<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
</head>
<body>
Thanks. FYI, the fixed kernels are<br>
<ul>
<li>6.12.85+ -- Raspberry Pi, and most Debian 13 systems</li>
<li>6.18.22+ -- most LTS</li>
<li>7.0+ -- I'm using 7.0.3 (CachyOS), so I'm OK.</li>
</ul>
<br>
<div class="moz-cite-prefix">On 2026-04-30 21:17, Jason wrote:<br>
</div>
<blockquote type="cite"
cite="mid:CAEnL8_dhaTvPJ2CvyGazwsR9vCNyXy8FzKWxeEFTZEDRyizpeQ@mail.gmail.com">
<meta http-equiv="content-type" content="text/html; charset=UTF-8">
<div dir="auto">
<div dir="auto">Pretty critical kernel exploit that allows local
privilege escalation'</div>
<div dir="auto"><br>
</div>
<div dir="auto"><a
href="https://www.cve.org/CVERecord?id=CVE-2026-31431"
rel="noreferrer noreferrer" target="_blank"
moz-do-not-send="true" class="moz-txt-link-freetext">https://www.cve.org/CVERecord?id=CVE-2026-31431</a></div>
<div dir="auto"><br>
</div>
<div dir="auto">Video explanation: <a
href="https://youtube.com/shorts/UIXYsZ67VCo?si=gBrke6vANgmU38r4"
target="_blank" rel="noreferrer" moz-do-not-send="true"
class="moz-txt-link-freetext">https://youtube.com/shorts/UIXYsZ67VCo?si=gBrke6vANgmU38r4</a></div>
<div dir="auto"><br>
</div>
Make sure to update your machines , and make sure you're on a
patched version. Trackers for common distros:
<div dir="auto">
<div dir="auto"><br>
</div>
<div dir="auto">- RedHat <a
href="https://access.redhat.com/security/cve/cve-2026-31431"
rel="noreferrer noreferrer" target="_blank"
moz-do-not-send="true" class="moz-txt-link-freetext">https://access.redhat.com/security/cve/cve-2026-31431</a></div>
<div dir="auto">- Debian <a
href="https://security-tracker.debian.org/tracker/CVE-2026-31431"
rel="noreferrer noreferrer" target="_blank"
moz-do-not-send="true" class="moz-txt-link-freetext">https://security-tracker.debian.org/tracker/CVE-2026-31431</a></div>
<div dir="auto">- Ubuntu <a
href="https://ubuntu.com/security/CVE-2026-31431"
rel="noreferrer noreferrer" target="_blank"
moz-do-not-send="true" class="moz-txt-link-freetext">https://ubuntu.com/security/CVE-2026-31431</a></div>
<div dir="auto">- Suse: <a
href="https://www.suse.com/security/cve/CVE-2026-31431.html"
rel="noreferrer noreferrer" target="_blank"
moz-do-not-send="true" class="moz-txt-link-freetext">https://www.suse.com/security/cve/CVE-2026-31431.html</a></div>
<div dir="auto">- Arch: <a
href="https://security.archlinux.org/CVE-2026-31431"
rel="noreferrer noreferrer" target="_blank"
moz-do-not-send="true" class="moz-txt-link-freetext">https://security.archlinux.org/CVE-2026-31431</a></div>
</div>
</div>
<br>
<fieldset class="moz-mime-attachment-header"></fieldset>
<pre wrap="" class="moz-quote-pre">_______________________________________________
kwlug-disc mailing list
To unsubscribe, send an email to <a class="moz-txt-link-abbreviated" href="mailto:kwlug-disc-leave@kwlug.org">kwlug-disc-leave@kwlug.org</a>
with the subject "unsubscribe", or email
<a class="moz-txt-link-abbreviated" href="mailto:kwlug-disc-owner@kwlug.org">kwlug-disc-owner@kwlug.org</a> to contact a human being.
</pre>
</blockquote>
<br>
</body>
</html>