Atemu@lemmy.ml to Linux@lemmy.ml · 1 year agobackdoor in upstream xz/liblzma leading to ssh server compromisewww.openwall.comexternal-linkmessage-square34linkfedilinkarrow-up132arrow-down10cross-posted to: selfhosted@lemmy.world
arrow-up132arrow-down1external-linkbackdoor in upstream xz/liblzma leading to ssh server compromisewww.openwall.comAtemu@lemmy.ml to Linux@lemmy.ml · 1 year agomessage-square34linkfedilinkcross-posted to: selfhosted@lemmy.world
minus-squareflying_sheep@lemmy.mllinkfedilinkarrow-up0arrow-down1·1 year agoBackdoor only gets inserted when building RPM or DEB. So while updating frequently is a good idea, it won’t change anything for Arch users today.
minus-squarecorsicanguppy@lemmy.calinkfedilinkarrow-up1·1 year ago when building RPM or DEB. Which ones? Everything I run seems to be clear. https://access.redhat.com/security/cve/CVE-2024-3094 Products / Services Components State Enterprise Linux 6 xz Not affected Enterprise Linux 7 xz Not affected Enterprise Linux 8 xz Not affected Enterprise Linux 9 xz Not affected (and thus all the bug-for-bug clones)
minus-squareSavvyBeardedFish@reddthat.comlinkfedilinkEnglisharrow-up0·1 year agoArchlinux’s XZ was compromised as well. News post Git change for not using tarballs from source
minus-squareflying_sheep@lemmy.mllinkfedilinkarrow-up1·1 year agoNo, read the link you posted: Arch does not directly link openssh to liblzma, and thus this attack vector is not possible. You can confirm this by issuing the following command: ldd "$(command -v sshd)" However, out of an abundance of caution, we advise users to remove the malicious code from their system by upgrading either way.
Backdoor only gets inserted when building RPM or DEB. So while updating frequently is a good idea, it won’t change anything for Arch users today.
Which ones? Everything I run seems to be clear.
https://access.redhat.com/security/cve/CVE-2024-3094
(and thus all the bug-for-bug clones)
Archlinux’s XZ was compromised as well.
News post
Git change for not using tarballs from source
No, read the link you posted: