Atemu@lemmy.ml to Linux@lemmy.ml · 7 months agobackdoor in upstream xz/liblzma leading to ssh server compromisewww.openwall.comexternal-linkmessage-square23fedilinkarrow-up11arrow-down10cross-posted to: netsec@lemmy.worldprogramming@programming.devsecurity@lemmy.ml
arrow-up11arrow-down1external-linkbackdoor in upstream xz/liblzma leading to ssh server compromisewww.openwall.comAtemu@lemmy.ml to Linux@lemmy.ml · 7 months agomessage-square23fedilinkcross-posted to: netsec@lemmy.worldprogramming@programming.devsecurity@lemmy.ml
minus-squarecorsicanguppy@lemmy.calinkfedilinkarrow-up0·7 months ago when building RPM or DEB. Which ones? Everything I run seems to be clear. https://access.redhat.com/security/cve/CVE-2024-3094 Products / Services Components State Enterprise Linux 6 xz Not affected Enterprise Linux 7 xz Not affected Enterprise Linux 8 xz Not affected Enterprise Linux 9 xz Not affected (and thus all the bug-for-bug clones)
minus-squareLaser@feddit.delinkfedilinkarrow-up0·7 months agoFedora 41, Fedora Rawhide, Debian Sid are the currently known affected ones AFAIK.
minus-squareprogandy@feddit.delinkfedilinkarrow-up0·7 months agoThose getting the most recent software versions, so nothing that should be running in a server.
Which ones? Everything I run seems to be clear.
https://access.redhat.com/security/cve/CVE-2024-3094
(and thus all the bug-for-bug clones)
Fedora 41, Fedora Rawhide, Debian Sid are the currently known affected ones AFAIK.
Those getting the most recent software versions, so nothing that should be running in a server.