-
-
Notifications
You must be signed in to change notification settings - Fork 48
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Backdoored liblzma
(CVSS 10.0) might be present in qubes-template-archlinux 4.2.0-202403061411
#9067
Comments
dom0 doesn't have liblzma installed, and debian 12 has v5.4.1-0.2 I think both should be safe, not sure about the fedora templates. |
Dom0 has xz-5.4.1, which doesn't include that backdoor. Neither Fedora 39 nor Debian 12 are affected. The Archlinux template in the "templates-community-testing" repository might be affected, rebuild is in progress. But community templates are not included in the standard security process, so there won't be Qubes Security Bulletin about it. |
Apparently Kali was also hit as of 26 March. |
Fedora 40 and 41 were apparently targeted:
|
We should look at libarchive too; from the same person who backdoored liblzma: |
@marmarek xz-5.4.1 was released by the very same person who inserted the backdoor into 5.6.0/5.6.1: Are you sure it's trustworthy, especially given it's in dom0 and thus in the Qubes TCB? I sure wouldn't put my money on it. |
A very good writeup which is being updated in real time as more layers of the onion are being peeled: |
liblzma
(CVSS 10.0) is present in qubes-template-archlinux 4.2.0-202403061411
FWIW my understanding is that the Arch template had the backdoored version, but the backdoor disables itself unless it detects an RPM or deb package being built, so the backdoor wasn’t included in the final binary. Also, the backdoor appears to only target sshd, rather than e.g. infecting all files on the system or all files processed by |
libalpm (which Pacman wraps) is known to have a bug (now fixed in upstream git) that causes a NULL pointer dereference under certain conditions. Qubes OS templates with the Qubes repos enabled are affected. I believe that this is the actual cause of the crash. |
Just in case, the official recommendation to upgrade to xz 5.6.1-2 looks suspicious: the |
@patrakov On Arch, the backdoor did not include itself in the build, so this is expected. |
liblzma
(CVSS 10.0) is present in qubes-template-archlinux 4.2.0-202403061411
liblzma
(CVSS 10.0) might be present in qubes-template-archlinux 4.2.0-202403061411
Lowering priority. But it's still worth to rebuilt with reverted version, just in case. |
I've requested a backport: https://gitlab.archlinux.org/archlinux/packaging/packages/pacman/-/issues/24 |
The Arch template is rebuilt (although it turned out to not be necessary), other supported templates are not affected (we don't have Fedora 40 nor Debian unstable templates yet). |
Hello,
liblzma has been backdoored upstream (CVE-2024-3094, CVSS 10.0):
https://www.openwall.com/lists/oss-security/2024/03/29/4
It would appear as though this has affected users of Qubes OS:
https://forum.qubes-os.org/t/qubes-users-kernel-paman-8748-segfault-at-58326dd13cf4-ip-00005837ecf00a71-sp-00007fff91f540b0-error-4-in-paman-5837ecefd000-1b000-likely-on-cpu-1-core-0-socket-0/25029
I am on mobile right now and cannot develop this issue further, but I wanted to make some noise about it to get people's attention.
The text was updated successfully, but these errors were encountered: