@EastonMan 看的新闻
+碎碎念
+膜大佬
+偶尔猫猫
+伊斯通听的歌
Matt Keeter
Beating the compiler

source
(author: Matt Keeter ([email protected]))
或者写一篇《敏捷香山不敏捷》
Easton Meow | 是满满
明天写篇博客
再写一篇《为什么科研不能使用RTL》
香山gem5无法支撑体系结构科研
明天写篇博客
什么gem5用不了一点
明天开始学习
发文章还得看chanpsim
Matt Keeter
Raven

A flexible Uxn + Varvara emulator

source
(author: Matt Keeter ([email protected]))
Arch Linux: Recent news updates
The sshd service needs to be restarted after upgrading to openssh-9.8p1

After upgrading to openssh-9.8p1, the existing SSH daemon will be unable to accept new connections (see https://gitlab.archlinux.org/archlinux/packaging/packages/openssh/-/issues/5).
When upgrading remote hosts, please make sure to restart the sshd service using systemctl try-restart sshd right after upgrading.

We are evaluating the possibility to automatically apply a restart of the sshd service on upgrade in a future release of the openssh-9.8p1 package.

source
(author: Robin Candau)
Race condition in sshd(8)
A critical vulnerability in sshd(8) was present in Portable OpenSSH versions 8.5p1 and 9.7p1 (inclusive) that may allow arbitrary code execution with root privileges.
https://www.openssh.com/releasenotes.html

Qualys Security Advisory: https://www.mail-archive.com/[email protected]/msg00235.html

Mitigation: set LoginGraceTime=0 in sshd_config

Fixing commit: https://github.com/openssh/openssh-portable/commit/81c1099d22b81ebfd20a334ce986c4f753b0db29

Because this fix is part of a large commit (81c1099), on top of an even larger defense-in-depth commit (03e3de4, "Start the process of splitting sshd into separate binaries"), it might prove difficult to backport. In that case, the signal handler race condition itself can be fixed by removing or commenting out the async-signal-unsafe code from the sshsigdie() function; for example:

 sshsigdie(const char *file, const char *func, int line, int showfunc,
     LogLevel level, const char *suffix, const char *fmt, ...)
 {
+#if 0
         va_list args;
 
         va_start(args, fmt);
         sshlogv(file, func, line, showfunc, SYSLOG_LEVEL_FATAL,
             suffix, fmt, args);
         va_end(args);
+#endif
         _exit(1);
 }
▓▓▓▓▓▓▓▓▓▓░░░░░░░░░░ 50%
Back to Top