{"id":8984,"date":"2024-08-30T15:47:39","date_gmt":"2024-08-30T10:17:39","guid":{"rendered":"https:\/\/www.satup.xyz\/index.php\/2024\/08\/30\/regresshion-vulnerability-recommended-actions-and-steps-weve-taken\/"},"modified":"2024-08-30T15:47:39","modified_gmt":"2024-08-30T10:17:39","slug":"regresshion-vulnerability-recommended-actions-and-steps-weve-taken","status":"publish","type":"post","link":"https:\/\/www.satup.xyz\/index.php\/2024\/08\/30\/regresshion-vulnerability-recommended-actions-and-steps-weve-taken\/","title":{"rendered":"Regresshion vulnerability: Recommended actions and steps we&#8217;ve taken"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div>\n<div class=\"Markdownstyles-sc-dd1icp-0 bqHMUD MarkdownStyles__StyledMarkdown-sc-bf598916-0 CHvqG\">\n<p>DigitalOcean is aware of a new security issue with OpenSSH (sshd) that was released yesterday under the title \u201cregresshion\u201d or <a href=\"https:\/\/www.qualys.com\/regresshion-cve-2024-6387\/\" rel=\"ugc nofollow noopener\" target=\"_blank\">CVE-2024-6387<\/a>. This vulnerability appears to allow an attacker to gain remote root access on vulnerable Linux systems running OpenSSH. However, there are some important caveats. Notably, the exploit requires winning a race condition which can take several hours.<\/p>\n<p>We are asking our customers to upgrade SSHD on their Droplets. If customers are running their own SSHD servers as part of a containerized workload (e.g., SSHD inside a Kubernetes pod) you should upgrade that service and relaunch the workload. Instructions can be found below for how to update SSHD on Dropets.<\/p>\n<p>The table below lists the Security Notices published for each DigitalOcean provided distribution:<\/p>\n<p>As part of our <a href=\"https:\/\/www.digitalocean.com\/security\/shared-responsibility-model\">shared responsibility model<\/a>, we are taking several actions in response to this vulnerability, which are outlined below.<\/p>\n<div class=\"table-wrapper\">\n<table>\n<thead>\n<tr>\n<th><strong>Product<\/strong><\/th>\n<th><strong>Status<\/strong><\/th>\n<th><strong>Instructions<\/strong><\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>App Platform<\/td>\n<td>Not Affected<\/td>\n<td>No action needed<\/td>\n<\/tr>\n<tr>\n<td>Container Registry<\/td>\n<td>Not Affected<\/td>\n<td>No action needed<\/td>\n<\/tr>\n<tr>\n<td>Droplet<\/td>\n<td><strong>Affected<\/strong><\/td>\n<td>Customer needs to upgrade <code>openssh-server<\/code> and <code>openssh-client<\/code>. Instructions below. DigitalOcean has patched Droplet Base Images for new deployments<\/td>\n<\/tr>\n<tr>\n<td>Functions<\/td>\n<td>Not Affected<\/td>\n<td>No action needed<\/td>\n<\/tr>\n<tr>\n<td>Kubernetes<\/td>\n<td><strong>Affected<\/strong><\/td>\n<td>Port 22 is disabled on cluster nodes by default, but customers may have enabled it. Customers can <a href=\"https:\/\/docs.digitalocean.com\/products\/kubernetes\/how-to\/upgrade-cluster\/#on-demand\" rel=\"ugc nofollow noopener\" target=\"_blank\">apply a cluster upgrade<\/a> or wait for their <a href=\"https:\/\/docs.digitalocean.com\/products\/kubernetes\/how-to\/upgrade-cluster\/#automatically\" rel=\"ugc nofollow noopener\" target=\"_blank\">regular maintenance window<\/a> which will apply the patch.<\/td>\n<\/tr>\n<tr>\n<td>Load Balancers<\/td>\n<td>Not Affected<\/td>\n<td>No action needed<\/td>\n<\/tr>\n<tr>\n<td>Managed Databases<\/td>\n<td><strong>Affected<\/strong><\/td>\n<td>DigitalOcean has patched<\/td>\n<\/tr>\n<tr>\n<td>Monitoring<\/td>\n<td>Not Affected<\/td>\n<td>No action needed<\/td>\n<\/tr>\n<tr>\n<td>Networking<\/td>\n<td>Not Affected<\/td>\n<td>No action needed<\/td>\n<\/tr>\n<tr>\n<td>Spaces<\/td>\n<td>Not Affected<\/td>\n<td>No action needed<\/td>\n<\/tr>\n<tr>\n<td>Spaces CDN<\/td>\n<td>Not Affected<\/td>\n<td>No action needed<\/td>\n<\/tr>\n<tr>\n<td>Volumes<\/td>\n<td>Not Affected<\/td>\n<td>No action needed<\/td>\n<\/tr>\n<tr>\n<td>VPC<\/td>\n<td>Not Affected<\/td>\n<td>No action needed<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>Additionally, DigitalOcean is taking action to ensure the version of OpenSSH used across its internal environment is patched.<\/p>\n<h3 id=\"customer-managed-droplets\"><a href=\"#customer-managed-droplets\" onclick=\"navigator.clipboard.writeText(this.href);\">Customer managed Droplets<\/a><a class=\"hash-anchor\" href=\"#customer-managed-droplets\" aria-hidden=\"true\" onclick=\"navigator.clipboard.writeText(this.href);\"\/><\/h3>\n<h4 id=\"ubuntu-and-debian\">Ubuntu and Debian<\/h4>\n<p><strong>Interactive commands:<\/strong><\/p>\n<pre class=\"language-bash\"><code><span class=\"token function\">sudo<\/span> <span class=\"token function\">apt<\/span> update\n<span class=\"token function\">sudo<\/span> <span class=\"token function\">apt<\/span> <span class=\"token function\">install<\/span> --only-upgrade openssh-server openssh-client\n<\/code><\/pre>\n<p><strong>Non-interactive commands:<\/strong><\/p>\n<pre class=\"language-bash\"><code><span class=\"token function\">sudo<\/span> <span class=\"token function\">apt<\/span> update\n<span class=\"token function\">sudo<\/span> <span class=\"token function\">env<\/span> <span class=\"token assign-left variable\">DEBIAN_FRONTEND<\/span><span class=\"token operator\">=<\/span>noninteractive <span class=\"token function\">apt<\/span> <span class=\"token function\">install<\/span> --only-upgrade <span class=\"token parameter variable\">-y<\/span> openssh-server openssh-client\n<\/code><\/pre>\n<p>Note:<\/p>\n<ol>\n<li>\n<p>This command will only update OpenSSH server, client, and sftp.<\/p>\n<\/li>\n<li>\n<p>The interactive commands will require user input on how to handle the sshd_config (keep old, compare old to new, install new, etc.).<\/p>\n<\/li>\n<li>\n<p>The non-interactive commands will install the update and keep the existing sshd_config.<\/p>\n<\/li>\n<li>\n<p>The <code>--only-upgrade<\/code> flag will only install the package if the package has been previously installed. This is a safety check.<\/p>\n<\/li>\n<\/ol>\n<p>It is always a good idea to update your entire system but please be aware that this may introduce potential breaking issues.<\/p>\n<h4 id=\"centos-fedora-rocky-linux-almalinux\">CentOS, Fedora, Rocky Linux, AlmaLinux<\/h4>\n<pre class=\"language-bash\"><code><span class=\"token function\">sudo<\/span> yum update openssh-server\n<span class=\"token function\">sudo<\/span> yum update openssh-clients\n<\/code><\/pre>\n<\/div>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.digitalocean.com\/blog\/regresshion-vulnerability-recommended-action\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>DigitalOcean is aware of a new security issue with OpenSSH (sshd) that was released yesterday under the title \u201cregresshion\u201d or CVE-2024-6387. This vulnerability appears to allow an attacker to gain remote root access on vulnerable Linux systems running OpenSSH. However, there are some important caveats. Notably, the exploit requires winning a race condition which can [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8532,"comment_status":"","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[16],"tags":[],"class_list":["post-8984","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-app-developer"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/posts\/8984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/comments?post=8984"}],"version-history":[{"count":0,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/posts\/8984\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/media\/8532"}],"wp:attachment":[{"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/media?parent=8984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/categories?post=8984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/tags?post=8984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}