Summary: The latest versions of the โxzโ tools and libraries contain malicious code that appears to be intended to allow unauthorized access. Specifically, this code is present in versions 5.6.0 and 5.6.1 of the libraries. Fedora Linux 40 users may have received version 5.6.0, depending on the timing of system updates. Fedora Rawhide users may have received version 5.6.0 or 5.6.1.
This #xz backdoor is tracked as CVE-2024-3094 and this CVE was opened by #RedHat. You can find our data on this at https://access.redhat.com/security/cve/CVE-2024-3094 If you search for "CVE-2024-3094" with the search engine of your choice you will find a growing list of references (and clickbait stories) of which https://nvd.nist.gov/vuln/detail/CVE-2024-3094 is a bit more relevant as it contains a long list of links to more news and background. The thread that started it all is at https://www.openwall.com/lists/oss-security/2024/03/29/4
The FAQ is at https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27
#xz #liblzma backdoor/exploit, CVE-2024-3094
Short update: the best source for up2date information on the history, analysis, fallout and moving forward is now https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27
As expected, a lot of motivated but not well-informed or qualified people in the comments are adding fuel to a fire that is effectively under control and almost extinguished, so when you read that FAQ, please ignore most of the comments under it.
"Please Ignore Most of the Comments" is an anthem for our time.
Thank you!
I did consider trying to moderate the comments but github gists are not ideal for this, and I realised it would both end up upsetting people and waste time.
I am trying to ask for calm when things look heated but otherwise decided to just leave it be. Universal law of comment sections...
@jwildeboer even more, 1000 eyes are now focussing on the wound, looking for damages and other infections. 1000 eyes that would otherwise do other things are focussing on the one wound, so it can heal.
Once a problem has been identified, the self-healing capabilities are typically given. This is the resilience that is needed for survival. And it is there.
That's the open-source spirit, and it is awesome ๐ค๐
@jwildeboer yesโฆ but. Iโm now wondering if there are other instances we havenโt caught, or caught yet. Seems optimistic to assume that weโve spotted a solitary instance of a very sophisticated approach to sneaking in back doors.
At a minimum, it might be time to revisit the practice of key signing parties and doing more to vet contributors.
@jzb What I am trying to say is that there are two sides here. Solving and cleaning up after it happened is #1. That is what I am talking about. #2, what you mention, is how to harden the FOSS ecosystem proactively to reduce the risk of stuff "hiding in plain sight" in FOSS. That's a far wider field with many more unknowns.
We just shouldn't mix the two things because that leads to open ending arguments and not to solutions, IMHO.