hessen.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
hessen.social ist die Mastodongemeinschaft für alle Hessen:innen und alle, die sich Hessen verbunden fühlen

Serverstatistik:

1,7 Tsd.
aktive Profile

#backport

0 Beiträge0 Beteiligte0 Beiträge heute
Mike Rochefort :fedora:<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@Cfkschaller" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Cfkschaller</span></a></span> How crazy and/or how much of a non-starter this idea would even be:</p><p>RHEL Workstation's desktop components as an application stream.</p><p>The core motivation here is to enable RHEL customers to use the latest Workstation environment on older RHEL versions (within logistical and practical reasoning). For example, GNOME 47 from RHEL 10 available for installation on RHEL 9.</p><p><a href="https://fosstodon.org/tags/RedHat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedHat</span></a> <a href="https://fosstodon.org/tags/RHEL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RHEL</span></a> <a href="https://fosstodon.org/tags/Workstation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Workstation</span></a> <a href="https://fosstodon.org/tags/Desktop" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Desktop</span></a> <a href="https://fosstodon.org/tags/Backport" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Backport</span></a> <a href="https://fosstodon.org/tags/Module" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Module</span></a> <a href="https://fosstodon.org/tags/GNOME" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GNOME</span></a> <a href="https://fosstodon.org/tags/GNOMEShell" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GNOMEShell</span></a> <a href="https://fosstodon.org/tags/AppStream" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppStream</span></a> <a href="https://fosstodon.org/tags/ApplicationStream" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApplicationStream</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://bitbang.social/@NanoRaptor" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>NanoRaptor</span></a></span> sadly support discontinued with EoL of <a href="https://infosec.space/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> 3.6.x / 3.4.x<br><a href="https://github.com/OS-1337/OS1337/blob/main/docu/linux.kernel.versions.tsv" rel="nofollow noopener noreferrer" target="_blank">according to my data</a>...</p><ul><li>Not shure <em>if</em> it's possible to <a href="https://infosec.space/tags/backport" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backport</span></a> <a href="https://infosec.space/tags/toybox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>toybox</span></a> to <a href="https://infosec.space/tags/i386" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>i386</span></a> (pretty shure noone bothered because Linux already EoL'd i386 long ago and supporting it would require a lot of redundant work noone wants to do anyway!)</li></ul>
Tushar Chauhan<p>A question for <a href="https://mastodon.mit.edu/tags/Debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Debian</span></a> users. Would you subscribe to backports for something as recent as bookworm ? Trying the polling option on here !</p><p><a href="https://mastodon.mit.edu/tags/foss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>foss</span></a> <a href="https://mastodon.mit.edu/tags/debian" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debian</span></a> <a href="https://mastodon.mit.edu/tags/bookworm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bookworm</span></a> <a href="https://mastodon.mit.edu/tags/backport" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backport</span></a> <a href="https://mastodon.mit.edu/tags/backports" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backports</span></a> <a href="https://mastodon.mit.edu/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.mit.edu/tags/poll" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>poll</span></a></p>
nex :fem_technik: :gentoo:<p>Fixes auf ältere Versionen <a href="https://fem.social/tags/backport" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backport</span></a>|en macht doch immer wieder Spaß... Oder so ähnlich 🙄</p>
Redhotcyber<p>Un altro 0-day critico su Apple iPhone e iPad che consente l’esecuzione di codice è stato rilevato da un ricercatore anonimo</p><p><a href="https://mastodon.bida.im/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> ha rilasciato <a href="https://mastodon.bida.im/tags/aggiornamenti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aggiornamenti</span></a> di sicurezza per eseguire il <a href="https://mastodon.bida.im/tags/backport" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backport</span></a> delle patch rilasciate il mese scorso, risolvendo un <a href="https://mastodon.bida.im/tags/bug" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bug</span></a> zero-day sfruttato attivamente per <a href="https://mastodon.bida.im/tags/iPhone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPhone</span></a> e <a href="https://mastodon.bida.im/tags/iPad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPad</span></a> meno recenti.</p><p>Si tratta della <a href="https://mastodon.bida.im/tags/vulnerabilit%C3%A0" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilità</span></a> (CVE-2023-23529), un problema di WebKit type confusion che la società ha risolto sui nuovi dispositivi iPhone e iPad il 13 febbraio 2023.</p><p><a href="https://mastodon.bida.im/tags/redhotcyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redhotcyber</span></a> <a href="https://mastodon.bida.im/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.bida.im/tags/ethicalhacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ethicalhacking</span></a> <a href="https://mastodon.bida.im/tags/dataprotection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprotection</span></a> <a href="https://mastodon.bida.im/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.bida.im/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.bida.im/tags/cybercrime" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybercrime</span></a> <a href="https://mastodon.bida.im/tags/cybersecurityawareness" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurityawareness</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritytraining" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritytraining</span></a> <a href="https://mastodon.bida.im/tags/cybersecuritynews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecuritynews</span></a> <a href="https://mastodon.bida.im/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.bida.im/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a></p><p><a href="https://www.redhotcyber.com/post/un-altro-0-day-critico-su-apple-iphone-e-ipad-che-consente-lesecuzione-di-codice-e-stato-rilevato-da-un-ricercatore-anonimo/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">redhotcyber.com/post/un-altro-</span><span class="invisible">0-day-critico-su-apple-iphone-e-ipad-che-consente-lesecuzione-di-codice-e-stato-rilevato-da-un-ricercatore-anonimo/</span></a></p>