WARNING: Malicious code in current pre-release & testing versions/variants: F40 and rawhide affected - users of F40/rawhide need to respond

⸻ Ban DHMO 🇦🇺 ⸻@aussie.zone to Linux@lemmy.ml – 401 points –
WARNING: Malicious code in current pre-release & testing versions/variants: F40 and rawhide affected - users of F40/rawhide need to respond
discussion.fedoraproject.org
74

You are viewing a single comment

some people in my mastodon feed are suggesting that the backdoor might have connected out to malicious infrastructure or substituted its own SSH host keys, but I can't find any clear confirmation. More info as the investigation progresses.

I guess at this point if you're on Fedora 40 or rawhide clear / regen your host keys, even after xz version rollback

or substituted its own SSH host keys,

why would the backdoor do that? It would immediately expose itself because every ssh client on the planet warns about changed host keys when connecting.

Perhaps it was a poorly worded way of suggesting that invalidating host keys would invalidate all client keys it could potentially generate? Either way it's a lot of speculation.

Resetting the keys and SSH config on any potentially compromised host is probably not a terrible idea

If you are on a affected system I would nuke from orbit.

Nuke from orbit might be an overreaction, if you need that machine perhaps disable ssh or turn the machine off until later next week when the postmortems happen. If you need that trusted machine now, then yes fresh install

Honestly doing a fresh install is a good test of your recovery abilities. You should always have a way to restore critical content in an emergency

I feel legitimately sorry for anyone who takes your rhetoric to heart.

Try not to let these 🧩's pull you down rabbit holes, guys.