If you're using server-side Google Tag Manager (GTM) and received a warning about a critical OpenSSH vulnerability, there's no need for alarm. This alert pertains to the underlying Google Cloud infrastructure that hosts your server-side GTM setup.
Key Points for GTM Users:
- Vulnerability Scope: The issue affects the Google Cloud tech stack, such as Cloud Run, which may host your server-side GTM.
- Automatic Updates: Google will automatically update the infrastructure and its dependencies to address the vulnerability.
- No User Action Required: You do not need to take any action to address this vulnerability in your GTM setup.
The alert titled "[Action Required] Critical OpenSSH vulnerability (CVE-2024-6387)" was sent to all affected Google Cloud customers. Despite the "Action Required" header, Google has confirmed they will handle all necessary updates. These automatic updates will resolve the vulnerability without any need for changes to your GTM configuration. You can continue to use your server-side GTM as usual, knowing that Google is actively addressing this security concern.
While no immediate action is needed, it's always a good practice to stay informed about any further communications from Google regarding your Cloud services.