LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 03-30-2024, 05:49 AM   #16
commandlinegamer
Member
 
Registered: Dec 2007
Posts: 163

Rep: Reputation: 51

Quote:
Originally Posted by metageek View Post
Yet another reason to be thankful for Pat not having adopted systemd!

Still, this may be much larger than this specific bug; lots of detective activity going on right now related to other code contributions by that bad actor.
Fortunate we are for now, but it might have been some other utility. I think in future this sort of attack will become more commonplace.
 
Old 03-30-2024, 10:19 AM   #17
the3dfxdude
Member
 
Registered: May 2007
Posts: 730

Rep: Reputation: 358Reputation: 358Reputation: 358Reputation: 358
The news swirling around this is making my blood boil. For months a year or two back, github had been blogging about their upcoming changes, sending me emails, on the importance of the supply chain, and how their soon to be mandated authentication mechanisms were securing the supply chain. Someone can steal your password from site A and use it on github. Passwords are sooo insecure -- we have to move on from passwords! Somebody can break into your account and start pushing changes to repositories you share commit access with if you use passwords!

Someone just said this was a supply chain attack, and they are right, so to speak. So the blood started to boil on those words, considering the news speak github has been engaged in for some time. How did the supply chain attack occur? Someone created a github account. That's it. It's that easy. And then it's social engineering from there. So much for blogging how secure things are if we just accept github's way. I guess github is concerned about all those one line changes I have spent the time to put through formal pull requests.

I pissed someone off just a few days ago, adding binaries files and a mashup of changes in one commit, and then I rejected it and telling the guy to create proper clear set of patches with descriptions that can be reviewed. The response I basically got, "what do you mean? my code is clear!". I think there is github, and there is git. I no longer see github as being a git repository system, but just a proprietary website that just happens it can speak some git behind the scenes if you jump through the hoops. Evidence of this is how so many projects are being maintained. They are not maintained on github in the way I would expect with most any revision control system. In fact, I would consider github is a place to dump and share files at this point. Github is not all at fault here. But I'm really kind of poking at irony in github's communication the past couple years.

Last edited by the3dfxdude; 03-30-2024 at 10:20 AM.
 
4 members found this post helpful.
Old 03-30-2024, 10:33 AM   #18
slackbit
LQ Newbie
 
Registered: Dec 2023
Distribution: Void Linux, Slackware, OpenBSD
Posts: 3

Rep: Reputation: 0
Can't be too careful

The scope of this attack is not yet fully analysed. Therefore, I tend to treat any source code coming from the co-maintainer of xz (Jia Tan) as an absolute threat. For instance, Lasse Collin (the original maintainer of xz), found another sabotage in the code.

I performed the following steps on my Slackware64-current to go back to xz-5.2.5 (same as Slackware64-15.0):

Code:
- removed xz (5.6.1) --> be careful, from this point onward, your system has no lzlma support
- deleted /lib64/libzlma.so.5.6.1 by hand (belongs to aaa_libraries package at this point)

- using lftp, mirrored the a/xz from slackware64-15.0 "sources" dir.
- using lftp, mirrored the a/aaa_libraries from slackware64-current "sources" dir.

- extracted the "xz-5.2.5.tar.xz" inside "a/xz/" with an old version of "xz" (from another machine).
- adapted the xz.SlackBuild
  - Bump the BUILD number
  - Use the tar file (instead of tar.xz)
  - Produce a "tgz" (instead of "txz")
- built and installed xz-5.2.5

- rebuilt the "a/aaa_libraries" and installed it.

- regenerated the initramfs image, because it contains a copy of "libzlma"
I chose not to blacklist "xz" for now, because I want to closely follow whatever changes are done in the -current.

One can follow Lasse's page for extra facts and links.

Last edited by slackbit; 03-30-2024 at 10:42 AM. Reason: Referenced Lasse's page
 
Old 03-30-2024, 11:05 AM   #19
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,369

Rep: Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085
Quote:
Originally Posted by slackbit View Post
The scope of this attack is not yet fully analysed. Therefore, I tend to treat any source code coming from the co-maintainer of xz (Jia Tan) as an absolute threat. For instance, Lasse Collin (the original maintainer of xz), found another sabotage in the code.

I performed the following steps on my Slackware64-current to go back to xz-5.2.5 (same as Slackware64-15.0):

Code:
- removed xz (5.6.1) --> be careful, from this point onward, your system has no lzlma support
- deleted /lib64/libzlma.so.5.6.1 by hand (belongs to aaa_libraries package at this point)

- using lftp, mirrored the a/xz from slackware64-15.0 "sources" dir.
- using lftp, mirrored the a/aaa_libraries from slackware64-current "sources" dir.

- extracted the "xz-5.2.5.tar.xz" inside "a/xz/" with an old version of "xz" (from another machine).
- adapted the xz.SlackBuild
  - Bump the BUILD number
  - Use the tar file (instead of tar.xz)
  - Produce a "tgz" (instead of "txz")
- built and installed xz-5.2.5

- rebuilt the "a/aaa_libraries" and installed it.

- regenerated the initramfs image, because it contains a copy of "libzlma"
I chose not to blacklist "xz" for now, because I want to closely follow whatever changes are done in the -current.

One can follow Lasse's page for extra facts and links.
Yep, thanks for the link
I don't think it cost that much to patch with this commit
https://git.tukaani.org/?p=xz.git;a=...a0137a5001c14c
 
Old 03-30-2024, 11:17 AM   #20
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,369

Rep: Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085
Kernel mailing list
Code:
Andrew (and anyone else), please do not take this code right now.

Until the backdooring of upstream xz[1] is fully understood, we should not
accept any code from Jia Tan, Lasse Collin, or any other folks associated
with tukaani.org. It appears the domain, or at least credentials
associated with Jia Tan, have been used to create an obfuscated ssh
server backdoor via the xz upstream releases since at least 5.6.0.
Without extensive analysis, we should not take any associated code.
It may be worth doing some retrospective analysis of past contributions
as well...

Lasse, are you able to comment about what is going on here?
Code:
Thank you. None of these patches are urgent. I'm on a holiday and only
happened to look at my emails and it seems to be a major mess.

My proper investigation efforts likely start in the first days of
April. That is, I currently know only a few facts which alone are bad
enough.

Info will be updated here: https://tukaani.org/xz-backdoor/

--
Lasse Collin
https://lkml.iu.edu/hypermail/linux/...3.3/12891.html

Last edited by marav; 03-30-2024 at 11:19 AM.
 
1 members found this post helpful.
Old 03-30-2024, 11:27 AM   #21
Petri Kaukasoina
Senior Member
 
Registered: Mar 2007
Posts: 1,794

Rep: Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473
Quote:
Originally Posted by marav View Post
I don't think it cost that much to patch with this commit
I tried but it didn't change anything: the md5sums of the binaries didn't change.
 
Old 03-30-2024, 11:28 AM   #22
reddog83
Member
 
Registered: Apr 2018
Distribution: Slackware 15.0/Current
Posts: 443

Rep: Reputation: 229Reputation: 229Reputation: 229
what commit it aint nothing but a blank line
 
Old 03-30-2024, 11:32 AM   #23
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,369

Rep: Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085Reputation: 4085
Quote:
Originally Posted by reddog83 View Post
what commit it aint nothing but a blank line
It removes the dot "."
Code:
-.
+
 
Old 03-30-2024, 11:33 AM   #24
reddog83
Member
 
Registered: Apr 2018
Distribution: Slackware 15.0/Current
Posts: 443

Rep: Reputation: 229Reputation: 229Reputation: 229
Talking

Quote:
Originally Posted by marav View Post
It removes the dot "."
Code:
-.
+
I must be getting old I didnt see the "." it just looked like a blank line to me....
 
Old 03-30-2024, 12:22 PM   #25
volkerdi
Slackware Maintainer
 
Registered: Dec 2002
Location: Minnesota
Distribution: Slackware! :-)
Posts: 2,508

Rep: Reputation: 8473Reputation: 8473Reputation: 8473Reputation: 8473Reputation: 8473Reputation: 8473Reputation: 8473Reputation: 8473Reputation: 8473Reputation: 8473Reputation: 8473
Quote:
Originally Posted by Petri Kaukasoina View Post
I tried but it didn't change anything: the md5sums of the binaries didn't change.
Did you build with CMake?
 
Old 03-30-2024, 12:39 PM   #26
Petri Kaukasoina
Senior Member
 
Registered: Mar 2007
Posts: 1,794

Rep: Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473
Quote:
Originally Posted by volkerdi View Post
Did you build with CMake?
Good question. No, I used your Slackbuild. Now that I tried with cmake, there is a lot of difference.
 
Old 03-30-2024, 12:50 PM   #27
Petri Kaukasoina
Senior Member
 
Registered: Mar 2007
Posts: 1,794

Rep: Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473
Code:
strings /bin/xz |grep landlock
shows the binary built with cmake and the fixed CMakeCache.txt does contain it, but the binary built with the sabotaged landlock sandbox check does not. And, the binary now in -current built with configure+make does not.
 
Old 03-30-2024, 02:30 PM   #28
Petri Kaukasoina
Senior Member
 
Registered: Mar 2007
Posts: 1,794

Rep: Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473Reputation: 1473
I was wrong. I didn't strip the binaries I built with cmake. When I removed strip from Pat's Slackbuild, it also showed the landlock strings in /bin/xz.

So: thanks to our BDFL, /bin/xz in Slackware already used the landlock sandbox because of not using cmake.

configure found '#define HAVE_LINUX_LANDLOCK 1' but cmake didn't find it with the sabotaged check.
 
2 members found this post helpful.
Old 03-30-2024, 02:34 PM   #29
yvesjv
Member
 
Registered: Sep 2015
Location: Australia
Distribution: Slackware, Devuan, Freebsd
Posts: 566

Rep: Reputation: Disabled
Unhappy

It is getting worse case scenario
https://gist.github.com/thesamesam/2...e9ee78baad9e27
Refreshed this active link and this was posted:

Windows 11 may be in scope.

Libarchive reviewing Jia Tan commits starting from 2021:
libarchive/libarchive#2103
Windows 11 added Libarchive in 23h2 (released in late 2023/early 2024):
https://support.microsoft.com/en-us/...8-f075841ca812

New! This update adds native support for reading additional archive file formats using the libarchive open-source project, such as:
...
tar.xz

Last edited by yvesjv; 03-30-2024 at 02:35 PM.
 
Old 03-30-2024, 03:43 PM   #30
Jeebizz
Senior Member
 
Registered: May 2004
Distribution: Slackware15.0 64-Bit Desktop, Debian 11 non-free Toshiba Satellite Notebook
Posts: 4,186

Rep: Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379
So if this video is to be confirmed as true, it sounds like this was done over a long period of time; adding bits of changes here and there that ended up being the exploit...? - If so, kinda means now more 'smaller' or insignificant commits to code might have to be looked at closely, and considered if adding the code adds any real benefit (if thats somehow even feasible to do - I realize code auditing takes time); but I guess this is where things are going now - supply chain attacks and very slow infiltration of bits of code that by itself doesn't do anything until everything is in place...
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: What The Intelligence Community Doesn't Get: Backdoor For 'The Good Guys' Is Always A Backdoor LXer Syndicated Linux News 0 01-11-2014 06:50 AM
Upstream Shapping qtgeo *BSD 2 11-08-2004 01:53 PM
ADSL upstream problems. marvin_robot Linux - Networking 1 03-08-2004 06:16 AM
SuSE 9.0 Wireless & Ethernet connect but no upstream puyan909 Linux - Wireless Networking 1 02-20-2004 03:23 PM
Upstream/Downstream stats jeucken Linux - Networking 4 01-06-2003 02:28 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 08:28 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration