summaryrefslogtreecommitdiffstats
path: root/scripts/sysroot-relativelinks.py
diff options
context:
space:
mode:
authorJose Quaresma <quaresma.jose@gmail.com>2024-07-02 17:53:16 +0100
committerSteve Sakoman <steve@sakoman.com>2024-07-09 06:06:09 -0700
commit979f68bad09969bf85b2b6ecb575a6d264c0dc5e (patch)
treed3ff8af01a8cd10798f1d07278645ece2306dab4 /scripts/sysroot-relativelinks.py
parent9170d3f0f33831955eca75097ed6d68817b62292 (diff)
downloadpoky-979f68bad09969bf85b2b6ecb575a6d264c0dc5e.tar.gz
openssh: fix CVE-2024-6387
sshd(8) in Portable OpenSSH versions 8.5p1 to 9.7p1 (inclusive). Race condition resulting in potential remote code execution. A race condition in sshd(8) could allow remote code execution as root on non-OpenBSD systems. This attack could be prevented by disabling the login grace timeout (LoginGraceTime=0 in sshd_config) though this makes denial-of service against sshd(8) considerably easier. For more information, please refer to the release notes [1] and the report from the Qualys Security Advisory Team [2] who discovered the bug. [1] https://www.openssh.com/txt/release-9.8 [2] https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt References: https://www.openssh.com/security.html (From OE-Core rev: ddb998d16fd869acb00a1cd8038ada20fd32aa8b) Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io> v2: include the missing cve tag: CVE: CVE-2024-6387 v3: add the Signed-off-by on the CVE-2024-6387.patch Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'scripts/sysroot-relativelinks.py')
0 files changed, 0 insertions, 0 deletions