<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<style type="text/css" style="display:none;"> P {margin-top:0;margin-bottom:0;} </style>
</head>
<body dir="ltr">
<div style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);" class="elementToProof">
Thank you. BUUG is mostly dead. As far as man pages go I went out on Network Information Service (NIS). You died on the wrong ski snow.</div>
<div style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);" class="elementToProof">
<br>
</div>
<div style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);" class="elementToProof">
One could set up a system with Windows Defender and best wireless router for the price and Linux as I was in 2012. I was not an intentional honey pot creator. You could be though.</div>
<div style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);" class="elementToProof">
<br>
</div>
<div style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);" class="elementToProof">
Or there is vegan goat cheese at a popular trader food market near here.</div>
<div style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);" class="elementToProof">
<br>
</div>
<div style="font-family: Aptos, Aptos_EmbeddedFont, Aptos_MSFontService, Calibri, Helvetica, sans-serif; font-size: 12pt; color: rgb(0, 0, 0);" class="elementToProof">
K</div>
<div id="appendonsend"></div>
<hr style="display:inline-block;width:98%" tabindex="-1">
<div id="divRplyFwdMsg" dir="ltr"><font face="Calibri, sans-serif" style="font-size:11pt" color="#000000"><b>From:</b> Dan Lyke <danlyke@flutterby.com><br>
<b>Sent:</b> Wednesday, October 11, 2023 4:53 PM<br>
<b>To:</b> KLH 111111 <klh111111@outlook.com><br>
<b>Cc:</b> balug-talk@lists.balug.org <balug-talk@lists.balug.org><br>
<b>Subject:</b> Re: [BALUG-Talk] netfilter cve</font>
<div> </div>
</div>
<div>
<div dir="ltr">On Wed, Oct 11, 2023 at 4:45 PM KLH 111111 <<a href="mailto:klh111111@outlook.com">klh111111@outlook.com</a>> wrote:<br>
> Is anyone else worried about this? I found it via <a href="http://redhat.com">
redhat.com</a><br>
><br>
> NVD - CVE-2023-39192 (<a href="http://nist.gov">nist.gov</a>)<br>
<br>
<br>
It's going to apply to all distributions, because it's a kernel issue, *but*.,.. it's just Moderate severity because it involves a local privileged attacker. I'm just a user these days, my only adminning is personal web servers, but presumably "privileged"
in this context means a user who can manipulate the Netfilter subsystem.<br>
<br>
So it's largely a question of "who can run `ufw` or `iptables`?". That's probably a fairly short list, and those users can probably damage your system or exfiltrate data through other means. Security is, after all, a question of layers and the Swiss cheese
effect.<br>
<div><br>
</div>
<div><br>
</div>
<br>
</div>
</div>
</body>
</html>