OpenSSH Remote Code Execution Vulnerability (CVE-2024-6387) Security Risk
This vulnerability is due to a signal handler competition issue in the OpenSSH service (sshd), allowing an unauthenticated attacker to This vulnerability can be exploited to execute arbitrary code as root on a Linux system. At present, the technical details of this vulnerability have been disclosed on the Internet. This vulnerability has a large impact. It is recommended to conduct self-examination and protection as soon as possible.
Affected versions: 8.5p1 - 9.7p1
Vernacular: In versions 8.5p1 - 9.7p1 of SSH, external attackers can Just modify your host
View the latest version file
https://cdn.openbsd.org/pub/OpenBSD/ OpenSSH/portable/
View version
Update and install necessary packages
Download the latest package:
Unzip:
Compile:
Install:
Restart the service:
View version
If the version does not show openssh-9.8p1, you need to add environment variables:
Verification takes effect
Check the version (OK if openssh-9.8p1 appears)
Modify the ExecStartPre, ExecStart and ExecReload lines in the ssh.service file,
Change /usr/sbin/sshd to /usr/local/sbin/sshd
Confirm the modification content:
Reload the service:
List running SSH processes (confirm if it is /usr/local/sbin/sshd)
Note: The above operation will change the ssh configuration file to /usr/local/etc/sshd_config. The content of the configuration file needs to be updated.
Delete the new configuration file and create a link. Go to /etc/ssh/sshd_config and load service
Clean up old versions (optional)