<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=6702&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=6702</link>
		<description><![CDATA[The most recent posts in CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems.]]></description>
		<lastBuildDate>Sat, 06 Jul 2024 18:05:51 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=50947#p50947</link>
			<description><![CDATA[<p>BTW, Siva, how does one know that&#160; 1:9.2p1-2+deb12u3 fixes regreSSHion?&#160; &#160; Never mind, found it on Debian&#039;s changelog.&#160; &#160;async-signal-unsafe&#160; (<a href="https://metadata.ftp-master.debian.org/changelogs//main/o/openssh/openssh_9.2p1-2+deb12u3_changelog" rel="nofollow">https://metadata.ftp-master.debian.org/ … _changelog</a>).</p>]]></description>
			<author><![CDATA[dummy@example.com (ghp)]]></author>
			<pubDate>Sat, 06 Jul 2024 18:05:51 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=50947#p50947</guid>
		</item>
		<item>
			<title><![CDATA[Re: CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=50946#p50946</link>
			<description><![CDATA[<p>I know, Siva, but I&#039;m running Devuan.&#160; &#160;I&#039;ve even tried with Debian&#039;s packages, which got me into a bit of a &quot;pickle&quot;, if that&#039;s what the English call it.&#160; I was hoping someone could tell me why Devuan is holding back.&#160; May be a dependency problem?&#160; But yes, I ran apt-get update, a number of times now since I read about regreSSHion.</p>]]></description>
			<author><![CDATA[dummy@example.com (ghp)]]></author>
			<pubDate>Sat, 06 Jul 2024 17:55:43 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=50946#p50946</guid>
		</item>
		<item>
			<title><![CDATA[Re: CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=50944#p50944</link>
			<description><![CDATA[<p>Hate asking, but did you run <span class="bbc">apt update</span> first? Debian&#039;s armhf version is at the correct version.</p><p><a href="https://packages.debian.org/search?arch=armhf&amp;keywords=openssh-server" rel="nofollow">https://packages.debian.org/search?arch … ssh-server</a></p>]]></description>
			<author><![CDATA[dummy@example.com (siva)]]></author>
			<pubDate>Sat, 06 Jul 2024 14:16:22 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=50944#p50944</guid>
		</item>
		<item>
			<title><![CDATA[Re: CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=50922#p50922</link>
			<description><![CDATA[<p>Any idea why this fix is not needed for daedalus on armhf?</p><div class="codebox"><pre><code>openssh-server is already the newest version (1:9.2p1-2+deb12u2).</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (ghp)]]></author>
			<pubDate>Thu, 04 Jul 2024 06:03:59 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=50922#p50922</guid>
		</item>
		<item>
			<title><![CDATA[Re: CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=50871#p50871</link>
			<description><![CDATA[<div class="quotebox"><blockquote><div><div class="codebox"><pre><code>Upgrade: openssh-client:amd64 (1:9.2p1-2+deb12u2, 1:9.2p1-2+deb12u3)</code></pre></div></div></blockquote></div><p>Now that you mention that, it looks like they released two fixes today: one to address the CVE in the server, and one to fix a separate issue in the client. <a href="https://www.openssh.com/releasenotes.html" rel="nofollow">https://www.openssh.com/releasenotes.html</a></p>]]></description>
			<author><![CDATA[dummy@example.com (siva)]]></author>
			<pubDate>Mon, 01 Jul 2024 19:01:48 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=50871#p50871</guid>
		</item>
		<item>
			<title><![CDATA[Re: CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=50870#p50870</link>
			<description><![CDATA[<p>Hello:</p><p>Got the upgrade from Devuan early this morning:</p><div class="codebox"><pre><code>Start-Date: 2024-07-01  07:09:32
Commandline: apt upgrade
Requested-By: groucho (1000)
Upgrade: openssh-client:amd64 (1:9.2p1-2+deb12u2, 1:9.2p1-2+deb12u3)
End-Date: 2024-07-01  07:09:34</code></pre></div><div class="codebox"><pre><code>Log started: 2024-07-01  07:09:32
Preparing to unpack .../openssh-client_1%3a9.2p1-2+deb12u3_amd64.deb ...
Unpacking openssh-client (1:9.2p1-2+deb12u3) over (1:9.2p1-2+deb12u2) ...
Setting up openssh-client (1:9.2p1-2+deb12u3) ...
Processing triggers for man-db (2.11.2-2) ...
Log ended: 2024-07-01  07:09:34</code></pre></div><p>Best,</p><p>A.</p>]]></description>
			<author><![CDATA[dummy@example.com (Altoid)]]></author>
			<pubDate>Mon, 01 Jul 2024 16:40:05 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=50870#p50870</guid>
		</item>
		<item>
			<title><![CDATA[CVE-2024-6387: RCE in OpenSSH's server, on glibc-based Linux systems]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=50866#p50866</link>
			<description><![CDATA[<p>Qualys writeup: <a href="https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt?ref=upstract.com" rel="nofollow">https://www.qualys.com/2024/07/01/cve-2 … stract.com</a><br />Debian security tracker: <a href="https://security-tracker.debian.org/tracker/CVE-2024-6387" rel="nofollow">https://security-tracker.debian.org/tra … -2024-6387</a><br />NIST report: <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-6387" rel="nofollow">https://nvd.nist.gov/vuln/detail/CVE-2024-6387</a></p><p>The Qualys writeup includes an in-depth walkthrough of the vulnerability. Can&#039;t find a standalone proof-of-concept at this time.</p><div class="quotebox"><blockquote><div><p>We discovered a vulnerability (a signal handler race condition) in<br />OpenSSH&#039;s server (sshd): if a client does not authenticate within<br />LoginGraceTime seconds (120 by default, 600 in old OpenSSH versions),<br />then sshd&#039;s SIGALRM handler is called asynchronously, but this signal<br />handler calls various functions that are not async-signal-safe (for<br />example, syslog()). This race condition affects sshd in its default<br />configuration.</p><p>On investigation, we realized that this vulnerability is in fact a<br />regression of CVE-2006-5051 (&quot;Signal handler race condition in OpenSSH<br />before 4.4 allows remote attackers to cause a denial of service (crash),<br />and possibly execute arbitrary code&quot;), which was reported in 2006 by<br />Mark Dowd.</p><p>This regression was introduced in October 2020 (OpenSSH 8.5p1) by commit<br />752250c (&quot;revised log infrastructure for OpenSSH&quot;), which accidentally<br />removed an &quot;#ifdef DO_LOG_SAFE_IN_SIGHAND&quot; from sigdie(), a function<br />that is directly called by sshd&#039;s SIGALRM handler. In other words:</p><p>- OpenSSH &lt; 4.4p1 is vulnerable to this signal handler race condition,<br />&#160; if not backport-patched against CVE-2006-5051, or not patched against<br />&#160; CVE-2008-4109, which was an incorrect fix for CVE-2006-5051;</p><p>- 4.4p1 &lt;= OpenSSH &lt; 8.5p1 is not vulnerable to this signal handler race<br />&#160; condition (because the &quot;#ifdef DO_LOG_SAFE_IN_SIGHAND&quot; that was added<br />&#160; to sigdie() by the patch for CVE-2006-5051 transformed this unsafe<br />&#160; function into a safe _exit(1) call);</p><p>- 8.5p1 &lt;= OpenSSH &lt; 9.8p1 is vulnerable again to this signal handler<br />&#160; race condition (because the &quot;#ifdef DO_LOG_SAFE_IN_SIGHAND&quot; was<br />&#160; accidentally removed from sigdie()).</p></div></blockquote></div>]]></description>
			<author><![CDATA[dummy@example.com (siva)]]></author>
			<pubDate>Mon, 01 Jul 2024 16:06:15 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=50866#p50866</guid>
		</item>
	</channel>
</rss>
