474
Arch with XZ (lemmy.world)
submitted 3 months ago by qwioeue@lemmy.world to c/linuxmemes@lemmy.world
you are viewing a single comment's thread
view the rest of the comments
[-] fl42v@lemmy.ml 117 points 3 months ago

Incorrect: the backdoored version was originally discovered by a Debian sid user on their system, and it presumably worked. On arch it's questionable since they don't link sshd with liblzma (although some say some kind of a cross-contamination may be possible via a patch used to support some systemd thingy, and systemd uses liblzma). Also, probably the rolling opensuse, and mb Ubuntu. Also nixos-unstalbe, but it doesn't pass the argv[0] requirements and also doesn't link liblzma. Also, fedora.

Btw, https://security.archlinux.org/ASA-202403-1

[-] SpaceCowboy@lemmy.ca 17 points 3 months ago

Sid was that dickhead in Toystory that broke the toys.

If you're running debian sid and not expecting it to be a buggy insecure mess, then you're doing debian wrong.

[-] mexicancartel@lemmy.dbzer0.com 5 points 3 months ago

Fedora and debian was affected in beta/dev branch only, unlike arch

[-] fl42v@lemmy.ml 4 points 3 months ago

Unlike arch that has no "stable". Yap, sure; idk what it was supposed to mean, tho.

[-] milicent_bystandr@lemm.ee 2 points 3 months ago

Yes, but Arch, though it had the compromised package, it appears the package didn't actually compromise Arch because of how both Arch and the attack were set up.

this post was submitted on 30 Mar 2024
474 points (84.4% liked)

linuxmemes

19701 readers
727 users here now

I use Arch btw


Sister communities:

Community rules

  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

founded 1 year ago
MODERATORS