<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Security update concerning CVE-2024-6387]]></title><description><![CDATA[<p dir="auto">Hello,</p>
<p dir="auto">We would like to inform you of a recent security vulnerability (CVE-2024-6387), which has been discovered in the OpenSSH component (versions 8.5p1 to 9.7p1) impacting operating systems based on Red Hat 9 (CentOS Stream, Rocky Linux, AlmaLinux).</p>
<p dir="auto">This vulnerability would allow an unauthenticated attacker to remotely execute code with root privileges. The exploit has so far only been proven on 32-bit systems.<br />
However, it is important to note that to exploit this flaw, continuous connections of 6 to 8 hours are required.</p>
<p dir="auto">As part of our migration plan to Alma Linux, we would like to assure you that security is a priority.</p>
<p dir="auto">The old GoFAST architecture using the CentOS operating system is not impacted; under Almalinux (the new architecture), we have updated the <a href="https://almalinux.org/blog/2024-07-01-almalinux-9-cve-2024-6387/" rel="nofollow ugc">package</a> to correct this vulnerability.</p>
<p dir="auto">Best regards,</p>
<p dir="auto">Léa Angelloz</p>
<p dir="auto">Useful link: <a href="https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-009/" rel="nofollow ugc">https://www.cert.ssi.gouv.fr/alerte/CERTFR-2024-ALE-009/</a></p>
]]></description><link>https://community.ceo-vision.com/topic/971/security-update-concerning-cve-2024-6387</link><generator>RSS for Node</generator><lastBuildDate>Sat, 11 Apr 2026 23:17:39 GMT</lastBuildDate><atom:link href="https://community.ceo-vision.com/topic/971.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 02 Jul 2024 08:48:05 GMT</pubDate><ttl>60</ttl></channel></rss>