tags:glibcopenSSHlinuxrace_condition original link: regreSSHion: RCE in OpenSSH’s server, on glibc-based Linux systems (CVE-2024-6387) newsletter link: exploits.club Weekly Newsletter 28
Exploits Club Summary:
The only way you haven’t heard about this is if you have been living under a rock or inside your debugger. Earlier this week, Qualys’ Threat Research Unit identified an RCE vulnerability within OpenSSH, specifically impacting glibc-based Linux systems. For many of you who work on the blue side of the house, that may be as far as you made it in the advisory before you had a panic attack and started patching systems. However, the write-up is exceptionally detailed, walking through the signal handler race condition, the history of the bug (a regression to CVE-2006-5051, originally reported by @mdowd) and the exploit strategy.