@Openssh-9.0p1 SCP注入漏洞及编译最新版本Openssl
Openssh-9.0p1 SCP注入漏洞及编译最新版本Openssl-3.0.5
1、OpenSSH 命令注入漏洞,禁用SCP
rpm -qa | grep openssh*
yum remove openssh-clients -y
删除openssh-clients后,验证下,命令行执行scp命令报错:
-bash:scp command not found
这样就禁用了scp命令
如果有SCP反馈信息,find / -name scp ,找到执行文件,删除, rm /文件所在目录/scp
重启ssh服务:
service sshd restart
2、安装最新版本openssl
最新版本文件openssl-3.0.5.tar.gz
wget https://www.openssl.org/source/openssl-3.0.5.tar.gz --no-check-certificate
拷贝到服务器,并解压、编译、安装
tar xzvf openssl-3.0.5.tar.gz
./config --prefix=/usr/local/ssl -d shared
make
make install
echo ‘/usr/local/ssl/lib’ >> /etc/ld.so.conf
ldconfig -v
3、重新编译ssh
cd openssh-9.0p1
./configure --prefix=/usr/local/openssh --with-zlib=/usr/local/zlib --with-ssl-dir=/usr/local/ssl
make
make install
service sshd restart
ssh -V