- cross-posted to:
- programmer_humor@programming.dev
- cross-posted to:
- programmer_humor@programming.dev
I by way the Debian use.
well at least they aren’t trying to make me install snaps, and patching apt so if I sudo apt install firefox it installs the snap version.
This should be a jailable crime.
especially as the hack flows downriver to distros with actual dignity like mint. Like this is pollution of the water supply dog!
Btw I use Debian
I use Debian btw
Debianties
This is great! No better way to demonstrate how perfect Debian is! Debian for the win!
KDE? Who needs anything other than FVWM2 or CDE?
As someone who loves the old designs (I’ve run Chicago95 for years now), the only thing stopping me from running CDE is it lacks first-class support from any distro I’ve used
.
’
™
Goodbye
3debian5me
NO REAL-WORLD USE FOUND for staying more than ONE VERSION behind
Joke’s on you, my servers are largely unaffected by regreSSHion because they’re too outdated.
so old that they are still vulnerable to the same vurnability
Oh, Debian!
Okay… No.
debian? kde? arch? nixos? gentoo? Ubuntu? what the hell are all of these? just use mint, it basically fits every use case.
no real-world use found for staying more than one version behind
The ssh vulnerability didn’t affect Debian because the packages were too many versions behind
AFAIK, the xz vulnerability was designed for Debian based on its workaround fixing systemd service status detection. Even if it shipped to something like Arch, the malicious code wouldn’t load.
Isn’t this meme format completely written in sarcasm?
We’re on a meme page. There is little difference between sarcasm and being serious here. It doesn’t matter whether OP is being fully sarcastic or fully serious, people in the comments may hold the same opinion seriously, sarcastically, or with a mixture of both. The format is irrelevant
Security through Geriatricity
Except this isn’t true at all.
https://security-tracker.debian.org/tracker/CVE-2024-6387
Regresshion impacted bookworm and trixie both. Buster was too old.
With the downside of me doing an apt update and seeing that openssh-server was on
1:9.2p1-2+deb12u3
and I had no idea at a glance if this included the fix or not (qualys’s page states version 8.5p1-9.8p1 were vulnerable).If you are running debian bookworm or trixie, you absolutely should update your openssh-server package.