this post was submitted on 14 May 2026
11 points (92.3% liked)

Selfhosted

50711 readers
1106 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

  7. No low-effort posts. This is subjective and will largely be determined by the community member reports.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

Update your nginx instances

cross-posted from: https://lemmy.world/post/46851448


CVE - Common Vulnerabilities and Exposures system
RCE - Remote Code Execution
PoC - Proof of Concept

top 12 comments
sorted by: hot top controversial new old
[–] Nighed@feddit.uk 4 points 1 day ago

Apparently not a massive deal? (I don't know, just linking someone who seems to have a clue)

https://cyberplace.social/@GossiTheDog/116578019563133410

[–] skankhunt42@lemmy.ca 3 points 1 day ago (2 children)

It's days like this where I'm happy I'm unemployed. I have a group chat with a few friends and they're pushing out patches and it's a bit of a rush.

All my publicly accessible servers update every 6 hours and reboot after whenever they need to. It's rare I need to step in and fix something. I checked a few hours ago and I'm not at risk.

[–] motruck@lemmy.zip 1 points 15 hours ago (1 children)

Your friends should do a PoC before they rush to fix random bugs that ostensibly have a high severity.

[–] motruck@lemmy.zip 1 points 15 hours ago

You should tell that on your group chat. Motruck says you need to slow down and stop jumping at high severity but low exploitabile trash.

[–] GreenKnight23@lemmy.world 2 points 1 day ago (1 children)

All my publicly accessible servers update every 6 hours and reboot after whenever they need to. It's rare I need to step in and fix something. I checked a few hours ago and I'm not at risk.

not the flex you think it is.

didn't npm have a worm problem a few days ago?

[–] skankhunt42@lemmy.ca 2 points 1 day ago (1 children)

Yep. I wasn't affected thankfully. Didn't realise I was flexing, sorry. Just happy most of my stack is automated and it's quite low maintenance at this point.

Where do I draw the line then? Serious question. If updating every couple hours is bad, then what's safe?

[–] JaddedFauceet@lemmy.world 1 points 9 hours ago

idk, also it is not about the frequency you update, it is usually about how long has it been since package is published to the internet

see concept of min release age https://pnpm.io/blog/releases/10.16

i wonder if other package manager have similar thing or not

[–] Decronym@lemmy.decronym.xyz 1 points 1 day ago* (last edited 9 hours ago)

Acronyms, initialisms, abbreviations, contractions, and other phrases which expand to something larger, that I've seen in this thread:

Fewer Letters More Letters
HTTP Hypertext Transfer Protocol, the Web
LTS Long Term Support software version
nginx Popular HTTP server

2 acronyms in this thread; the most compressed thread commented on today has 20 acronyms.

[Thread #290 for this comm, first seen 15th May 2026, 02:30] [FAQ] [Full list] [Contact] [Source code]

[–] K3can@lemmy.radio 1 points 1 day ago

Seems to be specific to rewrites using an un-named capture.

grep -rnE "\$[0-9.*].*\?" /etc/ngnix

should show if you have any potentially vulnerable directives in your config.

[–] cheesemoo@lemmy.world 1 points 1 day ago

For anyone else using SWAG, it looks like a fix is on its way but not available yet. This SWAG issue points to an upstream Alpine package dependency that needs to be updated first. Looking at the source, they just recently committed backported patches, so presumably a new version will be released soon; then the SWAG image can be updated.

[–] Lemmchen@feddit.org 0 points 1 day ago* (last edited 1 day ago) (1 children)

I have an old Debian 11 "bullseye" installation running on one of my servers. It's stuck at nginx 1.18.0, but it should theoretically still be covered by Debian 11 LTS security updates, right? https://wiki.debian.org/LTS/Using
nginx/oldoldstable-security,now 1.18.0-6.1+deb11u5