Rainb0wSkeppy@lemmy.world to linuxmemes@lemmy.worldEnglish · 7 months agoSTOP INSTALLING DEBIANfeddit.itimagemessage-square20fedilinkarrow-up113arrow-down10cross-posted to: programmer_humor@programming.dev
arrow-up113arrow-down1imageSTOP INSTALLING DEBIANfeddit.itRainb0wSkeppy@lemmy.world to linuxmemes@lemmy.worldEnglish · 7 months agomessage-square20fedilinkcross-posted to: programmer_humor@programming.dev
minus-squaregermanatlas@lemmy.blahaj.zonelinkfedilinkarrow-up5·7 months ago no real-world use found for staying more than one version behind The ssh vulnerability didn’t affect Debian because the packages were too many versions behind
minus-squareazvasKvklenko@sh.itjust.workslinkfedilinkEnglisharrow-up1·7 months agoAFAIK, the xz vulnerability was designed for Debian based on its workaround fixing systemd service status detection. Even if it shipped to something like Arch, the malicious code wouldn’t load.
minus-squarealienghic@slrpnk.netlinkfedilinkEnglisharrow-up1·4 months agoThe xz/ssh back door made it into Debian testing, So I felt I should wipe and reinstall. Debian has had a rolling release for ages.
The ssh vulnerability didn’t affect Debian because the packages were too many versions behind
AFAIK, the xz vulnerability was designed for Debian based on its workaround fixing systemd service status detection. Even if it shipped to something like Arch, the malicious code wouldn’t load.
The xz/ssh back door made it into Debian testing, So I felt I should wipe and reinstall.
Debian has had a rolling release for ages.