Hi all,

This topic is all over the internet at that point, and I doubt most operators 
here
would be affected, but it is worth a heads-up for people who do not stay on to
of the news:

The current maintainer (and also for the past two years) of xz-utils, which is
included in about every linux distribution in existence, has been backdooring
the release tarball of the package since at least February 2024 and the 5.6.0 
release.

The backdoor is specifically targeted at debian and rpm-based systems, which
one known effect providing a remote unauthorized access to the SSH server
(due to those distributions patching sshd to link to systemd which itself uses
liblzma from xz-utils).

The version is recent, and only included in debian sid/testing as well as
Fedora 40/41, which have since yesterday published new packages removing
the backdoor. Other distributions like Gentoo or Archlinux and derivatives were
also including the vulnerable versions, though it seems like no backdoored code
was built in there (the exploit was targeted during the build, and neither 
distribution
used a process that would include it).

The investigation is ongoing, but here [1] is the link to the oss-security mail 
which
was the first publication on that topic, and here [2] is a more detailed 
writeup of
the events.

Stay safe,
Mathieu

[1] https://www.openwall.com/lists/oss-security/2024/03/29/4
[2] https://boehs.org/node/everything-i-know-about-the-xz-backdoor

Reply via email to