backdoor in upstream xz/liblzma leading to ssh server compromise

Atemu@lemmy.ml to Linux@lemmy.ml – 518 points –
openwall.com
100

You are viewing a single comment

Archlinux's XZ was compromised as well.

News post

Git change for not using tarballs from source

No, read the link you posted:

Arch does not directly link openssh to liblzma, and thus this attack vector is not possible. You can confirm this by issuing the following command:

ldd "$(command -v sshd)"

However, out of an abundance of caution, we advise users to remove the malicious code from their system by upgrading either way.