Autore: Jeremy Phelps Data: To: dng Oggetto: Re: [DNG] [SECURITY] [DSA 5649-1] xz-utils security update
> On Mar 30, 2024, at 13:05, Martin Steigerwald <martin@???> wrote:
>
> Hi!
>
> Thanks.
>
> aitor - 30.03.24, 02:54:31 CET:
>> On 29/3/24 23:02,dng@??? wrote:
>>> For those running testing or unstable your are urged to update the
>>> xz-utils package:
>>> https://lists.debian.org/debian-security-announce/2024/msg00057.html > […]
>> As explained in this thread:
>>
>> https://www.openwall.com/lists/oss-security/2024/03/29/4 >>
>> the backdoor is in upstream xz-utils/liblzma and leads to ssh server
>> compromise.
>>
>> "Openssh does not directly use xz-utils/liblzma. However debian and
>> several other distributions patch openssh to support systemd
>> notification, and libsystemd does depend o xz-utils/liblzma"
>
> So I take it that Devuan is also affected.
>
I checked with ldd and confirmed that Devuan's sshd is linked with libsystemd.
> Would it be an idea to remove the Debian patch to support systemd
> notification? On the other hand that means another forked package.
>
It's easier than that. You just need to add --without-systemd to the flags passed to the configure script
when building it.