• dan@upvote.au
      link
      fedilink
      arrow-up
      8
      ·
      edit-2
      1 year ago

      From what I’ve been reading, it sounds like they were malicious from the very beginning. The work to integrate the malware goes back to 2021. https://boehs.org/node/everything-i-know-about-the-xz-backdoor

      It’s an extremely sophisticated attack that was hidden very well, and was only accidentally discovered by someone who noticed that SSH connections were using more CPU power and taking 0.5s longer than they should have. https://mastodon.social/@AndresFreundTec/112180406142695845

      • Moonrise2473@lemmy.ml
        link
        fedilink
        arrow-up
        3
        ·
        1 year ago

        From that post, commits set to UTC+0800 and activity between UTC 12-17 indicate that the programmer wasn’t operating from California but from another country starting with C. The name is also another hint.

        • dan@upvote.au
          link
          fedilink
          arrow-up
          4
          ·
          edit-2
          1 year ago

          That could be part of their plan though… Make people think they’re from China when in reality they’re a state-sponsored actor from a different country. Hard to tell at this point. The scary thing is they got very close to sneaking this malware in undetected.

          A lot of critical projects are only maintained by one person who may end up burning out, so I’m surprised we haven’t seen more attacks like this. Gain the trust of the maintainer (maybe fix some bugs, reply to some mailing-list posts, etc), take over maintenance, and slowly add some malware one small piece at a time, interspersed with enough legit commits that you become one of the top contributors (and thus people start implicitly trusting you).

  • gnuplusmatt@reddthat.com
    link
    fedilink
    arrow-up
    2
    ·
    1 year ago

    some people in my mastodon feed are suggesting that the backdoor might have connected out to malicious infrastructure or substituted its own SSH host keys, but I can’t find any clear confirmation. More info as the investigation progresses.

    I guess at this point if you’re on Fedora 40 or rawhide clear / regen your host keys, even after xz version rollback

    • Deathcrow@lemmy.ml
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      or substituted its own SSH host keys,

      why would the backdoor do that? It would immediately expose itself because every ssh client on the planet warns about changed host keys when connecting.

      • gnuplusmatt@reddthat.com
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        1 year ago

        Perhaps it was a poorly worded way of suggesting that invalidating host keys would invalidate all client keys it could potentially generate? Either way it’s a lot of speculation.

        Resetting the keys and SSH config on any potentially compromised host is probably not a terrible idea

  • interdimensionalmeme@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    Well, there’s also malicious code in the proprietary binary blobs of the drivers and those run with kernel privilege. At least that one we see what it does.

  • kaleissin@sopuli.xyz
    link
    fedilink
    arrow-up
    2
    arrow-down
    1
    ·
    1 year ago

    Bad title. This is CVE-2024-3094. Run “xz --version” to see if you are affected.

    • ⲇⲅⲇ@lemmy.ml
      link
      fedilink
      arrow-up
      6
      ·
      1 year ago

      If you go to the post, on the comments, there is someone that is already telling you to run dnf list xz --installed. So you don’t need to run xz directly.

    • 1henno1@feddit.de
      link
      fedilink
      arrow-up
      3
      ·
      1 year ago

      AFAIK it‘s better to use rpm -q xz xz-libs (copied from the forum replies) to avoid running xz itself just in case the affected version is already installed

  • 56!@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    I’m on Void, and I had the malicious version installed. Updating the system downgraded xz to 5.4.6, so it seems they are on it. I’ll be watching discussions to decide if my system might still be compromised.

  • loops@beehaw.org
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 year ago

    Running Ubuntu 23.10 with xz-utils 5.41 which is unaffected. Versions 5.6.0 and 5.6.1 are the malicious packages. I used Synaptic Package Manager to search for it.