[01:48] With the *Network>Connections* settings what does the 'Wi-Fi (shared)' option do? Is it an ad-hoc network with any connected devices or does it assume some separate interface is providing internet and sharing that? [05:50] I've tried nvidia 525, 535 and 545 driver. And everytime i boot into wayland with my kubuntu 23.10, i get a blank screen with a solid underscore. I cant Alt+F6 to another terminal, i cant ctrl alt delete, i need to kill the power to the computer... [06:09] Niwahr? [07:26] Seems to indeed just be an ad-hoc network === alucardromero4 is now known as alucardromero [08:28] Hi all [08:28] other having big trouble with snap since some days/since some updates of Kubuntu? [08:29] using 23.10 [08:31] also all flatpaks fail with "bwrap: setting up uid map: Permission denied error: ldconfig failed, exit status 256" === root is now known as Guest4358 === TomTom_ is now known as TomTom === ucz_ is now known as ucz__ [10:21] okok [10:21] okkokkokk [10:21] koooooooooooo [10:21] okkkkkkkkkkkkkkk [10:21] okkkkkkkkkkkkkkkkkkkkkkkkkkkk === kaj is now known as BluesKaj === Lord_of_Life_ is now known as Lord_of_Life === mfa is now known as mfa__ [11:46] others also having big trouble with flatpaks and snaps since some days/since some updates of Kubuntu? [11:46] using 23.10 [14:26] Can I use Kubuntu 24.04 dev now despite security breach of xz backdoor? Did they pull back the older version? Is it safe to use now? [14:35] Wait for the beta on 11th April. We are rebuilding a huge amount of packages to make sure that nothing even built in an environment where the bad xz was present (re @mwr777: Can I use Kubuntu 24.04 dev now despite security breach of xz backdoor? Did they pull back the older version? Is it safe to use now?) [14:36] This is a bit nuclear as nothing suggests that harm was done, but to be safe it is be done anyway [16:16] But did current vulnerability get patched or like downgraded? (re @RikMills: Wait for the beta on 11th April. We are rebuilding a huge amount of packages to make sure that nothing even built in an environment where the bad xz was present) [16:23] I'd be okay if they downgraded and start using. And finally upgrade on apr 11 with rebuild. [16:51] Install failed for 24.04. What can be done? : https://irc-attachments.kde.org/e2b44877/file_74205.jpg [19:04] Do we have reason for concern about the backdoor that was just found in xz? The xz-utils package is installed in my Kubuntu 22.04 LTS. [19:05] Elliria: last I checked, there was a fix issue already [19:05] So, we're good? [19:05] This just was announced on Friday. [19:06] lemme check with the bot [19:06] !xz [19:06] hmm nothing [19:07] It's the xz-utils package. [19:07] right [19:10] hmmm my connection is a bit spotty [19:11] Good news. It specifically targets versions 5.6.0 and 5.6.1 of xz-utils on systems using glibc, systemd, and patched OpenSSH. The version of xz-utils on Kubuntu 22.04 LTS is much lower than that. [19:13] hmmmm [19:18] Elliria: try going to https://xz.fail <---- the webpage does a quick heuristic test from what I've read [19:20] I don't go to unknown sites, but thanks. It targets a higher version of xz-utils than we use in this release, so we're good for now. Hopefully, by the time we update to that version, they will have sorted this out. [19:21] ohhh hehhe [19:22] Elliria: the website simply does quick checks on your system, if it detects the xz exploit, it doesn't install anything, installing requires permission anyhow [19:23] Elliria: https://github.com/amlweems/xzbot <----- is a project with a few fixes as well [19:23] Elliria: either way, it'll be just about 3 weeks when you'd be upgrading to 24.04 :) [19:26] Heh. I'm a pretty naughty girl and delay upgrading way longer than I should. [19:26] One of these days that will be my undoing. Heh. [19:27] Anyway, this is serious enough that I doubt they would delay that long to fix it. [19:27] It seems its official name is CVE-2024-3094. [19:27] -ubottu:#kubuntu- Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used ... [19:28] Elliria: well, the bot agrees =) [19:28] Heh. [19:28] Did I trigger that by typing that name? [19:29] My system is currently using the 5.2.5-2ubuntu1 version. [19:30] right [19:31] as I said, the project at xzbot has a few fixed [19:31] fixes even [19:31] Ah, good. Now I can write back to my family member who alerted me to this and let him know that all is well here.