• Mozilla and sheeple

    From Shadow@Sh@dowbr.invalid to alt.2600 on Mon Dec 1 11:58:25 2025
    From Newsgroup: alt.2600


    <https://www.linuxcompatible.org/story/linux-security-roundup-for-week-48-2025/>

    Out of 48 weeks, Mozilla's offerings have had "important vulnerabilities" (AKA, a carefully crafted webpage can gain root
    access just by visiting it) for 47 weeks ....
    Only ONE week they "forgot".
    And they are practically ALL "regressions". IOW,
    vulnerabilities that have been fixed and then deliberately
    re-introduced.

    This week's CVSS scores:

    * CVE-2025-11708 ( NVD ): 9.8
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    * CVE-2025-11709 ( NVD ): 9.8
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    * CVE-2025-11710 ( NVD ): 9.8
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

    9.8 score? Gratz Mozilla. An almost perfect 10. A 10 is when
    you mail your computer to Glugle, Farcekook, Crowdfare, X or any other
    TLS "partner". With a list of your passwords, of course.

    They claim they care about your "privacy".
    LOL.
    []'s

    PS CVE-2025-11708 Summary

    A use-after-free vulnerability in MediaTrackGraphImpl::GetInstance()
    affecting Mozilla Firefox and Thunderbird browser products. This
    vulnerability exists in Firefox versions prior to 144 and Firefox ESR
    versions prior to 140.4, as well as Thunderbird versions prior to 144
    and 140.4.

    Impact
    An attacker could potentially exploit this vulnerability to execute
    arbitrary code, compromise system integrity, and gain unauthorized
    access to sensitive information. The vulnerability allows remote code
    execution without requiring user interaction, making it particularly
    dangerous.
    --
    Don't be evil - Google 2004
    We have a new policy - Google 2012
    Google Fuchsia - 2021
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From David B.@BDonBlockNews@invalid.invalid to alt.2600,alt.comp.software.thunderbird on Mon Dec 1 17:57:27 2025
    From Newsgroup: alt.2600

    On 01/12/2025 14:58, Shadow wrote:

    <https://www.linuxcompatible.org/story/linux-security-roundup-for-week-48-2025/>

    Out of 48 weeks, Mozilla's offerings have had "important vulnerabilities" (AKA, a carefully crafted webpage can gain root
    access just by visiting it) for 47 weeks ....
    Only ONE week they "forgot".
    And they are practically ALL "regressions". IOW,
    vulnerabilities that have been fixed and then deliberately
    re-introduced.

    This week's CVSS scores:

    * CVE-2025-11708 ( NVD ): 9.8
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    * CVE-2025-11709 ( NVD ): 9.8
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    * CVE-2025-11710 ( NVD ): 9.8
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

    9.8 score? Gratz Mozilla. An almost perfect 10. A 10 is when
    you mail your computer to Glugle, Farcekook, Crowdfare, X or any other
    TLS "partner". With a list of your passwords, of course.

    They claim they care about your "privacy".
    LOL.
    []'s

    PS CVE-2025-11708 Summary

    A use-after-free vulnerability in MediaTrackGraphImpl::GetInstance() affecting Mozilla Firefox and Thunderbird browser products. This vulnerability exists in Firefox versions prior to 144 and Firefox ESR versions prior to 140.4, as well as Thunderbird versions prior to 144
    and 140.4.

    Impact
    An attacker could potentially exploit this vulnerability to execute
    arbitrary code, compromise system integrity, and gain unauthorized
    access to sensitive information. The vulnerability allows remote code execution without requiring user interaction, making it particularly dangerous.
    --
    Don't be evil - Google 2004
    We have a new policy - Google 2012
    Google Fuchsia - 2021

    Shared for comment!

    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From David B.@BDonBlockNews@invalid.invalid to alt.2600,alt.computer.workshop on Tue Dec 2 10:10:37 2025
    From Newsgroup: alt.2600

    On 01/12/2025 14:58, Shadow wrote:

    <https://www.linuxcompatible.org/story/linux-security-roundup-for-week-48-2025/>

    Out of 48 weeks, Mozilla's offerings have had "important vulnerabilities" (AKA, a carefully crafted webpage can gain root
    access just by visiting it) for 47 weeks ....
    Only ONE week they "forgot".
    And they are practically ALL "regressions". IOW,
    vulnerabilities that have been fixed and then deliberately
    re-introduced.

    This week's CVSS scores:

    * CVE-2025-11708 ( NVD ): 9.8
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    * CVE-2025-11709 ( NVD ): 9.8
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    * CVE-2025-11710 ( NVD ): 9.8
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

    9.8 score? Gratz Mozilla. An almost perfect 10. A 10 is when
    you mail your computer to Glugle, Farcekook, Crowdfare, X or any other
    TLS "partner". With a list of your passwords, of course.

    They claim they care about your "privacy".
    LOL.
    []'s

    PS CVE-2025-11708 Summary

    A use-after-free vulnerability in MediaTrackGraphImpl::GetInstance() affecting Mozilla Firefox and Thunderbird browser products. This vulnerability exists in Firefox versions prior to 144 and Firefox ESR versions prior to 140.4, as well as Thunderbird versions prior to 144
    and 140.4.

    Impact
    An attacker could potentially exploit this vulnerability to execute
    arbitrary code, compromise system integrity, and gain unauthorized
    access to sensitive information. The vulnerability allows remote code execution without requiring user interaction, making it particularly dangerous.
    --
    Don't be evil - Google 2004
    We have a new policy - Google 2012
    Google Fuchsia - 2021


    Shared with ACW
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Jenny Telia@Jny.Telia@gmail.com to alt.2600,alt.comp.software.thunderbird on Tue Dec 2 14:11:42 2025
    From Newsgroup: alt.2600

    On 01/12/2025 18:57, David B. wrote:

    <snip>


    Shared for comment!


    For the avoidance of any doubt - you (David B.) are a cunt.


    P.S. The OP 'Shadow' posted his message on alt.comp.freeware. It was
    titled "Firefox & Thunderbird - is this a record?"

    You re-interpreted and embellished his title with sheeple.

    In the imagined words of Forrest Gump's: A cunt is what a cunt does.
    (That would be you, David B.)
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From David B.@BD@hotmail.co.uk to alt.2600,alt.comp.software.thunderbird on Tue Dec 2 14:35:03 2025
    From Newsgroup: alt.2600

    On 02/12/2025 13:11, Jenny Telia wrote:
    On 01/12/2025 18:57, David B. wrote:

    <snip>


    Shared for comment!


    For the avoidance of any doubt <snipped lie>


    P.S. The OP 'Shadow' posted his message on alt.comp.freeware. It was
    titled "Firefox & Thunderbird - is this a record?"

    *You are Miss Taken lassie*!

    From: Shadow <Sh@dowbr.invalid>
    Newsgroups: alt.2600 <------*LOOK*
    Subject: Mozilla and sheeple
    Date: Mon, 01 Dec 2025 11:58:25 -0300
    Organization: A noiseless patient Shadow
    Message-ID: <d5brik9fmklujkaruckds4ju445rvobmp7@4ax.com>
    MIME-Version: 1.0
    Content-Type: text/plain; charset=us-ascii
    Content-Transfer-Encoding: 7bit
    Injection-Info: solani.org;
    logging-data="967245"; mail-complaints-to="abuse@news.solani.org" Cancel-Lock: sha1:i1F3zutR7hGpQJlyZtJ9Ux11tPk=
    X-User-ID: eJwFwYEBgDAIA7CXQGmBc4Yd/59ggpfOL4NgYLHKdmdLqOfOoG1YgTLIXCupk5527jZ4/AcUDhDj X-Newsreader: Forte Agent 3.3/32.846
    X-Received-Bytes: 2457


    <snipped lies>
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Jenny Telia@Jny.Telia@gmail.com to alt.2600,alt.comp.software.thunderbird on Wed Dec 3 09:55:32 2025
    From Newsgroup: alt.2600

    On 02/12/2025 15:35, David B. wrote:
    On 02/12/2025 13:11, Jenny Telia wrote:
    On 01/12/2025 18:57, David B. wrote:

    <snip>


    Shared for comment!


    For the avoidance of any doubt <snipped lie>


    P.S. The OP 'Shadow' posted his message on alt.comp.freeware. It was
    titled "Firefox & Thunderbird - is this a record?"

    *You are Miss Taken lassie*!


    No, I'm not.

    More on poster David Brooks:

    <https://comp.sys.mac.system.narkive.com/6pnQ6Vg3/ot-david-brooks-a-known-stalker>
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From Shadow@Sh@dowbr.invalid to alt.2600,soc.motss on Wed Dec 3 12:24:25 2025
    From Newsgroup: alt.2600

    On Wed, 3 Dec 2025 09:55:32 +0100, Jenny Telia <Jny.Telia@gmail.com>
    wrote:

    On 02/12/2025 15:35, David B. wrote:

    <snip>

    More on poster David Brooks:

    <https://comp.sys.mac.system.narkive.com/6pnQ6Vg3/ot-david-brooks-a-known-stalker>

    I can understand how jealous "he" is after another LGBTQ got
    elected president and gets all the attention now.....

    And .... "he" only has ONE webpage dedicated to "him", the
    other c#sucker has Fox News, and hundreds of other Nazi sites....

    Some of the FACTS are documented here:

    <https://web.archive.org/web/20210508184323/https://tekrider.net/pages/david-brooks-stalker.php>

    That page does not mention why he was kicked out of the Royal
    Navy. Whatever, there be REAL hackers here, they can uncover the facts
    easily enough.

    PS Jenny ---> just ignore him. I would not have seen his post
    if you had not replied.
    OT newsgroups removed.
    []'s
    --
    Don't be evil - Google 2004
    We have a new policy - Google 2012
    Google Fuchsia - 2021
    --- Synchronet 3.21a-Linux NewsLink 1.2
  • From David B.@BDonBlockNews@invalid.invalid to alt.2600 on Thu Dec 4 09:22:40 2025
    From Newsgroup: alt.2600

    On 03/12/2025 15:24, Shadow *LIED* again!

    That page does not mention why he was kicked out of the Royal Navy.

    David was *NOT* "kicked out of the navy".

    Explain why you feel a need to *LIE*!
    --- Synchronet 3.21a-Linux NewsLink 1.2