this post was submitted on 01 Apr 2024
75 points (100.0% liked)

Linux

1258 readers
96 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

Hey, I've been hearing a LOT about the xz backdoor. Crazy story, but rather than reading 10 different articles about it from 3 days ago when the story was quite new, does anybody know a high quality write-up that has all the juicy details and facts? I really like in-depth guides that cover every aspect of the story.

Thanks in advance guys!

top 12 comments
sorted by: hot top controversial new old
[–] Pantherina@feddit.de 33 points 7 months ago* (last edited 7 months ago)
[–] kbal@fedia.io 13 points 7 months ago* (last edited 7 months ago) (1 children)

Not everything is known yet, so you won't find a comprehensive summary. The latest news I've seen: https://www.openwall.com/lists/oss-security/2024/03/30/36

I'm watching some folks reverse engineer the xz backdoor, sharing some preliminary analysis with permission. The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system(). It's RCE, not auth bypass, and gated/unreplayable.

All the technical details that are widely known (and some that aren't yet) seem to be in that thread, including the original report from Andres Freund. For rumours about who might be behind it and high-level speculation about what it all means, you'd have to look elsewhere.

[–] BrikoX@lemmy.zip 10 points 7 months ago (1 children)
[–] PotatoesFall@discuss.tchncs.de 1 points 7 months ago

awesome, thanks!

[–] chameleon@kbin.social 9 points 7 months ago

Sam Jones's FAQ is by far the best single source, links to other solid sources for more in-depth technical details and also lightly debunks a few things.

The main thing sources online disagree on are which distros are affected. That's because it's not a simple yes/no and some distros are taking a nuanced approach in their public communication, while others have chosen the sledgehammer in an attempt to get people to upgrade their systems but keep/kept the nuance in the back room where the audience understood not everything was known yet. Some distros are underselling how vulnerable they were, others are overselling it.

[–] krdo@programming.dev 8 points 7 months ago (1 children)

Best coverage I've seen so far has been on Ars Technica.

[–] Fubarberry@sopuli.xyz 7 points 7 months ago (1 children)

Yeah, their original coverage was good, but they also had a really good follow up today.

[–] hallettj@leminal.space 6 points 7 months ago

I read a few articles. I think Andres Freund's announcement gave me the best context for the exploit itself. https://www.openwall.com/lists/oss-security/2024/03/29/4

The most helpful source I saw on which systems are affected was this Lemmy post, https://beehaw.org/post/12813772

[–] Max_P@lemmy.max-p.me 5 points 7 months ago

It's still ongoing and still being reverse engineered, so I would expect the good writeups to come in a couple days.

[–] Penguincoder 1 points 7 months ago