xz/liblzma is compromised upstream (backdoor) 29 March 2024, 19:47:48 Subject: https://openwall.com/lists/oss-security/2024/03/29/4I guess it has something to do with sshd linking, though I'm not sure (not an expert). Today xz got updated and now I'm concerned a bit.Any thoughts, guys?
Re: xz/liblzma is compromised upstream (backdoor) Reply #1 – 29 March 2024, 20:22:18 shouldn't be an issue, as sshd is not linked against lzmaWhen using xz version 5.6.0-1 or 5.6.1-1, upgrading is recommended.artist Last Edit: 29 March 2024, 23:04:00 by Artist 2 Likes
Re: xz/liblzma is compromised upstream (backdoor) Reply #2 – 29 March 2024, 20:25:49 That does sound worrying, if malevolent code has been inserted into the upstream package, from that link the affected versions are 5.6.0 and 5.6.1, the update today is just a minor version from 5.6.1-1 to 5.6.1-2 so unless it has been modified to fix this it is also suspect.You can get the last known good version from here:https://archive.artixlinux.org/packages/x/xz/xz-5.4.6-1-x86_64.pkg.tar.zst 26-Jan-2024 21:02 613Kand install it with:Code: [Select]# pacman -U xz-5.4.6-1-x86_64.pkg.tar.zstthen add the line:IgnorePkg = xzto /etc/pacman.conf to stop it being upgraded for now.That's what I've done anyway until further instructions appear! Can't be too careful with live malware exploits - thanks for the warning! (From the description the code is obfuscated and the reporter was unsure exactly what it did so it might affect other aspects besides ssh operations.) Last Edit: 29 March 2024, 20:35:01 by ####### 1 Likes
Re: xz/liblzma is compromised upstream (backdoor) Reply #3 – 29 March 2024, 21:22:30 https://news.ycombinator.com/item?id=39865810QuoteHe has been part of the xz project for 2 years, adding all sorts of binary test files, and to be honest with this level of sophistication I would be suspicious of even older versions of xz until proven otherwise.Do we need to change SSH keys?QuoteIf you really want to be sure you can run the `env sshd -h` test in the original emailcompare the time taken by time env -i LANG=C /usr/sbin/sshd -h and time env -i LANG=C TERM=foo /usr/sbin/sshd -h. If the first one consistently takes longer than the second one (500ms for the original author, 100ms for me on an affected system), then your sshd is affected Last Edit: 29 March 2024, 21:50:20 by kiblaster
Re: xz/liblzma is compromised upstream (backdoor) Reply #4 – 29 March 2024, 21:50:06 From what I can tell, the backdoor is injected into the distributed tarballs but not the repo itself. Arch recently started pulling from the repos instead of downloading the tarball: https://gitlab.archlinux.org/archlinux/packaging/packages/xz/-/commit/881385757abdc39d3cfea1c3e34ec09f637424adArtix too on system-gremlins: https://gitea.artixlinux.org/packages/xz/commit/7cde4de09a6f768d3ee58c5bdf02581af2f06ef8I would suggest people install the latest system-gremlins/xz, as this doesn't yet seem to have rolled out to system.Also, if the packagers are reading this, I suggest switching to #commit= instead of #tag= as tags can be changed
Re: xz/liblzma is compromised upstream (backdoor) Reply #5 – 29 March 2024, 22:12:36 Bit ironic that the last commit , by the xz dev who it's being reported was the one who got their account compromised (assuming that's what has happened), had the message "Docs: Simplify SECURITY.md."Edit:The whole thing smells a bit off.The backdoor may have only been injected into the tarballs but there's supposedly 'artifacts', as this Ars article calls them, in the main repo which run the backdoor.Tests: Add a few test files. How do you not notice commits made in your name to master ? Last Edit: 29 March 2024, 22:22:35 by gripped
Re: xz/liblzma is compromised upstream (backdoor) Reply #6 – 29 March 2024, 22:19:53 on arch linux: https://archlinux.org/news/the-xz-package-has-been-backdoored/in artix, sshd is indeed not linked against lzma, so no problem you can check it with the following command:Code: [Select]ldd $(command -v sshd) | grep liblzmaif the check above returns empty then you're good.
Re: xz/liblzma is compromised upstream (backdoor) Reply #7 – 29 March 2024, 23:02:55 When using xz version 5.6.0-1 or 5.6.1-1, upgrading is recommended.artist
Re: xz/liblzma is compromised upstream (backdoor) Reply #8 – 30 March 2024, 03:23:56 Quote from: Artist – on 29 March 2024, 23:02:55When using xz version 5.6.0-1 or 5.6.1-1, upgrading is recommended.artistI've decided I don't trust xz at all atm, since JiaT75's first commit. (Jan 7 2023)So I've downgraded xz to 5.4.0-1 (Build Date : Thu 15 Dec 2022)Is this paranioa ?https://boehs.org/node/everything-i-know-about-the-xz-backdoorI've no clue ? But sounds dodgy.I'll wait for the dust to settle....Edit: And github have just suspended the xz repo
Re: xz/liblzma is compromised upstream (backdoor) Reply #9 – 30 March 2024, 04:56:54 It's not paranoia, I also don't believe that existing fixed package has 100% safe code, because that Jia Tan plant was smuggling all kind of nasty shit to several projects, not just to xz/liblzma.https://github.com/libarchive/libarchive/pull/1609https://github.com/google/oss-fuzz/pull/10667/We have to wait for more of this story to unfold.Quote from: Dju – on 29 March 2024, 22:19:53you can check it with the following command:Code: [Select]ldd $(command -v sshd) | grep liblzmaif the check above returns empty then you're good.Also, keep in mind that running ldd is unsafe in some instances.https://jmmv.dev/2023/07/ldd-untrusted-binaries.htmlEDIT: Unrelated, but seems like I can't access archive.artixlinux.org without VPN? What's going on? Last Edit: 30 March 2024, 05:23:00 by Shoun2137 2 Likes
Re: xz/liblzma is compromised upstream (backdoor) Reply #10 – 30 March 2024, 11:44:24 Quote from: gripped – on 30 March 2024, 03:23:56Is this paranioa ?https://boehs.org/node/everything-i-know-about-the-xz-backdoorIt's not paranoia, that's damn sad. Btw, the link shows a nice perspective of this backdoor (came here today to post it too).
Re: xz/liblzma is compromised upstream (backdoor) Reply #11 – 30 March 2024, 11:51:44 The guy (Jia Tan) was also included as a maintainer of XZ Embedded repository used in the Linux kernel:https://lore.kernel.org/lkml/[email protected]/t/ Last Edit: 30 March 2024, 13:39:19 by TheExplorer
Re: xz/liblzma is compromised upstream (backdoor) Reply #12 – 30 March 2024, 12:11:20 Quote from: Shoun2137 – on 30 March 2024, 04:56:54EDIT: Unrelated, but seems like I can't access archive.artixlinux.org without VPN? What's going on?Ha... that's what I was talking about, but was sent to the website hosting ppl first and no one took the responsibility here, with someone even stating that the war in Ukraine was the answer... Have a read here: https://forum.artixlinux.org/index.php/topic,6252.30.htmlGitea migrated to another provider and now it works. Archive only via VPN.
Re: xz/liblzma is compromised upstream (backdoor) Reply #13 – 30 March 2024, 14:16:33 Update from the author: https://tukaani.org/xz-backdoor/
Re: xz/liblzma is compromised upstream (backdoor) Reply #14 – 30 March 2024, 14:20:01 Quote from: gripped – on 30 March 2024, 03:23:56So I've downgraded xz to 5.4.0-1 (Build Date : Thu 15 Dec 2022)5.4.6 Stable is fine. 1 Likes