Opened 9 months ago
Closed 9 months ago
#20027 closed enhancement (fixed)
openssh-9.8p1
Reported by: | Xi Ruoyao | Owned by: | Bruce Dubbs |
---|---|---|---|
Priority: | high | Milestone: | 12.2 |
Component: | Errata | Version: | git |
Severity: | normal | Keywords: | |
Cc: |
Description ¶
New minor version.
A critical vulnerability in sshd(8) was present in Portable OpenSSH versions 8.5p1 and 9.7p1 (inclusive) that may allow arbitrary code execution with root privileges.
Successful exploitation has been demonstrated on 32-bit Linux/glibc systems with ASLR. Under lab conditions, the attack requires on average 6-8 hours of continuous connections up to the maximum the server will accept. Exploitation on 64-bit systems is believed to be possible but has not been demonstrated at this time. It's likely that these attacks will be improved upon.
We should upgrade rivendell and anduin ASAP.
Change History (7)
comment:1 by , 9 months ago
Summary: | openssh-9.8 → openssh-9.8p1 |
---|
comment:2 by , 9 months ago
Owner: | changed from | to
---|---|
Status: | new → assigned |
comment:3 by , 9 months ago
Resolution: | → fixed |
---|---|
Status: | assigned → closed |
comment:4 by , 9 months ago
Component: | BOOK → Errata |
---|---|
Resolution: | fixed |
Status: | closed → reopened |
Reopen for a SA.
Fixed at commits