Opened 4 days ago

Closed 2 days ago

#20027 closed enhancement (fixed)

openssh-9.8p1

Reported by: Xi Ruoyao Owned by: Bruce Dubbs
Priority: high Milestone: 12.2
Component: Errata Version: git
Severity: normal Keywords:
Cc:

Description

New minor version.

A critical vulnerability in sshd(8) was present in Portable OpenSSH versions 8.5p1 and 9.7p1 (inclusive) that may allow arbitrary code execution with root privileges.

Successful exploitation has been demonstrated on 32-bit Linux/glibc systems with ASLR. Under lab conditions, the attack requires on average 6-8 hours of continuous connections up to the maximum the server will accept. Exploitation on 64-bit systems is believed to be possible but has not been demonstrated at this time. It's likely that these attacks will be improved upon.

We should upgrade rivendell and anduin ASAP.

Change History (7)

comment:1 by Xi Ruoyao, 4 days ago

Summary: openssh-9.8openssh-9.8p1

comment:2 by Bruce Dubbs, 4 days ago

Owner: changed from blfs-book to Bruce Dubbs
Status: newassigned

comment:3 by Bruce Dubbs, 4 days ago

Resolution: fixed
Status: assignedclosed

Fixed at commits

03391fe844 Update to feh-3.10.3.
f37d310283 Update to openssh-9.8p1 (Security Update).
ed7255a03d Update to SPIRV-LLVM-Translator-18.1.2.

comment:4 by Xi Ruoyao, 4 days ago

Component: BOOKErrata
Resolution: fixed
Status: closedreopened

Reopen for a SA.

comment:5 by Rahul Chandra, 2 days ago

I'll do the SA

comment:6 by Rahul Chandra, 2 days ago

CVE-2024-6387

comment:7 by Rahul Chandra, 2 days ago

Resolution: fixed
Status: reopenedclosed

SA 12.1-066 issued

Note: See TracTickets for help on using tickets.