• Decronym@lemmy.decronym.xyzB
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    2 hours ago

    Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I’ve seen in this thread:

    Fewer Letters More Letters
    HTTP Hypertext Transfer Protocol, the Web
    LTS Long Term Support software version
    nginx Popular HTTP server

    2 acronyms in this thread; the most compressed thread commented on today has 17 acronyms.

    [Thread #290 for this comm, first seen 15th May 2026, 02:30] [FAQ] [Full list] [Contact] [Source code]

  • K3CAN@lemmy.radio
    link
    fedilink
    English
    arrow-up
    10
    ·
    20 hours ago

    Seems to be specific to rewrites using an un-named capture.

    grep -rnE "\$[0-9.*].*\?" /etc/ngnix

    should show if you have any potentially vulnerable directives in your config.

  • skankhunt42@lemmy.ca
    link
    fedilink
    English
    arrow-up
    6
    ·
    18 hours ago

    It’s days like this where I’m happy I’m unemployed. I have a group chat with a few friends and they’re pushing out patches and it’s a bit of a rush.

    All my publicly accessible servers update every 6 hours and reboot after whenever they need to. It’s rare I need to step in and fix something. I checked a few hours ago and I’m not at risk.

    • GreenKnight23@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      11 hours ago

      All my publicly accessible servers update every 6 hours and reboot after whenever they need to. It’s rare I need to step in and fix something. I checked a few hours ago and I’m not at risk.

      not the flex you think it is.

      didn’t npm have a worm problem a few days ago?

      • skankhunt42@lemmy.ca
        link
        fedilink
        English
        arrow-up
        1
        ·
        5 hours ago

        Yep. I wasn’t affected thankfully. Didn’t realise I was flexing, sorry. Just happy most of my stack is automated and it’s quite low maintenance at this point.

        Where do I draw the line then? Serious question. If updating every couple hours is bad, then what’s safe?

        • GreenKnight23@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          5 hours ago

          for corporate services we do every 30 days. which is standard. emergency patches get direct support and resolved quickly.

  • Lemmchen@feddit.org
    link
    fedilink
    English
    arrow-up
    2
    ·
    edit-2
    19 hours ago

    I have an old Debian 11 “bullseye” installation running on one of my servers. It’s stuck at nginx 1.18.0, but it should theoretically still be covered by Debian 11 LTS security updates, right? https://wiki.debian.org/LTS/Using
    nginx/oldoldstable-security,now 1.18.0-6.1+deb11u5

  • cheesemoo@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    21 hours ago

    For anyone else using SWAG, it looks like a fix is on its way but not available yet. This SWAG issue points to an upstream Alpine package dependency that needs to be updated first. Looking at the source, they just recently committed backported patches, so presumably a new version will be released soon; then the SWAG image can be updated.