diff options
author | Jose Quaresma <quaresma.jose@gmail.com> | 2024-07-02 17:53:16 +0100 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2024-07-09 06:06:09 -0700 |
commit | 979f68bad09969bf85b2b6ecb575a6d264c0dc5e (patch) | |
tree | d3ff8af01a8cd10798f1d07278645ece2306dab4 /scripts/sysroot-relativelinks.py | |
parent | 9170d3f0f33831955eca75097ed6d68817b62292 (diff) | |
download | poky-979f68bad09969bf85b2b6ecb575a6d264c0dc5e.tar.gz |
openssh: fix CVE-2024-6387
sshd(8) in Portable OpenSSH versions 8.5p1 to 9.7p1 (inclusive).
Race condition resulting in potential remote code execution.
A race condition in sshd(8) could allow remote code execution as root on non-OpenBSD systems.
This attack could be prevented by disabling the login grace timeout (LoginGraceTime=0 in sshd_config)
though this makes denial-of service against sshd(8) considerably easier.
For more information, please refer to the release notes [1] and the
report from the Qualys Security Advisory Team [2] who discovered the bug.
[1] https://www.openssh.com/txt/release-9.8
[2] https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
References:
https://www.openssh.com/security.html
(From OE-Core rev: ddb998d16fd869acb00a1cd8038ada20fd32aa8b)
Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io>
v2: include the missing cve tag: CVE: CVE-2024-6387
v3: add the Signed-off-by on the CVE-2024-6387.patch
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'scripts/sysroot-relativelinks.py')
0 files changed, 0 insertions, 0 deletions