• lemmyvore@feddit.nl
    link
    fedilink
    English
    arrow-up
    36
    ·
    7 months ago

    I thought Arch was the only rolling distro that doesn’t have the backdoor. Its sshd is not linked with liblzma, and even if it were, they compile xz directly from git so they wouldn’t have gotten the backdoor anyway.

    • angel@iusearchlinux.fyi
      link
      fedilink
      arrow-up
      21
      arrow-down
      1
      ·
      7 months ago

      TBF they only switched to building from git after they were notified of the backdoor yesterday. Prior to that, the source tarball was used.

    • qwioeue@lemmy.worldOP
      link
      fedilink
      arrow-up
      12
      arrow-down
      2
      ·
      edit-2
      7 months ago

      liblzma is the problem. sshd is just the first thing they found that it is attacking. liblzma is used by firefox and many other critical packages.

      • Rustmilian@lemmy.world
        link
        fedilink
        English
        arrow-up
        12
        ·
        7 months ago

        Arch does not directly link openssh to liblzma, and thus this attack vector is not possible. You can confirm this by issuing the following command:

        ldd "$(command -v sshd)"
        
        • bitwolf@lemmy.one
          link
          fedilink
          arrow-up
          1
          arrow-down
          1
          ·
          7 months ago

          Do not use ldd on untrusted binaries.

          I executed the backdoor the other day when assessing the damage.

          objdump is the better tool to use in this case.

        • qwioeue@lemmy.worldOP
          link
          fedilink
          arrow-up
          7
          arrow-down
          7
          ·
          edit-2
          7 months ago

          Yes, this sshd attack vector isn’t possible. However, they haven’t decomposed the exploit and we don’t know the extent of the attack. The reporter of the issue just scratched the surface. If you are using Arch, you should run pacman right now to downgrade.

          • HopFlop@discuss.tchncs.de
            link
            fedilink
            arrow-up
            15
            ·
            7 months ago

            If you are using Arch, you should run pacman right now to downgrade.

            No, just update. It’s already fixed. Thats the point of rolling release.

          • Fubarberry@sopuli.xyz
            link
            fedilink
            English
            arrow-up
            10
            ·
            7 months ago

            They actually have an upgrade fix for it, at least for the known parts of it. Doing a standard system upgrade will replace the xz package with one with the known backdoor removed.

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      3
      ·
      7 months ago

      The extent of the exploit is still being analyzed so I would update and keep your eye on the news. If you don’t need your computer you could always power down.