summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJose Quaresma <quaresma.jose@gmail.com>2024-07-02 17:53:16 +0100
committerSteve Sakoman <steve@sakoman.com>2024-07-09 06:06:09 -0700
commit979f68bad09969bf85b2b6ecb575a6d264c0dc5e (patch)
treed3ff8af01a8cd10798f1d07278645ece2306dab4
parent9170d3f0f33831955eca75097ed6d68817b62292 (diff)
downloadpoky-979f68bad09969bf85b2b6ecb575a6d264c0dc5e.tar.gz
openssh: fix CVE-2024-6387
sshd(8) in Portable OpenSSH versions 8.5p1 to 9.7p1 (inclusive). Race condition resulting in potential remote code execution. A race condition in sshd(8) could allow remote code execution as root on non-OpenBSD systems. This attack could be prevented by disabling the login grace timeout (LoginGraceTime=0 in sshd_config) though this makes denial-of service against sshd(8) considerably easier. For more information, please refer to the release notes [1] and the report from the Qualys Security Advisory Team [2] who discovered the bug. [1] https://www.openssh.com/txt/release-9.8 [2] https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt References: https://www.openssh.com/security.html (From OE-Core rev: ddb998d16fd869acb00a1cd8038ada20fd32aa8b) Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io> v2: include the missing cve tag: CVE: CVE-2024-6387 v3: add the Signed-off-by on the CVE-2024-6387.patch Signed-off-by: Steve Sakoman <steve@sakoman.com>
-rw-r--r--meta/recipes-connectivity/openssh/openssh/CVE-2024-6387.patch27
-rw-r--r--meta/recipes-connectivity/openssh/openssh_8.9p1.bb1
2 files changed, 28 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/openssh/openssh/CVE-2024-6387.patch b/meta/recipes-connectivity/openssh/openssh/CVE-2024-6387.patch
new file mode 100644
index 0000000000..3e7c707100
--- /dev/null
+++ b/meta/recipes-connectivity/openssh/openssh/CVE-2024-6387.patch
@@ -0,0 +1,27 @@
1Description: fix signal handler race condition
2Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2070497
3
4CVE: CVE-2024-6387
5
6Upstream-Status: Backport
7https://git.launchpad.net/ubuntu/+source/openssh/commit/?h=applied/ubuntu/jammy-devel&id=b059bcfa928df4ff2d103ae2e8f4e3136ee03efc
8
9Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io>
10
11--- a/log.c
12+++ b/log.c
13@@ -452,12 +452,14 @@ void
14 sshsigdie(const char *file, const char *func, int line, int showfunc,
15 LogLevel level, const char *suffix, const char *fmt, ...)
16 {
17+#if 0
18 va_list args;
19
20 va_start(args, fmt);
21 sshlogv(file, func, line, showfunc, SYSLOG_LEVEL_FATAL,
22 suffix, fmt, args);
23 va_end(args);
24+#endif
25 _exit(1);
26 }
27
diff --git a/meta/recipes-connectivity/openssh/openssh_8.9p1.bb b/meta/recipes-connectivity/openssh/openssh_8.9p1.bb
index 6411a64eff..d2c477a062 100644
--- a/meta/recipes-connectivity/openssh/openssh_8.9p1.bb
+++ b/meta/recipes-connectivity/openssh/openssh_8.9p1.bb
@@ -36,6 +36,7 @@ SRC_URI = "http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${PV}.tar
36 file://CVE-2023-48795.patch \ 36 file://CVE-2023-48795.patch \
37 file://CVE-2023-51384.patch \ 37 file://CVE-2023-51384.patch \
38 file://CVE-2023-51385.patch \ 38 file://CVE-2023-51385.patch \
39 file://CVE-2024-6387.patch \
39 " 40 "
40SRC_URI[sha256sum] = "fd497654b7ab1686dac672fb83dfb4ba4096e8b5ffcdaccd262380ae58bec5e7" 41SRC_URI[sha256sum] = "fd497654b7ab1686dac672fb83dfb4ba4096e8b5ffcdaccd262380ae58bec5e7"
41 42