101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

536
active users

#needrestart

0 posts0 participants0 posts today
Christian Pietsch<p>Lately I've been doing more <a href="https://fedifreu.de/tags/SelfHosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SelfHosting</span></a> again due to the current situation. Of course, I'm paying particular attention to power consumption and noise. After good experiences with the <a href="https://fedifreu.de/tags/ARM64" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ARM64</span></a> architecture, even with power-hungry applications such as [Mastodon](<a href="https://fedifreu.de/about" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">fedifreu.de/about</span><span class="invisible"></span></a>), I'm now using the smartphone technology for my homeservers, too.</p><p>There are <a href="https://fedifreu.de/tags/SBCs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SBCs</span></a> with more open hardware, but the <a href="https://fedifreu.de/tags/RaspberryPi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RaspberryPi</span></a> is widely available, well documented, powerful and inexpensive. And it is available with up to 16 GB of RAM.</p><p>Anyone operating a server on the Internet must install <a href="https://fedifreu.de/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> updates quickly. However, many people forget to restart running software so that the new version runs instead of the old one. The <a href="https://fedifreu.de/tags/needrestart" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>needrestart</span></a> tool helps with this on Debian-based Linux systems, which unfortunately is usually not pre-installed.</p><p>On my Raspberry Pi 4, `needrestart` always runs correctly (automatically after `apt upgrade`). On my Raspberry Pi 5, however, I first had to create a configuration file as described by the main developer here:<br><a href="https://github.com/liske/needrestart/blob/master/README.raspberry.md" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/liske/needrestart/b</span><span class="invisible">lob/master/README.raspberry.md</span></a><br>Previously, the tool *always* claimed that a reboot was necessary because it thought an outdated Linux kernel was running.</p><p>Next, I want to activate <a href="https://fedifreu.de/tags/LUKS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LUKS</span></a> hard drive encryption on both raspis. Unfortunately, this is not as easy under <a href="https://fedifreu.de/tags/Raspbian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Raspbian</span></a> or <a href="https://fedifreu.de/tags/RaspberryPiOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RaspberryPiOS</span></a> as on other Debian systems. If you have managed this: Please let me know how you did it!</p><p><a href="https://fedifreu.de/tags/rpi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rpi</span></a> <a href="https://fedifreu.de/tags/rpi5" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rpi5</span></a> <a href="https://fedifreu.de/tags/raspi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>raspi</span></a> <a href="https://fedifreu.de/tags/raspberrypi5" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>raspberrypi5</span></a> <a href="https://fedifreu.de/tags/homeserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homeserver</span></a> <a href="https://fedifreu.de/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a></p>
Christian Pietsch<p>In letzter Zeit mache ich aus gegebenem Anlass wieder mehr <a href="https://fedifreu.de/tags/SelfHosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SelfHosting</span></a>. Natürlich achte ich dabei besonders auf den Stromverbrauch. Nach guten Erfahrungen mit der <a href="https://fedifreu.de/tags/ARM64" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ARM64</span></a>-Architektur selbst bei leistungshungrigen Anwendungen wie <a href="https://fedifreu.de/about" rel="nofollow noopener" target="_blank">Mastodon</a> setze ich jetzt auch zuhause auf auf die aus Smartphones bekannte Technologie.</p><p>Es gibt zwar <a href="https://fedifreu.de/tags/SBCs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SBCs</span></a> mit offenerer Hardware, aber der <a href="https://fedifreu.de/tags/RaspberryPi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RaspberryPi</span></a> ist überall erhältlich, gut dokumentiert, leistungsfähig und preiswert. Und es gibt ihn mit bis zu 16 GB RAM.</p><p>Wer einen Server am Internet betreibt, muss zügig <a href="https://fedifreu.de/tags/Sicherheitsupdates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitsupdates</span></a> einspielen. Viele vergessen aber, laufende Software neuzustarten, damit die neue Version läuft statt der alten. Dabei hilft auf debianbasierten Linux-Systemen das Tool <a href="https://fedifreu.de/tags/needrestart" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>needrestart</span></a>, das leider meist nicht vorinstalliert ist.</p><p>Auf meinem Raspberry Pi 4 läuft <code>needrestart</code> schon immer korrekt (automatisch nach <code>apt upgrade</code>). Auf meinem Raspberry Pi 5 musste ich aber erst eine Konfigurationsdatei anlegen, wie es der Hauptentwickler hier beschreibt:<br><a href="https://github.com/liske/needrestart/blob/master/README.raspberry.md" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/liske/needrestart/b</span><span class="invisible">lob/master/README.raspberry.md</span></a><br>Bis dahin behauptete das Tool <em>immer</em>, dass ein reboot nötig sei, weil ein veralteter Linux-Kernel laufe.</p><p>Als nächstes will ich auf beiden Raspis die Festplattenverschlüsselung aktivieren. Das ist unter <a href="https://fedifreu.de/tags/Raspbian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Raspbian</span></a> bzw. <a href="https://fedifreu.de/tags/RaspberryPiOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RaspberryPiOS</span></a> leider nicht so einfach wie auf anderen Debian-Systemen. Wenn ihr das geschafft habt: Schreibt gern eure Tipps!</p><p><a href="https://fedifreu.de/tags/rpi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rpi</span></a> <a href="https://fedifreu.de/tags/rpi5" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rpi5</span></a> <a href="https://fedifreu.de/tags/raspi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>raspi</span></a> <a href="https://fedifreu.de/tags/raspberrypi5" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>raspberrypi5</span></a> <a href="https://fedifreu.de/tags/homeserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homeserver</span></a> <a href="https://fedifreu.de/tags/howto" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>howto</span></a> <a href="https://fedifreu.de/tags/til" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>til</span></a></p>
Thomas Liske<p>There is a regression that reports false positives for processes running in a chroot or some mountns (read: container). This only happens if the process binary does not exist in the root mountns.</p><p>This is tracked upstream in issue #317 <a href="https://github.com/liske/needrestart/issues/317#issuecomment-2495949384" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/liske/needrestart/i</span><span class="invisible">ssues/317#issuecomment-2495949384</span></a></p><p>A patch proposal is already available and awaits feedback and (security) review. This should be finished in the next few days.</p><p>Sorry any inconvenience caused by this regression 😟 </p><p><a href="https://ibh.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://ibh.social/tags/needrestart" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>needrestart</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/UbuntuServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UbuntuServer</span></a>: Root-Lücke durch <a href="https://social.tchncs.de/tags/needrestart" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>needrestart</span></a>-Komponente | Security <a href="https://www.heise.de/news/Ubuntu-Server-Root-Luecke-durch-needrestart-Komponente-10083933.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Ubuntu-Server-Ro</span><span class="invisible">ot-Luecke-durch-needrestart-Komponente-10083933.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> :tux: <a href="https://social.tchncs.de/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ubuntu</span></a> :ubuntu:</p>
Ricardo Martín<p>Upgrade to version 3.8 or later of needrestart *now*</p><p>"We discovered three fundamental vulnerabilities in needrestart (three LPEs, Local Privilege Escalations, from any unprivileged user to full root), which are exploitable without user interaction on Ubuntu Server"</p><p><a href="https://www.qualys.com/2024/11/19/needrestart/needrestart.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">qualys.com/2024/11/19/needrest</span><span class="invisible">art/needrestart.txt</span></a></p><p><a href="https://mastodon.bsd.cafe/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.bsd.cafe/tags/ubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ubuntu</span></a> <a href="https://mastodon.bsd.cafe/tags/needrestart" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>needrestart</span></a></p>
Thomas Liske<p>Besides the security fixes the <a href="https://ibh.social/tags/needrestart" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>needrestart</span></a> 3.8 release contains a new feature and a bunch of bug fixes.</p><p>@cjwatson@debian.org has contributed support for <a href="https://ibh.social/tags/Incus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Incus</span></a> based containers.</p><p>@lelutin contributed a fix to make the OpenMetrics output <a href="https://ibh.social/tags/prometheus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>prometheus</span></a> compatible.</p><p>@onyxmaster has provided fixes for nasty bugs.</p><p><a href="https://ibh.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a></p>
Thomas Liske<p><a href="https://ibh.social/tags/needrestart" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>needrestart</span></a> 3.8 was released:<br><a href="https://github.com/liske/needrestart/releases/tag/v3.8" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/liske/needrestart/r</span><span class="invisible">eleases/tag/v3.8</span></a></p><p>This coordinated release contains 4 security fixes for local privilege escalations found by the Qualys Security Advisory team: <a href="https://www.qualys.com/2024/11/19/needrestart/needrestart.txt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">qualys.com/2024/11/19/needrest</span><span class="invisible">art/needrestart.txt</span></a></p><p>An local attacker can trick needrestart to execute arbitrary code as root. Debian and Ubuntu already shipping security updates.</p><p>You should apply these updates in a timely manner. These issues can be mitigated by disabling the interpreter heuristic.</p><p><a href="https://ibh.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://ibh.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://ibh.social/tags/qualys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>qualys</span></a> <a href="https://ibh.social/tags/debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>debian</span></a> <a href="https://ibh.social/tags/ubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ubuntu</span></a></p>