Walt Mankowski via plug on 29 Mar 2024 12:49:46 -0700


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] xz backdoor... check your boxes


It also made its way into homebrew, but it's already been reverted:

$ brew outdated
xz (5.6.1) < 5.4.6

Ubuntu 23.10 is still on 5.4.1:

% dpkg -l xz-utils
Desired=Unknown/Install/Remove/Purge/Hold
| Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend
|/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad)
||/ Name           Version      Architecture Description
+++-==============-============-============-=================================
ii  xz-utils       5.4.1-0.2    amd64        XZ-format compression utilities

On Fri, Mar 29, 2024 at 06:53:05PM +0000, Chad Waters via plug wrote:
> Check your xz packages. Upstream 5.6.x contains malicious code. You should be reverting back to 5.4.x. Its made it way into some bleeding edge/development distros.
> 
> https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users
> 
> https://www.openwall.com/lists/oss-security/2024/03/29/4
> 
> It made its way into Debian Sid and Testing (and has been reverted).
> https://tracker.debian.org/pkg/xz-utils
> 
> -Chad
> ___________________________________________________________________________
> Philadelphia Linux Users Group         --        http://www.phillylinux.org
> Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
> General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug
___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug