harrysintonen , to random
@harrysintonen@infosec.exchange avatar

Remote Unauthenticated Code Execution in server

Affected versions:

  • OpenSSH versions earlier than 4.4p1
  • Versions from 4.4p1 up to, but not including, 8.5p1 are not vulnerable
  • Versions from 8.5p1 up to, but not including, 9.8p1

Details:

scy , to random
@scy@chaos.social avatar

Eek. Apparently liblzma (part of the xz package) has a backdoor in versions 5.6.0 and 5.6.1, causing SSH to be compromised.

https://www.openwall.com/lists/oss-security/2024/03/29/4

This might even have been done on purpose by the upstream devs.

Developing story, please take with a grain of salt.

The 5.6 versions are somewhat recent, depending on how bleeding edge your distro is you might not be affected.

wurzelmann , to random German
@wurzelmann@mastodon.wurzelmann.at avatar

Leute, patcht euer openSSH, es gibt da eine grausliche Schwachstelle gerade:

https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt

raptor , to random
@raptor@infosec.exchange avatar

Qualys does it again!

#regreSSHion: #RCE in #OpenSSH's server, on glibc-based #Linux systems
(CVE-2024-6387)

https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • test
  • worldmews
  • mews
  • All magazines