You are viewing a single thread.
View all comments
117 points

Incorrect: the backdoored version was originally discovered by a Debian sid user on their system, and it presumably worked. On arch it’s questionable since they don’t link sshd with liblzma (although some say some kind of a cross-contamination may be possible via a patch used to support some systemd thingy, and systemd uses liblzma). Also, probably the rolling opensuse, and mb Ubuntu. Also nixos-unstalbe, but it doesn’t pass the argv[0] requirements and also doesn’t link liblzma. Also, fedora.

Btw, https://security.archlinux.org/ASA-202403-1

permalink
report
reply
17 points

Sid was that dickhead in Toystory that broke the toys.

If you’re running debian sid and not expecting it to be a buggy insecure mess, then you’re doing debian wrong.

permalink
report
parent
reply
5 points

Fedora and debian was affected in beta/dev branch only, unlike arch

permalink
report
parent
reply
4 points

Unlike arch that has no “stable”. Yap, sure; idk what it was supposed to mean, tho.

permalink
report
parent
reply
2 points

Yes, but Arch, though it had the compromised package, it appears the package didn’t actually compromise Arch because of how both Arch and the attack were set up.

permalink
report
parent
reply

linuxmemes

!linuxmemes@lemmy.world

Create post

I use Arch btw


Sister communities:
Community rules
  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

Community stats

  • 7.5K

    Monthly active users

  • 1.3K

    Posts

  • 70K

    Comments