diff options
author | Jose Quaresma <quaresma.jose@gmail.com> | 2024-07-04 13:56:17 +0300 |
---|---|---|
committer | Patrick Williams <patrick@stwcx.xyz> | 2024-07-12 00:40:29 +0300 |
commit | 634e797b0331cad240ff7c1a360864f333753612 (patch) | |
tree | bbe9380cccb1d49a465b9be1d2e4dd5a320915ba /meta-openembedded/meta-networking/files/waf-cross-answers/cross-answers-aarch64_be.txt | |
parent | bdf952eeb3a133bf83dc181c254ad183777e556a (diff) | |
download | openbmc-2.17.0-dev.tar.xz |
openssh: fix CVE-2024-63872.17.0-dev
sshd(8) in Portable OpenSSH versions 8.5p1 to 9.7p1 (inclusive).
Race condition resulting in potential remote code execution.
A race condition in sshd(8) could allow remote code execution as root on non-OpenBSD systems.
This attack could be prevented by disabling the login grace timeout (LoginGraceTime=0 in sshd_config)
though this makes denial-of service against sshd(8) considerably easier.
For more information, please refer to the release notes [1] and the
report from the Qualys Security Advisory Team [2] who discovered the bug.
[1] https://www.openssh.com/txt/release-9.8
[2] https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
References:
https://www.openssh.com/security.html
(From OE-Core rev: 7ba7c96f31bd81c5d1352136e405e99c3df29ea7)
Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Change-Id: Id6ba21766000be8c7216da1d0d9af6dce5914a0f
Diffstat (limited to 'meta-openembedded/meta-networking/files/waf-cross-answers/cross-answers-aarch64_be.txt')
0 files changed, 0 insertions, 0 deletions