Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

SCCS, the source motel! Programs check in and never check out! -- Ken Thompson


computers / comp.os.linux.advocacy / Re: XZ Vulnerabillity. Gentoo Immune.

SubjectAuthor
* XZ Vulnerabillity. Gentoo Immune.Farley Flud
`* Re: XZ Vulnerabillity. Gentoo Immune.Chris Ahlstrom
 +* Re: XZ Vulnerabillity. Gentoo Immune.Farley Flud
 |+- Re: XZ Vulnerabillity. Gentoo Immune.vallor
 |`* Re: XZ Vulnerabillity. Gentoo Immune.rbowman
 | `* Re: XZ Vulnerabillity. Gentoo Immune.Tyrone
 |  `- Re: XZ Vulnerabillity. Gentoo Immune.Farley Flud
 +- Re: XZ Vulnerabillity. Gentoo Immune.rbowman
 `- Re: XZ Vulnerabillity. Gentoo Immune.RonB

1
XZ Vulnerabillity. Gentoo Immune.

<17c188832fe8c1a2$137067$3716115$802601b3@news.usenetexpress.com>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=12984&group=comp.os.linux.advocacy#12984

  copy link   Newsgroups: comp.os.linux.advocacy
From: ff@linux.rocks (Farley Flud)
Subject: XZ Vulnerabillity. Gentoo Immune.
Newsgroups: comp.os.linux.advocacy
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Lines: 23
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!feeder.usenetexpress.com!tr2.iad1.usenetexpress.com!news.usenetexpress.com!not-for-mail
Date: Sat, 30 Mar 2024 11:50:30 +0000
Nntp-Posting-Date: Sat, 30 Mar 2024 11:50:30 +0000
Organization: UsenetExpress - www.usenetexpress.com
X-Complaints-To: abuse@usenetexpress.com
Message-Id: <17c188832fe8c1a2$137067$3716115$802601b3@news.usenetexpress.com>
X-Received-Bytes: 1314
 by: Farley Flud - Sat, 30 Mar 2024 11:50 UTC

The mainstream GNU/Linux distros are infected with poisoned
XZ code.

But Gentoo is totally immune:

"Our current understanding of the backdoor is that is does
not affect Gentoo systems, because 1. the backdoor only
appears to be included on specific systems and Gentoo does
not qualify; 2. the backdoor as it is currently understood
targets OpenSSH patched to work with systemd-notify support.
Gentoo does not support or include these patches;"

(From the Gentoo Security Database)

Ha, ha, ha, ha, ha, ha, ha! That piece of junk systemd
does it again!

Brother, unless you are using systemd-free Gentoo, then
you are tremendously sick in the head.

Ha, ha, ha, ha, ha, ha, ha!

Re: XZ Vulnerabillity. Gentoo Immune.

<uu9bji$12m8k$4@dont-email.me>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=12996&group=comp.os.linux.advocacy#12996

  copy link   Newsgroups: comp.os.linux.advocacy
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: OFeem1987@teleworm.us (Chris Ahlstrom)
Newsgroups: comp.os.linux.advocacy
Subject: Re: XZ Vulnerabillity. Gentoo Immune.
Date: Sat, 30 Mar 2024 11:37:22 -0400
Organization: None
Lines: 30
Message-ID: <uu9bji$12m8k$4@dont-email.me>
References: <17c188832fe8c1a2$137067$3716115$802601b3@news.usenetexpress.com>
Reply-To: OFeem1987@teleworm.us
Injection-Date: Sat, 30 Mar 2024 15:37:23 +0100 (CET)
Injection-Info: dont-email.me; posting-host="031ec8965709af23e98d4ea7fefcd3e6";
logging-data="1136916"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+DD2GFni53140UWHgtBuyN"
User-Agent: slrn/1.0.3 (Linux)
Cancel-Lock: sha1:qfu66rqbVcvZ2b5pd06cndMSNNo=
X-User-Agent: Microsoft Outl00k, Usenet K00k Editions
X-Slrn: Why use anything else?
X-Mutt: The most widely-used MUA
 by: Chris Ahlstrom - Sat, 30 Mar 2024 15:37 UTC

Farley Flud wrote this copyrighted missive and expects royalties:

> The mainstream GNU/Linux distros are infected with poisoned
> XZ code.
>
> But Gentoo is totally immune:
>
> "Our current understanding of the backdoor is that is does
> not affect Gentoo systems, because 1. the backdoor only
> appears to be included on specific systems and Gentoo does
> not qualify; 2. the backdoor as it is currently understood
> targets OpenSSH patched to work with systemd-notify support.
> Gentoo does not support or include these patches;"
>
> (From the Gentoo Security Database)
>
>
> Ha, ha, ha, ha, ha, ha, ha! That piece of junk systemd
> does it again!
>
> Brother, unless you are using systemd-free Gentoo, then
> you are tremendously sick in the head.
>
> Ha, ha, ha, ha, ha, ha, ha!

Run "xz --version" and tell us what you see.

--
Q: What's hard going in and soft and sticky coming out?
A: Chewing gum.

Re: XZ Vulnerabillity. Gentoo Immune.

<17c19c21eab154a1$54387$2218499$802601b3@news.usenetexpress.com>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=13005&group=comp.os.linux.advocacy#13005

  copy link   Newsgroups: comp.os.linux.advocacy
From: fflud@gnu.rocks (Farley Flud)
Subject: Re: XZ Vulnerabillity. Gentoo Immune.
Newsgroups: comp.os.linux.advocacy
References: <17c188832fe8c1a2$137067$3716115$802601b3@news.usenetexpress.com> <uu9bji$12m8k$4@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Lines: 19
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.cmpublishers.com!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!feeder.usenetexpress.com!tr2.iad1.usenetexpress.com!news.usenetexpress.com!not-for-mail
Date: Sat, 30 Mar 2024 17:50:02 +0000
Nntp-Posting-Date: Sat, 30 Mar 2024 17:50:02 +0000
X-Received-Bytes: 785
Organization: UsenetExpress - www.usenetexpress.com
X-Complaints-To: abuse@usenetexpress.com
Message-Id: <17c19c21eab154a1$54387$2218499$802601b3@news.usenetexpress.com>
 by: Farley Flud - Sat, 30 Mar 2024 17:50 UTC

On Sat, 30 Mar 2024 11:37:22 -0400, Chris Ahlstrom wrote:

>
> Run "xz --version" and tell us what you see.
>

[~]# xz --version
xz (XZ Utils) 5.6.1
liblzma 5.6.1

"Us?" Who is "Us?"

Are you some sort of schizoid split being?

Conjoined twins, perhaps?

Ha, ha, ha, ha, ha, ha, ha, ha, ha!

Re: XZ Vulnerabillity. Gentoo Immune.

<uu9m58$ipvj$9@dont-email.me>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=13011&group=comp.os.linux.advocacy#13011

  copy link   Newsgroups: comp.os.linux.advocacy
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: vallor@cultnix.org (vallor)
Newsgroups: comp.os.linux.advocacy
Subject: Re: XZ Vulnerabillity. Gentoo Immune.
Date: Sat, 30 Mar 2024 18:37:28 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 30
Message-ID: <uu9m58$ipvj$9@dont-email.me>
References: <17c188832fe8c1a2$137067$3716115$802601b3@news.usenetexpress.com>
<uu9bji$12m8k$4@dont-email.me>
<17c19c21eab154a1$54387$2218499$802601b3@news.usenetexpress.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 30 Mar 2024 18:37:28 +0100 (CET)
Injection-Info: dont-email.me; posting-host="9a574b9d3d043e02143eed091844e4e1";
logging-data="616435"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18BgO+jbab7iu5EldhFmmk1"
User-Agent: Pan/0.155 (Kherson; 578af3b gitlab.gnome.org/GNOME/pan.git;
x86_64-pc-linux-gnu)
Cancel-Lock: sha1:FDeYI2nfyy4h2qmmUDN+8o29CSc=
X-Face: \}2`P"_@pS86<'EM:'b.Ml}8IuMK"pV"?FReF$'c.S%u9<Q#U*4QO)$l81M`{Q/n
XL'`91kd%N::LG:=*\35JS0prp\VJN^<s"b#bff@fA7]5lJA.jn,x_d%Md$,{.EZ
 by: vallor - Sat, 30 Mar 2024 18:37 UTC

On Sat, 30 Mar 2024 17:50:02 +0000, Farley Flud <fflud@gnu.rocks> wrote in
<17c19c21eab154a1$54387$2218499$802601b3@news.usenetexpress.com>:

> On Sat, 30 Mar 2024 11:37:22 -0400, Chris Ahlstrom wrote:
>
>
>> Run "xz --version" and tell us what you see.
>>
>>
> [~]# xz --version xz (XZ Utils) 5.6.1 liblzma 5.6.1
>
>
> "Us?" Who is "Us?"
>
> Are you some sort of schizoid split being?
>
> Conjoined twins, perhaps?
>
> Ha, ha, ha, ha, ha, ha, ha, ha, ha!

Not sure why you're laughing, when your system is housing
spyware...

https://www.phoronix.com/news/GitHub-Disables-XZ-Repo

Does Gentoo have the option to revert back to
a 5.4 version? You might consider that.

--
-v

Re: XZ Vulnerabillity. Gentoo Immune.

<l6r7egFkfnpU1@mid.individual.net>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=13016&group=comp.os.linux.advocacy#13016

  copy link   Newsgroups: comp.os.linux.advocacy
Path: i2pn2.org!i2pn.org!news.swapon.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: bowman@montana.com (rbowman)
Newsgroups: comp.os.linux.advocacy
Subject: Re: XZ Vulnerabillity. Gentoo Immune.
Date: 30 Mar 2024 19:28:16 GMT
Lines: 19
Message-ID: <l6r7egFkfnpU1@mid.individual.net>
References: <17c188832fe8c1a2$137067$3716115$802601b3@news.usenetexpress.com>
<uu9bji$12m8k$4@dont-email.me>
<17c19c21eab154a1$54387$2218499$802601b3@news.usenetexpress.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Trace: individual.net UAQDdOJav1LxR3wqJzQ+Iwe/K9MPnsOwctHj13Tj59rNlArIBA
Cancel-Lock: sha1:ZCfOKp4EGtCzHIm9W7MWY6ZaNzs= sha256:cYKbMOLM+SnM1gtoTNSWmakgEdmqMVxk/rwTZvc9t7Y=
User-Agent: Pan/0.149 (Bellevue; 4c157ba)
 by: rbowman - Sat, 30 Mar 2024 19:28 UTC

On Sat, 30 Mar 2024 17:50:02 +0000, Farley Flud wrote:

> On Sat, 30 Mar 2024 11:37:22 -0400, Chris Ahlstrom wrote:
>
>
>> Run "xz --version" and tell us what you see.
>>
>>
> [~]# xz --version xz (XZ Utils) 5.6.1 liblzma 5.6.1

https://www.bleepingcomputer.com/news/security/red-hat-warns-of-backdoor-
in-xz-tools-used-by-most-linux-distros/

"Linux admins can check what version of XZ is installed by running the 'xz
-V' command in a terminal. If you are using versions 5.60 or 5.61, you are
advised to immediately downgrade to older versions that do not contain the
malicious code. "

You are pwned. Again.

Re: XZ Vulnerabillity. Gentoo Immune.

<l6r7nfFkfnpU2@mid.individual.net>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=13017&group=comp.os.linux.advocacy#13017

  copy link   Newsgroups: comp.os.linux.advocacy
Path: i2pn2.org!i2pn.org!news.swapon.de!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: bowman@montana.com (rbowman)
Newsgroups: comp.os.linux.advocacy
Subject: Re: XZ Vulnerabillity. Gentoo Immune.
Date: 30 Mar 2024 19:33:03 GMT
Lines: 9
Message-ID: <l6r7nfFkfnpU2@mid.individual.net>
References: <17c188832fe8c1a2$137067$3716115$802601b3@news.usenetexpress.com>
<uu9bji$12m8k$4@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
X-Trace: individual.net 7CT5qxkxTZTSMJYKXYPMcgBlbmzluBLERoDhJMCnNGJj6S+YuW
Cancel-Lock: sha1:Um4uEhEleuDQ6j+3AymiE07DaT8= sha256:auo263ZOQQyQEfexdBCHftocSF1x+/NjBP4TVF2VnnE=
User-Agent: Pan/0.149 (Bellevue; 4c157ba)
 by: rbowman - Sat, 30 Mar 2024 19:33 UTC

On Sat, 30 Mar 2024 11:37:22 -0400, Chris Ahlstrom wrote:

> Run "xz --version" and tell us what you see.

Both Debian based distros, Ubuntu and Lubuntu, are 5.2.5. Fedora 39 is
5.4.4. The problem was discovered in Fedora 40 which is still in beta.

Farley has the most up to date, handcrafted system with the free backdoor.
He feels safe since only systemd is mentioned.

Re: XZ Vulnerabillity. Gentoo Immune.

<9pSdnUteboyW65X7nZ2dnZfqnPednZ2d@supernews.com>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=13028&group=comp.os.linux.advocacy#13028

  copy link   Newsgroups: comp.os.linux.advocacy
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!newsfeed.hasname.com!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!npeer.as286.net!npeer-ng0.as286.net!peer01.ams1!peer.ams1.xlned.com!news.xlned.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!Xl.tags.giganews.com!local-1.nntp.ord.giganews.com!nntp.supernews.com!news.supernews.com.POSTED!not-for-mail
NNTP-Posting-Date: Sat, 30 Mar 2024 20:28:59 +0000
From: none@none.none (Tyrone)
Newsgroups: comp.os.linux.advocacy
Subject: Re: XZ Vulnerabillity. Gentoo Immune.
X-No-Archive: Yes
References: <17c188832fe8c1a2$137067$3716115$802601b3@news.usenetexpress.com> <uu9bji$12m8k$4@dont-email.me> <17c19c21eab154a1$54387$2218499$802601b3@news.usenetexpress.com> <l6r7egFkfnpU1@mid.individual.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=fixed
Content-Transfer-Encoding: 8bit
User-Agent: Usenapp for MacOS
X-Usenapp: v1.27.2/l - Full License
Message-ID: <9pSdnUteboyW65X7nZ2dnZfqnPednZ2d@supernews.com>
Date: Sat, 30 Mar 2024 20:28:59 +0000
Lines: 48
X-Trace: sv3-Sec8YgPsueoh34Xu7Iyr20BdrwH+fSGzNg29oMc4TuNs7hYnvHaRBRlb2qcFB2/djxbv9g7SWmU03j3!MzdPaSy3SQvlQ4YlgPwMu4VlPyK0qAT58ZoLhtLLjLJIAdWlDs7HD7rShbfwqu7OenUwMXek7TZi!9D6ozNfl
X-Complaints-To: www.supernews.com/docs/abuse.html
X-DMCA-Complaints-To: www.supernews.com/docs/dmca.html
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
X-Received-Bytes: 3212
 by: Tyrone - Sat, 30 Mar 2024 20:28 UTC

On Mar 30, 2024 at 3:28:16 PM EDT, "rbowman" <bowman@montana.com> wrote:

> On Sat, 30 Mar 2024 17:50:02 +0000, Farley Flud wrote:
>
>> On Sat, 30 Mar 2024 11:37:22 -0400, Chris Ahlstrom wrote:
>>
>>
>>> Run "xz --version" and tell us what you see.
>>>
>>>
>> [~]# xz --version xz (XZ Utils) 5.6.1 liblzma 5.6.1
>
> https://www.bleepingcomputer.com/news/security/red-hat-warns-of-backdoor-
> in-xz-tools-used-by-most-linux-distros/
>
> "Linux admins can check what version of XZ is installed by running the 'xz
> -V' command in a terminal. If you are using versions 5.60 or 5.61, you are
> advised to immediately downgrade to older versions that do not contain the
> malicious code. "
>
> You are pwned. Again.

Once again, Farley Fucktard publicy proves he is a clueless dispshit.

Ha, ha, ha, ha, ha, ha, ha, ha, ha indeed.

Continuing the quote from the bleepingcomputer link above:

"Microsoft software engineer Andres Freund discovered the security issue while
investigating slow SSH logins on a Linux box running Debian Sid (the rolling
development version of the Debian distro).

However, he has not found the exact purpose of the malicious code added to XZ
versions 5.6.0 and 5.6.1.

"I have not yet analyzed precisely what is being checked for in the injected
code, to allow unauthorized access. Since this is running in a
pre-authentication context, it seems likely to allow some form of access or
other form of remote code execution," Freund said."

So it was discovered by Microsoft. My irony detection meter just went off the
scale.

Ha, ha, ha, ha, ha, ha, ha, ha, ha again, Farley. Microsoft found malware that
is running on YOUR Linux box. How DOES that crow taste?

Ha, ha, ha, ha, ha, ha, ha, ha, ha again. You lose, Farley. You can thank MS
for finding it.

Re: XZ Vulnerabillity. Gentoo Immune.

<17c1a7a72be03eeb$95381$4075406$802601b3@news.usenetexpress.com>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=13035&group=comp.os.linux.advocacy#13035

  copy link   Newsgroups: comp.os.linux.advocacy
From: ff@linux.rocks (Farley Flud)
Subject: Re: XZ Vulnerabillity. Gentoo Immune.
Newsgroups: comp.os.linux.advocacy
References: <17c188832fe8c1a2$137067$3716115$802601b3@news.usenetexpress.com> <uu9bji$12m8k$4@dont-email.me> <17c19c21eab154a1$54387$2218499$802601b3@news.usenetexpress.com> <l6r7egFkfnpU1@mid.individual.net> <9pSdnUteboyW65X7nZ2dnZfqnPednZ2d@supernews.com>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Lines: 17
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!npeer.as286.net!npeer-ng0.as286.net!peer01.ams1!peer.ams1.xlned.com!news.xlned.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!feeder.usenetexpress.com!tr2.iad1.usenetexpress.com!news.usenetexpress.com!not-for-mail
Date: Sat, 30 Mar 2024 21:21:09 +0000
Nntp-Posting-Date: Sat, 30 Mar 2024 21:21:09 +0000
Organization: UsenetExpress - www.usenetexpress.com
X-Complaints-To: abuse@usenetexpress.com
Message-Id: <17c1a7a72be03eeb$95381$4075406$802601b3@news.usenetexpress.com>
X-Received-Bytes: 1383
 by: Farley Flud - Sat, 30 Mar 2024 21:21 UTC

On Sat, 30 Mar 2024 20:28:59 +0000, Tyrone wrote:

>
> "Microsoft software engineer Andres Freund discovered the security issue while
> investigating slow SSH logins on a Linux box
>

Do I have anyone attempting to login to my box via SSH?

Aside from from faggots like you, the answer is "fuck no."

I have no open ports for SSH.

Your understanding of security is abysmal.

Ha, ha, ha, ha, ha, ha, ha, ha, ha, ha, ha, ha, ha!

Re: XZ Vulnerabillity. Gentoo Immune.

<uuar7i$1h9kk$1@dont-email.me>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=13048&group=comp.os.linux.advocacy#13048

  copy link   Newsgroups: comp.os.linux.advocacy
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ronb02NOSPAM@gmail.com (RonB)
Newsgroups: comp.os.linux.advocacy
Subject: Re: XZ Vulnerabillity. Gentoo Immune.
Date: Sun, 31 Mar 2024 05:10:11 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 39
Message-ID: <uuar7i$1h9kk$1@dont-email.me>
References: <17c188832fe8c1a2$137067$3716115$802601b3@news.usenetexpress.com>
<uu9bji$12m8k$4@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 31 Mar 2024 05:10:11 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="585ab8355b3e77b45bc03c9d37a82b6b";
logging-data="1615508"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+yh6Lj0Ym3IaC+azB3yry+"
User-Agent: slrn/1.0.3 (Linux)
Cancel-Lock: sha1:pKrUQf7l1tsRGiP34VmSh1jJLDM=
 by: RonB - Sun, 31 Mar 2024 05:10 UTC

On 2024-03-30, Chris Ahlstrom <OFeem1987@teleworm.us> wrote:
> Farley Flud wrote this copyrighted missive and expects royalties:
>
>> The mainstream GNU/Linux distros are infected with poisoned
>> XZ code.
>>
>> But Gentoo is totally immune:
>>
>> "Our current understanding of the backdoor is that is does
>> not affect Gentoo systems, because 1. the backdoor only
>> appears to be included on specific systems and Gentoo does
>> not qualify; 2. the backdoor as it is currently understood
>> targets OpenSSH patched to work with systemd-notify support.
>> Gentoo does not support or include these patches;"
>>
>> (From the Gentoo Security Database)
>>
>>
>> Ha, ha, ha, ha, ha, ha, ha! That piece of junk systemd
>> does it again!
>>
>> Brother, unless you are using systemd-free Gentoo, then
>> you are tremendously sick in the head.
>>
>> Ha, ha, ha, ha, ha, ha, ha!
>
> Run "xz --version" and tell us what you see.

In Linux Mint 20.3, 5.2.4. In Linux Mint 21.3, 5.2.5. (The advantage of
non-cutting edge.)

In Fedora 39 before update, 5.4.4. After updated... same.

Fedora kernel now up to 6.7.10-200.

--
[Self-centered, Woke] "pride is a life of self-destructive fakery, an
entrapment to a false and self-created matrix of twisted unreality."
"It was pride that changed angels into devils..." — St. Augustine


computers / comp.os.linux.advocacy / Re: XZ Vulnerabillity. Gentoo Immune.

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor