Hello all,
If you haven't heard, it is a vulnerability present in some
instances of xz. Slackware has /usr/bin/xz, so that raises
the question, "Are we safe?"
If you haven't heard, it is a vulnerability present in some instances of
xz. Slackware has /usr/bin/xz, so that raises the question, "Are we
safe?"
Also please review these links to learn how to post correctly to USENET:
https://www.slack.net/~ant/usenet-posts.html
https://smfr.org/mtnw/docs/Usenet.html
As John wrote, stable Slackware 15.0 has never been affected by any ofmake"
those bad versions. For those running the alpha or beta version of the
next stable Slackware, also known as "Slackware current", the bad
versions 5.6.0 and 5.6.1 was included for a short time. However, if I understand things right, the xz.SlackBuild script used to build from
source does not user cmake but the old school way of "./configure;
and did not produce any bad binaries. Even if Slackware would have had
any bad binaries from any bad version it would not have become any ssh backdoor as Slackware does not run systemd.
regards Henrik
On Wed, 29 Jan 2025 05:31:27 -0000 (UTC), Henrik Carlqvist wrote:
[snip]
As John wrote, stable Slackware 15.0 has never been affected by any
of those bad versions. For those running the alpha or beta version
of the next stable Slackware, also known as "Slackware current", the
bad versions 5.6.0 and 5.6.1 was included for a short time.
However, if I understand things right, the xz.SlackBuild script used
to build from source does not user cmake but the old school way of
"./configure; make" and did not produce any bad binaries. Even if
Slackware would have had any bad binaries from any bad version it
would not have become any ssh backdoor as Slackware does not run
systemd.
regards Henrik
Hello, Henrik.
That's interesting. I was wondering whether systemd was involved in this story. One of the links I posted included a message that said something similar. Does systemd use ssh in some special way?
Joseph Rosevear <Mail@joeslife.org> wrote:
That's interesting. I was wondering whether systemd was involved in
this story. One of the links I posted included a message that said
something similar. Does systemd use ssh in some special way?
You know, this is all year old news, and just searching "xz backdoor"
should have found you this for further reading:
https://en.wikipedia.org/wiki/XZ_Utils_backdoor
The short story is the backdoor targeted ssh, and it got into ssh via
being linked into a systemd library that ssh, on systemd systems, itself linked to.
For Slackware it was a no-op because Slackware does not use systemd, so Slackware's ssh did not indirectly link to xz via a systemd library.
| Sysop: | Amessyroom |
|---|---|
| Location: | Fayetteville, NC |
| Users: | 65 |
| Nodes: | 6 (0 / 6) |
| Uptime: | 01:46:14 |
| Calls: | 862 |
| Files: | 1,311 |
| D/L today: |
10 files (20,373K bytes) |
| Messages: | 264,210 |