Have a fairly vanilla Debian Buster (10) latest stable.
PCI Scan (sysnet/qualsys/worldpay) shows a PCI Compliance = NO vulnerability identified as CVE-2019-16905 https://security-tracker.debian.org/tracker/CVE-2019-16905
It doesn't look like it will be fixed for a while. The solution is to upgrade to OpenSSH 8.3.x (latest) which seems fairly straightforward with this https://www.tecmint.com/install-openssh-server-from-source-in-linux/
ssh -V
OpenSSH_8.3p1, OpenSSL 1.1.1d 10 Sep 2019
Then restarted ssh via sudo /etc/init.d/ssh restart
However, PCI Scan is still showing OpenSSH_7.9p1 Debian-10+deb10u2
even if ssh -V
and sudo ssh -V
are both showing OpenSSH_8.3p1, OpenSSL 1.1.1d 10 Sep 2019
Doing more debugging yields the following but still not sure what is going on
type -pa ssh /usr/local/bin/ssh <== correct /usr/bin/ssh <== OpenSSH_7.9p1 Debian-10+deb10u2, OpenSSL 1.1.1d 10 Sep 2019 /bin/ssh <== OpenSSH_7.9p1 Debian-10+deb10u2, OpenSSL 1.1.1d 10 Sep 201
Doing a
sudo apt-get remove openssh-server
did not really work (had to log back into using backup console from hosting provider)The
/etc/init.d/ssh
script is showing something
# /etc/init.d/ssh: start and stop the OpenBSD "secure shell(tm)" daemon
test -x /usr/sbin/sshd || exit 0
( /usr/sbin/sshd -\? 2>&1 | grep -q OpenSSH ) 2>/dev/null || exit 0
umask 022
if test -f /etc/default/ssh; then
. /etc/default/ssh
fi
Any insight would be appreciated - thanks!