TL;DR there was a backdoor found in the XZ program. All major distros have been updated but it is recommended that you do a fresh install on systems that are exposed to the internet and that had the bad version of the program. Only upstream distros were affected.

  • poVoq@slrpnk.net
    link
    fedilink
    arrow-up
    2
    ·
    6 months ago

    This was basically a lucky catch. Sadly makes you wonder how many backdoors like that have not been found (yet). Never the less the distro model of not feeding in upstream binaries directly is an important part of the multi-barrier security.

  • herrcaptain@lemmy.ca
    link
    fedilink
    arrow-up
    2
    ·
    6 months ago

    stable release of Arch Linux is also affected. That distribution, however, isn’t used in production systems.

    Don’t tell me how to live my life, Ars Technica.

  • claudiom@blendit.bsd.cafe
    link
    fedilink
    arrow-up
    2
    ·
    6 months ago

    For those on Android running Termux, it is also affected. Just checked my version of xz-utils and it was 5.6.1. Running “pkg upgrade” will roll back to version 5.4.5 (tagged as “5.6.1+really5.4.5” for both liblzma and xz-utils packages).

    • Possibly linux@lemmy.zipOP
      link
      fedilink
      English
      arrow-up
      3
      ·
      6 months ago

      Makes you wonder why Termux ships the latest stuff. It might be smart to allow more time for critical problems to get caught.

      • RvTV95XBeo@sh.itjust.works
        link
        fedilink
        arrow-up
        3
        ·
        edit-2
        6 months ago

        Probably for the exact same reason this backdoor was introduced. Users complain about slow feature rollouts so (unpaid) devs (maintaining software in their spare time out of the kindness of their hearts) cut corners. In some situations that looks like bringing on a second maintainer without thorough vetting, in others it looks like importing upstream packages without thorough vetting.

        Don’t blame the Termux devs here, blame the community that keeps pushing them to move faster.

  • Hellfire103@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    6 months ago

    Just makes you wonder what else (if anything) is backdoored. I am seriously 🤏 this close to just switching all of my boxes over to OpenBSD.

    The last time someone over there was approached about backdooring a related piece of software (which they refused), the OpenBSD devs manually screened the entire codebase, just in case something got in.

    Really, the only things I’d miss would be Minecraft, KDE, and Mullvad Browser; and of course I’d have to buy a couple more WiFi dongles (or learn how to port drivers from Linux).

    • Possibly linux@lemmy.zipOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      6 months ago

      I honestly think BSD has the potential to be worse due lack of people. I think the best option is to not be paranoid as a user. If someone needs to be paranoid it is the maintainers.

      • BreakDecks@lemmy.ml
        link
        fedilink
        English
        arrow-up
        0
        arrow-down
        1
        ·
        6 months ago

        I think the best option is to not be paranoid as a user.

        Yeah, just never be a dissident, or a whistleblower, or an activist, or a member of a vulnerable marginalized group. Remember, if you obey there’s no reason to fear being spied on.

        I really don’t think you understand how serious this kind of backdoor is. It puts certain people in real danger.

  • Jay🚩@lemmy.ml
    link
    fedilink
    arrow-up
    0
    arrow-down
    1
    ·
    6 months ago

    Meanwhile non SystemD systems like NetBSD FreeBSD OpenBSD are safer.

    • exscape@kbin.social
      link
      fedilink
      arrow-up
      1
      ·
      6 months ago

      What does this have to do with systemd? Aren’t they safer in this situation because they aren’t using the beta xz release?

      My systems running Debian stable with systemd also aren’t affected…

      • mister_monster@monero.town
        link
        fedilink
        English
        arrow-up
        1
        ·
        6 months ago

        This particular backdoor affects sshd on systems that use libsystemd for logging.

        your Debian system is probably not affected because Debian stable doesn’t update packages very quickly. You’re probably on an older release of the backdoored package.

    • ebits21@lemmy.ca
      link
      fedilink
      English
      arrow-up
      1
      ·
      6 months ago

      You can have a nefarious developer working for a nation state infiltrate the supply chain for ANY OS.

      You don’t know.