• Rodeo@lemmy.ca
    link
    fedilink
    arrow-up
    4
    ·
    8 months ago

    Panik: your Debian stable system is so ancient it still contains the heartbleed bug.

    • bruhduh@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      8 months ago

      Is linux 6.1 vulnerable to heartbleed? I’m on lmde6 with linux 6.1 btw) edit: as other comment said debian 12 is good so everything alright

        • Hello Hotel@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          8 months ago

          Its a CPU bug only the kernel can fix 🤒. The kernel is responsible for its running hardware.

          Am I dumb? that’s the spectere and meltdown bug. xz-utils malware is a whole other thing, lol.

            • Hello Hotel@lemmy.world
              link
              fedilink
              English
              arrow-up
              0
              ·
              8 months ago

              Clearly not, lol. Every vulnerability is spectere aparently. (To be fair, the other CVE this week is hardware based)

              • areyouevenreal@lemm.ee
                link
                fedilink
                arrow-up
                1
                ·
                8 months ago

                Heartbleed isn’t new either. It’s from years ago. It’s also unrelated to the xz backdoor. Maybe you should get some rest. Check your carbon monoxide alarms are working. If not see a doctor. It sounds like you are having memory issues.

  • recapitated@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    8 months ago

    The xz infiltration is a proof of concept.

    Anyone who is comforted by the fact they’re not affected by a particular release is misguided. We just don’t yet know the ways in which we are thoroughly screwed.

  • shotgun_crab@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    8 months ago

    Still paniking, cause the backdoor was apparently targetting Debian servers, it was discovered just by chance and the “mantainer” made commits for 2 years in the same repo

      • dan@upvote.au
        link
        fedilink
        arrow-up
        1
        ·
        8 months ago

        and it was only discovered accidentally, when someone was profiling some stuff, noticed SSH using a bit too much CPU power when receiving connections even for invalid usernames/passwords, and spent the time to investigate it more deeply. A lot of developers aren’t that attentive, and it could have easily snuck through.

  • u/lukmly013 💾 (lemmy.sdf.org)@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    0
    ·
    8 months ago

    Your Debian stable system is so ancient you got bigger vulnerabilities to worry about: Panik!

    Also the problem was that Debian’s sshd linked to liblzma for some systemd feature to work. This mod was done by Debian team.

    • Delilah (She/Her)@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      8 months ago

      Even if you’re using debian 12 bookworm and are fully up to date, you’re still running [5.4.1].

      The only debian version actually shipping the vulnerable version of the package was sid, and being a canary for this kind of thing is what sid is for, which it’s users know perfectly well.

      • u/lukmly013 💾 (lemmy.sdf.org)@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        0
        ·
        8 months ago

        Mostly a joke about him calling it “ancient”, but there may be some unpatched vulnerabilities in older software. Though there could also be some new ones in newest versions.
        Still, unless it’s Alpha/Beta/RC, it’s probably better to keep it up-to-date.

        • Possibly linux@lemmy.zip
          link
          fedilink
          English
          arrow-up
          1
          ·
          8 months ago

          Debian responds to security issues in stable within a fairly short window. They have a dedicated security team.