Linux folks – remember to update your systems (elementary OS: run Operating System Updates from AppCenter or sudo apt update from Terminal) to fix Polkit vulnerability.
@aral it's not a remote code execution though, right? Good reminder anyway, I'll go do that.
@jonn @aral Yes. And I wasn't saying you weren't going to - just that this sort of talk can cause some people who don't fully understand risk management with servers online to say "oh, I'll wait, it's not big enough." It's like sleeping... you CAN avoid it. You just will be far easier to exploit if you don't.
And I've read from a few people "well it's not that big" and I'm sorry, aren't you running Wordpress, buddy? Gosh I have NO idea how anyone could POSSIBLY exploit anything via Wordpress plugins at all that NEVER happens. Etc (:
When I read an exploit and it just smells of "braindead simple" I know someone out there is gonna expiriment, and that's gonna roll into something else, and...
No, this isn't log4j level. This is _standard, everyday_ level. Not "people don't want to run their own servers" crap, but "maintenance of everything is a good discipline."
@aral why "sudo apt update" when you can do "pkexec apt update" without being asked for a password