-
Version2.4.100 Installation MethodSecurity Onion ISO image Descriptionupgrading Installation TypeDistributed Locationon-prem with Internet access Hardware SpecsMeets minimum requirements CPU4 RAM16 Storage for /2G Storage for /nsm2G Network Traffic Collectionspan port Network Traffic Speeds1Gbps to 10Gbps StatusYes, all services on all nodes are running OK Salt StatusNo, there are no failures LogsNo, there are no additional clues DetailHi, I'm running 2.4.100 and I have run soup and it is telling me that I'm all up to date. But:
Which according to my Security Onion Alerts screen is a vulnerable as per CVE-2024-6409. I've read the docs regarding updating and as far as I can tell I'm fully up to date.
I have rebooted the manager for good measure but the SSH version is still old. Is there anything I can do to update? Thanks, Jez. Guidelines
|
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 2 replies
-
Oracle package installed is openssh-server-8.7p1-38.0.2.el9_4.4.x86_64 2024-06-26 - Alex Burmashev [email protected] - 8.7p1-38.0.2
|
Beta Was this translation helpful? Give feedback.
-
https://linux.oracle.com/cve/CVE-2024-6409.html As mentioned previously Oracle Linux is not vulnerable to this. That Suricata rule you are referencing has a high false positive rate since its just using version. Some vulnerability scanners out there do the same thing where they see systems as vulnerable. This is because patches are backported into the existing version to fix the vulnerabilities. |
Beta Was this translation helpful? Give feedback.
https://linux.oracle.com/cve/CVE-2024-6409.html
As mentioned previously Oracle Linux is not vulnerable to this.
That Suricata rule you are referencing has a high false positive rate since its just using version. Some vulnerability scanners out there do the same thing where they see systems as vulnerable. This is because patches are backported into the existing version to fix the vulnerabilities.