A simple, lightweight distribution for 32-bit CPUs

You've reached the website for Arch Linux 32, the community maintained continuation of 32-bit support for Arch Linux, a lightweight and flexible Linux® distribution that tries to Keep It Simple.

Currently we have official packages optimized for the i686 and pentium4 architectures. Also most(ly) non-graphical packages are available for i486, too. Have a look at the required cpu flags to decide which architecture is the right one for you. Most packages from Arch Linux's community-operated package repository are also compatible with Arch Linux 32.

Installation media which boot on i686 can be found here.

Join us on #archlinux32 IRC channel on Libera, check out our forums or subscribe to the mailing list to get your feet wet. Also glance through the Arch Wiki if you want to learn more about upstream Arch.

Latest News

RSS Feed RSS Feed

Arch Linux 2024 Leader Election Results

2024-04-15

Recently we held our leader election, and the previous Project Leader Levente "anthraxx" Polyák ran again while no other people were nominated for the role.

As per our election rules he is re-elected for a new term.

The role of of the project lead within Arch Linux is connected to a few responsibilities regarding decision making (when no consensus can be reached), handling financial matters with SPI and overall project management tasks.

Congratulations to Levente and all the best wishes for another successful term! 🥳

Increasing the default vm.max_map_count value

2024-04-07

The vm.max_map_count parameter will be increased from the default 65530 value to 1048576.

This change should help address performance, crash or start-up issues for a number of memory intensive applications, particularly for (but not limited to) some Windows games played through Wine/Steam Proton. Overall, end users should have a smoother experience out of the box with no expressed concerns about potential downsides in the related proposal on arch-dev-public mailing list.

This vm.max_map_count increase is introduced in the 2024.04.07-1 release of the filesystem package and will be effective right after the upgrade.

Before upgrading, in case you are already setting your own value for that parameter in a sysctl.d configuration file, either remove it (to switch to the new default value) or make sure your configuration file will be read with a higher priority than the /usr/lib/sysctl.d/10-arch.conf file (to supersede the new default value).

xz backdoor in Archlinux32

2024-03-31

The xz versions 5.6.0 and 5.6.1 should be considered harmful in Archlinux32,
especially the last versions installed:

xz-5.6.1-1.0-pentium4
xz-5.6.1-1.0-i686
xz-5.6.0-1.0-i486

Make sure that the following versions  or newer are installed:

xz-5.6.1-2.0-pentium4
xz-5.6.1-2.0-i686

(486 is quite broken in general, not clear, when a new xz will appear there)

The xz package has been backdoored

2024-03-29

Update: To our knowledge the malicious code which was distributed via the release tarball never made it into the Arch Linux provided binaries, as the build script was configured to only inject the bad code in Debian/Fedora based package build environments. The news item below can therefore mostly be ignored.


We are closely monitoring the situation and will update the package and news as neccesary.

TL;DR: Upgrade your systems and container images now!

As many of you may have already read (one), the upstream release tarballs for xz in version 5.6.0 and 5.6.1 contain malicious code which adds a backdoor.

This vulnerability is tracked in the Arch Linux security tracker (two).

The xz packages prior to version 5.6.1-2 (specifically 5.6.0-1 and 5.6.1-1) contain this backdoor.

The following release artifacts contain the compromised xz:

  • installation medium 2024.03.01
  • virtual machine images 20240301.218094 and 20240315.221711
  • container images created between and including 2024-02-24 and 2024-03-28

The affected release artifacts have been removed from our mirrors.

We strongly advise against using affected release artifacts and instead downloading what is currently available as latest version!

Upgrading the system

It is strongly advised to do a full system upgrade right away if your system currently has xz version 5.6.0-1 or 5.6.1-1 installed:

pacman -Syu

Upgrading container images

To figure out if you are using an affected container image, use either

podman image history archlinux/archlinux

or

docker image history archlinux/archlinux

depending on whether you use podman or docker.

Any Arch Linux container image older than 2024-03-29 and younger than 2024-02-24 is affected.

Run either

podman image pull archlinux/archlinux

or

docker image pull archlinux/archlinux

to upgrade affected container images to the most recent version.

Afterwards make sure to rebuild any container images based on the affected versions and also inspect any running containers!

Regarding sshd authentication bypass/code execution

From the upstream report (one):

openssh does not directly use liblzma. However debian and several other distributions patch openssh to support systemd notification, and libsystemd does depend on lzma.

Arch does not directly link openssh to liblzma, and thus this attack vector is not possible. You can confirm this by issuing the following command:

ldd "$(command -v sshd)"

However, out of an abundance of caution, we advise users to remove the malicious code from their system by upgrading either way. This is because other yet-to-be discovered methods to exploit the backdoor could exist.

Older News

2024-03-04
mkinitcpio hook migration and early microcode
2024-01-09
Making dbus-broker our default D-Bus daemon
2023-12-04
Bugtracker migration to GitLab completed
2023-11-02
Incoming changes in JDK / JRE 21 packages may require manual intervention
2023-09-22
Changes to default password hashing algorithm and umask settings
2023-08-19
ansible-core >= 2.15.3-1 update may require manual intervention
2023-08-11
budgie-desktop >= 10.7.2-6 update requires manual intervention
2023-07-28
Shim packages required for 'icu'
2023-06-24
New package signing keys
2023-05-23
Git Migration
2023-05-16
upstream git migration
2023-04-29
In case of key problems
2023-03-31
Dropping Haskell
2022-11-17
OpenSSL 3.0.7
2022-10-30
systemd 251.2 breaks logins
2022-05-12
CA certificates file is empty
2022-02-01
ISO 2022.02.01 available
2022-01-07
error while loading shared libraries: libicui18n.so.68
2022-01-07
Warning about upgrading to zstd 1.5.1
2022-01-07
nss 3.73 crashes firefox
2021-10-25
libffi.so.7: cannot open shared object file: No such file or directory

Recent Updates (more)

RSS Feed
efivar 39-1.0 i486
libcap 2.69-4.0 i486
nfoview 2.0.1-2.0 i486
fwupd-efi 1.5-2.0 i486
seatd 0.8.0-1.0 i486
orca 46.1-1.0 pentium4
neovim 0.9.5-5.0 pentium4
kustomize 5.4.1-1.0 pentium4
power-profiles-daemon 0.21-1.0 pentium4
nfoview 2.0.1-2.0 pentium4
gnumeric 1.12.57-2.0 pentium4
gunicorn 21.2.0-2.0 pentium4
rustypaste-cli 0.9.0-2.0 i686
rustypaste 0.15.0-2.0 i686
orca 46.1-1.0 i686