[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1057843: Guidelines for affected users



Meanwhile, can the ftp admins pull this faulty version?

I just managed to download and install this, but fortunately didn't reboot
on all of my systems before coming across this bug via LWN via reddit.

If you're in such a pickle as myself, you're able to get around it for now
by:

apt install linux-image-amd64/bookworm-security
dpkg --get-selections | grep 6.1.0.14
apt purge linux-image-6.1.0-14-amd64
(probably want to mark that one as uninstallable too, but there's only one
of me, surely I'll remember not to install it at a later date??!)

and at worst you'll be left on the kernel you're currently running.

I am basing this off https://lwn.net/Articles/954285/

"- Stable kernels < 6.5 are affected if they have 91562895f803 (ext4
commit)
- Kernels >= 6.5 are not affected, as they will _also_ have 936e114a245b6
(iomap commit)"

91562895f803 is not in 6.1.55-1 that anyone who last updated 3 weeks ago
would have encountered, nor in the current bookworm-security version.


-- 
Tim Connors


Reply to: