cross-posted from: https://lemmy.pt/post/5733711
A severe vulnerability in OpenSSH, dubbed “regreSSHion” (CVE-2024-6387), has been discovered by the Qualys Threat Research Unit, potentially exposing
musl isn’t vulnerable, as per https://fosstodon.org/@musl/112711796005712271
The exploit isn’t that practicable, since it takes a very long time on 32 bit systems, which are ever rarer to see.
They could get RasPis below 4th gen running outdated software, I guess. I think I read elsewhere that Debian already had a patch out some time ago, so that number is also likely diminishingly small.
I have no idea when I last updated my RasPi 0s (none of which is exposed to the public).
Most images and distros are just Raspbian at their core and as such are pretty easy to upgrade.
I upgraded my homebridge/pihole from Bullseye to Bookworm just a few days ago and it went off without a hitch.
But it isn’t musl based? And I never heard it had anything except for the rolling release?