this post was submitted on 01 Jul 2024
15 points (100.0% liked)

Linux and Tech News

1008 readers
7 users here now

This is where all the News about Linux and Linux adjacent things goes. We'll use some of the articles here for the show! You can watch or listen at:

You can also get involved at our forum here on Lemmy:

Or just get the most recent episode of the show here:

founded 1 year ago
MODERATORS
top 3 comments
sorted by: hot top controversial new old
[–] Strit@lemmy.linuxuserspace.show 3 points 4 months ago (1 children)

If you are up to date on Arch, then this was fixed in an update for you.

[–] gamma@programming.dev 2 points 4 months ago

Just make sure you read the news (restart sshd)

[–] autotldr@lemmings.world 1 points 4 months ago

This is the best summary I could come up with:


Qualys went public today with a security vulnerability they have discovered within the OpenSSH server that could lead to remote, unauthenticated code execution.

OpenSSH servers running with the GNU C Library (glibc) in Linux environments are vulnerable to CVE-2024-6387, or the vulnerability they have dubbed "RegreSSHion" as a play on "SSH" and "regression".

A signal handler race condition within the OpenSSH server could lead to unauthenticated remote code execution.

Various versions of OpenSSH going back years are affected on Linux.

Qualys noted in their research: "This vulnerability, if exploited, could lead to full system compromise where an attacker can execute arbitrary code with the highest privileges, resulting in a complete system takeover, installation of malware, data manipulation, and the creation of backdoors for persistent access.

More details on CVE-2024-6387 as this severe OpenSSH security vulnerability for Linux servers can be found via the Qualys blog.


The original article contains 170 words, the summary contains 145 words. Saved 15%. I'm a bot and I'm open source!