>soystemd dependent vulnerability gentoobros take a giant breather, we're somewhat safe here also >.deb and .rpm file injection its literally the linux virus meme holy shit :kirsche_pointlaugh: :kagerou_laugh:
@hazlin from what I understood, it affects the distros that patch lzma support into openssh for soystemd notification. From that mailing list:
openssh does not directly use liblzma. However debian and several other
distributions patch openssh to support systemd notification, and libsystemd
does depend on lzma.
So whichever distros (including debian) doing this are fucked.
And how do you guys stay on old versions for so long while using mainstream architectures? :marseyemojismilemouthtighteyes: Even PowerPC machine this instance runs on has xz-5.6.0 — and I not only have to build it myself, mainline Void maintainers don't even longer patch software to remain buildable for PowerPC :marseylaugh: Well, I probably have too much free time :marseyshy2:
@romin I agree, but on more obscure architectures it often does make sense — gcc and llvm often introduce critical bugs which get fixed in later releases, but never get backported, e.g. clang from llvm15 was segfaulting randomly on my PPC machine — I tried a few patches, including the one that looked very much like it symptoms-wise — all to no success. But with llvm17 it works perfectly again :marseyshrug: Now Python3.12.2 segfaults right on being launched — I thought it's some weird endian-ness problem due to cross compilcation, so I've built it natively — and it's just as broken. 3.12.1 works fine — I'm simply out of ideas what could've introduced such a bug with a patchlevel update. With marginal architectures — it's often weird shit like this :marseysigh: @mona@bronze