• Rustmilian@lemmy.world
    link
    fedilink
    English
    arrow-up
    12
    ·
    7 months ago

    Arch does not directly link openssh to liblzma, and thus this attack vector is not possible. You can confirm this by issuing the following command:

    ldd "$(command -v sshd)"
    
    • qwioeue@lemmy.worldOP
      link
      fedilink
      arrow-up
      7
      arrow-down
      7
      ·
      edit-2
      7 months ago

      Yes, this sshd attack vector isn’t possible. However, they haven’t decomposed the exploit and we don’t know the extent of the attack. The reporter of the issue just scratched the surface. If you are using Arch, you should run pacman right now to downgrade.

      • HopFlop@discuss.tchncs.de
        link
        fedilink
        arrow-up
        15
        ·
        7 months ago

        If you are using Arch, you should run pacman right now to downgrade.

        No, just update. It’s already fixed. Thats the point of rolling release.

      • Fubarberry@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        10
        ·
        7 months ago

        They actually have an upgrade fix for it, at least for the known parts of it. Doing a standard system upgrade will replace the xz package with one with the known backdoor removed.

    • bitwolf@lemmy.one
      link
      fedilink
      arrow-up
      1
      arrow-down
      1
      ·
      7 months ago

      Do not use ldd on untrusted binaries.

      I executed the backdoor the other day when assessing the damage.

      objdump is the better tool to use in this case.