Goaty McGoatFace

@xfranky@ioc.exchange
14 Followers
71 Following
2.4K Posts
Lazy technophile, Linux enthusiast, privacy defender; ITA 🇮🇹 (+HK 🇭🇰), he/him

The story of how I first got into Open Source in the early 1990s is now up here: https://maintaine.rs/bagder

(but yeah, it wasn't actually named "Open Source" until 1998 so before that we just shipped freely available code)

bagder

more views on curl vulnerabilities

This is an intersection of two of my obsessions: graphs and vulnerability data for the curl project. In order to track and follow every imaginable angle of development, progression and (possible) improvements in the curl project we track and log lots of metadata. In order to educate and inform users about past vulnerabilities, but also â€Ļ Continue reading more views on curl vulnerabilities →

daniel.haxx.se

Whoa: Weston, the reference compositor for #Wayland, supports multiple physical independent mice at the same time! 😀

"New mouse, who dis?"

(See toot later in the thread for how to set this up!)

Side note: I think more window managers should support *this* feature!

ACARS Message From: 4X-EHF / LY0238

Message: PAX WITH IPAD WAS SENT BY SQRTY TO GATE 10. ONE FLOOR DOWN. THE IPAD WAS LEFT THERE. PLS ADVS TNX

Track Aircraft

Area: Barvaria, Germany

#acars #vdlm2 #4XEHF #LY0238

The Wayback project, a X11 compatibility layer that allows running X11 desktop environments using Wayland, is now hosted by FreeDesktop.org.
https://linuxiac.com/wayback-becomes-part-of-freedesktop-org-ecosystem/

#wayback #x11 #wayland #opensource

"We didn't include a printed manual because everything you need to know about this device can be found at this dead link."
â„šī¸ Update: Internet connectivity in #Egypt remains degraded some 48 hours after Monday's deadly fire at the Ramses Central Exchange; diminished telecoms continue to impact the economy and limit the public's ability to communicate 📉

ACARS Message From: N649AW / US2766

Message: NO HELP ON WIFI RESET ENTIRE SYST NOT WORKING I CANT BELIEV NO1 BRINGS A BOOK HA

Track Aircraft

Area: Phoenix, AZ, USA

#acars #vdlm2 #N649AW #US2766

I believe Citrix may have made a mistake in the patching instructions for CitrixBleed2 aka CVE-2025-5777.

They say to do the instructions on the left, but they appear to have missed other session types (e.g. AAA) which have session cookies that can be stolen and replayed with CitrixBleed2. On the right is the CitrixBleed1 instructions.

The net impact is, if you patched but a threat actor already took system memory, they can still reuse prior sessions.

Tell anybody you know at Citrix.