Tux Machines

Security Patches and FUD Tactics From Sophos

Posted by Roy Schestowitz on Mar 14, 2023

=> GNU/Linux: Flathub (Centralisation and Bloat), GNU/Linux Weekly Roundup, and GNU/Linux in Minnesota | Meeting Theo de Raadt (OpenBSD) and Curl's Founder Daniel

Security updates for Monday [LWN.net]

=> ↺ Security updates for Monday [LWN.net]

Security updates have been issued by Debian (imagemagick, libapache2-mod-auth-mellon, mpv, rails, and ruby-sidekiq), Fedora (chromium, dcmtk, and strongswan), Mageia (chromium-browser-stable, dcmtk, kernel, kernel-linus, libreswan, microcode, redis, and tmux), SUSE (postgresql14 and python39), and Ubuntu (linux-kvm, linux-raspi-5.4, and thunderbird).

Linux gets double-quick double-update to fix kernel Oops! [Ed: False equivalence by Microsofters who profit from Windows, not Linux]

=> ↺ Linux gets double-quick double-update to fix kernel Oops!

It’s simply that Linux does’t BSoD (yes, the term can be used as an intransitive verb, as in “my laptop BSoDded half way through an email”), because – in a delightful understatment – it suffers an oops, or if the oops is severe enough that the system can’t reliably stay up even with degraded performance, it panics.
(It’s also possible to configure a Linux kernel so that an oops always get “promoted” to a panic, for environments where security considerations make it better to have a system that shuts down abruptly, albeit with some data not getting saved in time, than a system that ends up in an uncertain state that could lead to data leakage or data corruption.)

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2023/03/14/Security_Patches_and_FUD_Tactics_From_Sophos.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
140.057397 milliseconds
Gemini-to-HTML Time
0.474338 milliseconds

This content has been proxied by September (ba2dc).