Hopefully this does not affect you but if you are running something like Arch, OpenSUSE tumbleweed, Debian sid or Fedora Rawhide and use SSH for remote access you should do a full wipe.

7 points

Wow, thank you for sharing this! Grumblegrumble have to reinstall my system…

This straight on the back of a thread about flatpak verification and security - a reminder that a lot of the incredible work of a distribution, especially Debian, is a community of people curating packages with care, and not just for how quick they can be made to work together.

Also a highlight for the work toward fully replicatable systems - if I understand right, the exploit here was snuck in in the binary, not in the source code.

permalink
report
reply
5 points

Well you only have to reinstall if you had affected versions installed.
For e.g. Debian stable, thats not the case. Or e.g. Arch sshd doesnt link to xz, so thats not a concern there.

Most systems wont be affected because their sshd doesnt link xz, didnt update to that version yet or simply isnt accessible from the outside.
Though it does show how vulnerable critical packages can be and how much better we need to protect them.

permalink
report
parent
reply
1 point

No, it was snuck into the website download of the source code. If you got it from GitHub it was fine, if you got it from their website you got pwnd

permalink
report
parent
reply
3 points

That’s not correct as far as I can tell. The backdoored code ended up in release tarballs (but not source tarballs because of autoconf fuckery), see eg. this mailing list discussion.

permalink
report
parent
reply
2 points

Ah, you’re right. I wasn’t aware they had release tars on GitHub as well

permalink
report
parent
reply
7 points

HN comments have some more in-depth information about this https://news.ycombinator.com/item?id=39865810

permalink
report
reply
1 point

Just got the zx update

permalink
report
reply
1 point

The good one I hope

permalink
report
parent
reply

Sysadmin

!sysadmin@lemmy.world

Create post

A community dedicated to the profession of IT Systems Administration

No generic Lemmy issue posts please! Posts about Lemmy belong in one of these communities:
!lemmy@lemmy.ml
!lemmyworld@lemmy.world
!lemmy_support@lemmy.ml
!support@lemmy.world

Community stats

  • 419

    Monthly active users

  • 203

    Posts

  • 2K

    Comments