<div dir="ltr"><div class="gmail_default" style="font-size:large">Brian and all, Linux kernel 5.14 release August 2021, and kernel 6.6 released October 2023. I am not sure what that means for the news and issues involved. Ted P<br></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Mon, Jun 3, 2024 at 1:44 PM Ted Pomeroy <<a href="mailto:ted.pome@gmail.com">ted.pome@gmail.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir="ltr"><div class="gmail_default" style="font-size:large">Brian, Probably not at all. Note the breadth of the problem and the level. It affects a broad range of kernels, and will be attended to by the people who can address this at the kernel level. Keep an eye on updates, that is do them regularly, but no need to panic. I am assuming you are not running the servers for Cisco or AWS, just doing personal business on your machine. You do turn it off at night?</div><div class="gmail_default" style="font-size:large">I usually like to be aware of the issues, but have confidence in the people at the kernel and OS levels who can address any issue, whether in the kernel, the OS or any application I am likely to use. I also try to be aware of my system's usual behaviors: amount of ram and cpu in normal use, speed of my applications and the loading of webpages. These are inexact, but for a personal computer at my level of involvement seem good enough. I am a bit cavalier about issues as a fresh install(after the issues has been addressed) can remedy any severe issues and I don't have my machine too heavily tweaked that I cannot start over again. I will eat my words if I do lose some files I have failed to back up recently, but that's the extent of my vulnerability. <br></div><div class="gmail_default" style="font-size:large">I do also try to read up on "Gnu/Linux news" as a topic several times a week. When an issue hits I will look for the remedy being developed or implemented in a timely way. This one could be tricky, since it is in the kernel. It is also a kernel piece that has been retained over a long period. I will look at the release dates for the 5.14 and 6.6 kernels to see how long. Hang in there and don't fret. Thank you, Ted P<br></div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Sun, Jun 2, 2024 at 2:05 PM Brian O'Keefe <<a href="mailto:okeefe@cybermesa.com" target="_blank">okeefe@cybermesa.com</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><u></u>
<div>
<p>Is this a problem for someone like me? Are folks aware of it?<br>
</p>
<p>$ uname -r<br>
5.4.0-182-generic<br>
</p>
<p><br>
</p>
<a href="https://arstechnica.com/security/2024/05/federal-agency-warns-critical-linux-vulnerability-being-actively-exploited/?comments=1&comments-page=1" target="_blank">https://arstechnica.com/security/2024/05/federal-agency-warns-critical-linux-vulnerability-being-actively-exploited/?comments=1&comments-page=1</a>
<div>-- <br>
<img src="cid:ii_18fdf94c5d261a917f31" border="0"></div>
</div>
_______________________________________________<br>
nmglug mailing list<br>
<a href="mailto:nmglug@lists.nmglug.org" target="_blank">nmglug@lists.nmglug.org</a><br>
<a href="http://lists.nmglug.org/listinfo.cgi/nmglug-nmglug.org" rel="noreferrer" target="_blank">http://lists.nmglug.org/listinfo.cgi/nmglug-nmglug.org</a><br>
</blockquote></div>
</blockquote></div>