Federal agency warns critical Linux vulnerability being actively exploitedjoojmachine@lemmy.ml to Linux@lemmy.ml – 300 points – 5 months agoarstechnica.com110Post a CommentPreviewYou are viewing a single commentView all commentsShow the parent commentYet another problem that actually updating your shit - which is trivially easy on enterprise Linux - would fix. It's part of the 95% of problems solved by actually updating your enterprise Linux host. unattended-upgrades and forget about itTell me more (for real, I'm unfamiliar).Its a Debian package that automatically upgraded packages (if they have pending security updates)I run mine manually, good to know. Will check it out.2 more...But then I can't screenshot my 7 years of uptimeJust live patch Although it is better to have some sort of HA system.That requires that the patches be in the repos. With RHEL it might be a few monthsNormally security patches are pretty good on same day releases as the CVE if available.2 more...
Yet another problem that actually updating your shit - which is trivially easy on enterprise Linux - would fix. It's part of the 95% of problems solved by actually updating your enterprise Linux host. unattended-upgrades and forget about itTell me more (for real, I'm unfamiliar).Its a Debian package that automatically upgraded packages (if they have pending security updates)I run mine manually, good to know. Will check it out.2 more...But then I can't screenshot my 7 years of uptimeJust live patch Although it is better to have some sort of HA system.That requires that the patches be in the repos. With RHEL it might be a few monthsNormally security patches are pretty good on same day releases as the CVE if available.2 more...
unattended-upgrades and forget about itTell me more (for real, I'm unfamiliar).Its a Debian package that automatically upgraded packages (if they have pending security updates)I run mine manually, good to know. Will check it out.2 more...
Tell me more (for real, I'm unfamiliar).Its a Debian package that automatically upgraded packages (if they have pending security updates)I run mine manually, good to know. Will check it out.
Its a Debian package that automatically upgraded packages (if they have pending security updates)I run mine manually, good to know. Will check it out.
But then I can't screenshot my 7 years of uptimeJust live patch Although it is better to have some sort of HA system.
That requires that the patches be in the repos. With RHEL it might be a few monthsNormally security patches are pretty good on same day releases as the CVE if available.
Yet another problem that actually updating your shit - which is trivially easy on enterprise Linux - would fix.
It's part of the 95% of problems solved by actually updating your enterprise Linux host.
unattended-upgrades and forget about it
Tell me more (for real, I'm unfamiliar).
Its a Debian package that automatically upgraded packages (if they have pending security updates)
I run mine manually, good to know. Will check it out.
But then I can't screenshot my 7 years of uptime
Just live patch
Although it is better to have some sort of HA system.
That requires that the patches be in the repos. With RHEL it might be a few months
Normally security patches are pretty good on same day releases as the CVE if available.