Quantcast
Channel: CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs
Browsing all 26 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

redshift: TL;DR: The commit git.tukaani.org - xz.git/commitdiff hid a . before the definition of a sandbox function, disabling Linux landlock. The long-time maintainer of xz reverted it today. The...

View Article


CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

General PSA that if you are scanning your system for potentially malicious binaries, running ldd on them is not something you should do. Read full topic

View Article


CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

Guix has grafts precisely for this purpose. Can’t we have something similar? What roadblock as would there be for implementing and then utilizing such change? Read full topic

View Article

Image may be NSFW.
Clik here to view.

CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

dpc: It should be possible to opt-in into some very-early-unstable-head-channel, that guarantees only a core subset built (toolchains and core utilities, possibly only for x86_64 That actually does...

View Article

CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

We shouldn’t wait for the rebuild, xz, libarchive, all related packages should be removed/marked insecure and pushed to master. Let people rebuild what they need themselves. There is reason to believe...

View Article


CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

Yeah, you can also check it by enabling the backdoor condition against a problematic binary: $ nix build -f '<nixpkgs>' xz.out --out-link before $ nix build --impure --expr 'with import...

View Article

Image may be NSFW.
Clik here to view.

CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

L-as: We shouldn’t wait for the rebuild, xz, libarchive, all related packages should be removed/marked insecure and pushed to master. Why do you think that we should remove or mark as insecure all...

View Article

Image may be NSFW.
Clik here to view.

CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

L-as: Let people rebuild what they need themselves. It is not as simple as that. As already mentioned before, xz is part of the bootstrap binaries through that stdenv which means you cannot even write...

View Article


CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

(Point of order: could the “what kinds of source distribution should nixpkgs accept” discussion please go to a new thread? It’s unrelated to the current remediation efforts.) Read full topic

View Article


CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

14k store paths, why does everything depend on xz anyway? How long would it there to build it for you? Is it not worth not having the vulnerabilities? Read full topic

View Article

CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

12 posts were split to a new topic: Reconsider reusing upstream tarballs Read full topic

View Article

CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

10 days is a very long time for such a critical security update, and we need to be better for the next time this happens. Read full topic

View Article

CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

xz is part of stdenv (along with a few other tools). It’s needed to unpack .tar.xz tarballs. Virtually everything depends on stdenv. nix why-depends might help you figure they details: $ nix...

View Article


Image may be NSFW.
Clik here to view.

CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

L-as: How long would it there to build it for you? Is it not worth not having the vulnerabilities? I would estimate it to be at least a couple of days if not a week and I would need to baby sit it and...

View Article

Image may be NSFW.
Clik here to view.

CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

trofi: xz is part of stdenv (along with a few other tools). It’s needed to unpack .tar.xz tarballs. Virtually everything depends on stdenv. It seems that the main problem here is not that xz (the...

View Article


CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

I’m not sure I understand. xz does link against (it’s own) liblzma: $ lddtree `which xz` /run/current-system/sw/bin/xz (interpreter =>...

View Article

Image may be NSFW.
Clik here to view.

CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

trofi: If we are to fix liblzma we should relink xz as well. Yes. My point is that we don’t need to update the xz binary that is used in stdenv (or at least not right away), if we ensure that it’s...

View Article


CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

Unless you have a more systemic fix you’re thinking of, this is really just over fitting a fringe/one-off event. Read full topic

View Article

CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

The maximal version of what I am proposing is a systemic fix. Basically, split all the dependencies of stdenv into two groups “build tools” and “libraries provided by default”. Enforce that the first...

View Article

CVE-2024-3094: Malicious code in xz 5.6.0 and 5.6.1 tarballs

Aside from the complexity of the implementation how much do you expect to gain from such a change? What the rebuild decrease would you call a net benefit for that? 2x? 10x? 100x rebuild speedup? Let’s...

View Article
Browsing all 26 articles
Browse latest View live