Daerandin
Well-Known Member
Yesterday it was announced that a backdoor was discovered in liblzma which seems to specifically target sshd. The unique thing here is that all evidence points to one of the XZ devs doing this intentionally. The same dev have contributed code to several other projects, so there's a lot of digging now to verify if this other code could potentionally introduce vulnerabilities.
The original announcement is here: https://www.openwall.com/lists/oss-security/2024/03/29/4
As I am writing this, the XZ repo on github has been disabled for now, and all affected distros have already released fixed versions.
This backdoor appear to be very well made, and it only triggers under certain specific build conditions. Only Debian and Fedora seems to be targeted, as they have patched openssh to link to libsystemd, which links to liblzma, which is how the backdoor is invoked. I'm just hoping there is no more malicious code that just haven't been detected yet, or more undiscovered functionality to this backdoor.
The original announcement is here: https://www.openwall.com/lists/oss-security/2024/03/29/4
As I am writing this, the XZ repo on github has been disabled for now, and all affected distros have already released fixed versions.
This backdoor appear to be very well made, and it only triggers under certain specific build conditions. Only Debian and Fedora seems to be targeted, as they have patched openssh to link to libsystemd, which links to liblzma, which is how the backdoor is invoked. I'm just hoping there is no more malicious code that just haven't been detected yet, or more undiscovered functionality to this backdoor.