/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Researchers find malicious code in versions of the compression tool XZ Utils that were incorporated into Linux distributions from Red Hat, Debian, and others

Malicious code planted in xz Utils has been circulating for more than a month.  —  Researchers have found a malicious backdoor …

Ars Technica Dan Goodin

Discussion

  • 9to5Linux Marius Nestor on x
    Red Hat Warns Fedora Linux 40/41 and Rawhide Users About Critical Security Flaw
  • @pitrh@mastodon.social Peter N. M. Hansteen on mastodon
    This is one of the best explanations of the xz matter I have seen so far:  —  https://lcamtuf.substack.com/ ...  and it leads in with a quote to remember -  —  “This dependency existed not because of a deliberate design decisionby the developers of OpenSSH …
  • @JulianOliver@mastodon.social Julian Oliver on mastodon
    XZ, an archiving utility in broad use across GNU/Linux distributions, has a backdoor in versions 5.6.0 and 5.6.1 that appears to fiddle with SSH auth and possibly offers an attacker RCE.  Debian and Redhat have both released advisories.  Thankfully RHEL and Debian GNU/Linux stabl…
  • @stuartl@mastodon.longlandclan.id.au Stuart Longland on mastodon
    #Gentoo #GLSA regarding the #xz vulnerability affecting #Debian and #RedHat  —  https://security.gentoo.org/ ...  Definitely downgrade xz-utils if you are running ≥ 5.6.0: even though this seems to be systemd-specific, it's not worth taking the risk.  —  Most users should already…
  • @hanno@mastodon.social @hanno@mastodon.social on mastodon
    I have a story to tell that is relevant to the xz-utils thing that just happened.  I'll probably write this up properly later, but I'm in pre-vacation mode so it may take a while .  We have a problem with the way we develop and then distribute FOSS software, and both stories show…
  • @ak_hepcat@mastodon.akhepcat.com @ak_hepcat@mastodon.akhepcat.com on mastodon
    lots of chatter re: xz, libarchive, ssh, and possibly other impacted software.  —  Ubuntu pushing updates if you were following “proposed”:  —  https://github.com/...  “Now they are syncing 5.6.1+really5.4.5-1 to make sure you get safer 5.4, even if you installed 5.6 the days it …
  • @anthropy@mastodon.derg.nz @anthropy@mastodon.derg.nz on mastodon
    XZ SSH backdoor vulnerability: this actually looks pretty bad. either the involved long time dev was thoroughly compromised, or they got bribed or forced into doing this somehow, as they provided comments and arguments for all their (malicious) additions.  —  https://github.com/.…
  • @kalilinux Kali Linux on x
    The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th, it is crucial to apply the latest updates today.
  • @eigenrobot @eigenrobot on x
    if you haven't seen this its utterly bananas the scale of potential pwnage seems almost unfathomable to me idk how you even start going about fixing the vulnerability that led to this
  • @matiasgoldberg Matías N. Goldberg on x
    I'm still in shock the xz backdoor happened. But even more surprising is that it got caught because a dev noticed login in to his machine via ssh was taking 0.8s instead of the usual 0.3s and decided to look into it. And he happened to be familiar with the Valgrind situation
  • @kdrag0n Danny Lin on x
    The xz backdoor is, well, setting a fire under the entire Linux ecosystem... but I'm also so impressed with how it was set up: 2-yr maintainership, oss-fuzz, etc. ...and who knows how long it would've stayed undetected if the injected sshd code ran faster (<600ms) Highlights:
  • @badsectorlabs @badsectorlabs on x
    “Jia Tan's” commits to xz started 2022-02-06. Perhaps the account was compromised, but this looks like trust building with the maintainers before the backdoor commits.
  • @cisacyber @cisacyber on x
    We're responding to CVE-2024-3094, a reported supply chain compromise affecting XZ Utils versions 5.6.0 and 5.6.1. XZ Utils may be present in Linux distributions. See our additional guidance at https://cisa.gov/....
  • @craighrowland Craig Rowland on x
    FWIW, building trust in a project and then inserting malicious code after some time is exactly what I'd do if I was going for a supply chain attack.
  • @hackerfantastic @hackerfantastic on x
    This “xz” and “liblzma” backdoor story is increasingly looking like a sophisticated effort to target FOSS supply chains, getting this backdoor into Debian and Kali etc. It's also not the only library the backdoor author has added code too, libarchive and others may have issues.
  • @malwarejake Jake Williams on x
    So there's a supply chain compromise in the xz library that is backdooring some Linux SSH installations. Goodbye long weekend... https://www.openwall.com/...
  • @badsectorlabs @badsectorlabs on x
    The xz package tar's were backdoored. Only discovered because the backdoor slowed down sshd enough for Andres Freund to investigate. Consider the case where the backdoor didn't cause perf issues... How long would this have gone undetected? https://www.openwall.com/...
  • @zer0pwn Dominik Penner on x
    wild stuff re: xz/liblzma backdoor https://news.ycombinator.com/ ... [image]
  • @bl4sty @bl4sty on x
    nothing to see here, just properly documenting the fixed defects in the backdoor code 😂 [image]
  • @lukolejnik @lukolejnik on x
    Upstream xz repository and the xz tarballs have been backdoored. Very serious security risk because xz is used for compression ... very widely. It makes a ssh server backdoored. This is very serious. Happens...? https://www.openwall.com/.... Backdoor execution: https://www.openwa…
  • @dcuthbert Daniel Cuthbert on x
    As far as supply chain backdoors go, this is Prada level of design and style.
  • @jgreigj Jon Greig on x
    Of course a vulnerability like this drops on Good Friday CISA and Red Hat warned Linux users of CVE-2024-3094 — affecting #XZ Utils https://therecord.media/...
  • @iancoldwater Ian Coldwater on x
    This upstream supply chain security attack is the kind of nightmare scenario that has gotten people describing it called hysterical for years. It's real. Sleep well. backdoor in upstream xz/liblzma leading to ssh server compromise https://www.openwall.com/...
  • @vhmth Vinay Hiremath on x
    @zer0pwn It's fucking crazy. This part was my favorite. “I'm not really a security researcher or reverse engineer but here's a complete breakdown of exactly how the behavior changes.” You only get this kind of humility when you're working with absolute wizards on a consistent bas…
  • @thegrugq @thegrugq on x
    On the .xz backdoor. It is hard to see how the developer Jia Tan is innocent. The backdoor was added in 5.6.0 by his account. He contacted Fedora to push them to move to 5.6.0. There was a problem with valgrind, they worked with hi to resolve it. He commits the fix in 5.6.1.
  • @birchb0y Alden on x
    Interesting note on the #xz backdoor: If you plot Jai Tan's commit history over time, the cluster of offending commits occurs at an unusual time compared to rest of their activity. If the dev was pwned, it could be a sign that the threat actor contributed in their own timezone [i…
  • @bl4sty @bl4sty on x
    you gotta appreciate the way they shipped the backdoored object file. added some “test” data to the source tree that gets unxz'd and (dd) carved in a specific way, that is fed into a deobfuscator written in.. awk script and the result gets unxz'd again [image]
  • @vxunderground @vxunderground on x
    Happy Supply Chain Attack Friday.
  • @haxrob @haxrob on x
    Andres Freund, the principal software engineer at Microsoft who discovered the xz backdoor really does deserve a big pat on the back. 👏 The outcome could have been much, much worse.
  • @bcrypt Yan on x
    fyi homebrew had the backdoored version of xz utils; updating now will downgrade it https://duo.com/... [image]
  • @kaylintrychon Kaylin Trychon on x
    Chainguard Images are built to reduce the number of components inside, only using what is required to build or run an application. Because of these minimal and intentional design decisions, @chainguard_dev Images do not include SSH or liblzma by default.
  • r/technology r on reddit
    Backdoor found in widely used Linux utility breaks encrypted SSH connections
  • r/cybersecurity r on reddit
    Backdoor found in widely used Linux utility breaks encrypted SSH connections
  • r/openSUSE r on reddit
    openSUSE addresses supply chain attack against xz compression library
  • r/linux r on reddit
    openSUSE addresses supply chain attack against xz compression library
  • r/hacking r on reddit
    oss-security - backdoor in upstream xz/liblzma leading to ssh server compromise
  • r/archlinux r on reddit
    Arch Linux - News: The xz package has been backdoored
  • r/linuxsucks r on reddit
    “PLEASE IMMEDIATELY STOP USAGE OF ANY FEDORA 41 OR FEDORA RAWHIDE INSTANCES for work or personal activity.”