A backdoor in xz
A backdoor in xz
Posted Mar 30, 2024 8:23 UTC (Sat) by mb (subscriber, #50428)In reply to: A backdoor in xz by DimeCadmium
Parent article: A backdoor in xz
But let's not distract from the discussion: systemd ist *not* why this backdoor was possible. It could have been any other library. It could even have been any other server application. It's not restricted to sshd.
The real problem is that patches that have not been understood/reviewed have been applied.
This is a social problem. Not a technical one.
Posted Mar 30, 2024 12:46 UTC (Sat)
by stef70 (guest, #14813)
[Link] (1 responses)
On my Debian system, liblzma.so is linked in several programs and libraries. A lot are unrelated to systemd: grub, insmod, lvm, reboot, gimp, imagemagick, runlevel, ...
All of them are potential targets for that xz backdoor. For now, we have to wait for the full analysis. I am pretty optimistic that sshd was the main target because installing another backdoor on the system or calling "home" would significantly increase the probability or detection.
Posted Mar 30, 2024 23:33 UTC (Sat)
by brooksmoses (guest, #88422)
[Link]
[Reference: https://github.com/Midar/xz-backdoor-documentation/wiki#s... as of the time of this comment.]
Posted Mar 31, 2024 1:25 UTC (Sun)
by DimeCadmium (subscriber, #157243)
[Link] (1 responses)
Ah, okay. And how exactly do you believe that one methods of notifications is any more reliable at this than any other? They all rely on the software developer picking a good time to say "started".
> But let's not distract from the discussion: systemd ist *not* why this backdoor was possible
It absolutely is.
> It could have been any other library
But it wasn't. "Don't worry about our vulnerabilities, other people have vulnerabilities too!" "Don't worry about our bad design, other people have bad design too!"
Posted Mar 31, 2024 9:22 UTC (Sun)
by smurf (subscriber, #17840)
[Link]
They all rely on picking a good time that happens to *work*.
There are plenty of situations where, once you're *really* started, it's no longer possible to signal "OK I'm alive now" by double-forking.
Writing a PID file has its own class of race conditions, the handling of which I can guarantee most users of that method get fatally wrong.
And so on.
> "Don't worry about our vulnerabilities, other people have vulnerabilities too!" "Don't worry about our bad design, other people have bad design too!"
Don't blame the messenger. If linking to a library you don't strictly need *in your particular situation* is a "vulnerability" or "bad design" I can guarantee that 90+% of programs out there suffer from it.
A backdoor in xz
A backdoor in xz
A backdoor in xz
A backdoor in xz