New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
What a surprise. How do you manage and still stay in high school?
Thanks for being the first person in this thread to actually answer the question. Not too impressed with this board lately. Seems there are a group if regulars here who are only interest in finding people to gang up on. Seen it happen several times lately around here. Do these guys think they are selling themselves and their services by doing this?
No problem for me to update my kernels. It's not about the how but the why. I want to understand what the risks actually are. You pretty much hit the nail on the head by saying.
Security is about risk management. Not trying to plug all perceived, imagined, or not even fully understood threats. Too often I see people posting with hair on fire about how omg it needs to be fixed or else the world is going to end.
Then you have the people who are so obsessed with security that they forgot one important thing. It still needs to be easy to use. As long as you are connected to the internet you will never be 100% secure so just throwing everything you can at everything always is what amateurs do.
Read what @jarland and stfu, please. You're more interested in drama than patching it.
I don't believe this is anything but a troll, the reality is all the information is already out there, you really don't need to ask on a forum once alerted, no reboot required (with kcare), and it takes less time than it took me to write this post to do it.
But he's a PROFESSIONAL, wtf do you know you high school, GVH loving, kiddo?
He's done a professional risk assessment and decided against patching and now you, a random provider on the internet have the nerve to claim otherwise? /s
yeah my mistake sorry.
You're endangering your customers by even questioning it. It's called a security vulnerability for a reason. It should be patched without question depending on the severity, and this one is severe! This exploit is fully understood and serious, so what are you even on about?
I do fully understand it now thanks to one or two helpful people here. Not a serious issue for what I do but will patch it as part of normal maintenance.
Gives me an excuse to try KernelCare. I don't want to have to reboot servers over this.
If this didn't require local access then I could understand why people would have the opinion they know what is best for me and my customers. Does everyone here assume everyone does the same thing?