TABLE OF CONTENTS
DESCRIPTION
A critical vulnerability, identified as CVE-2024-6387, affects OpenSSH server (sshd) on all Enterprise Linux 9 system. This issue involves a signal handler race condition that can lead to a potential remote code execution.
MITIGATION
- Update OS OpenSSH
- Update Irass OpenSSH
STEPS
Update OS OpenSSH
1. Download the updated RPM packages and move them to the server via SFTP
2. Update OpenSSH RPM packages
3. Restart the sshd service
Update iRASS
1. Get the patch file from SecureKi Support
2. Update the patch file
3. Restart iRASS ALL Services
4. Check iRASS sshd version
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article