-1 points

Bad title. This is CVE-2024-3094. Run “xz --version” to see if you are affected.

permalink
report
reply
7 points
*
Deleted by creator
permalink
report
parent
reply
3 points

Can’t you edit it?

permalink
report
parent
reply
1 point
*
Deleted by creator
permalink
report
parent
reply
65 points

AFAIK it‘s better to use rpm -q xz xz-libs (copied from the forum replies) to avoid running xz itself just in case the affected version is already installed

permalink
report
parent
reply
82 points

“Run the affected binary to see if you have it”

permalink
report
parent
reply
56 points

If you go to the post, on the comments, there is someone that is already telling you to run dnf list xz --installed. So you don’t need to run xz directly.

permalink
report
parent
reply
2 points

If you are checking out the extent of damage on your system do not use ldd to check the links.

You can inadvertently executed the exploit this way.

permalink
report
parent
reply
4 points

Running Ubuntu 23.10 with xz-utils 5.41 which is unaffected. Versions 5.6.0 and 5.6.1 are the malicious packages. I used Synaptic Package Manager to search for it.

permalink
report
reply
3 points

On Ubuntu the only affected people were those running the prerelease of Ubuntu 24.04 who had installed the update from the proposed pocket.

permalink
report
parent
reply
8 points

The bad actor had a launchpad bug to pull it into the Ubuntu LTS beta. Serious kudos to the person who discovered it, literally in the nick of time.

permalink
report
parent
reply
4 points

Same story with Fedora

permalink
report
parent
reply
5 points

Using the F40 preview with KDE and a regular update from Discover rolled xz back to the known good version 5.4.6

permalink
report
reply
24 points

I’m on Void, and I had the malicious version installed. Updating the system downgraded xz to 5.4.6, so it seems they are on it. I’ll be watching discussions to decide if my system might still be compromised.

permalink
report
reply
0 points

I would nuke it and rebuild. If nothing else it is a good test of backups

permalink
report
parent
reply
1 point

Did you have SSH open to the internet?

permalink
report
parent
reply
1 point

@Auli @56_ I have SSH open on internet… on ipv6, I’m safe. Do you think VPN open on the internet is safer ? (Think twice CVE-2024-21762…)

permalink
report
parent
reply
2 points

No, this is just my personal laptop. I don’t even have access to an IP address I could enable port-forwarding on.

permalink
report
parent
reply
14 points

some people in my mastodon feed are suggesting that the backdoor might have connected out to malicious infrastructure or substituted its own SSH host keys, but I can’t find any clear confirmation. More info as the investigation progresses.

I guess at this point if you’re on Fedora 40 or rawhide clear / regen your host keys, even after xz version rollback

permalink
report
reply
9 points

or substituted its own SSH host keys,

why would the backdoor do that? It would immediately expose itself because every ssh client on the planet warns about changed host keys when connecting.

permalink
report
parent
reply
3 points
*

Perhaps it was a poorly worded way of suggesting that invalidating host keys would invalidate all client keys it could potentially generate? Either way it’s a lot of speculation.

Resetting the keys and SSH config on any potentially compromised host is probably not a terrible idea

permalink
report
parent
reply
2 points

If you are on a affected system I would nuke from orbit.

permalink
report
parent
reply
4 points

Nuke from orbit might be an overreaction, if you need that machine perhaps disable ssh or turn the machine off until later next week when the postmortems happen. If you need that trusted machine now, then yes fresh install

permalink
report
parent
reply
3 points

Honestly doing a fresh install is a good test of your recovery abilities. You should always have a way to restore critical content in an emergency

permalink
report
parent
reply

Linux

!linux@lemmy.ml

Create post

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word “Linux” in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

  • Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
  • No misinformation
  • No NSFW content
  • No hate speech, bigotry, etc

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

Community stats

  • 8.3K

    Monthly active users

  • 6.3K

    Posts

  • 173K

    Comments