joojmachine@lemmy.ml to Linux@lemmy.mlEnglish · 5 months agoFederal agency warns critical Linux vulnerability being actively exploitedarstechnica.comexternal-linkmessage-square111fedilinkarrow-up1310arrow-down15cross-posted to: cybersecurity@sh.itjust.works
arrow-up1305arrow-down1external-linkFederal agency warns critical Linux vulnerability being actively exploitedarstechnica.comjoojmachine@lemmy.ml to Linux@lemmy.mlEnglish · 5 months agomessage-square111fedilinkcross-posted to: cybersecurity@sh.itjust.works
minus-squarecorsicanguppy@lemmy.calinkfedilinkarrow-up34arrow-down1·5 months agoYet another problem that actually updating your shit - which is trivially easy on enterprise Linux - would fix. It’s part of the 95% of problems solved by actually updating your enterprise Linux host.
minus-squaredelirious_owl@discuss.onlinelinkfedilinkarrow-up8arrow-down1·5 months agounattended-upgrades and forget about it
minus-squareKISSmyOSFeddit@lemmy.worldlinkfedilinkarrow-up6arrow-down1·5 months agooops, our third party application broke again
minus-squaredelirious_owl@discuss.onlinelinkfedilinkarrow-up6arrow-down1·5 months agoNever happened to me when set to security.
minus-squaredelirious_owl@discuss.onlinelinkfedilinkarrow-up3·edit-25 months agoIts a Debian package that automatically upgraded packages (if they have pending security updates)
minus-squareiegod@lemm.eelinkfedilinkarrow-up3·5 months agoI run mine manually, good to know. Will check it out.
minus-squareikidd@lemmy.worldlinkfedilinkEnglisharrow-up1·5 months agoBut then I can’t screenshot my 7 years of uptime
minus-squarePossibly linux@lemmy.ziplinkfedilinkEnglisharrow-up1·5 months agoJust live patch Although it is better to have some sort of HA system.
minus-squarePossibly linux@lemmy.ziplinkfedilinkEnglisharrow-up1·5 months agoThat requires that the patches be in the repos. With RHEL it might be a few months
minus-squarefruitycoder@sh.itjust.workslinkfedilinkarrow-up2·5 months agoNormally security patches are pretty good on same day releases as the CVE if available.
Yet another problem that actually updating your shit - which is trivially easy on enterprise Linux - would fix.
It’s part of the 95% of problems solved by actually updating your enterprise Linux host.
unattended-upgrades and forget about it
oops, our third party application broke again
Never happened to me when set to security.
Tell me more (for real, I’m unfamiliar).
Its a Debian package that automatically upgraded packages (if they have pending security updates)
I run mine manually, good to know. Will check it out.
But then I can’t screenshot my 7 years of uptime
Just live patch
Although it is better to have some sort of HA system.
That requires that the patches be in the repos. With RHEL it might be a few months
Normally security patches are pretty good on same day releases as the CVE if available.