LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 03-30-2024, 10:18 AM   #1
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,363

Rep: Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335
xz Bug: Need anyone do anything?


https://www.linuxquestions.org/quest...ol-4175735491/

The Fedora guys are jumping up and down about a backdoor in xz-5.6.0 & 5.6.1 which involves systemd. Current of 2024-03-22 has xz-5.6.1, but not, of course systemd. No sir!

What's the recommended course of action here, or can I go back to sleep?
 
Old 03-30-2024, 10:28 AM   #2
USUARIONUEVO
Senior Member
 
Registered: Apr 2015
Posts: 2,338

Rep: Reputation: 930Reputation: 930Reputation: 930Reputation: 930Reputation: 930Reputation: 930Reputation: 930Reputation: 930
Upgrade your system and go sleep ;=)

Quote:
a/xz-5.6.1-x86_64-2.txz: Rebuilt.
Seems like a good idea to build this from a git pull rather than the signed
release tarballs. :-)
The liblzma in the previous packages were not found to be vulnerable by the
detection script, but I'd rather not carry the bad m4 files in our sources.
Here's a test script for anyone wanting to try it:
if hexdump -ve '1/1 "%.2x"' /lib*/liblzma.so.5 | grep -q f30f1efa554889f54c89ce5389fb81e7000000804883ec28488954241848894c2410 ; then
echo probably vulnerable
else
echo probably not vulnerable
fi
 
2 members found this post helpful.
Old 03-30-2024, 11:04 AM   #3
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,363

Original Poster
Rep: Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335
Haha. Thanks.
 
Old 03-30-2024, 11:41 AM   #4
reddog83
Member
 
Registered: Apr 2018
Distribution: Slackware 15.0/Current
Posts: 457

Rep: Reputation: 236Reputation: 236Reputation: 236
Yep same here im going back to rebuilding my python3 modules....
 
Old 03-30-2024, 02:36 PM   #5
henca
Member
 
Registered: Aug 2007
Location: Linköping, Sweden
Distribution: Slackware
Posts: 978

Rep: Reputation: 667Reputation: 667Reputation: 667Reputation: 667Reputation: 667Reputation: 667
Slackware is not affected by the known liblzma backdoor from upstream source packages and does not build with cmake.

However, there are still more commits made by the bad actor which has to be investigated.

regards Henrik
 
3 members found this post helpful.
Old 03-30-2024, 03:30 PM   #6
business_kid
LQ Guru
 
Registered: Jan 2006
Location: Ireland
Distribution: Slackware, Slarm64 & Android
Posts: 16,363

Original Poster
Rep: Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335Reputation: 2335
Thanks. I don't get the import of "[Slackware] does not build with cmake."
Could you elaborate?

And if this is a sign of anything, maybe everyone should restrict their open source stuff on github. A bad actor has come along and make commits with evil intent, and opened a backdoor. If it has happened once, it can happen again... and again...etc.

EDIT: Personally, I'm more likely to be affected by python3.9 --> python3.11. We've been on 3.9 for a good while.

Last edited by business_kid; 03-30-2024 at 03:32 PM.
 
1 members found this post helpful.
Old 03-30-2024, 03:40 PM   #7
BrunoLafleur
Member
 
Registered: Apr 2020
Location: France
Distribution: Slackware
Posts: 402

Rep: Reputation: 367Reputation: 367Reputation: 367Reputation: 367
Quote:
Originally Posted by henca View Post
Slackware is not affected by the known liblzma backdoor from ups Thtream source packages and does not build with cmake.

However, there are still more commits made by the bad actor which has to be investigated.

regards Henrik
I understood the problem is with autoconf, not cmake.

Also that the problem is far from beeing fully investigated and github has closed the tukaani xz project.

Some other distribution revert to 5.4 and don't try to use 5.6 even with no systemd and without the binary problematic files. But even 5.4 maybe suspicious. Server Ubuntu 22 distribution is with 5.2 version of xz.
 
Old 03-30-2024, 03:52 PM   #8
Petri Kaukasoina
Senior Member
 
Registered: Mar 2007
Posts: 1,816

Rep: Reputation: 1493Reputation: 1493Reputation: 1493Reputation: 1493Reputation: 1493Reputation: 1493Reputation: 1493Reputation: 1493Reputation: 1493Reputation: 1493
Quote:
Originally Posted by BrunoLafleur View Post
I understood the problem is with autoconf, not cmake.
The new problem is that the saboteur prohibited the use of Landlock sandbox with cmake builds. The sandbox should "help mitigate the security impact of bugs or unexpected/malicious behaviors in user space applications".
 
2 members found this post helpful.
Old 03-30-2024, 05:01 PM   #9
Jeebizz
Senior Member
 
Registered: May 2004
Distribution: Slackware15.0 64-Bit Desktop, Debian 11 non-free Toshiba Satellite Notebook
Posts: 4,187

Rep: Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379Reputation: 1379
Quote:
Originally Posted by Petri Kaukasoina View Post
The new problem is that the saboteur prohibited the use of Landlock sandbox with cmake builds. The sandbox should "help mitigate the security impact of bugs or unexpected/malicious behaviors in user space applications".
So then this was an oversight - and those in charge of the repo should have perhaps questioned 'why is said feature prohibited' ? Seems to me this is the new way of attack going forward , bits of code that either do not offer any real improvement or stability, and potentially have smaller malicious intent or say the very least questionable intent, yet on its own it does nothing, until another piece of code later on builds on that. So yea, going forward now even every bit of 'changes' needs to be scrutinized even if it is either benign or has no immediate impact - but should still be looked at and questioned: "why was it written this way?" "Why the need of prohibiting this one protective feature to run or compile?"
 
Old 03-30-2024, 05:29 PM   #10
ludist
Member
 
Registered: Nov 2005
Location: Greece
Distribution: Slackware
Posts: 172

Rep: Reputation: 21
Slightly off-topic. This backdoor is it logged to check with command
Code:
last
If yes with which user?
 
Old 03-30-2024, 05:39 PM   #11
volkerdi
Slackware Maintainer
 
Registered: Dec 2002
Location: Minnesota
Distribution: Slackware! :-)
Posts: 2,523

Rep: Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489Reputation: 8489
Quote:
Originally Posted by ludist View Post
Slightly off-topic. This backdoor is it logged to check with command
Code:
last
If yes with which user?
I don't think any researchers have been able to observe an unauthorized login, so we don't currently know if it leaves any residue in the logs. I doubt that it would, though.
 
Old 03-30-2024, 09:29 PM   #12
thirdm
Member
 
Registered: May 2013
Location: Massachusetts
Distribution: Slackware, NetBSD, Debian, 9front
Posts: 318

Rep: Reputation: Disabled
But for this miscalculation this compromise might never have been noticed (and someone buy Andres Fruend a drink?)?:

"Subsequently the injected code (more about that below) caused valgrind errors
and crashes in some configurations, due the stack layout differing from what
the backdoor was expecting. These issues were attempted to be worked around
in 5.6.1:"

https://www.openwall.com/lists/oss-s...y/2024/03/29/4
 
Old 03-31-2024, 12:35 AM   #13
hazel
LQ Guru
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: LFS, AntiX, Slackware
Posts: 7,611
Blog Entries: 19

Rep: Reputation: 4458Reputation: 4458Reputation: 4458Reputation: 4458Reputation: 4458Reputation: 4458Reputation: 4458Reputation: 4458Reputation: 4458Reputation: 4458Reputation: 4458
Quote:
Originally Posted by Jeebizz View Post
So then this was an oversight - and those in charge of the repo should have perhaps questioned 'why is said feature prohibited' ? Seems to me this is the new way of attack going forward , bits of code that either do not offer any real improvement or stability, and potentially have smaller malicious intent or say the very least questionable intent, yet on its own it does nothing, until another piece of code later on builds on that. So yea, going forward now even every bit of 'changes' needs to be scrutinized even if it is either benign or has no immediate impact - but should still be looked at and questioned: "why was it written this way?" "Why the need of prohibiting this one protective feature to run or compile?"
Last year there was an academic research project (sadly I can't remember who carried it out) to see if it was possible to inject bad code into the Linux kernel. They used precisely this method, offering harmless patches that corrected minor stylistic errors and seemed only pedantic at worst, but one of them created an opening into which something worse could be inserted later.

Of course they immediately informed the kernel team and the world of their success.

Last edited by hazel; 03-31-2024 at 12:36 AM.
 
Old 03-31-2024, 05:09 AM   #14
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,387

Rep: Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108Reputation: 4108
Quote:
Originally Posted by hazel View Post
Last year there was an academic research project (sadly I can't remember who carried it out) to see if it was possible to inject bad code into the Linux kernel. They used precisely this method, offering harmless patches that corrected minor stylistic errors and seemed only pedantic at worst, but one of them created an opening into which something worse could be inserted later.

Of course they immediately informed the kernel team and the world of their success.
Isn't the University of Minnesota in 2021 ?
https://cse.umn.edu/cs/statement-cse...-april-21-2021
https://cse.umn.edu/cs/open-letter-l...-april-24-2021
 
2 members found this post helpful.
Old 03-31-2024, 06:59 AM   #15
pghvlaans
Member
 
Registered: Jan 2021
Distribution: Slackware64 {15.0,-current}, FreeBSD, stuff on QEMU
Posts: 457

Rep: Reputation: 366Reputation: 366Reputation: 366Reputation: 366
Yep. Their IRB probably should've had something to say about that one.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
To allow anything to be written on a dir, but also to not erase anything. coltson Linux - Software 1 07-11-2020 06:30 PM
Using libreoffice or anything to print anything from terminal MattFly Programming 5 09-06-2015 04:06 PM
backup to qcow2 (or anything VM compatible) using dd (anything) serafean Linux - Software 3 07-02-2010 02:39 AM
OT: anyone need anything slack/linux/newbie related hosted? user1442 Slackware 1 10-18-2005 11:28 AM
i cant install anything or get anything to work!! karupt Linux - Software 2 03-04-2004 10:55 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 11:31 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration