Ssh Vulnerability 2024. Learn how to stay safe Researchers have found a malicious backdoor in a compression tool that made its way into widely used linux distributions, including those from red hat and debian.
The vulnerability allows a remote unauthenticated attacker to execute arbitrary commands on the affected target, as the user running the ssh service. Researchers have found a malicious backdoor in a compression tool that made its way into widely used linux distributions, including those from red hat and debian.