A backdoor in xz
A backdoor in xz
Posted Mar 29, 2024 20:10 UTC (Fri) by cjwatson (subscriber, #7322)In reply to: A backdoor in xz by cjwatson
Parent article: A backdoor in xz
Apparently unreleased versions of systemd dlopen liblzma instead, which would have meant it wasn't in sshd's process space.
Posted Mar 29, 2024 20:28 UTC (Fri)
by intelfx (subscriber, #130118)
[Link] (3 responses)
I don't think any of that code is needed. OpenSSH as patched only needs sd_listen_fds() and plain sd_notify() which _as used_ can be implemented in about 5-10 lines of C code each.
Posted Mar 29, 2024 20:35 UTC (Fri)
by cjwatson (subscriber, #7322)
[Link] (2 responses)
Posted Mar 30, 2024 1:12 UTC (Sat)
by zdzichu (subscriber, #17118)
[Link]
Posted Mar 30, 2024 6:50 UTC (Sat)
by intelfx (subscriber, #130118)
[Link]
Yep, that's why I tried to emphasize "as used". The implementation you see is shared between several mostly-disjoint users (e. g. it is also used to communicate with hypervisors via vsock) and also implements other features of this ad-hoc protocol (such as fd passing) which are not used in openssh.
The usage in openssh (to signal readiness) is covered by writing a fixed, static text string into an AF_UNIX datagram socket pointed to by the $NOTIFY_SOCKET variable.
Posted Mar 29, 2024 21:05 UTC (Fri)
by judas_iscariote (guest, #47386)
[Link] (13 responses)
Posted Mar 30, 2024 11:04 UTC (Sat)
by fenncruz (subscriber, #81417)
[Link] (12 responses)
Posted Mar 30, 2024 12:02 UTC (Sat)
by bluca (subscriber, #118303)
[Link] (7 responses)
Posted Mar 30, 2024 14:12 UTC (Sat)
by smurf (subscriber, #17840)
[Link]
Posted Mar 30, 2024 15:27 UTC (Sat)
by dskoll (subscriber, #1630)
[Link] (1 responses)
I understand the advantages of the dlopen approach, but it still leaves me feeling uneasy. You might get shared libraries that you don't expect dlopened just by making an innocent API call.
It seems to me that the supervisor notification protocol is likely to be used by many programs, and also quite likely that they might not want anything else from libsystemd. Wouldn't it make sense to put the notification client code in its own shared library that has no external dependencies and won't dlopen anything else ever?
Posted Mar 30, 2024 15:52 UTC (Sat)
by zdzichu (subscriber, #17118)
[Link]
Posted Mar 30, 2024 18:36 UTC (Sat)
by Cyberax (✭ supporter ✭, #52523)
[Link] (3 responses)
Posted Mar 30, 2024 19:14 UTC (Sat)
by andresfreund (subscriber, #69562)
[Link] (2 responses)
Posted Mar 30, 2024 19:41 UTC (Sat)
by Cyberax (✭ supporter ✭, #52523)
[Link] (1 responses)
> Dlopen() doesn't change any of that?
Indeed it doesn't (right now), but expanding its usage will make it harder to enable something like mseal() later.
Posted Mar 31, 2024 13:13 UTC (Sun)
by bluca (subscriber, #118303)
[Link]
Posted Mar 30, 2024 16:53 UTC (Sat)
by judas_iscariote (guest, #47386)
[Link] (3 responses)
Posted Mar 30, 2024 19:05 UTC (Sat)
by andresfreund (subscriber, #69562)
[Link] (1 responses)
I'm somewhat surprised that nobody called for glibc's rtld-audit infrastructure to be removed. That's really what made this attack possible despite relro. As far as I know, it's not used widely.
Posted Mar 31, 2024 13:30 UTC (Sun)
by nix (subscriber, #2304)
[Link]
Posted Mar 31, 2024 6:37 UTC (Sun)
by epa (subscriber, #39769)
[Link]
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz
It is more like corporations fault for not paying people to work in things they profit from.
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz