Task #14449
closedCVE-2024-6387 - regreSSHion
0%
CW Updated by Colin Wilk about 2 months ago
{color:#abb2bf}---{color}
{color:#abb2bf}- {color}{color:#c678dd}name{color}{color:#abb2bf}: {color}{color:#98c379}Lets patch up another big boy vulnerability UwU (CVE-2024-6387){color}
{color:#abb2bf} {color}{color:#c678dd}hosts{color}{color:#abb2bf}: {color}{color:#98c379}linux{color}
{color:#abb2bf} {color}{color:#c678dd}gather_facts{color}{color:#abb2bf}: {color}{color:#d19a66}false{color}
{color:#abb2bf} {color}{color:#c678dd}tasks{color}{color:#abb2bf}:{color}
{color:#abb2bf} - {color}{color:#c678dd}name{color}{color:#abb2bf}: {color}{color:#98c379}Check if Ubuntu release is after 20.04 ^^{color}
{color:#abb2bf} {color}{color:#e5c07b}command{color}{color:#abb2bf}: {color}{color:#98c379}lsb_release -rs{color}
{color:#abb2bf} {color}{color:#c678dd}register{color}{color:#abb2bf}: {color}{color:#98c379}ubuntu_version{color}
{color:#abb2bf} - {color}{color:#c678dd}name{color}{color:#abb2bf}: {color}{color:#98c379}Shiiiit im affected ;-;.{color}
{color:#abb2bf} {color}{color:#e5c07b}debug{color}{color:#abb2bf}:{color}
{color:#abb2bf} {color}{color:#61afef}msg{color}{color:#abb2bf}: {color}{color:#98c379}"Ubuntu version is after 20.04 -> {color}{color:#56b6c2}{{{color}{color:#abb2bf} {color}{color:#e06c75}ubuntu_version{color}{color:#d19a66}.{color}{color:#e06c75}stdout{color}{color:#abb2bf} {color}{color:#56b6c2}}}{color}{color:#98c379}"{color}
{color:#abb2bf} {color}{color:#c678dd}when{color}{color:#abb2bf}: {color}{color:#e06c75}ubuntu_version{color}{color:#d19a66}.{color}{color:#e06c75}stdout{color}{color:#abb2bf} {color}{color:#c678dd}is{color}{color:#abb2bf} {color}{color:#e06c75}version{color}{color:#abb2bf}({color}{color:#98c379}'20.04'{color}{color:#abb2bf}, {color}{color:#98c379}'>'{color}{color:#abb2bf}){color}
{color:#abb2bf} - {color}{color:#c678dd}name{color}{color:#abb2bf}: {color}{color:#98c379}Gonna patch myself up OwO!!{color}
{color:#abb2bf} {color}{color:#e5c07b}ansible.builtin.apt{color}{color:#abb2bf}:{color}
{color:#abb2bf} {color}{color:#61afef}update_cache{color}{color:#abb2bf}: {color}{color:#d19a66}true{color}
{color:#abb2bf} {color}{color:#61afef}name{color}{color:#abb2bf}: {color}{color:#98c379}"*"{color}
{color:#abb2bf} {color}{color:#61afef}state{color}{color:#abb2bf}: {color}{color:#98c379}latest{color}
{color:#abb2bf} {color}{color:#c678dd}become{color}{color:#abb2bf}: {color}{color:#d19a66}true{color}
{color:#abb2bf} {color}{color:#c678dd}when{color}{color:#abb2bf}: {color}{color:#e06c75}ubuntu_version{color}{color:#d19a66}.{color}{color:#e06c75}stdout{color}{color:#abb2bf} {color}{color:#c678dd}is{color}{color:#abb2bf} {color}{color:#e06c75}version{color}{color:#abb2bf}({color}{color:#98c379}'20.04'{color}{color:#abb2bf}, {color}{color:#98c379}'>'{color}{color:#abb2bf}){color}
SK Updated by Stephan Krusche about 2 months ago
Sind unsere Systeme davon betroffen oder nicht?
IB Updated by ITG Bot about 2 months ago
Issue put to "In Progress" since somebody commented on it when its' state was already closed.
CW Updated by Colin Wilk about 2 months ago
Die meisten unserer Systeme sind Ubuntu 20.04, und damit nicht betroffen.
Ein paar unsere Systeme waren neuer und alles über 20.04 War betroffen. Ich hab alle systeme die betroffen waren gepatched.
Der Impact ist glücklicherweise nicht groß weil
Kaum welche unserer SSH ports offen sind und¶
Unsere ganxen systeme auf amd64 laufen und nicht x86 und dort die Memory protection mechanismen (ASLR) stärker sind als auf x86. Meines wissens konnte der Angriff bisher auch nur auf x86 systemen reproduziert werden auch wenn er theoretisch auf amd64 systemen möglich ist.¶
Alles in allem sind wir nicht mehr vulnerable und ich halte es für unwahrscheinlich, dass wir angegriffen wurden in der Zeit in der wir vulnerable waren.