Hello Linux users, 

A critical OpenSSH RCE bug dubbed "regreSSHion" was recently discovered. This flaw enables an unauthenticated attacker to gain root-level code execution without authentication, potentially compromising an entire system and resulting in malware infections, data breaches, and the creation of backdoors for sustained unauthorized access. Just the thought of experiencing these repercussions makes me tremble!

Read on to learn if your OpenSSH version is impacted and how to secure your systems against this widespread vulnerability. You’ll also get updates on other issues affecting your open-source programs and applications that threaten your sensitive data and system security. 

If you gained valuable information from reading today’s newsletter, please share it with a fellow security geek. Do you have a Linux security-related topic you'd like to cover for our audience? We welcome contributions from passionate, insightful community members who share our love for Linux and security!

Stay safe out there,

Brittany Signature 150 Esm W150

OpenSSH

The Discovery 

A critical OpenSSH RCE bug dubbed "regreSSHion" (CVE-2024-6387) was recently discovered. This flaw enables an unauthenticated attacker to gain root-level code execution without authentication, rendering this race condition especially severe given SSH's root-level access capabilities.

OpenSSH Esm W190

The Impact

This flaw could potentially compromise an entire system, resulting in malware infections, data breaches, and the creation of backdoors for sustained unauthorized access. 

The Fix

Critical OpenSSH security bug fixes have been released to mitigate this issue. We strongly recommend that all impacted users update immediately to secure their systems and data against compromise. 

Your Related Advisories:

Register to Customize Your Advisories

PHP

The Discovery 

Cybercriminals have recently been exploiting a PHP code execution vulnerability to spread TellYouThePass ransomware. This flaw impacts PHP versions 8.1, before 8.1.29, 8.2, before 8.2.20, and 8.3. before 8.3.8.

PHP Esm W306

The Impact

This bug enables malicious actors to execute arbitrary PHP code on target systems, putting web applications and servers at risk of ransomware attacks.

The Fix

Distros continue to release essential PHP security advisory updates addressing this issue. We strongly encourage all impacted users to update now to protect their systems and data against ransomware attacks.

Your Related Advisories:

Register to Customize Your Advisories

Linux Kernel

The Discovery 

Have you updated to mitigate the high-severity privilege elevation bug (CVE-2023-3390) identified in the Linux kernel? Proof-of-Concept (PoC) exploit for this vulnerability has significantly increased its risk, providing security researchers and malicious actors with the knowledge required to exploit it. 

LinuxKernel Esm W206

The Impact

This bug enables threat actors to gain root access to impacted systems, leading to complete system compromise, data loss, and malware infections, among other threats.

The Fix

Important Linux kernel security patch updates have been released to mitigate this flaw. We urge all impacted users to update immediately to protect the security of their systems and sensitive data.

Your Related Advisories:

Register to Customize Your Advisories