• qwioeue@lemmy.worldOP
    122·
    1 year ago

    liblzma is the problem. sshd is just the first thing they found that it is attacking. liblzma is used by firefox and many other critical packages.

    • Rustmilian@lemmy.worldEnglish
      12·
      1 year ago

      Arch does not directly link openssh to liblzma, and thus this attack vector is not possible. You can confirm this by issuing the following command:

      ldd "$(command -v sshd)"
      
      • bitwolf@lemmy.one
        11·
        1 year ago

        Do not use ldd on untrusted binaries.

        I executed the backdoor the other day when assessing the damage.

        objdump is the better tool to use in this case.

      • qwioeue@lemmy.worldOP
        77·
        1 year ago

        Yes, this sshd attack vector isn’t possible. However, they haven’t decomposed the exploit and we don’t know the extent of the attack. The reporter of the issue just scratched the surface. If you are using Arch, you should run pacman right now to downgrade.

        • HopFlop@discuss.tchncs.de
          15·
          1 year ago

          If you are using Arch, you should run pacman right now to downgrade.

          No, just update. It’s already fixed. Thats the point of rolling release.

        • Fubarberry@sopuli.xyzEnglish
          10·
          1 year ago

          They actually have an upgrade fix for it, at least for the known parts of it. Doing a standard system upgrade will replace the xz package with one with the known backdoor removed.

        • Trail@lemmy.world
          3·
          1 year ago

          Bold of you to assume I hare upgraded in the first place.