^ lol Onpon
I didn't even read that part :)
> With such rare update frequency,
head Trisquel developers might simply forget how to build a Trisquel ISO
What an astonishingly low opinion of the Trisquel developers' memory
capacity...
> it has not been updated for 1.5 years already
Trisquel 7 was released on 11/03/2014
In any case, I think it is a perfect time to release a new version of
Trisquel ISO,
because it has not been updated for 1.5 years already... With such rare
update frequency,
head Trisquel developers might simply forget how to build a Trisquel ISO when
such need arises in future
Not that I'm worried or anything (my line on italian language above is not to
be taken seriously), specially if my analysis is correct: I just find this
interesting. But since it's already fixed, it's even better.
There's really no need to analyze the danger of it. It's fixed. Trisquel is
up-to-date. (This was already the case when this topic was started.)
I see, thanks.
Wait, is that a vulnerability that allows an attacker on KVM ON THE SAME
MACHINE to launch a DOS attack?
That would be troublesome IF the machine is stolen, and encrypted of course.
If not encrypted, attacking from KVM or not doesn't matter much.
That might be another quick c
You mean the article the OP linked to? It looks like Spanish to me, but I'm
no expert in these languages, so you could be right. In any case, it
references this article which is in English:
http://linux.softpedia.com/blog/canonical-patches-linux-kernel-vulnerability-in-ubuntu-15-10-15-04-14-0
I see, thanks for the clarification.
I don't understand italian, so it makes that vulnerability even scarier.
What does it says about that vulnerability?
What about the updates that can be done during the installation? Is it
something different?
well, that doesn't apply to Trisquel 7 live. So, yeah, as BSOD pointed out it
is vulnerable.
Do you have any idea how often security vulnerabilities are discovered and
fixed? It would be terribly impractical to release a new live ISO every time
this happens, and no distro does this. New ISOs are either released when a
new major version of the system is released, or in regular interva
For kernel updates you must to reboot.
But I read something about live patching:
http://www.zdnet.com/article/no-reboot-patching-comes-to-linux-4-0/
http://www.eweek.com/enterprise-apps/linux-4.0-goes-live-with-live-kernel-patching.html
http://news.softpedia.com/news/Linus-Torvalds-Releases-Li
Hmm, don't you need to reboot in order for the kernel to get actually
upgraded or am I wrong?
No problem here, cuz GNU update system it is not like fully bloated "Windows
Bugdate". In GNU you can update easyly and very very fast.
ok but all the people who download the iso and boot trisquel in live have
this vulnerability, and not only this
There's no need for a "workaround". Trisquel is up-to-date here.
BSOD: A possible workaround is to use the latest kernel:
https://jxself.org/linux-libre/
Ciao BSOD!
Indeed the kernel for Buguntu 14.04 LTS and all the derivatives using that
kernel (like Triquel 7) must upgrade to linux-image-3.13.0-68 (3.13.0-68.111)
uname -a will give you the output of what kernel is currently running on your
OS. I guess the developers already pushed the upda
*when trisquel 7.0.1?
http://www.tuxjournal.net/scoperta-una-vulnerabilita-del-kernel-linux-tutte-le-release-di-ubuntu-sono-coinvolte/
21 matches
Mail list logo