Amazing: #Debian is now shipping reproducible packages 
https://lists.debian.org/debian-devel-announce/2026/05/msg00001.html
Thanks to everyone who helped make this happen!
See https://reproducible-builds.org/ if you are not familiar with the topic
Amazing: #Debian is now shipping reproducible packages 
https://lists.debian.org/debian-devel-announce/2026/05/msg00001.html
Thanks to everyone who helped make this happen!
See https://reproducible-builds.org/ if you are not familiar with the topic
Now, the exploit did not work as-is on the NixOS 25.11 system I tested, so maybe the exploit code needs more adjustment (buys us more time) or does not work on NixOS for some reason.
But better safe than sorry! So just mitigate proactively.
Another day, another #Linux security vulnerability!
Dirty Frag: https://github.com/V4bel/dirtyfrag
For my fellow #NixOS users, here is the mitigation I applied to my systems: https://github.com/stapelberg/nix/commit/05e40d77799a8d68dc019b316cb824904a53361c
In case you were wondering: #gokrazy kernels are not vulnerable to copy.fail because they do not include the vulnerable code 🥳
In any case, 7.0.3 is available, so maybe update regardless (it’s always good to be up-to-date) 
If you are not familiar: https://gokrazy.org/ is my Go appliance platform based on the Linux kernel and a 100% Go userspace