FreeBSD warned users last week that an additional patch is needed to fix the OpenSSH vulnerability known as “regreSSHion,” which was first addressed in early July.FreeBSD, an open-source Unix-based operating system, uses OpenSSH to implement the Secure Shell Protocol (SSH) for services such as remote shell access.On July 1, the Qualys Threat Research Unit disclosed a high-severity vulnerability in OpenSSH that could lead to remote code execution (RCE) with root privileges. The flaw, tracked as CVE-2024-6387, affected more than 14 million internet-exposed instances across various Linux and Unix-based systems. FreeBSD first addressed CVE-2024-6387 with updates to stable versions 13 and 14, and release engineering (releng) versions 13.2, 13.3, 14.0 and 14.1 on July 1, but later discovered another version of the flaw resulting from its integration of the blacklistd daemon with OpenSSH. This version of the flaw, disclosed Aug. 7 and tracked as CVE-2024-7589, poses the same RCE risk as the original regreSSHion flaw and requires additional updates to stable versions 13 and 14, and releng versions 13.3, 14.0 and 14.1. Detailed instructions for applying the necessary patches are available in the latest advisory.If immediate patching is not possible, users can prevent RCE by setting the LoginGraceTime to 0 in /etc/ssh/sshd_config and restarting sshd(8). This workaround leaves instances vulnerable to denial of service, but prevents attackers from exploiting the flaw to perform RCE with root privileges.
Network Security, Vulnerability Management, Patch/Configuration Management
FreeBSD releases new patch for regreSSHion-related RCE flaw

An In-Depth Guide to Network Security
Get essential knowledge and practical strategies to fortify your network security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds