And the light will shine if you don't update!
This is actually a 2020 regression of a vulnerability initially fixed in 2006 (hence the name 😎). It is a "race condition" which requires several hours to be exploited but which allows you to become root. It is detectable but you will have to be reactive!
The original article : https://www.openwall.com/lists/oss-security/2024/07/01/3
The OpenSSH versions state are as follows:
8.5p1 <= OpenSSH < 9.8p1 is vulnerable again due to the regression
How to correct OpenSSH regression?
First things to determine:
Do you have OpenSSH exposed on the Internet?
If so, are they vulnerable?
If so, update them as a priority!
Then:
Do you have OpenSSH internally?
If so, are they vulnerable?
If yes, schedule the update
If you can't update :
Restrict Access to SSH (limit exposition of ssh to admin networks, IP address white listing...)
Disabling password-based logins when possible
Monitor SSH access logs for unusual activities
In addition, here is a procedure that we recommend to update without losing control if the classic update does not work or is not available :