Security Vulnerability: remote code execution in openssh aka CVE-2024-6387 aka "regreSSHion"
This document (000021482) is provided subject to the disclaimer at the end of this document.
Environment
Situation
Only SUSE Linux Enterprise 15 SP6, SUSE Linux Micro 6.0, openSUSE Leap 15.6 and openSUSE Tumbleweed were affected by this problem.
Resolution
Status
Additional Information
In the "/etc/sysconfig/ssh" filed in the SSHD_OPTS line add the "-e" option, like:
SSHD_OPTS="-e"And restart the sshd.service.
The -e option will not use the affected syslog() function to the journal, but instead log to stderr to systemd and so in turn to journald.
References: https://www.suse.com/security/cve/CVE-2024-6387.html
Researcher Blog: https://blog.qualys.com/vulnerabilities-threat-research/2024/07/01/regresshion-remote-unauthenticated-code-execution-vulnerability-in-openssh-server
Disclaimer
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:000021482
- Creation Date: 02-Jul-2024
- Modified Date:02-Jul-2024
-
- SUSE Linux Enterprise Desktop
- SUSE Linux Enterprise Server
- SUSE Linux Enterprise Server for SAP Applications
For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com