• @GarlicToast
    link
    English
    526 days ago

    Nix lets you go back, and you and even mix channels. Pulling one package from a different version.

    • @starmanOP
      link
      English
      4
      edit-2
      25 days ago

      That’s true, but you have to know there was a backdoor first. If someone doesn’t know, and they use the latest version, they’re vulnerable to attack

          • λλλ
            link
            English
            224 days ago

            I believe the point they were making is that if you are techy enough to use nix, they are likely the type to keep up to date with news like this.

      • @[email protected]
        link
        fedilink
        English
        425 days ago

        If the issue had been critical, then the branch head could be rolled back, causing everyone to downgrade

        • Atemu
          link
          fedilink
          English
          2
          edit-2
          20 days ago

          That’s a nice idea in theory but not possible in practice as the last Nixpkgs revision without a tainted version of xz is many months old. You’d trade one CVE for dozens of others.

      • @GarlicToast
        link
        English
        425 days ago

        NixOS is aimed at highly technical people. You literally code your system structure.

    • Atemu
      link
      fedilink
      English
      120 days ago

      That works for leaf packages but not for core node packages. Every package depends on xz in some way; it’s in the stdenv aswell as bootstrap.

      • @GarlicToast
        link
        English
        120 days ago

        You are right, it will be a mess to pull xz from a different hash. This is why you go back to an older build, and keep only packages you need on the newer version.

        • Atemu
          link
          fedilink
          English
          118 days ago

          Those packages themselves depend on xz. Pretty much all of them.

          What you’re suggesting would only make the xz executable not be backdoored anymore but any other application using liblzma would still be as vulnerable as before. That’s actually the only currently known attack vector; inject malicious code into SSHD via liblzma.