I’m seeing it at 5.6.1 in our GitHub repoisory: 
https://github.com/macports/macports-ports/blob/master/archivers/xz/Portfile

We should roll it back to an older release and bump the epoch so everyone sees 
the rollback.

Blair

> On Mar 29, 2024, at 10:40 AM, Fred Wright <f...@fwright.net> wrote:
> 
> 
> On Fri, 29 Mar 2024, Frank Dean wrote:
> 
>> I received a security announcement on the Debian mailing list [1].  It 
>> appears versions 5.6.0 of XY Utils and later may be compromised.  I also 
>> found a discussion on Openwall [2].
>> 
>> 
>> [1]: https://lists.debian.org/debian-security-announce/2024/msg00057.html 
>> <https://lists.debian.org/debian-security-announce/2024/msg00057.html>
>> 
>> [2]: https://www.openwall.com/lists/oss-security/2024/03/29/4 
>> <https://www.openwall.com/lists/oss-security/2024/03/29/4>
>> 
>> 
>> I'm afraid that's all I know.  Just a heads-up.
> 
> In [1] they mention reverting to 5.4.5 to fix it.  It's not 100% clear from 
> that whether 5.4.6 is affected, but it sounds like it's not.  Since MacPorts 
> is currently at 5.4.6, the port is probably OK as long as it doesn't do any 
> overzealous upgrading.
> 
> CCing the users list so they don't panic. :-)
> 
> Fred Wright
> 

Reply via email to