Deutsch English Français Italiano |
<uuccol$1qpft$4@dont-email.me> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: Lew Pitcher <lew.pitcher@digitalfreehold.ca> Newsgroups: comp.os.linux.misc Subject: Re: Malware find in the news: xz related. Date: Sun, 31 Mar 2024 19:15:34 -0000 (UTC) Organization: A noiseless patient Spider Lines: 46 Message-ID: <uuccol$1qpft$4@dont-email.me> References: <uu7r9s$kh5b$2@dont-email.me> <uubp1i$1qg47$1@dont-email.me> <uuc1l6$lfl$1@tncsrv09.home.tnetconsulting.net> <op.2lh91erma3w0dxdave@hodgins.homeip.net> <uuc72o$1ts1m$1@dont-email.me> <op.2lihbgr3a3w0dxdave@hodgins.homeip.net> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Injection-Date: Sun, 31 Mar 2024 19:15:34 +0200 (CEST) Injection-Info: dont-email.me; posting-host="ed41f3d6728541102659be294dee06a6"; logging-data="1926653"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+qvcEK2LghbOlJlWCWJM5CG8o17sJwjBk=" User-Agent: Pan/0.139 (Sexual Chocolate; GIT bf56508 git://git.gnome.org/pan2) Cancel-Lock: sha1:5+1HHs76WuE566H/qaiz68nuuVY= Bytes: 3127 On Sun, 31 Mar 2024 14:51:06 -0400, David W. Hodgins wrote: > On Sun, 31 Mar 2024 13:38:32 -0400, Rich <rich@example.invalid> wrote: > >> David W. Hodgins <dwhodgins@nomail.afraid.org> wrote: >>> On Sun, 31 Mar 2024 12:05:58 -0400, Grant Taylor <gtaylor@tnetconsulting.net> wrote: >>> >>>> On 3/31/24 08:38, John McCue wrote: >>>>> Thanks, here is another interesting link that describes how the issue >>>>> occurred and indicates why *BSD and Distros like Slackware would not >>>>> be vulnerable. >>>> >>>> My understanding is that effectively the differentiating factor of if a >>>> distro is impacted or not is if it uses systemd or not. >>> >>> sshd supports compression. xz is an option for how things are compressed. >> >> ssh supports zlib compression. It (ssh) does not offer lzma/xz as a >> compression option. >> >> xz got pulled into ssh on systemd systems because systemd supports >> using xz/lzma for journald compression, and it is therefore a >> dependency of libsystemd. Some distros patch sshd to link to >> libsystemd so that their sshd can "notify" systemd that it is up via a >> call to a libsystemd function. > > Perhaps ssh is only impacted on systemd systems, but anything processing > untrusted xz compressed files, such as clamav is still vulnerable, so the > statement that only systems using systemd are vulnerable is not correct. > > Any system using xz 5.6.0 or 5.6.1 is vulnerable. In theory, yes. And, "its better to be safe than sorry" But, from my (admittedly very limited) understanding of the backdoor (as currently exposed), the bad code in xz specifically targets sshd, and (from current indications) no other application. Still, if I had one of the suspicious xz/liblzma packages installed, I'd not hesitate to "nuke it from orbit" and replace it with a known-good version. Again, "its better to be safe than sorry". -- Lew Pitcher "In Skills We Trust"