Your Debian stable system is so ancient you got bigger vulnerabilities to worry about: Panik!
Also the problem was that Debian’s sshd linked to liblzma for some systemd feature to work. This mod was done by Debian team.
Liblzma balls
But do it in private, don’t let my xz.
The linked version in stable was not impacted.
Even if you’re using debian 12 bookworm and are fully up to date, you’re still running [5.4.1].
The only debian version actually shipping the vulnerable version of the package was sid, and being a canary for this kind of thing is what sid is for, which it’s users know perfectly well.
There was a comment on Mastodon or Lemmy saying that the bad actor had been working with the project for two years so earlier versions may have malicious code as well already.
Needless to say all his work ever will already be being reviewed.
What do you mean bigger vulnerabilitirs to worry about in Debian stable?
Mostly a joke about him calling it “ancient”, but there may be some unpatched vulnerabilities in older software. Though there could also be some new ones in newest versions.
Still, unless it’s Alpha/Beta/RC, it’s probably better to keep it up-to-date.Debian patches security vulnerabilities in stable. They don’t change the version numbers or anything but they do fix security holes.
The xz infiltration is a proof of concept.
Anyone who is comforted by the fact they’re not affected by a particular release is misguided. We just don’t yet know the ways in which we are thoroughly screwed.
This is a huge wake up call to OSS maintainers that they need to review code a lot more thoroughly. This is far from the last time we’re going to see this, and it probably wouldn’t have been caught if the attacker hadn’t been sloppy
That’s basically the idea of having a stable branch. Where all packages have 2+ years of testing and revisions.
They are stagnant. They keep getting security/fix patches, just not new features.
The malicious changes were submitted by JiaT75, one of the two main xz Utils developers with years of contributions to the project.
“Given the activity over several weeks, the committer is either directly involved or there was some quite severe compromise of their system,” Freund wrote. “Unfortunately the latter looks like the less likely explanation, given they communicated on various lists about the ‘fixes’” provided in recent updates. Those updates and fixes can be found here, here, here, and here. https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/
That really sucks. This kind of thing can make people and companies lose trust in open source. I wonder if we will learn the reason behind that. I would guess the developer was paid a lot of money by some organization to risk ruining his reputation like that.
Like the exact same thing can not happen in a closed source codebase. It probably does daily. Since closed codebases the due dilligence and reviews cost money, and nobody can see the state. They are intentionally neglected.
Open source nor closed source is immune to the 5$ wrench hackCan’t decide which one is more relevant - the $5 wrench hack, or any sort of blackmailing.
Exactly, if you are as big a Microsoft, you can’t tell 100% if one of your developer’s is actually being paid by a foreign government. Even if you say completely check the commits other devs make, there will still be deadlines when a code review is just “looks fine, next”.
Could be a state actor too
No, its the exact opposite.
Supply chain conpromise is a level of risk to manage not unique to FOSS. Ever heard of sunburst? It resulted in a lot of Microsofts cloud customers getting wreaked all because their supply chain was compromised.
Do people continue to buy into 365 and Azure? Yes. Without care.
So will this hurt open source projects? Not at all, in fact it will benefit them, highlight just why source code SHOULD be open source and visible to all! We would have had very little to no visibility and capability to monitor closed source. Let alone learn, improve and harden how projects can protect against this increasingly more common attack.
Still paniking, cause the backdoor was apparently targetting Debian servers, it was discovered just by chance and the “mantainer” made commits for 2 years in the same repo
The fact that this was planned is what makes me nervous. Imagine what else is lurking.
and it was only discovered accidentally, when someone was profiling some stuff, noticed SSH using a bit too much CPU power when receiving connections even for invalid usernames/passwords, and spent the time to investigate it more deeply. A lot of developers aren’t that attentive, and it could have easily snuck through.
The slowness is on purpose.
(OP may know, but I don’t know if everyone does.)
The slowness is on purpose? To help identify the sshd in question to the attacker which nodes are compromised? What reason(s) could there be?
He’s talking about Debian’s slowness in getting new versions to stable, and how the meme ignores security backports.
Panik: your Debian stable system is so ancient it still contains the heartbleed bug.
Is linux 6.1 vulnerable to heartbleed? I’m on lmde6 with linux 6.1 btw) edit: as other comment said debian 12 is good so everything alright
I don’t think heartbleed is a kernel bug
Its a CPU bug only the kernel can fix 🤒. The kernel is responsible for its running hardware.Am I dumb? that’s the spectere and meltdown bug. xz-utils malware is a whole other thing, lol.
Heartbleed isn’t a hardware vulnerability either. It’s a bug in OpenSSL. Are you alright?
Clearly not, lol. Every vulnerability is spectere aparently. (To be fair, the other CVE this week is hardware based)
Heartbleed isn’t new either. It’s from years ago. It’s also unrelated to the xz backdoor. Maybe you should get some rest. Check your carbon monoxide alarms are working. If not see a doctor. It sounds like you are having memory issues.
Maybe Manjaro should delay update even longer to make it extra secure /s
Ngl manjaro beeing slow as saved my ass more than once
I recently ran into a bug in the latest version of cmake that breaks it completely in my system, can’t compile shit and it just does a coredump.
What is worse is that I can’t even report the bug because I can’t get the registration email from the cmake gitlab. I checked the manjaro repos and their cmake version is 2 versions older than the one that has the bug that left me thinking for a while lol.
In this case the slower updates payed off. There are many things wrong with Manjaro but slower updates is not one of them.
It’s not though, because the malicious release happened more than two weeks ago and manjaro had to fast track the patched xs from arch git repo. This is why manjaro should extend their delayed update policy to catch this kind of issue in the future (maybe 2 months instead of 2 weeks) /s
They honestly should as it probably would fix a lot of issues. Then again, Manjaro is so broken that it probably doesn’t matter
This was the slow process for my hungover brain today.