• stuner@lemmy.world
    link
    fedilink
    arrow-up
    8
    ·
    2 days ago

    It seems that most LTS distros didn’t get a heads up and there are no patches available. Uh oh.

    • woelkchen@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      1 day ago

      Automated test suites became so good, many regular people can just use rolling release distros these days.

      • stuner@lemmy.world
        link
        fedilink
        arrow-up
        5
        ·
        1 day ago

        That may be true for personal computers, but the impact of this vulnerability is mainly on servers. And those typically run distros like Debian, Ubuntu, RHEL that didn’t have a patch at that time.

        • woelkchen@lemmy.world
          link
          fedilink
          arrow-up
          3
          ·
          1 day ago

          the impact of this vulnerability is mainly on servers

          The impact is any Linux install without root access for its users.

          • dgdft@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            23 hours ago

            Sure, but it’s much easier to get some form of RCE on public hosts in order to make practical use of the LPE.

      • stuner@lemmy.world
        link
        fedilink
        arrow-up
        3
        ·
        1 day ago

        It looks like the fixes were merged in 6.18, 6.19, and 7.0. But all older (but supported) LTS kernels didn’t have the fix, like 6.12, which is used in Debian 13. And it also seems that Ubuntu, RHEL, and SUSE had not picked up the patches in their kernel versions.