Hello, Dear Users.

 

Recently OpenSSH has burst a serious vulnerability, for security considerations, please test whether you are in the affected range.

 

Vulnerability details: CVE-2024-6387 High risk: average 6-8 hours to obtain root privileges

A Remote Code Execution (RCE) vulnerability has been identified in OpenSSH due to a signal handler contention issue in the OpenSSH server (sshd), which can be exploited by an unauthenticated attacker to execute arbitrary code as root on a Linux system.

 

Versions affected: 4.4p1 and 8.5p1 <= OpenSSH < 9.7p1

Affected systems: Debian12 OpenSSH 9.2p1, Ubuntu 22.04 OpenSSH 8.9p1.

Tips: Most of the affected systems are newer versions of Ubuntu, Debian and Centos9, while older versions of Centos6, 7 and 8 are not affected. 

 

The ssh -V command allows you to check the current version of your server. 

 

If you are using a version of OpenSSH within the affected range, please use the official source to update to OpenSSH 9.8p1 as soon as possible, third-party mirrors may not be able to update to the latest security version due to synchronization lag and other issues.

 

Please refer to the following:

https://www.openssh.com/txt/release-9.8

 

https://www.cve.org/CVERecord?id=CVE-2024-6387



Tuesday, 2nd July, 2024,18:26pm