Bug#1057843: Guidelines for affected users
Meanwhile, can the ftp admins pull this faulty version?
I just managed to download and install this, but fortunately didn't reboot
on all of my systems before coming across this bug via LWN via reddit.
If you're in such a pickle as myself, you're able to get around it for now
by:
apt install linux-image-amd64/bookworm-security
dpkg --get-selections | grep 6.1.0.14
apt purge linux-image-6.1.0-14-amd64
(probably want to mark that one as uninstallable too, but there's only one
of me, surely I'll remember not to install it at a later date??!)
and at worst you'll be left on the kernel you're currently running.
I am basing this off https://lwn.net/Articles/954285/
"- Stable kernels < 6.5 are affected if they have 91562895f803 (ext4
commit)
- Kernels >= 6.5 are not affected, as they will _also_ have 936e114a245b6
(iomap commit)"
91562895f803 is not in 6.1.55-1 that anyone who last updated 3 weeks ago
would have encountered, nor in the current bookworm-security version.
--
Tim Connors
Reply to: