Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    XZ Struck By Malicious Code That Could Allow Unauthorized Remote System Access

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    30 Posts 8 Posters 3.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • T
      tgl @mcury
      last edited by

      @mcury said in XZ Struck By Malicious Code That Could Allow Unauthorized Remote System Access:

      That guy, if I'm not mistaken, was there for around two years building reputation..
      That was pretty nasty to say the least.

      Yeah, that indeed is scary. You have to wonder about moles playing equally long games in other projects. I'm assuming this guy was funded by a nation-state's intelligence apparatus, because who else is going to put in that kind of effort? (Or else his account was broken into, but people seem to think not.)

      M 1 Reply Last reply Reply Quote 0
      • S
        SteveITS Galactic Empire @mcury
        last edited by

        Writeup in Ars
        https://apple.news/A9xzZKmgVSQOqWrHZsotu-Q

        Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
        When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
        Upvote ๐Ÿ‘ helpful posts!

        M 1 Reply Last reply Reply Quote 0
        • M
          mcury Rebel Alliance @tgl
          last edited by

          @tgl said in XZ Struck By Malicious Code That Could Allow Unauthorized Remote System Access:

          I'm assuming this guy was funded by a nation-state's intelligence apparatus, because who else is going to put in that kind of effort? (Or else his account was broken into, but people seem to think not.)

          That is the question I'm asking myself right now

          dead on arrival, nowhere to be found.

          1 Reply Last reply Reply Quote 0
          • M
            mcury Rebel Alliance @SteveITS
            last edited by

            @SteveITS said in XZ Struck By Malicious Code That Could Allow Unauthorized Remote System Access:

            Writeup in Ars
            https://apple.news/A9xzZKmgVSQOqWrHZsotu-Q

            hm, so Fedora decided to revert to the 5.4.x versions of xz Utils ? That was a different approach than Arch did.
            I'm not sure if that is going to be enough.

            https://gitlab.archlinux.org/archlinux/packaging/packages/xz/-/issues/2
            3fb74a15-b149-49dd-92fa-aac360eec625-image.png

            dead on arrival, nowhere to be found.

            M T 2 Replies Last reply Reply Quote 0
            • M
              mcury Rebel Alliance @mcury
              last edited by

              67c7f1c4-c893-4f74-8231-c3d68e7b2d45-image.png

              That is something to think about, this guy wasn't shooting randomly..

              dead on arrival, nowhere to be found.

              S M 2 Replies Last reply Reply Quote 0
              • S
                SteveITS Galactic Empire @mcury
                last edited by

                @mcury โ€œHe has been part of the xz project for 2 yearsโ€

                Seems very fortunate it was caught before hitting production Linux releases. Though it sounds like MacOS packages were using it.

                Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                Upvote ๐Ÿ‘ helpful posts!

                1 Reply Last reply Reply Quote 1
                • M
                  mcury Rebel Alliance @mcury
                  last edited by

                  a little history:

                  got this link from EnOS forum:
                  https://boehs.org/node/everything-i-know-about-the-xz-backdoor

                  dead on arrival, nowhere to be found.

                  H 1 Reply Last reply Reply Quote 1
                  • H
                    heper @mcury
                    last edited by

                    the github repo has been disabled...

                    nice

                    1 Reply Last reply Reply Quote 1
                    • T
                      tgl @mcury
                      last edited by

                      @mcury said in XZ Struck By Malicious Code That Could Allow Unauthorized Remote System Access:

                      hm, so Fedora decided to revert to the 5.4.x versions of xz Utils ? That was a different approach than Arch did.

                      I'm not following? The discussion you linked showed Arch doing exactly the same thing.

                      It's surely not unreasonable to worry about every version signed by the compromised developer (and I'm confident there are people putting 5.4.x under a microscope right now). My bet though is that the pre-5.6 versions don't actually contain anything dangerous. The developer showed his hand by pushing for 5.6 to be spread rapidly, as he'd not done for the earlier releases.

                      M 1 Reply Last reply Reply Quote 1
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        There's enough pain to go around here! ๐Ÿ˜ฌ

                        1 Reply Last reply Reply Quote 1
                        • M
                          mcury Rebel Alliance @tgl
                          last edited by mcury

                          @tgl said in XZ Struck By Malicious Code That Could Allow Unauthorized Remote System Access:

                          The developer showed his hand by pushing for 5.6 to be spread rapidly, as he'd not done for the earlier releases.

                          This is huge, the FOSS community will take time to recover and I think things are going to change permanently from now on..
                          I'm trying to look at it in a different perspective and not witch hunt as mentioned here in this thread

                          big blow to the stomach that this was.

                          dead on arrival, nowhere to be found.

                          S 1 Reply Last reply Reply Quote 1
                          • S
                            slu @mcury
                            last edited by

                            I hope pfSense is not affected, 2.7.2 show:

                            xz --version
                            xz (XZ Utils) 5.4.4
                            liblzma 5.4.4
                            

                            As far as i can follow the bug report on Debian [1] it's still not clear revert to 5.4.5 is enough since the
                            last version of a trusted person was 5.4.1.

                            [1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068024#72

                            pfSense Gold subscription

                            1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator
                              last edited by

                              In my own personal opinion it's unlikely because this exploit targeted specific Linux distros. sshd with a patch for systemd integration which obviously doesn't apply to FreeBSD.

                              However that's only the known exploit. Whist nothing in known in other versions we are monitoring the situation closely.

                              M 1 Reply Last reply Reply Quote 5
                              • M
                                mcury Rebel Alliance @stephenw10
                                last edited by mcury

                                @stephenw10 said in XZ Struck By Malicious Code That Could Allow Unauthorized Remote System Access:

                                However that's only the known exploit. Whist nothing in known in other versions we are monitoring the situation closely.

                                They are evaluating libarchive now, there are commits from the same developer.
                                What haunts me is that we don't know how deep this going to go..

                                dead on arrival, nowhere to be found.

                                S 1 Reply Last reply Reply Quote 1
                                • S
                                  slu @mcury
                                  last edited by

                                  @mcury said in XZ Struck By Malicious Code That Could Allow Unauthorized Remote System Access:

                                  What haunts me is that we don't know how deep this going to go..

                                  Yes, I'm afraid that's not the end of the story, this has the potential for a really nightmare.
                                  But at the moment we can only monitoring the situation as @stephenw10 said.

                                  pfSense Gold subscription

                                  1 Reply Last reply Reply Quote 0
                                  • JonathanLeeJ
                                    JonathanLee
                                    last edited by

                                    A couple months ago I was testing openVPN and I could see my IP traverse the firewall however after I disconnected something else was connected a IP address from digital oceans IP block, I have logging enabled on the firewall and you could see the enumeration occurring so I killed the state and only allow VPN connections from specific IP addresses. Think about eternal blue, they patch it but the bug reappears over and over. Cyber security teams need to stay one step ahead of abuses.

                                    Make sure to upvote

                                    1 Reply Last reply Reply Quote 1
                                    • JonathanLeeJ
                                      JonathanLee @mcury
                                      last edited by JonathanLee

                                      @mcury thanks for sharing, does this effect 230501? Or 230901??

                                      Make sure to upvote

                                      M 1 Reply Last reply Reply Quote 1
                                      • M
                                        mcury Rebel Alliance @JonathanLee
                                        last edited by

                                        @JonathanLee said in XZ Struck By Malicious Code That Could Allow Unauthorized Remote System Access:

                                        @mcury thanks for sharing, does this effect 230501? Or 230901??

                                        No.
                                        This problem is still being under investigation, so everything I'll say and have said before, take with a grain of salt.

                                        According to what has been said in github, reddit, phonorix, IRC channels and along, the targets were RHEL and debian/derivatives distros only.
                                        Arch (which my system is based on and I use everyday) was kind of lucky because Arch don't use tarlball and openssh does not directly use liblzma.

                                        Also, you would need to have ssh service enabled and open to the internet.
                                        The backdoor would somehow be able to bypass ssh keys and allow remote control, which by itself is a 10 vulnerability score CVE.

                                        But, as I see it, Arch has a lot of homework to do.. this developer was the maintainer of absolute most of Arch packages..
                                        Mostly inside any chinese project from Deepin to stuff like that.

                                        dead on arrival, nowhere to be found.

                                        JonathanLeeJ 1 Reply Last reply Reply Quote 1
                                        • JonathanLeeJ
                                          JonathanLee @mcury
                                          last edited by

                                          @mcury thanks for the reply I wonder about raspberry pi also, that does use its own flavor however you can add on packages to it

                                          Make sure to upvote

                                          T 1 Reply Last reply Reply Quote 1
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            I believe the only known exploit targetted amd64 only.

                                            M 1 Reply Last reply Reply Quote 1
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.