Helpful resources for the xz situation
Collection of useful resources, to bring people up to speed with the situation.
Management summary
For those not up to speed, the xz
package was backdoored (CVE-2024-3094
) by a maintainer that took over the projects in the past years. The backdoor targeted sshd on systemd systems and was found by Andres Freund, while setting up a machine for microbenchmarks. The discovery was early and mainly effected bleeding edge systems, like Fedora Rawhide or Debian Unstable. It’s not the first vulnerability of its kind, but it could have been very impactful if not found that early.
If you need a government announcement, there is currently one form CISA. The German BSI hasn’t provided one yet (to my knowledge).
There is now an upstream response by the original author/maintainer, Lasse Collin, who took back the project now. He stopped his well earned vacation because a lot of people use his hobby project for production systems. Please understand they have no obligation to you!
Timeline
There is a great article on the timeline of the incident by Evan Boehs. He’s updating the timeline quite frequently and there is nothing I could add, so just enjoy it there.
How to detect affected versions?
- Take a deep breath
- Consider where you run sshd
- Consider what distros you run sshd on, what OS versions you use and what the distributions say about the vulnerability
- There is a detection script you can run to find affected versions.
Useful links
- Original post to oss-security mailing list
- FAQ by Sam James
- GossiTheDog’s coverage of the issue
- GossiTheDog’s summary blog post on the issue
- Red Hat blog post on the issue
- OpenSUSE blog post on the issue
- The register article on the issue
- Alpine’s CVE for the edge repository
- Amazon’s take on the (short) issue
- Debian’s “Stop the world” for release processes
- Filippo Valsorda reporting on the reverse-engineering of the backdoor
- Analysis of the payload by Gynvael Coldwind
- Compromised release
tar.gz
extracted from Fedora SRPM files - Open Source Security Podcast on the XZ issue
- fr0gger’s diagram trying to explain it