https://infosec.exchange/@wdormann/112179988525798247
Will Dormann (@[email protected])
Just a backdoor in XZ. Nothing important. https://www.openwall.com/lists/oss-security/2024/03/29/4
Just a backdoor in XZ. Nothing important. https://www.openwall.com/lists/oss-security/2024/03/29/4
So glad someone asked the macports question.
Why (oh why) am I getting notice of vulnerability via mastodon and not supreme leader nasa IT.
(Probably my computer inexplicably just won’t work come Monday.)
@SteveBellovin The openwall post describing the xz backdoor (https://www.openwall.com/lists/oss-security/2024/03/29/4) says it decides to modify the the build process to inject the code, with conditions including:
@ozdreaming This was my understanding as well.
- Linux
- x86_64
- Compiled with GCC/GNU LD (IIRC all the homebrew stuff uses Clang?)
- Implied Glibc (due to IFUNC usage)
- Built from tarballs for deb or RPM
But I suppose it doesn't hurt to just avoid using code with potential backdoors in it 🙂
xz --version
to see if you have 5.6.0 or 5.6.1 installed
brew deps --tree --installed
.. to show who uses it, what you have to remove to get rid of it. In my case, it was:
brew remove curl
brew remove zstd
and then
brew uninstall --force xz
@seachanged @SteveBellovin
Assuming that `xz` is potentially malicious and untrustworthy, running it ("xz --version") is probably not the best of ideas...
I'd recommend using strings/grep on it instead.
@SteveBellovin @seachanged
Unfortunately, I don't use MacOS.
I tried to do something like this with apt but it doesn't work, because there is no "xz" package. Instead, there is a "xz-utils" package and a "liblzma5" package containing the library that xz uses.
Also, for some reason xz installed here both in /bin and in /usr/bin, so one would probably need to use something like "type -a xz" to find all the instances and then grep them.
Yes, defintely better to not run the affected component!
Fortunately, macos on m3.
@cy @3f @isotopp the exploit didn't target macOS, so while homebrew and macports did roll back, they were not affected by the discovered backdoor.