How the XZ backdoor works
How the XZ backdoor works
Posted Apr 2, 2024 23:56 UTC (Tue) by Heretic_Blacksheep (guest, #169992)In reply to: How the XZ backdoor works by randomguy3
Parent article: How the XZ backdoor works
I'm glad to see the follow up article because a lot of early reporting from various outlets are working from incomplete information and therefore drawing incorrect conclusions ie: not just an authentication bypass, it's an arbitrary RCE injection which makes it far worse had it made to widespread distribution in RHEL 10(?) or Debian 13.
For OpenSSH's role in the chain, there's a feature request submitted to change its behavior for security certificates along with a diff already offered for review. https://bugzilla.mindrot.org/show_bug.cgi?id=3675
For Lasse Collin this has to be a nightmare scenario for him and I am sympathetic to his problems. I do wonder if he will assign the xz project and copyright to a well known open source foundation in the future who may be better suited to monitor and audit contributions if he hasn't the time and a lack of people he believes he can trust.
(?) Not sure how RHEL does its updates with regards to specific packages as I don't use it, 10 is the next major version anyway.
Posted Apr 3, 2024 8:20 UTC (Wed)
by pbonzini (subscriber, #60935)
[Link]
Posted Apr 3, 2024 15:31 UTC (Wed)
by mario-campos (subscriber, #152845)
[Link]
While I do agree that this speaks to a larger problem for all distros, I disagree that OpenBSD is somehow more susceptible. OpenBSD is, by design, more minimal, which means that if a backdoor exists in a 3rd-party package, one must choose to install it -- secure by default. Whereas, on other distros, such packages might already be included by default -- insecure by default.
Posted Apr 3, 2024 16:53 UTC (Wed)
by emaste (guest, #121005)
[Link]
How the XZ backdoor works
How the XZ backdoor works
How the XZ backdoor works