my..." /> my..."> my...">
hacker voice I’m In, the XZ Fiasco | cmdr-nova@internet:~$

*hacker voice* I'm In, the XZ Fiasco

Follow me via:





As some who visit this blog, and also my Patreon, may know, for the past month or so, I've gone headfirst completely into Linux leaving Windows in the dust like the roadrunner escaping the coyote. This was largely due-in-part to Microsoft's forced "artificial intelligence" injections into every single piece of its software (and possible subscription requirements in future versions of Windows).

Since then, I've learned quite a few different things. I already had some experience, as I've launched Debian instances on Digital Ocean in the past for hosting Mastodon instances, and I currently run this website on Debian 12.

With that in mind, I can't say that I fully understand what's going on with XZ today, aside from the fact that a backdoor was injected a little while ago (without anyone noticing until today) through ... what I believe to be a Github commit?

This is a huge security risk, as I believe it gives a hijacker open access to an SSH pipeline on a system (correct me in the comments if I'm wrong, I'm still learning a lot of things). Needless to say, I checked updates and versions of XZ on both my Pop!_OS system and my Debian 12 laptop faster than you can say, "Oh farts, I've lost my juice!"

But, you actually don't really need to worry all that much, unless you're running pre-release versions of most distributions, as detailed here via openwall.com.

That doesn't mean it's not something you should worry about, if you're outside of that scope of instances. In fact, if I were you, I'd open a terminal and check your XZ version, just to be sure.

The versions you DON'T want, are versions 5.6.0 or 5.6.1, and you can check this by running xz --version in the terminal. My guess is that most won't have these versions, but if you do, run your updates!

This has been an exciting update brought to you by Me, in the world of Linux. Stay tuned for, I mean, hopefully less posts about sudden backdoors in Linux software!


mkultra.monster is independent, in that it is written, developed, and maintained by one person. Written, developed, and maintained, not for scrapers, bots, scammers, algorithms, or grifters: But for people to follow and read, just like the way it used to be, back in the golden age of the internet.
mkultra.monster is independent, in that it is written, developed, and maintained by one person. Written, developed, and maintained, not for scrapers, bots, scammers, algorithms, or grifters: But for people to follow and read, just like the way it used to be, back in the golden age of the internet.


WEBMENTIONS

Have you written a response to this post? Send me a webmention!

📝 How to send a webmention

To send a webmention, your response page must contain an exact link to this post and be publicly fetchable.

  • A blog post that mentions or links to this article
  • A public webpage that includes the exact canonical URL
  • Any webpage that references this content

After creating your response, paste the URL below. Social posts often need a bridge such as Bridgy before they appear as webmentions here.

Webmention submitted!
It may take a few moments to appear.

Error submitting webmention.