openoms on Nostr: A quick summary on regreSSHion ...
A quick summary on regreSSHion https://cert.europa.eu/publications/security-advisories/2024-066/pdf
Most home nodes are not exposed to the public internet, but any cloud server or VPS is at high risk.
Log in and check the openssh-server version with:
apt list openssh-server
See the safe versions for Debian (most distros on RPi are Debian based): https://security-tracker.debian.org/tracker/CVE-2024-6387
for Ubuntu (the most used on cloud servers): https://ubuntu.com/security/CVE-2024-6387
in many occasions autoupdate (aka unattended-upgrades) took care of it already, but if not run manually:
# update the apt store
sudo apt update
# look for openssh-server updating
sudo apt upgrade -y
# restart the ssh service to update the running code
sudo systemctl restart ssh
#regreSSHion #security
Most home nodes are not exposed to the public internet, but any cloud server or VPS is at high risk.
Log in and check the openssh-server version with:
apt list openssh-server
See the safe versions for Debian (most distros on RPi are Debian based): https://security-tracker.debian.org/tracker/CVE-2024-6387
for Ubuntu (the most used on cloud servers): https://ubuntu.com/security/CVE-2024-6387
in many occasions autoupdate (aka unattended-upgrades) took care of it already, but if not run manually:
# update the apt store
sudo apt update
# look for openssh-server updating
sudo apt upgrade -y
# restart the ssh service to update the running code
sudo systemctl restart ssh
#regreSSHion #security