Deutsch English Français Italiano |
<op.2lihbgr3a3w0dxdave@hodgins.homeip.net> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!news.nobody.at!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "David W. Hodgins" <dwhodgins@nomail.afraid.org> Newsgroups: comp.os.linux.misc Subject: Re: Malware find in the news: xz related. Date: Sun, 31 Mar 2024 14:51:06 -0400 Organization: A noiseless patient Spider Lines: 31 Message-ID: <op.2lihbgr3a3w0dxdave@hodgins.homeip.net> References: <uu7r9s$kh5b$2@dont-email.me> <uubp1i$1qg47$1@dont-email.me> <uuc1l6$lfl$1@tncsrv09.home.tnetconsulting.net> <op.2lh91erma3w0dxdave@hodgins.homeip.net> <uuc72o$1ts1m$1@dont-email.me> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed; delsp=yes Content-Transfer-Encoding: 8bit Injection-Date: Sun, 31 Mar 2024 18:56:56 +0200 (CEST) Injection-Info: dont-email.me; posting-host="d2cdf57838d94b96c1341b5af9238951"; logging-data="2063583"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1//oC+Tn/cxYv3iw0+r0lLKGNDnlQrgVnQ=" User-Agent: Opera Mail/12.16 (Linux) Cancel-Lock: sha1:khthZrr7tbguWiYuET3B8S0DVIE= Bytes: 2514 On Sun, 31 Mar 2024 13:38:32 -0400, Rich <rich@example.invalid> wrote: > David W. Hodgins <dwhodgins@nomail.afraid.org> wrote: >> On Sun, 31 Mar 2024 12:05:58 -0400, Grant Taylor <gtaylor@tnetconsulting.net> wrote: >> >>> On 3/31/24 08:38, John McCue wrote: >>>> Thanks, here is another interesting link that describes how the issue >>>> occurred and indicates why *BSD and Distros like Slackware would not >>>> be vulnerable. >>> >>> My understanding is that effectively the differentiating factor of if a >>> distro is impacted or not is if it uses systemd or not. >> >> sshd supports compression. xz is an option for how things are compressed. > > ssh supports zlib compression. It (ssh) does not offer lzma/xz as a > compression option. > > xz got pulled into ssh on systemd systems because systemd supports > using xz/lzma for journald compression, and it is therefore a > dependency of libsystemd. Some distros patch sshd to link to > libsystemd so that their sshd can "notify" systemd that it is up via a > call to a libsystemd function. Perhaps ssh is only impacted on systemd systems, but anything processing untrusted xz compressed files, such as clamav is still vulnerable, so the statement that only systems using systemd are vulnerable is not correct. Any system using xz 5.6.0 or 5.6.1 is vulnerable. Regards, Dave Hodgins