XMPP Service Operators - 2019-05-14


  1. Licaon_Kter

    Hosting on Linux? https://www.bleepingcomputer.com/news/security/linux-kernel-prior-to-508-vulnerable-to-remote-code-execution/

  2. perflyst

    https://security-tracker.debian.org/tracker/CVE-2019-11815

  3. perflyst

    no fixes yet

  4. perflyst

    you could just disable it via modprobe.d

  5. Link Mauve

    perflyst, “no fixes yet”?

  6. Link Mauve

    It says there that it’s been fixed in 5.0.8+ and 4.19.37+.

  7. Link Mauve

    pea, you’re blinking a lot.

  8. perflyst

    dont think anyone uses sid in prod

  9. perflyst

    either buster or stretch

  10. pea

    perflyst, I run Linux 5.1.1 in production, and I don’t use Sid.

  11. pep.

    I also use 5+ in prod and I don't use Sid

  12. Licaon_Kter

    pea: 5.1 here...

  13. Licaon_Kter

    *Buster lol

  14. MattJ

    You two

  15. perflyst

    you run Debian with a 5.0 kernel?

  16. perflyst

    crazy dudes

  17. MattJ

    No, they use Archlinux and they are proud of that fact :)

  18. perflyst

    ah, makes sense arch on your workstation is OK, but on a server uuh. next time gentoo on server?

  19. pea

    Not especially proud of anything, I just use something which works.

  20. pea

    perflyst, why would it be uuh?

  21. perflyst

    because it is gentoo

  22. pea

    ArchLinux isn’t Gentoo, no.

  23. pep.

    MattJ, as linkmauve says, not particularly proud of it. (Not ashamed either). I just don't like when people wrongly assume Debian

  24. reset

    Ppl assume debian coz thats what any normal person would use

  25. pep.

    whatever

  26. reset

    🙃

  27. Licaon_Kter

    perflyst: only way to have Debian arm64 on RPi3+ is Buster

  28. Licaon_Kter

    *with custom build Raspbian kernel