[BlueOnyx:27075] Re: New OpenSSH vulnerability
Taco Scargo
taco at blueonyx.nl
Tue Jul 2 01:24:44 -05 2024
Hi Michael,
As far as I can see Almalinux was already patched:
[root at alma ~]# rpm -qi openssh-server --changelog
Name : openssh-server
Version : 8.7p1
Release : 38.el9.alma.2
Architecture: x86_64
Install Date: Tue 02 Jul 2024 06:03:13 AM CEST
Group : Unspecified
Size : 1094809
License : BSD
Signature : RSA/SHA256, Mon 01 Jul 2024 08:05:53 PM CEST, Key ID d36cb86cb86b3716
Source RPM : openssh-8.7p1-38.el9.alma.2.src.rpm
Build Date : Mon 01 Jul 2024 07:48:41 PM CEST
Build Host : x64-builder01.almalinux.org
Packager : AlmaLinux Packaging Team <packager at almalinux.org>
Vendor : AlmaLinux
URL : http://www.openssh.com/portable.html
Summary : An open source SSH server daemon
Description :
OpenSSH is a free version of SSH (Secure SHell), a program for logging
into and executing commands on a remote machine. This package contains
the secure shell daemon (sshd). The sshd daemon allows SSH clients to
securely connect to your SSH server.
* Mon Jul 01 2024 Jonathan Wright <jonathan at almalinux.org> - 8.7p1-38.alma.2
- Fix regreSSHion attack
Resolves: CVE-2024-6387
> On 1 Jul 2024, at 18:35, Michael Stauber via Blueonyx <blueonyx at mail.blueonyx.it> wrote:
>
> Hi all,
>
> Qualsys reported a new OpenSSH vulnerability today:
>
> https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
>
> Affected OpenSSH versions:
> ==========================
>
> - OpenSSH versions earlier than 4.4p1 are vulnerable to this signal handler race condition unless they are patched for CVE-2006-5051 and CVE-2008-4109.
>
> - Versions from 4.4p1 up to, but not including, 8.5p1 are not vulnerable due to a transformative patch for CVE-2006-5051, which made a previously unsafe function secure.
>
> - The vulnerability resurfaces in versions from 8.5p1 up to, but not including, 9.8p1 due to the accidental removal of a critical component in a function.
>
>
> I did a quick check and we seem to be partially affected by this:
>
> Aventurin{e} 6109R: Not affected
> BlueOnyx 5209R (EOL): Not affected
> BlueOnyx 5210R: Affected
> BlueOnyx 5221R: Affected
>
> I can see that RedHat is already working on it:
>
> https://bugzilla.redhat.com/show_bug.cgi?id=2294879
>
> I'd expect that AlmaLinux is also on it, so fixed OpenSSH server RPMs should be available soon and it is recommended to urgently install them as soon as they become available.
>
> In the meantime you might want to secure your OpenSSH by either turning it off via the GUI or by limiting access to it via Firewall rules.
>
> --
> With best regards
>
> Michael Stauber
> _______________________________________________
> Blueonyx mailing list
> Blueonyx at mail.blueonyx.it
> http://mail.blueonyx.it/mailman/listinfo/blueonyx
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.blueonyx.it/pipermail/blueonyx/attachments/20240702/8607a48c/attachment.html>
More information about the Blueonyx
mailing list