[nmglug] Federal agency warns critical Linux vulnerability being actively exploited | Ars Technica
Brian O'Keefe
okeefe at cybermesa.com
Mon Jun 3 16:14:15 PDT 2024
The newer kernels aren't in the repositories for Ubuntu 20.04 LTS
On 6/3/24 05:11PM, Brian O'Keefe wrote:
>
> Thanks Ted. You've put me at ease!
>
> Brian
>
> On 6/3/24 01:44PM, Ted Pomeroy wrote:
>> Brian, Probably not at all. Note the breadth of the problem and the
>> level. It affects a broad range of kernels, and will be attended to
>> by the people who can address this at the kernel level. Keep an eye
>> on updates, that is do them regularly, but no need to panic. I am
>> assuming you are not running the servers for Cisco or AWS, just doing
>> personal business on your machine. You do turn it off at night?
>> I usually like to be aware of the issues, but have confidence in the
>> people at the kernel and OS levels who can address any issue, whether
>> in the kernel, the OS or any application I am likely to use. I also
>> try to be aware of my system's usual behaviors: amount of ram and cpu
>> in normal use, speed of my applications and the loading of webpages.
>> These are inexact, but for a personal computer at my level of
>> involvement seem good enough. I am a bit cavalier about issues as a
>> fresh install(after the issues has been addressed) can remedy any
>> severe issues and I don't have my machine too heavily tweaked that I
>> cannot start over again. I will eat my words if I do lose some files
>> I have failed to back up recently, but that's the extent of my
>> vulnerability.
>> I do also try to read up on "Gnu/Linux news" as a topic several times
>> a week. When an issue hits I will look for the remedy being developed
>> or implemented in a timely way. This one could be tricky, since it is
>> in the kernel. It is also a kernel piece that has been retained over
>> a long period. I will look at the release dates for the 5.14 and 6.6
>> kernels to see how long. Hang in there and don't fret. Thank you, Ted P
>>
>> On Sun, Jun 2, 2024 at 2:05 PM Brian O'Keefe <okeefe at cybermesa.com>
>> wrote:
>>
>> Is this a problem for someone like me? Are folks aware of it?
>>
>> $ uname -r
>> 5.4.0-182-generic
>>
>>
>> https://arstechnica.com/security/2024/05/federal-agency-warns-critical-linux-vulnerability-being-actively-exploited/?comments=1&comments-page=1
>> <https://arstechnica.com/security/2024/05/federal-agency-warns-critical-linux-vulnerability-being-actively-exploited/?comments=1&comments-page=1>
>>
>> --
>> _______________________________________________
>> nmglug mailing list
>> nmglug at lists.nmglug.org
>> http://lists.nmglug.org/listinfo.cgi/nmglug-nmglug.org
>>
> --
>
> _______________________________________________
> nmglug mailing list
> nmglug at lists.nmglug.org
> http://lists.nmglug.org/listinfo.cgi/nmglug-nmglug.org
--
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.nmglug.org/pipermail/nmglug-nmglug.org/attachments/20240603/9bf2c272/attachment.htm>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.png
Type: image/png
Size: 3913 bytes
Desc: not available
URL: <http://lists.nmglug.org/pipermail/nmglug-nmglug.org/attachments/20240603/9bf2c272/attachment.png>
More information about the nmglug
mailing list