• lemmyreader@lemmy.ml
    ·
    3 months ago

    t y for sharing.

    #showerthoughts The problem is in upstream and has only entered Debian Sid/unstable. Does this mean that for example bleeding edge Arch (btw) sshd users are compromised already ?

    • Dima@lemmy.one
      ·
      edit-2
      3 months ago

      Looks like the 5.6.1-2 release on Arch moved from using the published GitHub releases to just using the git repository directly, which as I understand avoids the exploit (because the obfuscated script to inject the exploit is only present in the packaged tarballs and not the git repo itself)

      https://gitlab.archlinux.org/archlinux/packaging/packages/xz/-/commit/881385757abdc39d3cfea1c3e34ec09f637424ad

    • Atemu@lemmy.ml
      hexagon
      ·
      edit-2
      3 months ago

      Arch is on 5.6.1 as of now: https://archlinux.org/packages/core/x86_64/xz/

      We at Nixpkgs have barely evaded having it go to a channel used by users and we don't seem to be affected by the backdoor.

        • Last@reddthat.com
          ·
          3 months ago

          Yeah, it's probably fine. I also don't use systemd. I was just pointing out that another rolling release distribution had the affected version.