xz check

osprey

Well-Known Member
Joined
Apr 15, 2022
Messages
1,558
Reaction score
1,651
Credits
15,124
In case one wishes to check whether their xz binary is affected by the xz exploit, there's a check at: https://xz.fail/
Upload the xz binary which is usually at /usr/bin/xz in the installed filesystem, and the website checks it out and returns a result like: CLEAN no implantation detected.
There's an anti robot captcha to plod through. It's probably only relevant for those who run more "bleeding edge" installations, but by now most have probably upgraded beyond the infected software.
 


I am clean with Lubuntu.

I knew that already. I just wanted to fit in and be one of the cool kids!
 
hey !....me too !

2024-04-07_09-31.png
 
Me too.
m1212.gif
 
The language in this video is adult in nature. If you click this link, you will hear adult language.


I think it's important to understand the social engineering that went into this.

If you are underage and an adult restricts you from bad language, you can read and extrapolate from this blog post that kind of sums it up.


Again, there will be adult language in the video. (I almost didn't include this, but we allow adult language, and themes, in the various music threads. I figure being off-site is an acceptable barrier to entry.)
 
If you click this link
I saw that already.. thanks anyway, but is a new one which have timeline, much more interesting...
I wonder if we ever find out, like.. who is behind and who is that so called microsoft employee...:rolleyes:
I bet he was a linux dev ;)
Your turn !

 
I bet he was a linux dev ;)

He is and was. He works for MSFT. MSFT contribute to the kernel and other FOSS projects. MSFT is on the Linux Foundation.
 

Staff online


Top