Updating OpenSSH to address CVE-2024-6387

Warning The instructions mentioned in this post are no longer necessary. The “regreSSHion” vulnerability in Rocky Linux’s OpenSSH package is addressed in the default repositories. Please read the SIG/Security Wiki, consider your needs, and plan accordingly before using the SIG/Security repository.

I am trying to address CVE-2024-6387 on my Linux server. It’s running following version.

Virtualization: vmware
Operating System: Rocky Linux 9.4 (Blue Onyx)
CPE OS Name: cpe:/o:rocky:rocky:9::baseos
Kernel: Linux 5.14.0-427.24.1.el9_4.x86_64

When it comes to addressing CVE-2024-6387, I am bit lost as to what’s best approach to take

There is following OpenSSH installed

openssh-8.7p1-38.el9.x86_64

As mentioned in here is running following commands best approach to take?

  1. Install the SIG/Security release file
dnf install rocky-release-security
  1. Disable SIG/Security security-common repo
dnf config-manager --disable security-common
  1. Upgrade openssh
dnf --enablerepo=security-common update openssh\*
  1. Confirm version openssh-8.7p1-38.el9_4.security.0.5 is installed
rpm -q openssh

Or should I update OpenSSH using following command to address this CVE? I believe this will update OpenSSH to latest version in repository which is 8.7p1-38.el9_4.4

update openssh *

Please help as I am not used to Linux a lot

CVE-2024-6387 was addressed in openssh-8.7p1-38.el9_4.1. The current version is openssh-8.7p1-38.el9_4.4.

Run dnf update to update your system to full. Running rpm -q openssh will tell you the version you are running after.

1 Like

This topic was automatically closed 60 days after the last reply. New replies are no longer allowed.