OpenSSH and Qualys have disclosed CVE-2024-6387, which is a race condition allowing for Remote Code Execution as Root in openssh-server. OpenSSH estimate that 6-8 hours of bruteforcing against an ASLR-enabled 32-bit system would allow this vulnerability to be exploited. Exploits for 64-bit are currently still theoretical. I've raised this as urgent, although it could potentially be downgraded to High until the exploit is proven. There are more details about this vulnerability on https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt This will be fixed by bug 2230781, which I will hopefully have a look at later today. Reproducible: Always
Freshly un-embargoed, this is also being tracked on bug 2294604.
The fix has landed