<div dir="ltr"><div>My Debian systems are up to 6.12.85, but my Raspi systems seem stuck at 6.12.75, despite patching several times since yesterday. I wonder if they're affected by the Ubuntu outage, maybe? IIRC, Raspi is Debian based, but I think they started out as Ubuntu based.</div><div><br></div></div><br><div class="gmail_quote gmail_quote_container"><div dir="ltr" class="gmail_attr">On Sat, 2 May 2026 at 04:43, William Park via kwlug-disc <<a href="mailto:kwlug-disc@kwlug.org">kwlug-disc@kwlug.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><u></u>
<div>
Thanks. FYI, the fixed kernels are<br>
<ul>
<li>6.12.85+ -- Raspberry Pi, and most Debian 13 systems</li>
<li>6.18.22+ -- most LTS</li>
<li>7.0+ -- I'm using 7.0.3 (CachyOS), so I'm OK.</li>
</ul>
<br>
<div>On 2026-04-30 21:17, Jason wrote:<br>
</div>
<blockquote type="cite">
<div dir="auto">
<div dir="auto">Pretty critical kernel exploit that allows local
privilege escalation'</div>
<div dir="auto"><br>
</div>
<div dir="auto"><a href="https://www.cve.org/CVERecord?id=CVE-2026-31431" rel="noreferrer noreferrer" target="_blank">https://www.cve.org/CVERecord?id=CVE-2026-31431</a></div>
<div dir="auto"><br>
</div>
<div dir="auto">Video explanation: <a href="https://youtube.com/shorts/UIXYsZ67VCo?si=gBrke6vANgmU38r4" rel="noreferrer" target="_blank">https://youtube.com/shorts/UIXYsZ67VCo?si=gBrke6vANgmU38r4</a></div>
<div dir="auto"><br>
</div>
Make sure to update your machines , and make sure you're on a
patched version. Trackers for common distros:
<div dir="auto">
<div dir="auto"><br>
</div>
<div dir="auto">- RedHat <a href="https://access.redhat.com/security/cve/cve-2026-31431" rel="noreferrer noreferrer" target="_blank">https://access.redhat.com/security/cve/cve-2026-31431</a></div>
<div dir="auto">- Debian <a href="https://security-tracker.debian.org/tracker/CVE-2026-31431" rel="noreferrer noreferrer" target="_blank">https://security-tracker.debian.org/tracker/CVE-2026-31431</a></div>
<div dir="auto">- Ubuntu <a href="https://ubuntu.com/security/CVE-2026-31431" rel="noreferrer noreferrer" target="_blank">https://ubuntu.com/security/CVE-2026-31431</a></div>
<div dir="auto">- Suse: <a href="https://www.suse.com/security/cve/CVE-2026-31431.html" rel="noreferrer noreferrer" target="_blank">https://www.suse.com/security/cve/CVE-2026-31431.html</a></div>
<div dir="auto">- Arch: <a href="https://security.archlinux.org/CVE-2026-31431" rel="noreferrer noreferrer" target="_blank">https://security.archlinux.org/CVE-2026-31431</a></div>
</div>
</div>
<br>
<fieldset></fieldset>
<pre>_______________________________________________
kwlug-disc mailing list
To unsubscribe, send an email to <a href="mailto:kwlug-disc-leave@kwlug.org" target="_blank">kwlug-disc-leave@kwlug.org</a>
with the subject "unsubscribe", or email
<a href="mailto:kwlug-disc-owner@kwlug.org" target="_blank">kwlug-disc-owner@kwlug.org</a> to contact a human being.
</pre>
</blockquote>
<br>
</div>
_______________________________________________<br>
kwlug-disc mailing list<br>
To unsubscribe, send an email to <a href="mailto:kwlug-disc-leave@kwlug.org" target="_blank">kwlug-disc-leave@kwlug.org</a><br>
with the subject "unsubscribe", or email<br>
<a href="mailto:kwlug-disc-owner@kwlug.org" target="_blank">kwlug-disc-owner@kwlug.org</a> to contact a human being.<br>
</blockquote></div>