• capt_kafei@lemmy.ca
    link
    fedilink
    English
    arrow-up
    0
    ·
    9 months ago

    Damn, it is actually scary that they managed to pull this off. The backdoor came from the second-largest contributor to xz too, not some random drive-by.

        • cjk@feddit.de
          link
          fedilink
          arrow-up
          0
          ·
          9 months ago

          Either that or the attacker was very good at choosing their puppet…

          • Alex@lemmy.ml
            link
            fedilink
            arrow-up
            0
            ·
            9 months ago

            Well the account is focused on one particular project which makes sense if you expect to get burned at some point and don’t want all your other exploits to be detected. It looks like there was a second sock puppet account involved in the original attack vector support code.

            We should certainly audit other projects for similar changes from other psudoanonymous accounts.

            • cjk@feddit.de
              link
              fedilink
              arrow-up
              0
              ·
              9 months ago

              Yeah, and the 700 commits should be reverted… just in case we missed something.

  • lemmyreader@lemmy.ml
    link
    fedilink
    English
    arrow-up
    0
    ·
    9 months ago

    t y for sharing.

    #showerthoughts The problem is in upstream and has only entered Debian Sid/unstable. Does this mean that for example bleeding edge Arch (btw) sshd users are compromised already ?

      • festus@lemmy.ca
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        9 months ago

        They also believe we (Arch users) are unaffected because this backdoor targeted Debian and Redhat type packaging specifically and also relied on a certain SSH configuration Arch doesn’t use. To be honest while it’s nice to know we’re unaffected, it’s not at all comforting that had the exploiter targeted Arch they would have succeeded. Just yesterday I was talking to someone about how much I love rolling release distros and now I’m feeling insecure about it.

        More details here: https://gitlab.archlinux.org/archlinux/packaging/packages/xz/-/issues/2

        • tal@lemmy.today
          link
          fedilink
          English
          arrow-up
          0
          ·
          9 months ago

          Someone always has to be the guinea pig.

          That being said, maybe there’s an argument for distros that do rolling releases to have an “intentionally delayed rolling release” that just trails the regular rolling release by a fixed amount of time to provide more time for guinea pigs to run into things. If you want rolling, but can live with the delay, just use that.

    • 30p87@feddit.de
      link
      fedilink
      arrow-up
      0
      ·
      9 months ago

      I upgraded to 5.6.0-1 on the 28th Februar already. Over a month ago. On a server. That’s the first time Arch testing has fucked me so hard lol.

  • atzanteol@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    9 months ago

    They noticed that some ssh sessions took 0.5 seconds too long under certain circumstances. 😲

    Holy hell that’s good QA.

    • 30p87@feddit.de
      link
      fedilink
      arrow-up
      0
      ·
      9 months ago

      Well half a second delay is pretty noticeable when you ssh into a machine sitting right next to you. It should be instant. And if it isn’t something’s off.