Atemu@lemmy.ml to Linux@lemmy.ml · 7 months agobackdoor in upstream xz/liblzma leading to ssh server compromisewww.openwall.comexternal-linkmessage-square30fedilinkarrow-up132arrow-down10cross-posted to: selfhosted@lemmy.world
arrow-up132arrow-down1external-linkbackdoor in upstream xz/liblzma leading to ssh server compromisewww.openwall.comAtemu@lemmy.ml to Linux@lemmy.ml · 7 months agomessage-square30fedilinkcross-posted to: selfhosted@lemmy.world
minus-squareflying_sheep@lemmy.mllinkfedilinkarrow-up0arrow-down1·7 months agoBackdoor only gets inserted when building RPM or DEB. So while updating frequently is a good idea, it won’t change anything for Arch users today.
minus-squarecorsicanguppy@lemmy.calinkfedilinkarrow-up1·7 months ago when building RPM or DEB. Which ones? Everything I run seems to be clear. https://access.redhat.com/security/cve/CVE-2024-3094 Products / Services Components State Enterprise Linux 6 xz Not affected Enterprise Linux 7 xz Not affected Enterprise Linux 8 xz Not affected Enterprise Linux 9 xz Not affected (and thus all the bug-for-bug clones)
minus-squareSavvyBeardedFish@reddthat.comlinkfedilinkEnglisharrow-up0·7 months agoArchlinux’s XZ was compromised as well. News post Git change for not using tarballs from source
minus-squareflying_sheep@lemmy.mllinkfedilinkarrow-up1·7 months agoNo, read the link you posted: Arch does not directly link openssh to liblzma, and thus this attack vector is not possible. You can confirm this by issuing the following command: ldd "$(command -v sshd)" However, out of an abundance of caution, we advise users to remove the malicious code from their system by upgrading either way.
Backdoor only gets inserted when building RPM or DEB. So while updating frequently is a good idea, it won’t change anything for Arch users today.
Which ones? Everything I run seems to be clear.
https://access.redhat.com/security/cve/CVE-2024-3094
(and thus all the bug-for-bug clones)
Archlinux’s XZ was compromised as well.
News post
Git change for not using tarballs from source
No, read the link you posted: