CVE-2022-24950
Linux openSUSE vulnerability analysis and mitigation

Overview

A race condition vulnerability was discovered in Eternal Terminal versions prior to 6.2.0, identified as CVE-2022-24950. The vulnerability allows an authenticated attacker to hijack other users' SSH authorization socket, which can be exploited to enable unauthorized login to other systems as the targeted users. The vulnerability was discovered in the UserTerminalRouter::getInfoForId() function and was publicly disclosed in early 2022 (GitHub Advisory, NVD).

Technical details

The vulnerability stems from a logic bug in UserTerminalRouter::getInfoForId() where user info for a client connection is pulled from a mutable unordered_map named idInfoMap. This user info is retrieved in TerminalServer::run() and later passed to pipeSocketHandler::listen() to set permissions on the forwarded SSH socket. The race condition occurs during the retrieval and modification of user information, allowing an attacker to manipulate the contents of idInfoMap such that the forwarded SSH socket ownership is transferred to the attacker (GitHub Advisory).

Impact

When successfully exploited, the vulnerability allows an authenticated attacker to gain ownership of forwarded ssh-agent sockets of other users. This enables the attacker to login to any other machine that the targeted user could normally access via SSH. Additionally, as a side effect, the victim may be given a session as the attacker upon logging on (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in Eternal Terminal version 6.2.0. Users are advised to upgrade to this version or later to protect against this vulnerability. The fix was implemented by adding proper synchronization mechanisms to prevent the race condition (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Linux openSUSE vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-62291HIGH8.1
  • strongSwanstrongSwan
  • strongswan-nm
NoYesJan 16, 2026
CVE-2026-0891HIGH8.1
  • Mozilla FirefoxMozilla Firefox
  • MozillaFirefox
NoYesJan 13, 2026
CVE-2025-24528HIGH7.1
  • KerberosKerberos
  • krb5
NoYesJan 16, 2026
CVE-2026-0890MEDIUM5.4
  • Mozilla FirefoxMozilla Firefox
  • firefox-esr
NoYesJan 13, 2026
CVE-2025-43904MEDIUM4.2
  • Linux DebianLinux Debian
  • slurm-doc
NoYesJan 16, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management