this post was submitted on 29 Mar 2024
337 points (100.0% liked)

Linux

1259 readers
79 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] capt_kafei@lemmy.ca 69 points 8 months ago (3 children)

Damn, it is actually scary that they managed to pull this off. The backdoor came from the second-largest contributor to xz too, not some random drive-by.

[–] AmbiguousProps@lemmy.today 34 points 8 months ago (1 children)

They've been contributing to xz for two years, and commited various "test" binary files.

[–] stsquad@lemmy.ml 41 points 8 months ago (1 children)

It's looking more like a long game to compromise an upstream.

[–] cjk@feddit.de 15 points 8 months ago (1 children)

Either that or the attacker was very good at choosing their puppet…

[–] stsquad@lemmy.ml 25 points 8 months ago (1 children)

Well the account is focused on one particular project which makes sense if you expect to get burned at some point and don't want all your other exploits to be detected. It looks like there was a second sock puppet account involved in the original attack vector support code.

We should certainly audit other projects for similar changes from other psudoanonymous accounts.

[–] cjk@feddit.de 3 points 8 months ago (1 children)

Yeah, and the 700 commits should be reverted… just in case we missed something.

load more comments (1 replies)
[–] stsquad@lemmy.ml 25 points 8 months ago* (last edited 8 months ago) (2 children)

Time to audit all their contributions although it looks like they mostly contribute to xz. I guess we'll have to wait for comments from the rest of the team or if the whole org needs to be considered comprimised.

load more comments (2 replies)
[–] possiblylinux127@lemmy.zip 9 points 7 months ago (1 children)

It would be nice if we could press formal charges

load more comments (1 replies)
[–] chameleon@kbin.social 55 points 8 months ago (1 children)

This is a fun one we're gonna be hearing about for a while...

It's fortunate it was discovered before any major releases of non-rolling-release distros were cut, but damn.

[–] rolaulten@startrek.website 6 points 7 months ago

That's the scary thing. It looks like this narrowly missed getting into Debian and RH. Downstream downstream that is... everything.

[–] dan@upvote.au 55 points 7 months ago (2 children)
[–] SpaceCadet@feddit.nl 19 points 7 months ago (1 children)

In the fallout, we learn a little bit about mental health in open source.

Reminded me of this, relevant as always, xkcd:

Image

load more comments (1 replies)
[–] worsedoughnut@lemdro.id 10 points 7 months ago

That whole timeline is insane, and the fact that anyone even found this in the totally coincidental way they did is very lucky for the rest of us.

[–] redcalcium@lemmy.institute 36 points 8 months ago (1 children)

If you're using xz version 5.6.0 or 5.6.1, please upgrade asap, especially if you're using a rolling-release distro like Arch or its derivatives. Arch has rolled out the patched version a few hours ago.

[–] flying_sheep@lemmy.ml 7 points 8 months ago (5 children)

Backdoor only gets inserted when building RPM or DEB. So while updating frequently is a good idea, it won't change anything for Arch users today.

[–] SavvyBeardedFish@reddthat.com 12 points 8 months ago (2 children)
[–] flying_sheep@lemmy.ml 10 points 7 months ago

No, read the link you posted:

Arch does not directly link openssh to liblzma, and thus this attack vector is not possible. You can confirm this by issuing the following command:

ldd "$(command -v sshd)"

However, out of an abundance of caution, we advise users to remove the malicious code from their system by upgrading either way.

[–] progandy@feddit.de 5 points 7 months ago* (last edited 7 months ago)

I think that was a precaution. The malicious build script ran during the build, but the backdoor itself was most likely not included in the resuling package as it checked for specific packaging systems.

https://www.openwall.com/lists/oss-security/2024/03/29/22

load more comments (4 replies)
[–] lemmyreader@lemmy.ml 33 points 8 months ago
[–] OsrsNeedsF2P@lemmy.ml 30 points 8 months ago (3 children)

Time to bring back the reproducible build hype

[–] chameleon@kbin.social 42 points 8 months ago (1 children)

Won't help here; this backdoor is entirely reproducible. That's one of the scary parts.

[–] OsrsNeedsF2P@lemmy.ml 23 points 8 months ago* (last edited 8 months ago) (2 children)

The backdoor wasn't in the source code, only in the distributed binary. So reproducible builds would have flagged the tar as not coming from what was in Git

[–] chameleon@kbin.social 33 points 8 months ago (1 children)

Reproducible builds generally work from the published source tarballs, as those tend to be easier to mirror and archive than a Git repository is. The GPG-signed source tarball includes all of the code to build the exploit.

The Git repository does not include the code to build the backdoor (though it does include the actual backdoor itself, the binary "test file", it's simply disused).

Verifying that the tarball and Git repository match would be neat, but is not a focus of any existing reproducible build project that I know of. It probably should be, but quite a number of projects have legitimate differences in their tarballs, often pre-compiling things like autotools-based configure scripts and man pages so that you can have a relaxed ./configure && make && make install build without having to hunt down all of the necessary generators.

[–] flying_sheep@lemmy.ml 7 points 8 months ago (2 children)

Time to change that tarball thing. Git repos come with built in checksums, that should be the way to go.

load more comments (2 replies)
load more comments (1 replies)
load more comments (2 replies)
[–] AmbiguousProps@lemmy.today 25 points 8 months ago

This is pretty insane. Can't wait for the Darknet Diaries on this one.

[–] lemmyreader@lemmy.ml 23 points 8 months ago

Reading the comments here https://news.ycombinator.com/item?id=39865810 it appears that libarchive may be tainted as well.

[–] Doombot1@lemmy.one 19 points 8 months ago (2 children)

ELI5 what does this mean for the average Linux user? I run a few Ubuntu 22.04 systems (yeah yeah, I know, canonical schmanonical) - but they aren’t bleeding edge, so they shouldn’t exhibit this vulnerability, right?

[–] kbal@fedia.io 28 points 8 months ago (2 children)

The average user? Nothing. Mostly it just affects those who get the newest versions of everything.

[–] flying_sheep@lemmy.ml 4 points 8 months ago

In this case I think that's just Fedora and Debian Sid users or so.

The backdoor only activates during DEB or RPM builds, and was quickly discovered so only rolling release distros using either package format were affected.

load more comments (1 replies)
[–] rotopenguin@infosec.pub 16 points 8 months ago (1 children)

apt info xz-utils

Your version is old as balls. Even if you were on Mantic, it would still be old as balls.

[–] trk@aussie.zone 23 points 7 months ago

Security through antiquity

[–] bloodfart@lemmy.ml 17 points 7 months ago
[–] lemmyreader@lemmy.ml 16 points 8 months ago (5 children)

t y for sharing.

#showerthoughts The problem is in upstream and has only entered Debian Sid/unstable. Does this mean that for example bleeding edge Arch (btw) sshd users are compromised already ?

[–] Dima@lemmy.one 18 points 8 months ago* (last edited 8 months ago) (1 children)

Looks like the 5.6.1-2 release on Arch moved from using the published GitHub releases to just using the git repository directly, which as I understand avoids the exploit (because the obfuscated script to inject the exploit is only present in the packaged tarballs and not the git repo itself)

https://gitlab.archlinux.org/archlinux/packaging/packages/xz/-/commit/881385757abdc39d3cfea1c3e34ec09f637424ad

[–] festus@lemmy.ca 28 points 8 months ago* (last edited 8 months ago) (1 children)

They also believe we (Arch users) are unaffected because this backdoor targeted Debian and Redhat type packaging specifically and also relied on a certain SSH configuration Arch doesn't use. To be honest while it's nice to know we're unaffected, it's not at all comforting that had the exploiter targeted Arch they would have succeeded. Just yesterday I was talking to someone about how much I love rolling release distros and now I'm feeling insecure about it.

More details here: https://gitlab.archlinux.org/archlinux/packaging/packages/xz/-/issues/2

[–] tal@lemmy.today 7 points 8 months ago (1 children)

Someone always has to be the guinea pig.

That being said, maybe there's an argument for distros that do rolling releases to have an "intentionally delayed rolling release" that just trails the regular rolling release by a fixed amount of time to provide more time for guinea pigs to run into things. If you want rolling, but can live with the delay, just use that.

[–] Gobbel2000@feddit.de 3 points 7 months ago

OpenSuse Slowroll does pretty much that, a slightly delayed rolling release.

[–] Atemu@lemmy.ml 15 points 8 months ago* (last edited 8 months ago)

Arch is on 5.6.1 as of now: https://archlinux.org/packages/core/x86_64/xz/

We at Nixpkgs have barely evaded having it go to a channel used by users and we don't seem to be affected by the backdoor.

[–] blaise@champserver.net 8 points 8 months ago

The link mentions that it is only ran as part of a debian or RPM package build. Not to mention that on Arch sshd is not linked against liblzma anyways.

[–] redcalcium@lemmy.institute 6 points 8 months ago (1 children)
load more comments (1 replies)
[–] LastoftheDinosaurs@reddthat.com 4 points 8 months ago (1 children)

It was also on Gentoo. I had this version installed for a day or two.

[–] flying_sheep@lemmy.ml 6 points 8 months ago (1 children)

Since you didn't build a RPM or DEB package however, your didn't compile in the backdoor.

[–] LastoftheDinosaurs@reddthat.com 3 points 8 months ago

Yeah, it's probably fine. I also don't use systemd. I was just pointing out that another rolling release distribution had the affected version.

[–] umami_wasbi@lemmy.ml 7 points 7 months ago (1 children)
load more comments (1 replies)
[–] DoingFedTime@scribe.disroot.org 6 points 8 months ago (1 children)

And you know what? Doing updates once a week saved me from updating to this version :)

[–] 30p87@feddit.de 4 points 7 months ago (2 children)

I upgraded to 5.6.0-1 on the 28th Februar already. Over a month ago. On a server. That's the first time Arch testing has fucked me so hard lol.

load more comments (2 replies)
[–] Wes_Dev@lemmy.ml 5 points 7 months ago

Damn fine work all around.

I know this is an issue fraught with potential legal and political BS, and it's impossible to check everything without automation these days, but is there an organization that trains and pays people to work as security researchers or QA for open source projects?

Basically, a watchdog group that finds exploitable security vulnerabilities, and works with individuals or vendors to patch them? Maybe make it a publicly owned and operated group with mandatory reporting of some kind. An international project funded by multiple governments, where it's harder for a single point of influence to hide exploits, abuse secrets, or interfere with the researchers? They don't own or control any code, just find security issues and advise.

I don't know.

Just thinking that modern security is getting pretty complicated, with so many moving parts and all.

load more comments
view more: next ›