diff options
author | Jose Quaresma <quaresma.jose@gmail.com> | 2024-07-04 11:56:17 +0100 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2024-07-04 12:45:28 +0100 |
commit | fb18901d55caa80fb78bc93f569b005a8b9c8869 (patch) | |
tree | e57dae9e1c54b3749e26c99503ff9b12c7d311af /meta/recipes-extended/mdadm/files | |
parent | 18decbd1d5ddfcc62ea55412dc83f6449c1ff8c3 (diff) | |
download | poky-master-next.tar.gz |
openssh: fix CVE-2024-6387master-next
sshd(8) in Portable OpenSSH versions 8.5p1 to 9.7p1 (inclusive).
Race condition resulting in potential remote code execution.
A race condition in sshd(8) could allow remote code execution as root on non-OpenBSD systems.
This attack could be prevented by disabling the login grace timeout (LoginGraceTime=0 in sshd_config)
though this makes denial-of service against sshd(8) considerably easier.
For more information, please refer to the release notes [1] and the
report from the Qualys Security Advisory Team [2] who discovered the bug.
[1] https://www.openssh.com/txt/release-9.8
[2] https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
References:
https://www.openssh.com/security.html
(From OE-Core rev: 5d4694cc9bca69fa9c5acdd3007577614efafe20)
Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/mdadm/files')
0 files changed, 0 insertions, 0 deletions