https://tranny-man.tumblr.com/
Leo ● Trans masc butch/stud ○ 27●💉 - 12 /7/17 / 🔪 - 10/10/19
Add me in discord: xanthers


lexi
@lexi

full report: https://www.openwall.com/lists/oss-security/2024/03/29/4

tl;dr: liblzma/xz has been compromised upstream. the github releases 5.6.0/5.6.1 (since feb 24) contain malicious code, significantly slows down sshd and runs code on pubkey login. checker script is available, please check your distro's repository to see if you have those versions of xz, and if yes upgrade if a rollback is packaged or roll it back yourself.

here is how you can tell if you're running the affected version:


xz --version

here is what the output on the vulnerable version looks like:

$ xz --version
xz (XZ Utils) 5.6.1
liblzma 5.6.1

OR

$ xz --version
xz (XZ Utils) 5.6.0
liblzma 5.6.0

if you want to be a bit safer, try the detection script from the full report!


You must log in to comment.

in reply to @lexi's post:

stupid q: how do you check which version of liblzma/xz you have on your OS? sshd -v gives me

OpenSSH_8.9p1 Ubuntu-3ubuntu0.6, OpenSSL 3.0.2

but i have no clue how that translates to the lib in question

Alright, so after doing my diligence, I tried to execute the detect.sh included with the report, but it throws an error, "ldd: missing file arguments", about which I'm not sure what to do. However, my xz version numbers seem to be far lower (5.2.5) than the problem range, so is it worth being confident I'm safe here?