LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 03-30-2024, 09:16 PM   #31
slackbit
LQ Newbie
 
Registered: Dec 2023
Distribution: Void Linux, Slackware, OpenBSD
Posts: 3

Rep: Reputation: 0
Don't use ldd


According to a linked article in the notes of Sam James (Gentoo mainttainer), "ldd" must not be used on suspicious binaries, because it loads them into memory that can lead to arbitrary code execution.
 
Old 03-31-2024, 07:34 AM   #32
gattocarlo
Member
 
Registered: Jan 2020
Posts: 63

Rep: Reputation: Disabled
This is a very clear analysis of the shell stage obfuscation to inject the object code during the building process, written by Gynvael Coldwind:

xz/liblzma: Bash-stage Obfuscation Explained
https://gynvael.coldwind.pl/?id=782

I'm amazed by the sophistication level of the attack, from both a social and technical perspective, and it makes me wonder how safe are, in general, our digital infrastructures which are becoming so essential to protect our fundamental freedoms. I have the feeling that this incident will have long standing consequences for our FOSS communities, or at least I hope so.
 
4 members found this post helpful.
Old 03-31-2024, 07:51 AM   #33
henca
Member
 
Registered: Aug 2007
Location: Linköping, Sweden
Distribution: Slackware
Posts: 971

Rep: Reputation: 657Reputation: 657Reputation: 657Reputation: 657Reputation: 657Reputation: 657
Quote:
Originally Posted by gattocarlo View Post
I'm amazed by the sophistication level of the attack, from both a social and technical perspective, and it makes me wonder how safe are, in general, our digital infrastructures which are becoming so essential to protect our fundamental freedoms. I have the feeling that this incident will have long standing consequences for our FOSS communities, or at least I hope so.
Yes, this "Jia Tan" user probably has a completely different real name, it might even be an organization consisting of several people. The scary thing with this is not what else the commits of Jia Tan has done to xz. The scary thing is that social engineering has been used to put malicious code in a project (xz) which opened up a backdoor in another project (openSSH) which did not even in itself have any dependency on xz.

Now this "Jia Tan" account has been exposed as a bad account and at least one more malicious commit has been identified in the xz repo. The scary part is not those identified malicious commits. The scary part is all unknown malicious contributions to projects. Malicious contributions might happen after social engineering to both open source and closed source projects. Maybe it is easier to make a malicious contribution to an open source project, but on the other hand it is also easier to later spot such contributions.

regards Henrik
 
Old 03-31-2024, 06:06 PM   #34
ReaperX7
LQ Guru
 
Registered: Jul 2011
Location: California
Distribution: Slackware64-15.0 Multilib
Posts: 6,558
Blog Entries: 15

Rep: Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097Reputation: 2097
Jia Tan was one of two known actors in this.
 
Old 03-31-2024, 09:11 PM   #35
Jan K.
Member
 
Registered: Apr 2019
Location: Esbjerg
Distribution: Windows 7...
Posts: 773

Rep: Reputation: 489Reputation: 489Reputation: 489Reputation: 489Reputation: 489
The code also revealed a weakness in SSH... Andreas raised the issue here https://bugzilla.mindrot.org/show_bug.cgi?id=3675
 
1 members found this post helpful.
Old 04-01-2024, 02:24 AM   #36
Pithium
Member
 
Registered: Jul 2014
Location: Far side of the Oregon Trail
Distribution: Slackware64 15.0
Posts: 502

Rep: Reputation: 586Reputation: 586Reputation: 586Reputation: 586Reputation: 586Reputation: 586
The thing that concerns me is that we already knew this was a possibility, we just haven't seen many actual attacks like this. For these types of structural libraries and tools (SSH) these things get caught pretty quick. The real threat is with all these pip/cpan/npm/cargo systems that can autodownload thousands of dependencies for a single app. There are a lot of obscure modules for higher level languages that provide APIs for S3 storage and MFA flows that could be exploited to reveal a lot of secure info in a very short amount of time.
 
2 members found this post helpful.
Old 04-01-2024, 03:01 AM   #37
hazel
LQ Guru
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: LFS, AntiX, Slackware
Posts: 7,591
Blog Entries: 19

Rep: Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455
When I started using Linux, most distros didn't even bother to sign their packages (though Arch did). Usually there was just an md5sum for users to check that they had downloaded correctly.

Those were more innocent times!
 
Old 04-01-2024, 05:22 AM   #38
henca
Member
 
Registered: Aug 2007
Location: Linköping, Sweden
Distribution: Slackware
Posts: 971

Rep: Reputation: 657Reputation: 657Reputation: 657Reputation: 657Reputation: 657Reputation: 657
Quote:
Originally Posted by ReaperX7 View Post
Jia Tan was one of two known actors in this.
Do you refer to "Jigar Kumar" as the other bad actor? Again, that is probably a fake name, used for an account to put pressure upon Lasse Collin to accept Jia Tan as a new maintainer.

regards Henrik
 
Old 04-01-2024, 05:32 AM   #39
henca
Member
 
Registered: Aug 2007
Location: Linköping, Sweden
Distribution: Slackware
Posts: 971

Rep: Reputation: 657Reputation: 657Reputation: 657Reputation: 657Reputation: 657Reputation: 657
Quote:
Originally Posted by hazel View Post
When I started using Linux, most distros didn't even bother to sign their packages (though Arch did). Usually there was just an md5sum for users to check that they had downloaded correctly.
Slackware started signing packages with GPG with Slackware 8.1 released year 2002. The first release of Arch Linux was also year 2002.

regards Henrik
 
Old 04-01-2024, 05:36 AM   #40
hazel
LQ Guru
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: LFS, AntiX, Slackware
Posts: 7,591
Blog Entries: 19

Rep: Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455
At that time and for many years later I wouldn't have touched Slackware with a bargepole! I saw it as an expert hackers' system and not for the likes of me. How things can change...
 
Old 04-01-2024, 06:18 AM   #41
gattocarlo
Member
 
Registered: Jan 2020
Posts: 63

Rep: Reputation: Disabled
Quote:
Originally Posted by hazel View Post
At that time and for many years later I wouldn't have touched Slackware with a bargepole! I saw it as an expert hackers' system and not for the likes of me. How things can change...
which is funny because when I installed it for the first time -- Dec. '93 -- it was the easiest way to install linux on a i386 system... it was meant for non-expert... you are right, how things can change...
 
Old 04-01-2024, 07:43 AM   #42
henca
Member
 
Registered: Aug 2007
Location: Linköping, Sweden
Distribution: Slackware
Posts: 971

Rep: Reputation: 657Reputation: 657Reputation: 657Reputation: 657Reputation: 657Reputation: 657
Quote:
Originally Posted by gattocarlo View Post
how things can change...
And still, I would say that it has been times and views that has changed rather than Slackware. Since the beginning in the early 90s the Slackware installation has allways been the same: Manually partitioning of disk before running installation scripts and bootloader settings by scripts at the end of the installation.

There might be other distributions out there that are easier to install, but once you have installed Slackware you have a system that you understand.

regards Henrik
 
Old 04-01-2024, 08:01 AM   #43
hazel
LQ Guru
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: LFS, AntiX, Slackware
Posts: 7,591
Blog Entries: 19

Rep: Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455Reputation: 4455
Oops! We're getting off the point. This isn't a slackware fans fest, it's about the vulnerability of Linux code to bad actors.
 
Old 04-01-2024, 11:37 AM   #44
gattocarlo
Member
 
Registered: Jan 2020
Posts: 63

Rep: Reputation: Disabled
Quote:
Originally Posted by hazel View Post
Oops! We're getting off the point. This isn't a slackware fans fest, it's about the vulnerability of Linux code to bad actors.
right, I'm sorry.

back to the topic... this is an interesting proof of concept of the exploitation of the xz backdoor (obviously re-keyed since only the bad guy has the needed private key the exploit the original backdoor):

https://github.com/amlweems/xzbot
 
2 members found this post helpful.
Old 04-01-2024, 12:52 PM   #45
madridsecreto
Member
 
Registered: Apr 2018
Location: Madrid
Distribution: Slackware64 -current
Posts: 34

Rep: Reputation: 30
Now that I think about it, wasn't Jia Tan & friends' modus operandi awfully similar to how ZhaoLin and the Russian dude whose nick I forgot usually behave?
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: What The Intelligence Community Doesn't Get: Backdoor For 'The Good Guys' Is Always A Backdoor LXer Syndicated Linux News 0 01-11-2014 06:50 AM
Upstream Shapping qtgeo *BSD 2 11-08-2004 01:53 PM
ADSL upstream problems. marvin_robot Linux - Networking 1 03-08-2004 06:16 AM
SuSE 9.0 Wireless & Ethernet connect but no upstream puyan909 Linux - Wireless Networking 1 02-20-2004 03:23 PM
Upstream/Downstream stats jeucken Linux - Networking 4 01-06-2003 02:28 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 01:09 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration