Combatting the OpenSSH Vulnerability

Time and again, we encounter stark reminders that every piece of software, no matter how widespread its use or how thoroughly it is reviewed, has the potential to harbor security vulnerabilities. A recent case in point is a security flaw that was detected in OpenSSH, a tool commonly employed for secure connectivity. This occurrence underlines the necessity of maintaining vigilance regarding all software, including those with the primary function of enhancing security.

The detected vulnerability in OpenSSH, designated CVE-2023-38408, opens the possibility of a remote execution attack under certain conditions. A remote command execution vulnerability represents a type of security flaw within computer systems, applications, or network devices that allows an attacker to execute arbitrary commands remotely on the target system. Once this breach has been exploited, the attacker can utilize the remote execution to mount further attacks, given that the remote host often possesses additional permissions within an organization's network.

As discovered through a code review, this vulnerability can be mitigated by updating OpenSSH to version 9.3p2.

How Developers Can Work With Generative AI Securely

If you work in software development, or indeed within any sector of the technology industry, you will have undoubtedly been part of discussions about, read headlines on, or even trialed a platform for generative artificial intelligence (AI). Put simply, this new and quickly evolving technology is everywhere.

Yet along with the exciting promise of greater productivity with AI code generation tools — GitHub argues the increase in developer productivity due to AI could boost global GDP by over $1.5 trillion — there is also increased risk. These risks include concerns around code quality, as AI models can produce complex code that is both difficult to understand and explain.