Atemu@lemmy.ml to Linux@lemmy.ml · 7 months agobackdoor in upstream xz/liblzma leading to ssh server compromisewww.openwall.comexternal-linkmessage-square95fedilinkarrow-up1503arrow-down15cross-posted to: opensource@lemmit.onlinenetsec@links.hackliberty.orglinux_gaming@lemmit.onlineselfhosted@lemmy.worldlinux@lemmy.worldprogramming@programming.devsaugumas@group.ltcybersecurity@sh.itjust.workshackernews@lemmy.smeargle.fanssecurity@lemmy.ml
arrow-up1498arrow-down1external-linkbackdoor in upstream xz/liblzma leading to ssh server compromisewww.openwall.comAtemu@lemmy.ml to Linux@lemmy.ml · 7 months agomessage-square95fedilinkcross-posted to: opensource@lemmit.onlinenetsec@links.hackliberty.orglinux_gaming@lemmit.onlineselfhosted@lemmy.worldlinux@lemmy.worldprogramming@programming.devsaugumas@group.ltcybersecurity@sh.itjust.workshackernews@lemmy.smeargle.fanssecurity@lemmy.ml
minus-squareflying_sheep@lemmy.mllinkfedilinkarrow-up12·7 months agoNo, read the link you posted: Arch does not directly link openssh to liblzma, and thus this attack vector is not possible. You can confirm this by issuing the following command: ldd "$(command -v sshd)" However, out of an abundance of caution, we advise users to remove the malicious code from their system by upgrading either way.
No, read the link you posted: