jotbe, to security
@jotbe@chaos.social avatar

Putting an xz Backdoor Payload in a Valid RSA Key | rya.nc

https://rya.nc/xz-valid-n.html

popey, to ubuntu
@popey@mastodon.social avatar

[Announcement] "Xz/liblzma security update (post #2)" from the Ubuntu developers regarding

https://discourse.ubuntu.com/t/xz-liblzma-security-update-post-2/43801?u=popey

jbzfn, to debian
@jbzfn@mastodon.social avatar

🍥 Debian Decided to Postpone the 12.6 Release | Linuxiac

「 Without a doubt, the deliberate infiltration of backdoored upstream XZ tarballs into the Debian sid repository a few days ago, allowing remote SSH access without authentication, sparked a real storm in the Linux community 」

https://linuxiac.com/debian-decided-to-postpone-the-12-6-release/

jomo, (edited ) to random
@jomo@mstdn.io avatar

Nice! @amlw wrote a PoC exploit and a honeypot for the xz backdoor.

https://github.com/amlweems/xzbot

jwildeboer, to random
@jwildeboer@social.wildeboer.net avatar

#JustInCase I have mirrored @thesamesam gist at https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27 (the xz backdoor/exploit FAQ) locally and on https://codeberg.org/jwildeboer/gists/src/branch/main/20240401CVE20243094FAQMirror.md Will setup some sort of automatic update script later. I don't think Github will somehow interfere with this FAQ, but hey, better safe than sorry and stuff :)

This is just a FYI. Please do NOT use my manual mirror of the FAQ and bookmark ONLY the original source.

#CVE20243094 #xz #liblzma #backdoor

forgejo, to random
@forgejo@floss.social avatar

Hello admins,

We've published a post regarding the impact of the xz backdoor (CVE-2024-3094) on the Forgejo project.
https://forgejo.org/2024-03-xz/

shellsharks, to infosec
@shellsharks@shellsharks.social avatar

There's A LOT going on (analysis, discussion, vendor notices, etc...) related to the ongoing xz/liblzma compromise so I created a "link roundup" which centralizes and buckets a lot of the awesome links and threads I've seen flying around.

https://shellsharks.com/xz-compromise-link-roundup

I will try to keep this up-to-date (ish) for a few days while things are hot but I make no promises beyond that.

#cve20243094 #xz #xzbackdoor #xzorcist #supplychainattack #xz4shell #infosec #cybersecurity

jwf, to linux
@jwf@floss.social avatar

Most of my feed on the mess is solution-eering on ideas for paying maintainers. It implies the way to fix this is to simply pay people for their time.

I am not seeing something else though. Has anyone actually asked the maintainer what they want? What if that answer was not money? What if it was "I don't want to do this anymore?"

Regardless of the answer this time around, we should be prepared to boldly face these types of answers too.

techsaviours, to security
@techsaviours@fosstodon.org avatar
synlogic, to random
@synlogic@toot.io avatar

many Russian & Chinese names seen as maintainers or key commiter atributations of xz & liblzma:

Larhzu (username of "Lasse Collin")
Jia Tan
Chan Tsune
Wei Dai

Sergey Kosukhin
Igor Pavlov
Ilya Kurdyukov
Dimitri Papadopoulos

DISCLAIMER: This is NOT exhaustive search, just quick. And having one's name in this list does NOT imply guilt or malfeasance, and its possible its all an innocent coincidence! But given what we know about Chin & Rus gov backed hacking/infiltration attempts...

circl, to infosec
@circl@social.circl.lu avatar

TR-82 - backdoor discovered in xz-utils - CVE-2024-3094

🔗 For more information including detection and information about vulnerable distribution https://www.circl.lu/pub/tr-82/

jotbe, to security
@jotbe@chaos.social avatar
kernellogger, to linux
@kernellogger@fosstodon.org avatar

Lasse Collin's patch-series updating the 's code that a few days ago hit -next was dropped for now until backdooring of upstream xz is understood better:

https://lore.kernel.org/all/20240329195602.382cb1c99bb70e3d8c6093ae@linux-foundation.org/

kernellogger,
@kernellogger@fosstodon.org avatar

Lasse Collin, original author of , replied on : https://lore.kernel.org/lkml/20240330144848.102a1e8c@kaneli/

"'"[…] I'm on a holiday and only happened to look at my emails and it seems to be a major mess.

My proper investigation efforts likely start in the first days of April. That is, I currently know only a few facts which alone are bad enough.

Info will be updated here: https://tukaani.org/xz-backdoor/"'"

bentomn, (edited ) to random
@bentomn@hachyderm.io avatar

This is a good, clear note regarding the incident.
What is known, what is unknown.
It distills earlier notes, offers context.

https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27

philpem, to random
@philpem@digipres.club avatar

Learning about the gcc attribute ((ifunc ("resolve_xxx"))) construct is making me wonder what the hell the person who thought it up was drinking, smoking or eating, and the code review team too.

I'm struggling to think of a reasonable usecase for this monstrosity of a construct.

https://gcc.gnu.org/onlinedocs/gcc/Common-Function-Attributes.html#index-ifunc-function-attribute

stdevel, to linux
@stdevel@chaos.social avatar

Admins on Monday be like…

bsdphk, to random
@bsdphk@fosstodon.org avatar

I gave a talk about state actors attacking FOSS, ten years ago, on FOSSDEM:

https://www.youtube.com/watch?v=3jQoAYRKqhg

Adorable_Sergal, to random
@Adorable_Sergal@hachyderm.io avatar

Is RHEL 8.x affected by the xz exploit?

asking for a friend

Adorable_Sergal, to random
@Adorable_Sergal@hachyderm.io avatar
cccfr, to internet German
@cccfr@chaos.social avatar

xz or not xz , thats the question?
ugly, mode: alles anzünden

"Backdoor found in xz liblzma specifically targets the RSA implementation of OpenSSH. Story still developing."

#leak #backdoor #ssh #Internet #xz #linux #rsa #libzma #openssh #CVE20243094 #sicherheitslücke
https://www.youtube.com/watch?v=jqjtNDtbDNI
https://openwall.com/lists/oss-security/2024/03/29/4
https://archlinux.org/news/the-xz-package-has-been-backdoored/
https://sc.tarnkappe.info/d941c4

Haydar, to random German
@Haydar@social.tchncs.de avatar

Regarding the / backdoor, quoting the original mail https://seclists.org/oss-sec/2024/q1/268

"Debian and several other distributions patch openssh to support systemd notification, and libsystemd does depend on lzma."

"it is likely the backdoor can only work on glibc based systems."

So, if you are using a non-sytemd distro ( e.g. , , , ) or a non-glibc distro (e.g. ) you are most likely not affected, right?

phryk, to random
@phryk@mastodon.social avatar

Realistically, any contributions by JiaT75 should be retroactively audited.

Not gonna look into it too deep as I'm working right now, but they seem to maintain a unit testing framework – seems pretty dead, but a testing framework certainly sounds like the sort of thing that would be in a good position to fuck with software supply chains.

#cve20243094

cassidy, to linux
@cassidy@blaede.family avatar

Watching the discovery and fallout from the xz supply chain compromise unfold in real time across mailing lists and issue trackers. Wild stuff.

Hug ops to OSS security peeps, today. And hopefully we can better understand what exactly happened—and why.

w8emv, to random
@w8emv@hachyderm.io avatar

Red Hat assigned this issue CVE-2024-3094.

"Subject: backdoor in upstream xz/liblzma leading to ssh server compromise"

As posted to oss-security by Andres Freund andres@

https://www.openwall.com/lists/oss-security/2024/03/29/4

miah, to random
@miah@hachyderm.io avatar
w8emv,
@w8emv@hachyderm.io avatar

@miah SUSE has a downgrade patch for /

https://build.opensuse.org/request/show/1163302

based on the patch it looks like their Tumbleweed distro might need a closer look.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • InstantRegret
  • rosin
  • modclub
  • Youngstown
  • khanakhh
  • Durango
  • slotface
  • mdbf
  • cubers
  • GTA5RPClips
  • kavyap
  • DreamBathrooms
  • ngwrru68w68
  • JUstTest
  • magazineikmin
  • osvaldo12
  • tester
  • tacticalgear
  • ethstaker
  • Leos
  • thenastyranch
  • everett
  • normalnudes
  • anitta
  • provamag3
  • cisconetworking
  • lostlight
  • All magazines