<!DOCTYPE html>
<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  </head>
  <body>
    Thanks.  FYI, the fixed kernels are<br>
    <ul>
      <li>6.12.85+  -- Raspberry Pi, and most Debian 13 systems</li>
      <li>6.18.22+  -- most LTS</li>
      <li>7.0+  -- I'm using 7.0.3 (CachyOS), so I'm OK.</li>
    </ul>
    <br>
    <div class="moz-cite-prefix">On 2026-04-30 21:17, Jason wrote:<br>
    </div>
    <blockquote type="cite"
cite="mid:CAEnL8_dhaTvPJ2CvyGazwsR9vCNyXy8FzKWxeEFTZEDRyizpeQ@mail.gmail.com">
      <meta http-equiv="content-type" content="text/html; charset=UTF-8">
      <div dir="auto">
        <div dir="auto">Pretty critical kernel exploit that allows local
          privilege escalation'</div>
        <div dir="auto"><br>
        </div>
        <div dir="auto"><a
            href="https://www.cve.org/CVERecord?id=CVE-2026-31431"
            rel="noreferrer noreferrer" target="_blank"
            moz-do-not-send="true" class="moz-txt-link-freetext">https://www.cve.org/CVERecord?id=CVE-2026-31431</a></div>
        <div dir="auto"><br>
        </div>
        <div dir="auto">Video explanation:  <a
href="https://youtube.com/shorts/UIXYsZ67VCo?si=gBrke6vANgmU38r4"
            target="_blank" rel="noreferrer" moz-do-not-send="true"
            class="moz-txt-link-freetext">https://youtube.com/shorts/UIXYsZ67VCo?si=gBrke6vANgmU38r4</a></div>
        <div dir="auto"><br>
        </div>
        Make sure to update your machines , and make sure you're on a
        patched version. Trackers for common distros:
        <div dir="auto">
          <div dir="auto"><br>
          </div>
          <div dir="auto">- RedHat <a
href="https://access.redhat.com/security/cve/cve-2026-31431"
              rel="noreferrer noreferrer" target="_blank"
              moz-do-not-send="true" class="moz-txt-link-freetext">https://access.redhat.com/security/cve/cve-2026-31431</a></div>
          <div dir="auto">- Debian <a
href="https://security-tracker.debian.org/tracker/CVE-2026-31431"
              rel="noreferrer noreferrer" target="_blank"
              moz-do-not-send="true" class="moz-txt-link-freetext">https://security-tracker.debian.org/tracker/CVE-2026-31431</a></div>
          <div dir="auto">- Ubuntu <a
              href="https://ubuntu.com/security/CVE-2026-31431"
              rel="noreferrer noreferrer" target="_blank"
              moz-do-not-send="true" class="moz-txt-link-freetext">https://ubuntu.com/security/CVE-2026-31431</a></div>
          <div dir="auto">- Suse: <a
href="https://www.suse.com/security/cve/CVE-2026-31431.html"
              rel="noreferrer noreferrer" target="_blank"
              moz-do-not-send="true" class="moz-txt-link-freetext">https://www.suse.com/security/cve/CVE-2026-31431.html</a></div>
          <div dir="auto">- Arch: <a
              href="https://security.archlinux.org/CVE-2026-31431"
              rel="noreferrer noreferrer" target="_blank"
              moz-do-not-send="true" class="moz-txt-link-freetext">https://security.archlinux.org/CVE-2026-31431</a></div>
        </div>
      </div>
      <br>
      <fieldset class="moz-mime-attachment-header"></fieldset>
      <pre wrap="" class="moz-quote-pre">_______________________________________________
kwlug-disc mailing list
To unsubscribe, send an email to <a class="moz-txt-link-abbreviated" href="mailto:kwlug-disc-leave@kwlug.org">kwlug-disc-leave@kwlug.org</a>
with the subject "unsubscribe", or email
<a class="moz-txt-link-abbreviated" href="mailto:kwlug-disc-owner@kwlug.org">kwlug-disc-owner@kwlug.org</a> to contact a human being.
</pre>
    </blockquote>
    <br>
  </body>
</html>