[nmglug] Federal agency warns critical Linux vulnerability being actively exploited | Ars Technica

Brian O'Keefe okeefe at cybermesa.com
Mon Jun 3 16:11:39 PDT 2024


Thanks Ted. You've put me at ease!

Brian

On 6/3/24 01:44PM, Ted Pomeroy wrote:
> Brian, Probably not at all. Note the breadth of the problem and the 
> level. It affects a broad range of kernels, and will be attended to by 
> the people who can address this at the kernel level. Keep an eye on 
> updates, that is do them regularly, but no need to panic. I am 
> assuming you are not running the servers for Cisco or AWS, just doing 
> personal business on your machine. You do turn it off at night?
> I usually like to be aware of the issues, but have confidence in the 
> people at the kernel and OS levels who can address any issue, whether 
> in the kernel, the OS or any application I am likely to use. I also 
> try to be aware of my system's usual behaviors: amount of ram and cpu 
> in normal use, speed of my applications and the loading of webpages. 
> These are inexact, but for a personal computer at my level of 
> involvement seem good enough. I am a bit cavalier about issues as a 
> fresh install(after the issues has been addressed) can remedy any 
> severe issues and I don't have my machine too heavily tweaked that I 
> cannot start over again. I will eat my words if I do lose some files I 
> have failed to back up recently, but that's the extent of my 
> vulnerability.
> I do also try to read up on "Gnu/Linux news" as a topic several times 
> a week. When an issue hits I will look for the remedy being developed 
> or implemented in a timely way. This one could be tricky, since it is 
> in the kernel. It is also a kernel piece that has been retained over a 
> long period. I will look at the release dates for the 5.14 and 6.6 
> kernels to see how long. Hang in there and don't fret. Thank you, Ted P
>
> On Sun, Jun 2, 2024 at 2:05 PM Brian O'Keefe <okeefe at cybermesa.com> wrote:
>
>     Is this a problem for someone like me? Are folks aware of it?
>
>     $ uname -r
>     5.4.0-182-generic
>
>
>     https://arstechnica.com/security/2024/05/federal-agency-warns-critical-linux-vulnerability-being-actively-exploited/?comments=1&comments-page=1
>     <https://arstechnica.com/security/2024/05/federal-agency-warns-critical-linux-vulnerability-being-actively-exploited/?comments=1&comments-page=1>
>
>     -- 
>     _______________________________________________
>     nmglug mailing list
>     nmglug at lists.nmglug.org
>     http://lists.nmglug.org/listinfo.cgi/nmglug-nmglug.org
>
-- 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.nmglug.org/pipermail/nmglug-nmglug.org/attachments/20240603/17454969/attachment.htm>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.png
Type: image/png
Size: 3913 bytes
Desc: not available
URL: <http://lists.nmglug.org/pipermail/nmglug-nmglug.org/attachments/20240603/17454969/attachment.png>


More information about the nmglug mailing list