0 points

t y for sharing.

#showerthoughts The problem is in upstream and has only entered Debian Sid/unstable. Does this mean that for example bleeding edge Arch (btw) sshd users are compromised already ?

permalink
report
reply
0 points
*

Looks like the 5.6.1-2 release on Arch moved from using the published GitHub releases to just using the git repository directly, which as I understand avoids the exploit (because the obfuscated script to inject the exploit is only present in the packaged tarballs and not the git repo itself)

https://gitlab.archlinux.org/archlinux/packaging/packages/xz/-/commit/881385757abdc39d3cfea1c3e34ec09f637424ad

permalink
report
parent
reply
0 points
*

They also believe we (Arch users) are unaffected because this backdoor targeted Debian and Redhat type packaging specifically and also relied on a certain SSH configuration Arch doesn’t use. To be honest while it’s nice to know we’re unaffected, it’s not at all comforting that had the exploiter targeted Arch they would have succeeded. Just yesterday I was talking to someone about how much I love rolling release distros and now I’m feeling insecure about it.

More details here: https://gitlab.archlinux.org/archlinux/packaging/packages/xz/-/issues/2

permalink
report
parent
reply
0 points

Someone always has to be the guinea pig.

That being said, maybe there’s an argument for distros that do rolling releases to have an “intentionally delayed rolling release” that just trails the regular rolling release by a fixed amount of time to provide more time for guinea pigs to run into things. If you want rolling, but can live with the delay, just use that.

permalink
report
parent
reply
0 points

Damn, it is actually scary that they managed to pull this off. The backdoor came from the second-largest contributor to xz too, not some random drive-by.

permalink
report
reply
0 points

They’ve been contributing to xz for two years, and commited various “test” binary files.

permalink
report
parent
reply
0 points

It’s looking more like a long game to compromise an upstream.

permalink
report
parent
reply
0 points

Either that or the attacker was very good at choosing their puppet…

permalink
report
parent
reply
0 points
*

They noticed that some ssh sessions took 0.5 seconds too long under certain circumstances. 😲

Holy hell that’s good QA.

permalink
report
reply
0 points

Well half a second delay is pretty noticeable when you ssh into a machine sitting right next to you. It should be instant. And if it isn’t something’s off.

permalink
report
parent
reply
0 points

If you’re using xz version 5.6.0 or 5.6.1, please upgrade asap, especially if you’re using a rolling-release distro like Arch or its derivatives. Arch has rolled out the patched version a few hours ago.

permalink
report
reply
0 points

Backdoor only gets inserted when building RPM or DEB. So while updating frequently is a good idea, it won’t change anything for Arch users today.

permalink
report
parent
reply
0 points

Archlinux’s XZ was compromised as well.

News post

Git change for not using tarballs from source

permalink
report
parent
reply
0 points
*

I think that was a precaution. The malicious build script ran during the build, but the backdoor itself was most likely not included in the resuling package as it checked for specific packaging systems.

https://www.openwall.com/lists/oss-security/2024/03/29/22

permalink
report
parent
reply
0 points

when building RPM or DEB.

Which ones? Everything I run seems to be clear.

https://access.redhat.com/security/cve/CVE-2024-3094

Products / Services Components State
Enterprise Linux 6 xz Not affected
Enterprise Linux 7 xz Not affected
Enterprise Linux 8 xz Not affected
Enterprise Linux 9 xz Not affected

(and thus all the bug-for-bug clones)

permalink
report
parent
reply
0 points

Those getting the most recent software versions, so nothing that should be running in a server.

permalink
report
parent
reply
0 points

Fedora 41, Fedora Rawhide, Debian Sid are the currently known affected ones AFAIK.

permalink
report
parent
reply
0 points

And you know what? Doing updates once a week saved me from updating to this version :)

permalink
report
reply
0 points

I upgraded to 5.6.0-1 on the 28th Februar already. Over a month ago. On a server. That’s the first time Arch testing has fucked me so hard lol.

permalink
report
parent
reply

Linux

!linux@lemmy.ml

Create post

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word “Linux” in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

  • Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
  • No misinformation
  • No NSFW content
  • No hate speech, bigotry, etc

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

Community stats

  • 6.4K

    Monthly active users

  • 4K

    Posts

  • 55K

    Comments