The main issue is the handling of security updates within the Nixpkgs ecosystem, which relies on Nix’s CI system, Hydra, to test and build packages. Due to the extensive number of packages in the Nixpkgs repository, the process can be slow, causing delays in the release of updates. As an example, the updated xz 5.4.6 package took nearly 5 days to become available in the unstable branch!

Fundamentally, there needs to be a change in how security fixes are handled in Hydra. As stated in the article, Nix was lucky to be unaffected, but multiple days to push out a security patch of this severity is concerning, even if there was no reason for concern.

  • Auli@lemmy.ca
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    1
    ·
    8 months ago

    I don’t even think unstable was suseptical to it. I don’t think Nix ties ssh to systemd. Debian and redhat do.

    • Atemu
      link
      fedilink
      arrow-up
      12
      ·
      edit-2
      8 months ago

      It was not vulnerable to this particular attack because the attack didn’t specifically target Nixpkgs. It could have very well done so if they had wanted to.

    • bizdelnick
      link
      fedilink
      arrow-up
      5
      arrow-down
      1
      ·
      8 months ago

      Anyway the xz backdoor was enabled only in rpm and deb packages.

      • lemmyvore@feddit.nl
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        8 months ago

        AFAIK it was enabled in anything that used the official source tarball. The exploit binaries were added during the tarball build process.

        • bizdelnick
          link
          fedilink
          arrow-up
          4
          arrow-down
          1
          ·
          8 months ago

          Nope. There were checks of build environment.

            • bizdelnick
              link
              fedilink
              arrow-up
              6
              ·
              8 months ago

              Because nobody can be sure there are no other backdoors. And, I guess, they wanted to stop distribution of affected source code.

    • lemmyvore@feddit.nl
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      edit-2
      8 months ago

      Shouldn’t the lesson here be “don’t introduce more complexity and dependencies to critical software”?

      But then again that’s systemd in a nutshell…