@[email protected] to [email protected]English • 4 months agoFederal agency warns critical Linux vulnerability being actively exploitedarstechnica.comexternal-linkmessage-square86fedilinkarrow-up1290arrow-down16cross-posted to: [email protected][email protected]
arrow-up1284arrow-down1external-linkFederal agency warns critical Linux vulnerability being actively exploitedarstechnica.com@[email protected] to [email protected]English • 4 months agomessage-square86fedilinkcross-posted to: [email protected][email protected]
minus-square@[email protected]linkfedilink28•4 months agoYet another problem that actually updating your shit - which is trivially easy on enterprise Linux - would fix. It’s part of the 95% of problems solved by actually updating your enterprise Linux host.
minus-square@[email protected]linkfedilink3•edit-24 months agoIts a Debian package that automatically upgraded packages (if they have pending security updates)
minus-square@[email protected]linkfedilink3•4 months agoI run mine manually, good to know. Will check it out.
minus-squarePossibly linuxlinkfedilinkEnglish1•4 months agoJust live patch Although it is better to have some sort of HA system.
minus-squarePossibly linuxlinkfedilinkEnglish1•4 months agoThat requires that the patches be in the repos. With RHEL it might be a few months
minus-square@[email protected]linkfedilink2•4 months agoNormally security patches are pretty good on same day releases as the CVE if available.
Yet another problem that actually updating your shit - which is trivially easy on enterprise Linux - would fix.
It’s part of the 95% of problems solved by actually updating your enterprise Linux host.
unattended-upgrades and forget about it
oops, our third party application broke again
Never happened to me when set to security.
Tell me more (for real, I’m unfamiliar).
Its a Debian package that automatically upgraded packages (if they have pending security updates)
I run mine manually, good to know. Will check it out.
But then I can’t screenshot my 7 years of uptime
Just live patch
Although it is better to have some sort of HA system.
That requires that the patches be in the repos. With RHEL it might be a few months
Normally security patches are pretty good on same day releases as the CVE if available.