Re: making Debian secure by default
- To: debian-user@lists.debian.org
- Subject: Re: making Debian secure by default
- From: Kamil Jońca <kjonca@o2.pl>
- Date: Fri, 29 Mar 2024 19:02:54 +0100
- Message-id: <[🔎] 87msqggbld.fsf@alfa.kjonca>
- In-reply-to: <InnK9-2z9u-1@gated-at.bofh.it> (Andy Smith's message of "Fri, 29 Mar 2024 18:00:01 +0100")
- References: <ImJa1-27aa-1@gated-at.bofh.it> <ImKz7-28aw-1@gated-at.bofh.it> <ImPyN-2bh9-3@gated-at.bofh.it> <ImY94-2heG-5@gated-at.bofh.it> <ImZRv-2iJ8-1@gated-at.bofh.it> <In22Z-2kwg-5@gated-at.bofh.it> <InnK9-2z9u-1@gated-at.bofh.it>
Andy Smith <andy@strugglers.net> writes:
[...]
> https://www.openwall.com/lists/oss-security/2024/03/29/4
>
> (Upstream xz/lzma project compromised, hostile code inserted into
> sshd in Debian sid and other leading edge distros.)
>
> Thanks,
> Andy
O-o, is there any simple test to check if I have infected version or
not?
KJ
--
http://wolnelektury.pl/wesprzyj/teraz/
Reply to: