[nmglug] Federal agency warns critical Linux vulnerability being actively exploited | Ars Technica

Brian O'Keefe okeefe at cybermesa.com
Mon Jun 3 16:14:15 PDT 2024


The newer kernels aren't in the repositories for Ubuntu 20.04 LTS

On 6/3/24 05:11PM, Brian O'Keefe wrote:
>
> Thanks Ted. You've put me at ease!
>
> Brian
>
> On 6/3/24 01:44PM, Ted Pomeroy wrote:
>> Brian, Probably not at all. Note the breadth of the problem and the 
>> level. It affects a broad range of kernels, and will be attended to 
>> by the people who can address this at the kernel level. Keep an eye 
>> on updates, that is do them regularly, but no need to panic. I am 
>> assuming you are not running the servers for Cisco or AWS, just doing 
>> personal business on your machine. You do turn it off at night?
>> I usually like to be aware of the issues, but have confidence in the 
>> people at the kernel and OS levels who can address any issue, whether 
>> in the kernel, the OS or any application I am likely to use. I also 
>> try to be aware of my system's usual behaviors: amount of ram and cpu 
>> in normal use, speed of my applications and the loading of webpages. 
>> These are inexact, but for a personal computer at my level of 
>> involvement seem good enough. I am a bit cavalier about issues as a 
>> fresh install(after the issues has been addressed) can remedy any 
>> severe issues and I don't have my machine too heavily tweaked that I 
>> cannot start over again. I will eat my words if I do lose some files 
>> I have failed to back up recently, but that's the extent of my 
>> vulnerability.
>> I do also try to read up on "Gnu/Linux news" as a topic several times 
>> a week. When an issue hits I will look for the remedy being developed 
>> or implemented in a timely way. This one could be tricky, since it is 
>> in the kernel. It is also a kernel piece that has been retained over 
>> a long period. I will look at the release dates for the 5.14 and 6.6 
>> kernels to see how long. Hang in there and don't fret. Thank you, Ted P
>>
>> On Sun, Jun 2, 2024 at 2:05 PM Brian O'Keefe <okeefe at cybermesa.com> 
>> wrote:
>>
>>     Is this a problem for someone like me? Are folks aware of it?
>>
>>     $ uname -r
>>     5.4.0-182-generic
>>
>>
>>     https://arstechnica.com/security/2024/05/federal-agency-warns-critical-linux-vulnerability-being-actively-exploited/?comments=1&comments-page=1
>>     <https://arstechnica.com/security/2024/05/federal-agency-warns-critical-linux-vulnerability-being-actively-exploited/?comments=1&comments-page=1>
>>
>>     -- 
>>     _______________________________________________
>>     nmglug mailing list
>>     nmglug at lists.nmglug.org
>>     http://lists.nmglug.org/listinfo.cgi/nmglug-nmglug.org
>>
> -- 
>
> _______________________________________________
> nmglug mailing list
> nmglug at lists.nmglug.org
> http://lists.nmglug.org/listinfo.cgi/nmglug-nmglug.org
-- 
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.nmglug.org/pipermail/nmglug-nmglug.org/attachments/20240603/9bf2c272/attachment.htm>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.png
Type: image/png
Size: 3913 bytes
Desc: not available
URL: <http://lists.nmglug.org/pipermail/nmglug-nmglug.org/attachments/20240603/9bf2c272/attachment.png>


More information about the nmglug mailing list