| ▲ | barbegal 2 days ago |
| Yes I would imagine lots of those type of services would be vulnerable if they hadn't updated to the latest kernel versions. |
|
| ▲ | stackghost 2 days ago | parent | next [-] |
| As of this comment, Debian Stable ("Trixie", though I hate codenames) doesn't have a fix in place and remains vulnerable, or at least their CVE tracker shows it as such: https://security-tracker.debian.org/tracker/CVE-2026-31431 |
| |
| ▲ | bananamogul 2 days ago | parent [-] | | "Debian Stable ("Trixie", though I hate codenames)" You can also call it Debian 13. | | |
| ▲ | stackghost 2 days ago | parent | next [-] | | I choose not to call it Debian 13 because that carries less context than Stable/Testing/sid. I'd rather not require the user to maintain that extra metnal mapping. Anyone who knows anything about this subject immediately understands what is connoted by "Debian Stable". I run Trixie on most of my personal boxes and I had no idea what version number it is, nor do I particularly care. | | |
| ▲ | tremon a day ago | parent [-] | | > I run Trixie on most of my personal boxes and I had no idea what version number it is It's not that hard to find though: $ cat /etc/debian_version
13.4
|
| |
| ▲ | cachius 2 days ago | parent | prev [-] | | 13.4 since 3/14 |
|
|
|
| ▲ | a day ago | parent | prev [-] |
| [deleted] |