LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 03-29-2024, 01:48 PM   #1
metageek
Member
 
Registered: Jun 2007
Location: Farmington, CT
Distribution: Slackware64
Posts: 204

Rep: Reputation: 44
backdoor in upstream xz/liblzma


There are reports that xz versions 5.6.0 and 5.6.1 contain a backdoor that was inserted upstream reported here. This allows a ssh exploit.

I think this affects slackware current but not 15.0 which is still on xz version 5.2.5.
 
Old 03-29-2024, 01:54 PM   #2
yvesjv
Member
 
Registered: Sep 2015
Location: Australia
Distribution: Slackware, Devuan, Freebsd
Posts: 566

Rep: Reputation: Disabled
Thumbs up

Quote:
Originally Posted by metageek View Post
There are reports that xz versions 5.6.0 and 5.6.1 contain a backdoor that was inserted upstream reported here. This allows a ssh exploit.

I think this affects slackware current but not 15.0 which is still on xz version 5.2.5.
Thank you
It is now CVE-2024-3094
Recommendation appears to be 5.4.6

Last edited by yvesjv; 03-29-2024 at 02:04 PM. Reason: Gov recommendation
 
Old 03-29-2024, 01:56 PM   #3
metageek
Member
 
Registered: Jun 2007
Location: Farmington, CT
Distribution: Slackware64
Posts: 204

Original Poster
Rep: Reputation: 44
CISA is already on this: CVE-2024-3094
 
Old 03-29-2024, 01:58 PM   #4
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,366

Rep: Reputation: 4081Reputation: 4081Reputation: 4081Reputation: 4081Reputation: 4081Reputation: 4081Reputation: 4081Reputation: 4081Reputation: 4081Reputation: 4081Reputation: 4081
https://www.linuxquestions.org/quest...ch-4175708118/
 
Old 03-29-2024, 01:58 PM   #5
ponce
LQ Guru
 
Registered: Aug 2004
Location: Pisa, Italy
Distribution: Slackware
Posts: 7,098

Rep: Reputation: 4175Reputation: 4175Reputation: 4175Reputation: 4175Reputation: 4175Reputation: 4175Reputation: 4175Reputation: 4175Reputation: 4175Reputation: 4175Reputation: 4175
Quote:
Originally Posted by metageek View Post
There are reports that xz versions 5.6.0 and 5.6.1 contain a backdoor that was inserted upstream reported here. This allows a ssh exploit.

I think this affects slackware current but not 15.0 which is still on xz version 5.2.5.
actually, as Petri explained in another topic, our sshd doesn't link to liblzma because it doesn't use systemd's notifications (we don't have systemd, thanks to our BDFL!), so even if the malicious code is present in the xz source tarball in current sshd is not actually vulnerable.

you can try the detect script in the openwall message, it won't find any liblzma as a dependency to sshd so it will have an empty output.

Last edited by ponce; 03-29-2024 at 02:00 PM.
 
10 members found this post helpful.
Old 03-29-2024, 02:04 PM   #6
volkerdi
Slackware Maintainer
 
Registered: Dec 2002
Location: Minnesota
Distribution: Slackware! :-)
Posts: 2,508

Rep: Reputation: 8469Reputation: 8469Reputation: 8469Reputation: 8469Reputation: 8469Reputation: 8469Reputation: 8469Reputation: 8469Reputation: 8469Reputation: 8469Reputation: 8469
Quote:
Originally Posted by ponce View Post
actually, as Petri explained in another topic, our sshd doesn't link to liblzma because it doesn't use systemd's notifications (we don't have systemd, thanks to our BDFL!), so even if the malicious code is present in the xz source tarball in current sshd is not actually vulnerable.

you can try the detect script in the openwall message, it won't find any liblzma as a dependency to sshd so it will have an empty output.
The detect script modified to just check our liblzma does not find the fingerprint for the backdoor, so our liblzma is not vulnerable, nor do we patch sshd to link to libsystemd (which would then bring in liblzma).

I might rebuild from a git pull to shed the poisoned m4 files from our sources. Or maybe not... I'm really not sure the git repo can be trusted at this time.
 
24 members found this post helpful.
Old 03-29-2024, 02:10 PM   #7
metageek
Member
 
Registered: Jun 2007
Location: Farmington, CT
Distribution: Slackware64
Posts: 204

Original Poster
Rep: Reputation: 44
Yet another reason to be thankful for Pat not having adopted systemd!

Still, this may be much larger than this specific bug; lots of detective activity going on right now related to other code contributions by that bad actor.
 
2 members found this post helpful.
Old 03-29-2024, 02:28 PM   #8
yvesjv
Member
 
Registered: Sep 2015
Location: Australia
Distribution: Slackware, Devuan, Freebsd
Posts: 566

Rep: Reputation: Disabled
Thumbs up

Quote:
Originally Posted by metageek View Post
Yet another reason to be thankful for Pat not having adopted systemd!

Still, this may be much larger than this specific bug; lots of detective activity going on right now related to other code contributions by that bad actor.
Link(s) please?
I'm interested
 
Old 03-29-2024, 02:45 PM   #9
metageek
Member
 
Registered: Jun 2007
Location: Farmington, CT
Distribution: Slackware64
Posts: 204

Original Poster
Rep: Reputation: 44
See this discussion on Hacker News. Apparently this actor had made contributions to other packages; their Github account has other code that may also be compromised. Essentially anything written by this person is suspect and needs to be reviewed with a fine comb.
 
6 members found this post helpful.
Old 03-29-2024, 05:25 PM   #10
ReaperX7
LQ Guru
 
Registered: Jul 2011
Location: California
Distribution: Slackware64-15.0 Multilib
Posts: 6,558
Blog Entries: 15

Rep: Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097
Glad to hear this is being resolved.

Last edited by ReaperX7; 03-29-2024 at 05:27 PM.
 
Old 03-29-2024, 05:54 PM   #11
yvesjv
Member
 
Registered: Sep 2015
Location: Australia
Distribution: Slackware, Devuan, Freebsd
Posts: 566

Rep: Reputation: Disabled
This one is a good read
https://gist.github.com/thesamesam/2...e9ee78baad9e27

Hahahaha!
"This further suspects targeting systemd systems due to their usrmerge initiative putting all binaries in /usr/bin."

Last edited by yvesjv; 03-29-2024 at 05:57 PM.
 
5 members found this post helpful.
Old 03-29-2024, 07:23 PM   #12
bigbadaboum
Member
 
Registered: Apr 2023
Posts: 142

Rep: Reputation: 55
Mmmm...
https://gist.github.com/thesamesam/2...e9ee78baad9e27

I do not use GitHub but Sourceforge, Manage directly by Larhzu Last update 2024-01-26 It was for XZ-5.4.6
 
Old 03-29-2024, 07:31 PM   #13
ReaperX7
LQ Guru
 
Registered: Jul 2011
Location: California
Distribution: Slackware64-15.0 Multilib
Posts: 6,558
Blog Entries: 15

Rep: Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097
From what I can gather, it looks to be targeting Debian and Ubuntu systems mainly. Most distributions, even with systemd, use a vanilla sshd build, IE Arch. This looks to be a targeted attack against those systems that use the Debian/Ubuntu patch. Even the Arch build doesn't use anything but a vanilla implementation.
 
Old 03-29-2024, 08:52 PM   #14
reddog83
Member
 
Registered: Apr 2018
Distribution: Slackware 15.0/Current
Posts: 443

Rep: Reputation: 229Reputation: 229Reputation: 229
Github has disabled https://github.com/tukaani-project/xz
 
1 members found this post helpful.
Old 03-29-2024, 09:17 PM   #15
ReaperX7
LQ Guru
 
Registered: Jul 2011
Location: California
Distribution: Slackware64-15.0 Multilib
Posts: 6,558
Blog Entries: 15

Rep: Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097
These malicious actors are getting more and more bold and brazen doing long term infiltration into projects. I really hope other projects aren't being hit the same way.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: What The Intelligence Community Doesn't Get: Backdoor For 'The Good Guys' Is Always A Backdoor LXer Syndicated Linux News 0 01-11-2014 06:50 AM
Upstream Shapping qtgeo *BSD 2 11-08-2004 01:53 PM
ADSL upstream problems. marvin_robot Linux - Networking 1 03-08-2004 06:16 AM
SuSE 9.0 Wireless & Ethernet connect but no upstream puyan909 Linux - Wireless Networking 1 02-20-2004 03:23 PM
Upstream/Downstream stats jeucken Linux - Networking 4 01-06-2003 02:28 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 06:21 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration