- cross-posted to:
- linux@lemmy.ml
- cross-posted to:
- linux@lemmy.ml
A severe vulnerability in OpenSSH, dubbed “regreSSHion” (CVE-2024-6387), has been discovered by the Qualys Threat Research Unit, potentially exposing
musl isn’t vulnerable, as per https://fosstodon.org/@musl/112711796005712271
Last I read about it it required connecting for 6-7 hours continuously on 32bit systems, and it’s unknown how long it would take on 64bit.
Yeah, exactly. Very impracticable.
But, eventually exploitable is still a pretty major concern for anybody who has systems running longer than a few days at a time.
True, an RCE is always a serious thing. Just saying it’s not exactly catastrophic like others have been more so.
I can’t imagine any system of influence running an exposed ssh without some further protection from connection abuse like fail2ban.
Reminds me of the node-ip guy making thn repo read only because of amateur researchers filling up cve s
I always use my ssh server for remote code execution.
technically the truth!