-
Notifications
You must be signed in to change notification settings - Fork 45
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[<Debian GNU/Linux 10 (buster)>] <Vulnerability in OpenSSH server (CVE-2024-6387)> #1580
Comments
Hi @brookerrj, Thanks for using Bitnami. According to the official Debian website, Debian Buster stopped receiving security updates as of June 30th, 2022. I'm afraid I don't know if Debian Buster is affected by CVE-2024-6387 because it is not listed in the CVE description webpage either. You will need to ask in a more specialized forum for further help on this. |
Hello, The OpenSSH server vulnerability (CVE-2024-6387) is a critical issue that affects OpenSSH’s server (sshd) due to a race condition, allowing remote attackers to execute arbitrary code without authentication12. For Debian GNU/Linux 10 (buster), here are the steps to address this vulnerability: Check for Updates: Unattended Upgrades: Best Regards, |
This Issue has been automatically marked as "stale" because it has not had recent activity (for 15 days). It will be closed if no further activity occurs. Thanks for the feedback. |
@florence0239 Thank you for your feedback. I shall try to implement your solution in the next few days. I just need to make sure all is properly backed up first. |
This Issue has been automatically marked as "stale" because it has not had recent activity (for 15 days). It will be closed if no further activity occurs. Thanks for the feedback. |
Due to the lack of activity in the last 5 days since it was marked as "stale", we proceed to close this Issue. Do not hesitate to reopen it later if necessary. |
Describe your issue as much as you can
I'm assuming that the OpenSSH server vulnerability (CVE-2024-6387) is present in Debian GNU/Linux 10 (buster)?
How can I get fixes for this version? Will there be a fix available in the unattended-upgrades for this version?
Versions on my server:
bitnami@wordpress-1-vm:~$ sudo dpkg -l | grep ssh
ii libssh2-1:amd64 1.8.0-2.1+deb10u1 amd64 SSH2 client-side library
ii openssh-client 1:7.9p1-10+deb10u4 amd64 secure shell (SSH) client, for secure access to remote machines
ii openssh-server 1:7.9p1-10+deb10u4 amd64 secure shell (SSH) server, for secure access from remote machines
ii openssh-sftp-server 1:7.9p1-10+deb10u4 amd64 secure shell (SSH) sftp server module, for SFTP access from remote machines
ii ssh 1:7.9p1-10+deb10u4 all secure shell client and server (metapackage)
bitnami@wordpress-1-vm:~$ lsb_release -a
No LSB modules are available.
Distributor ID: Debian
Description: Debian GNU/Linux 10 (buster)
Release: 10
Codename: buster
The text was updated successfully, but these errors were encountered: