122 points

OpenSUSE Tumbleweed has it. The Fedora 40 beta has it. Its just a result of being bleeding edge. Arch doesn’t have exclusive rights to that.

permalink
report
reply
16 points

I use arch btw

permalink
report
parent
reply
1 point

Uhh? Good for you?

permalink
report
parent
reply
2 points

Thank you

permalink
report
parent
reply
1 point

It’s a double edged sword, fastest patches and fastest exploits.

permalink
report
parent
reply
117 points

Incorrect: the backdoored version was originally discovered by a Debian sid user on their system, and it presumably worked. On arch it’s questionable since they don’t link sshd with liblzma (although some say some kind of a cross-contamination may be possible via a patch used to support some systemd thingy, and systemd uses liblzma). Also, probably the rolling opensuse, and mb Ubuntu. Also nixos-unstalbe, but it doesn’t pass the argv[0] requirements and also doesn’t link liblzma. Also, fedora.

Btw, https://security.archlinux.org/ASA-202403-1

permalink
report
reply
17 points

Sid was that dickhead in Toystory that broke the toys.

If you’re running debian sid and not expecting it to be a buggy insecure mess, then you’re doing debian wrong.

permalink
report
parent
reply
5 points

Fedora and debian was affected in beta/dev branch only, unlike arch

permalink
report
parent
reply
4 points

Unlike arch that has no “stable”. Yap, sure; idk what it was supposed to mean, tho.

permalink
report
parent
reply
2 points

Yes, but Arch, though it had the compromised package, it appears the package didn’t actually compromise Arch because of how both Arch and the attack were set up.

permalink
report
parent
reply
92 points

I thought Arch was the only rolling distro that doesn’t have the backdoor. Its sshd is not linked with liblzma, and even if it were, they compile xz directly from git so they wouldn’t have gotten the backdoor anyway.

permalink
report
reply
31 points

TBF they only switched to building from git after they were notified of the backdoor yesterday. Prior to that, the source tarball was used.

permalink
report
parent
reply
21 points
*

liblzma is the problem. sshd is just the first thing they found that it is attacking. liblzma is used by firefox and many other critical packages.

permalink
report
parent
reply
32 points

Arch does not directly link openssh to liblzma, and thus this attack vector is not possible. You can confirm this by issuing the following command:

ldd "$(command -v sshd)"
permalink
report
parent
reply
7 points
*

Yes, this sshd attack vector isn’t possible. However, they haven’t decomposed the exploit and we don’t know the extent of the attack. The reporter of the issue just scratched the surface. If you are using Arch, you should run pacman right now to downgrade.

permalink
report
parent
reply
0 points

Do not use ldd on untrusted binaries.

I executed the backdoor the other day when assessing the damage.

objdump is the better tool to use in this case.

permalink
report
parent
reply
11 points
*

Interestingly, looking at Gentoo’s package, they have both the github and tukaani.org URLs listed:

https://github.com/gentoo/gentoo/blob/master/app-arch/xz-utils/xz-utils-5.6.1.ebuild#L28

From what I understand, those wouldn’t be the same tarball, and might have thrown an error.

permalink
report
parent
reply
3 points

The extent of the exploit is still being analyzed so I would update and keep your eye on the news. If you don’t need your computer you could always power down.

permalink
report
parent
reply
88 points
5 points

It is not entirely clear either this exploit can affect other parts of the system. This is one those things you need to take extremely seriously

permalink
report
parent
reply
2 points

In the case of Arch the backdoor also wasn’t inserted into liblzma at all, because at build time there was a check to see if it’s being built on a deb or rpm based system, and only inserts it in those two cases.

See https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27 for an analysis of the situation.

So even if Arch built their xz binaries off the backdoored tarball, it was never actually vulnerable.

permalink
report
parent
reply
1 point

I just know there is a lot of uncertainty. Maybe a complete wipe is a over reaction but it is better to be safe

permalink
report
parent
reply
86 points

most stable

How the hell is arch more stable than Debian?

permalink
report
reply
11 points

i think it’s a matter of perspective. if i’m deploying some containers or servers on a system that has well defined dependencies then i think Debian wins in a stability argument.

for me, i’m installing a bunch of experimental or bleeding edge stuff that is hard to manage in even a non LTS Debian system. i don’t need my CUDA drivers to be battle tested, and i don’t want to add a bunch of sketchy links to APT because i want to install a nightly version of neovim with my package manager. Arch makes that stuff simple, reliable, and stable, at least in comparison.

permalink
report
parent
reply
9 points

“Stable” doesn’t mean “doesn’t crash”, it means “low frequency of changes”. Debian only makes changing updates every few years, and you can wait a few more years before even taking those changes without losing security support while Arch makes changing updates pretty much every time a package you have installed does.

In no way is Arch more stable than Debian (other than maybe Debian Unstable/Sid, but even then it’s likely a bit of a wash)

permalink
report
parent
reply
-3 points

If you are adding sources to Debian you are doing it wrong. Use flatpak or Distrobox although distrobox is still affected

permalink
report
parent
reply
6 points

Just Arch users being delusional. Every recent thread that had Arch mentioned in the comments has some variation of “Arch is the most stable distro” or “Stable distros have more issues than Arch”.

permalink
report
parent
reply
-9 points

Old does not mean stable

permalink
report
parent
reply
14 points

It literally does though. Stable doesn’t mean bug free. It means unchanging. That’s what the term “stable distro” actually means. That the software isn’t being updated except for security patches. When people say stable distro, that is what they are trying to communicate. That means the software will be old. That’s what stable actually means.

permalink
report
parent
reply
3 points

Stable means stable

permalink
report
parent
reply
3 points

Stable is the building horses are kept in

permalink
report
parent
reply
-11 points
*

In my experience they’re the same from a reliability standpoint. Stuff on Arch will break for no reason after an update. Stuff on Debian will break for no reason after an update. It’s just as difficult to solve reliability problems on both.

Because Debian isn’t a rolling release you will often run into issues where a bug got fixed in a future version of whatever program it is but not the one that’s available in the repository. Try using yt-dlp on any stable Debian installation and it won’t work for example.

Arch isn’t without its issues. Half of the good stuff is on the AUR, and fuck the AUR. Stuff only installs without issues half the time. Good luck installing stuff that needs like 13+ other AUR packages as dependencies because non of that shit can be installed automatically. On other distros,all that stuff can be installed automatically and easily with a single command.

I use Arch btw.

permalink
report
parent
reply
4 points

I have never had anything break on Debian. It has been running for years on attended upgrades

permalink
report
parent
reply
1 point

I have never had anything break on Debian.

I use Arch btw.

permalink
report
parent
reply
1 point

I’ve had the exact opposite experience. I switched to Arch when proton came out, and I haven’t had a system breakage since that wasn’t directly caused by my actions.

Debian upgrades would basically fail to boot about 20% of the time before that.

permalink
report
parent
reply
4 points

You can get yay for an AUR package manager, but it’s generally not recommended because it means blindly trusting the build scripts for community packages that have no real oversight. You’re typically advised to check the build script for every AUR package you install.

permalink
report
parent
reply
3 points

Stuff on Debian will break for no reason after an update

I have never had this happen on Debian servers and I’ve been using it for around 20 years. The only time I broke a Debian system was my fault - I tried to upgrade an old server from Debian 10 to 12. It’s only supported to upgrade one version at a time. Had to restore from backup and upgrade to Debian 11 first, then to 12.

permalink
report
parent
reply
0 points
*
Deleted by creator
permalink
report
parent
reply
8 points

I heard this so many times that I really believed arch was so brittle that my system would become unbootable if I went on vacation. Turns out updating it after 6 months went perfectly fine.

permalink
report
parent
reply

linuxmemes

!linuxmemes@lemmy.world

Create post

I use Arch btw


Sister communities:
Community rules
  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

Community stats

  • 8.4K

    Monthly active users

  • 1.1K

    Posts

  • 61K

    Comments