diff options
| author | Jose Quaresma <quaresma.jose@gmail.com> | 2024-07-02 17:53:16 +0100 |
|---|---|---|
| committer | Steve Sakoman <steve@sakoman.com> | 2024-07-09 06:06:09 -0700 |
| commit | 979f68bad09969bf85b2b6ecb575a6d264c0dc5e (patch) | |
| tree | d3ff8af01a8cd10798f1d07278645ece2306dab4 | |
| parent | 9170d3f0f33831955eca75097ed6d68817b62292 (diff) | |
| download | poky-979f68bad09969bf85b2b6ecb575a6d264c0dc5e.tar.gz | |
openssh: fix CVE-2024-6387
sshd(8) in Portable OpenSSH versions 8.5p1 to 9.7p1 (inclusive).
Race condition resulting in potential remote code execution.
A race condition in sshd(8) could allow remote code execution as root on non-OpenBSD systems.
This attack could be prevented by disabling the login grace timeout (LoginGraceTime=0 in sshd_config)
though this makes denial-of service against sshd(8) considerably easier.
For more information, please refer to the release notes [1] and the
report from the Qualys Security Advisory Team [2] who discovered the bug.
[1] https://www.openssh.com/txt/release-9.8
[2] https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
References:
https://www.openssh.com/security.html
(From OE-Core rev: ddb998d16fd869acb00a1cd8038ada20fd32aa8b)
Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io>
v2: include the missing cve tag: CVE: CVE-2024-6387
v3: add the Signed-off-by on the CVE-2024-6387.patch
Signed-off-by: Steve Sakoman <steve@sakoman.com>
| -rw-r--r-- | meta/recipes-connectivity/openssh/openssh/CVE-2024-6387.patch | 27 | ||||
| -rw-r--r-- | meta/recipes-connectivity/openssh/openssh_8.9p1.bb | 1 |
2 files changed, 28 insertions, 0 deletions
diff --git a/meta/recipes-connectivity/openssh/openssh/CVE-2024-6387.patch b/meta/recipes-connectivity/openssh/openssh/CVE-2024-6387.patch new file mode 100644 index 0000000000..3e7c707100 --- /dev/null +++ b/meta/recipes-connectivity/openssh/openssh/CVE-2024-6387.patch | |||
| @@ -0,0 +1,27 @@ | |||
| 1 | Description: fix signal handler race condition | ||
| 2 | Bug-Ubuntu: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2070497 | ||
| 3 | |||
| 4 | CVE: CVE-2024-6387 | ||
| 5 | |||
| 6 | Upstream-Status: Backport | ||
| 7 | https://git.launchpad.net/ubuntu/+source/openssh/commit/?h=applied/ubuntu/jammy-devel&id=b059bcfa928df4ff2d103ae2e8f4e3136ee03efc | ||
| 8 | |||
| 9 | Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io> | ||
| 10 | |||
| 11 | --- a/log.c | ||
| 12 | +++ b/log.c | ||
| 13 | @@ -452,12 +452,14 @@ void | ||
| 14 | sshsigdie(const char *file, const char *func, int line, int showfunc, | ||
| 15 | LogLevel level, const char *suffix, const char *fmt, ...) | ||
| 16 | { | ||
| 17 | +#if 0 | ||
| 18 | va_list args; | ||
| 19 | |||
| 20 | va_start(args, fmt); | ||
| 21 | sshlogv(file, func, line, showfunc, SYSLOG_LEVEL_FATAL, | ||
| 22 | suffix, fmt, args); | ||
| 23 | va_end(args); | ||
| 24 | +#endif | ||
| 25 | _exit(1); | ||
| 26 | } | ||
| 27 | |||
diff --git a/meta/recipes-connectivity/openssh/openssh_8.9p1.bb b/meta/recipes-connectivity/openssh/openssh_8.9p1.bb index 6411a64eff..d2c477a062 100644 --- a/meta/recipes-connectivity/openssh/openssh_8.9p1.bb +++ b/meta/recipes-connectivity/openssh/openssh_8.9p1.bb | |||
| @@ -36,6 +36,7 @@ SRC_URI = "http://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-${PV}.tar | |||
| 36 | file://CVE-2023-48795.patch \ | 36 | file://CVE-2023-48795.patch \ |
| 37 | file://CVE-2023-51384.patch \ | 37 | file://CVE-2023-51384.patch \ |
| 38 | file://CVE-2023-51385.patch \ | 38 | file://CVE-2023-51385.patch \ |
| 39 | file://CVE-2024-6387.patch \ | ||
| 39 | " | 40 | " |
| 40 | SRC_URI[sha256sum] = "fd497654b7ab1686dac672fb83dfb4ba4096e8b5ffcdaccd262380ae58bec5e7" | 41 | SRC_URI[sha256sum] = "fd497654b7ab1686dac672fb83dfb4ba4096e8b5ffcdaccd262380ae58bec5e7" |
| 41 | 42 | ||
