Unveiling the xz Utils Backdoor which deliberately opens our SSH connections for RCAs

mFat@lemdro.id to Linux@lemmy.ml – 111 points –
Unveiling the xz Utils Backdoor which deliberately opens our SSH connections for RCAs
youtube.com
14

Thanks for the pointer.

This is really huge, but people don't quite understand that yet.

If this wasn't caught, every system -running public sshd- could be hacked or abused/misused.

And I completely agree with the last words, corporate should pay foss projects!

For all those wanting to know what version of the xz package you have, DO NOT use xz -V or xz --version. Ask your package manager instead; e.g. apt info xz-utils. Executing a potentially malicious binary IS NOT a good idea, so ask your package manager instead.

So if I have been using arch with infected xz library to connect to a Debian LTS server, am I compromised?

From what I've read both arch and debian stable aren't vulnerable to this. It targeted mostly debian-testing.

Arch put out a statement saying users should update to a non infected binary even though it doesn’t appear to affect Arch https://archlinux.org/news/the-xz-package-has-been-backdoored/

However, out of an abundance of caution, we advise users to remove the malicious code from their system by upgrading either way. This is because other yet-to-be discovered methods to exploit the backdoor could exist.

2 more...

I would pay attention to the news. You definitely want to upgrade immediately if you have not already

2 more...

I need the IASIP meme for this thumbnail