3 points
*

For Ubuntu releases, Package search shows latest versions used are 5.4.x.

Are all these releases compromised too?

permalink
report
reply
4 points

Not that we know of, just package versions 5.6.0 and 5.6.1

permalink
report
parent
reply
29 points
*

Simply excluding this backdoor does not seem to be sufficient. The malicious actor has contributed over 750 commits to xz, all of which could contain further backdoors.

Downgrading to the last version without any contributions from the malicious actor is not possible either, because of new functionalities and other security issues that were fixed in the meantime. Uninstalling xz is also not possible, because half my system depends on it.

I guess it will take some time to sort all of that out. I am very impressed by the fast and coordinated response to this incident by the FOSS community.

permalink
report
reply
17 points

This is just speculation, but I think this was a long planned attack. I think it’s unlikely any previous backdoors or significant security vulnerabilities would have been introduced, the goal was to establish themselves as a legitimate contributor and then sneak one critical backdoor in unnoticed. Sneaking in multiple vulnerabilities would have increased the risk of detection.

From what I understand they did cause a conflict with another package, and then used that to try to justify having the backdoored versions of the package fast tracked into upcoming Debian and fedora releases. But that would also suggest that their whole goal was shipping this one backdoor.

permalink
report
parent
reply
9 points
*
2 points

Well that’s unfortunate

permalink
report
parent
reply
5 points

I am a brand new debian user, with debian running on two active laptops (mine and my daughter’s). Is this something I need to be concerned about and if so, what do I do?

Literally first week or two of use and still quite lost trying to get used to the massive difference from Windows.

permalink
report
reply
18 points

If you’re on Debian stable, you don’t need to worry too much. This attack is actually targeted at Debian and Debian-based systems, but Debian is slow to update packages to make sure everything is stable. Thanks to this, Debian stable never updated with the infected package.

If you were on one of the Debian testing updates though your system is in danger. The other concern is that the bad user who pushed this backdoor has been providing code updates for two years. Seemingly these other updates were legitimate to get him in position to sneak in this backdoor, but there is a chance that he has already snuck in some other kind of backdoor that hasn’t yet been identified and that could be present on your system.

For the time being, you’re probably ok and we just need to wait to see if any other backdoors are found in the code.

permalink
report
parent
reply
1 point

Okay, thank you very much.

permalink
report
parent
reply
14 points

Man, rolling release is great

I use Debian stable btw…

permalink
report
reply
6 points

The downside to bleeding edge…

permalink
report
reply
14 points

This backdoor has existed for the past 2 months. If anything, Arch was one of the first to roll out the fix.

permalink
report
parent
reply
2 points

Sure, but if you went the Debian way of things…… you wouldn’t have had the back door version for three more years

permalink
report
parent
reply
1 point

Without knowing my arch installation has xz 5.6.1-2

permalink
report
parent
reply

Arch Linux

!archlinux@lemmy.ml

Create post

The beloved lightweight distro

Community stats

  • 159

    Monthly active users

  • 255

    Posts

  • 1.6K

    Comments

Community moderators