00:03:00etnguyen03 (etnguyen03) joins
00:05:08<@JAA>Seems like the Dirty Frag people did go around it the right way, but the details got leaked (or independently rediscovered) and presumably are being exploited. So releasing is probably the right move there.
00:20:18<klea>Regarding Dirty Frag, someone linked to this, https://lobste.rs/c/5aniih which further links to https://x.com/spendergrsec/status/2052393963873534154 (reuploaded to transfer at https://transfer.archivete.am/inline/MPrG4/xcancel.com_spendergrsec_status_2052393963873534154.html via xcancel in case someone would rather not enable JS)
00:20:20<eggdrop>nitter: https://nitter.net/spendergrsec/status/2052393963873534154
00:20:28<klea>smh, eggdrop.
00:21:28<klea>Someone shared https://github.com/0xdeadbeefnetwork/Copy_Fail2-Electric_Boogaloo elsewhere too.
00:21:48<klea>Oh nvm, it was in that thread.
00:25:48wickedplayer494 quits [Read error: Connection reset by peer]
00:27:19wickedplayer494 (wickedplayer494) joins
00:30:40etnguyen03 quits [Client Quit]
01:24:20etnguyen03 (etnguyen03) joins
01:35:14<nicolas17>JAA: still no CVE number even?
01:43:56nulldata-alt1 quits [Read error: Connection reset by peer]
01:44:21nulldata-alt1 (nulldata) joins
01:54:54nulldata-alt1 quits [Ping timeout: 268 seconds]
02:06:23nulldata-alt1 (nulldata) joins
02:47:30Webuser364016 quits [Quit: Ooops, wrong browser tab.]
02:49:18etnguyen03 quits [Remote host closed the connection]
03:05:02michaelblob7641 quits [Quit: yoop]
03:07:59michaelblob7641 joins
04:05:22tzt quits [Remote host closed the connection]
04:05:42tzt (tzt) joins
04:06:21DogsRNice quits [Read error: Connection reset by peer]
04:09:25ThetaDev quits [Quit: https://quassel-irc.org - Chat comfortably. Anywhere.]
04:10:12ThetaDev joins
04:25:33HackMii quits [Remote host closed the connection]
04:25:53HackMii (hacktheplanet) joins
04:32:29HackMii quits [Remote host closed the connection]
04:32:47HackMii (hacktheplanet) joins
04:45:51SootBector quits [Remote host closed the connection]
04:47:03SootBector (SootBector) joins
04:49:32HackMii quits [Remote host closed the connection]
04:49:51HackMii (hacktheplanet) joins
04:52:54exorcism|m uploaded an image: 💀 (113KiB) < https://matrix.hackint.org/_irc/v1/media/download/AQxo7SF-ngEObHdZO9UQ47uXMK9GQQIlRsOEN2A_9Mlv8oD3Cw0_mWJZaAZJA11vVlUiC-iHduAB16KgRuU8HNFCfnctosuAAHZlcm4uY2MvZk1mbVZmQXdYaHRZeWdCc1luZU9keEVF >
04:58:47HP_Archivist quits [Quit: Leaving]
05:54:17HackMii quits [Remote host closed the connection]
05:54:42HackMii (hacktheplanet) joins
05:59:38HP_Archivist (HP_Archivist) joins
06:47:23<@Sanqui>I'm looking for a new IRC client
06:47:27<@Sanqui>Long time Hexchat user, recently High DPI was fixed (which is great) but also the layout resets into tiny every time I open the client (which sucks)
07:05:41<steering>https://www.rfc-editor.org/rfc/rfc8140
07:45:46<pabs>isn't hexchat dead? where was the fix?
07:49:47raccoon quits [Read error: Connection reset by peer]
07:50:04raccoon (raccoon) joins
07:56:21raccoon quits [Read error: Connection reset by peer]
08:05:40raccoon (raccoon) joins
08:24:57<steering>i've seen a few mentions of https://github.com/ZoiteChat/zoitechat as a successor
09:08:12ichdasich joins
09:37:31APOLLO03a joins
09:39:22<klea>ButtFlare--
09:39:24<eggdrop>[karma] 'ButtFlare' now has -294 karma!
09:39:56APOLLO03 quits [Ping timeout: 268 seconds]
10:02:49datechnoman quits [Quit: The Lounge - https://thelounge.chat]
10:03:11datechnoman (datechnoman) joins
11:00:02Bleo1826007227196234552220110 quits [Quit: The Lounge - https://thelounge.chat]
11:01:59<@Sanqui>pabs: Yeah, it's abandoned. No clue what actually fixed it
11:02:50Bleo1826007227196234552220110 joins
11:10:47<@Sanqui>ZoiteChat is pretty promising
11:10:53<@Sanqui>...and as I said that, it crashed
11:32:35nine quits [Quit: See ya!]
12:05:06<pabs>I got the feeling ZoiteChat was vibecoded?
12:06:11Snivy (Snivy) joins
12:07:01<pabs>was thinking of one of the other forks, hadn't seen ZoiteChat yet
12:07:30nine joins
12:12:27<TheTechRobo>If you're not too attached to it being a derivative of HexChat, I've been using Quassel and I quite like it - you have the option of separating the IRC part and the UI (like a better-integrated bouncer), or you can run both in the same binary if you prefer
12:12:27<TheTechRobo>unfortunately, it's *also* barely maintained :/
12:13:51<exorcism|m>The lounge >>>>>
12:14:34<TheTechRobo>yeah, TheLounge is also nice if you are aware of its issues
13:15:20<justauser>The only issue I have with Lounge (private mode) is losing unread count on restarts and IRC reconnections.
13:37:16<justauser>Is https://bsky.app/profile/textfiles.com/post/3mldslnlw5c2f a real drawing by someone? Doesn't obviously look like slop, but I can't really imagine a human going that far.
14:05:20HackMii quits [Remote host closed the connection]
14:05:39HackMii (hacktheplanet) joins
15:05:43Goofybally quits [Killed (NickServ (GHOST command used by Goofybally1))]
15:05:49Goofybally joins
16:13:08Webuser480366 joins
16:26:52nulldata-alt1 quits [Ping timeout: 268 seconds]
17:26:53MetaNova quits [Quit: quit]
17:28:00MetaNova (MetaNova) joins
17:33:24<nulldata>https://www.instructure.com/incident_update
17:33:42<nulldata>"We've identified the underlying issue tied to Free-For-Teacher accounts and temporarily shut those accounts down to remove the access path the actor used."
17:34:30dada quits [Quit: chief, beam me out of here]
17:35:44<nulldata>Hmm I wonder if the vulnerability really was limited to just free-for-teacher accounts, or if any account allows for access and that was just a vector to make new accounts
17:37:38<nicolas17>dirtyfrag got CVE-2026-43284 + CVE-2026-43500 assigned
17:40:38dada joins
17:48:05nulldata-alt1 (nulldata) joins
18:57:32Webuser480366 quits [Client Quit]
18:58:19<steering>man, the kernel security team is incredibly anti-distro.
18:59:28<steering>according to https://www.openwall.com/lists/oss-security/2026/05/08/8 43284 is for copyfail (i think that's what he means "first issue") so the cve's are all screwy lol
18:59:57<steering>(or the first "part" of dirty frag? idk)
19:00:05<steering>https://www.openwall.com/lists/oss-security/2026/05/07/2
19:08:40Webuser052995 joins
19:12:00<nicolas17>copyfail is CVE-2026-31431
19:33:43hyperreal quits [Ping timeout: 268 seconds]
19:35:35yano quits [Quit: WeeChat, https://weechat.org/]
19:40:08yano (yano) joins
19:55:59Cornelius705286 quits [Quit: Cornelius705286]
19:56:51Cornelius705286 (Cornelius) joins
20:09:23<steering>ah, yeah, two parts of dirtyfrag
20:09:24<steering>https://lwn.net/Articles/1071483/
20:16:15h|ca2 quits [Quit: WeeChat 4.8.1]
20:19:18h|ca2 (h) joins
20:20:04ThreeHM quits [Quit: WeeChat 4.8.1]
20:21:58ThreeHM (ThreeHeadedMonkey) joins
20:24:19eggdrop quits []
20:27:25szczot3k quits [Ping timeout: 268 seconds]
20:28:42eggdrop (eggdrop) joins
20:36:41<nicolas17>https://letsencrypt.status.io/ "We have been made aware of a potential incident and are shutting down all issuance."
20:36:44<nicolas17>now what D:
20:45:37<@JAA>Yup
20:50:54szczot3k (szczot3k) joins
20:53:46<steering>f
20:55:56<steering>they're back up now, phew
21:08:36<@JAA>> Due to an issue with the cross-signed certificate from our Generation X root to our new Generation Y root, all issuance has been switched back to our Generation X root certificate. This affects our "tlsserver" and "shortlived" ACME certificate profiles.
21:08:50<steering>o_O
21:13:27hyperreal (hyperreal) joins
21:44:01etnguyen03 (etnguyen03) joins
21:59:10etnguyen03 quits [Client Quit]
22:11:37DogsRNice joins
22:43:22etnguyen03 (etnguyen03) joins
23:30:28etnguyen03 quits [Client Quit]
23:55:23cmlow59 quits [Quit: The Lounge - https://thelounge.chat]
23:57:32cmlow59 joins
23:58:01etnguyen03 (etnguyen03) joins