- cross-posted to:
- technology@lemmy.ml
- cross-posted to:
- technology@lemmy.ml
cross-posted from: https://lemmy.pt/post/5733711
A severe vulnerability in OpenSSH, dubbed “regreSSHion” (CVE-2024-6387), has been discovered by the Qualys Threat Research Unit, potentially exposing
Question if I update my server and it has the new SSH (patched) package. Is that enough or do I have to restart the server as well? How can I check if the old SSH is in use currently?
deleted by creator
we do restarts twice a month, they are in production
Well I should have read the first comment before I went ahead with update and reboot😪
Some package managers have a command to see if anything is in need of restart. Zypper has ps -s for example. I’d restart to be sure though.
My server tells me a restart would be required because of:
Does that have anything to do with the SSH package?
It sounds like it’s the kernel but whether it has anything to do with ssh, I really don’t know. Sometimes parts work together in surprising ways, as I learned with the recent sshd/systemd/xz exploit.
You might be fine and this was the most alarming exploit since it’s very inconvenient, but personally I’d restart just to be sure.
For anyone in RHEL / Fedora land (or using dnf somewhere else), try
dnf needs-restarting
to list executables that have mismatched files on disk vs memory. The-r
flag will hint if a reboot is needed (due to things like kernel or glibc changes)