Hello,
Only few attacks do knock out the security by simple "remote code execution with root rights" in one step. Many attacks include a two step approach: First take control of users code execution, then gain root privilege.
Now imagine how hackers will prepare such attacks: They silently are developing their methods to activate their own code and then they are waiting for the opportunity to become root. Not patching a known privilege escalation bug makes it easier for them to attack their target systems.
I think the alert shows our responsiveness and as a result there is no panic.
Doing a dist-upgrade or installing a kernel is just standard procedure.
@michaa7, thanks for the hint, i'll update the name.
greetings
musca