- cross-posted to:
- ubuntu@discuss.tchncs.de
- ubuntu@lemmy.ml
- linux@lemmy.world
- cross-posted to:
- ubuntu@discuss.tchncs.de
- ubuntu@lemmy.ml
- linux@lemmy.world
You must log in or register to comment.
My $0.05 reading of it is that they want to hose down the build servers* and start clean, in case if the attacker escaped the sandboxing there.
* (the computers that compile all of the new packages from source, not web servers that are handing out finished deb binaries to the public.)
They’re rebuilding all the newer builds “out of an abundance of caution.” The servers themselves obviously don’t run on experimental software.
This.
That would make sense if they ran servers on non-LTS release. Do they do that?
They dont run experimental software on their build servers.
Just don’t package it. And if you have to, sandbox it in Firejail or in Bubblewrap. Or just make Snap out of it.