aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorFabian Dellwing <fabian.dellwing@mbconnectline.de>2024-03-29 20:57:09 +0100
committerGitHub <noreply@github.com>2024-03-29 15:57:09 -0400
commitc753ef44038b89c8db1f19eb593914768c8b13de (patch)
tree521672c5b84f4bc66597acd61ebe68c673459f21
parent646509045848a0495ff0f4779b8a8e3e5968ffa1 (diff)
downloadxesite-c753ef44038b89c8db1f19eb593914768c8b13de.tar.xz
xesite-c753ef44038b89c8db1f19eb593914768c8b13de.zip
Add openSUSE to distros that shipped the backdoor (#764)
-rw-r--r--lume/src/notes/2024/xz-vuln.mdx2
1 files changed, 1 insertions, 1 deletions
diff --git a/lume/src/notes/2024/xz-vuln.mdx b/lume/src/notes/2024/xz-vuln.mdx
index d27a1c0..f194c7b 100644
--- a/lume/src/notes/2024/xz-vuln.mdx
+++ b/lume/src/notes/2024/xz-vuln.mdx
@@ -19,7 +19,7 @@ We are lucky. This only affects AMD64 Linux systems. Currently, incomplete analy
If you are using a distribution that has not yet released xz 5.6.0 or 5.6.1, you are likely safe.
-If you are running Debian sid, Fedora 41, or Fedora Rawhide, run updates now.
+If you are running Debian sid, Fedora 41, Fedora Rawhide, openSUSE Tumbleweed, or openSUSE MicroOS, run updates now.
Here are the distros where it is likely to be released (according to [repology](https://repology.org/project/xz/versions)):