-
Notifications
You must be signed in to change notification settings - Fork 70
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
1 changed file
with
15 additions
and
29 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -19,55 +19,41 @@ tags: | |
- Security | ||
|
||
--- | ||
openSUSE maintainers received notification of a supply chain attack against the "xz" compression tool and "liblzma5" library. | ||
|
||
[openSUSE](https://get.opensuse.org/) maintainers received notification of a supply chain attack against the "xz" compression tool and "liblzma5" library. | ||
|
||
<strong>Background</strong> | ||
|
||
Andres Freund reported to Debian that the xz / liblzma library had been backdoored. | ||
|
||
This backdoor was introduced in the upstream github xz project with | ||
release 5.6.0 in February 2024. | ||
This backdoor was introduced in the upstream github xz project with release 5.6.0 in February 2024. | ||
|
||
Our rolling release distribution openSUSE Tumbleweed and openSUSE MicroOS | ||
included this version between March 7th and March 28th. | ||
Our rolling release distribution [openSUSE Tumbleweed](https://get.opensuse.org/tumbleweed/) and [openSUSE MicroOS](https://get.opensuse.org/microos/) included this version between March 7 and March 28. | ||
|
||
SUSE Linux Enterprise and openSUSE Leap are built in isolation from openSUSE. | ||
Code, functionality and characteristics of Tumbleweed are not automatically | ||
introduced in SUSE Linux Enterprise and/or openSUSE Leap. It has been established | ||
that the malicious file introduced into Tumbleweed is not present in | ||
SUSE Linux Enterprise and/or openSUSE Leap. | ||
[SUSE Linux Enterprise](https://www.suse.com/products/server/) and [openSUSE Leap](https://get.opensuse.org/leap/15.5/) are built in isolation from openSUSE. Code, functionality and characteristics of Tumbleweed are not automatically introduced in SUSE Linux Enterprise and/or openSUSE Leap. It has been established that the malicious file introduced into Tumbleweed is not present in SUSE Linux Enterprise and/or openSUSE Leap. | ||
|
||
<strong>Impact</strong> | ||
|
||
Current research indicates that the backdoor is active in the SSH Daemon, | ||
allowing malicious actors to access systems where SSH is exposed to | ||
the internet. | ||
Current research indicates that the backdoor is active in the SSH Daemon, allowing malicious actors to access systems where SSH is exposed to the internet. | ||
|
||
As of March 29th reverse engineering of the backdoor is still ongoing. | ||
As of March 29, reverse engineering of the backdoor is still ongoing. | ||
|
||
<strong>Mitigations</strong> | ||
|
||
openSUSE Maintainers have rolled back the version of xz on Tumbleweed | ||
on March 28th and have released a new Tumbleweed snapshot (20240328 | ||
or later) that was built from a safe backup. | ||
openSUSE Maintainers have rolled back the version of xz on Tumbleweed on March 28 and have released a new Tumbleweed snapshot ([20240328](https://lists.opensuse.org/archives/list/[email protected]/thread/6R5BPBJLB5YGTOVFE6SJMT3CEHG5IHG5/) or later) that was built from a safe backup. | ||
|
||
The reversed version is versioned <code>5.6.1.revertto5.4</code> and | ||
can be queried with <code>rpm -q liblzma5</code>. | ||
The reversed version is versioned <code>5.6.1.revertto5.4</code> and can be queried with <code>rpm -q liblzma5</code>. | ||
|
||
<strong>User recommendation</strong> | ||
|
||
For our openSUSE Tumbleweed users where SSH is exposed to the internet | ||
we recommend installing fresh, as it's unknown if the backdoor has | ||
been exploited. | ||
Due to the sophisticated nature of the backdoor an | ||
on-system detection of a breach is likely not possible. | ||
Also rotation of any credentials that could have been fetched from the | ||
system is highly recommended. | ||
Otherwise, simply update to openSUSE Tumbleweed 20240328 or later and | ||
reboot the system. | ||
For our openSUSE Tumbleweed users where SSH is exposed to the internet, we recommend installing fresh, as it's unknown if the backdoor has been exploited. | ||
|
||
Due to the sophisticated nature of the backdoor an on-system detection of a breach is likely not possible. | ||
|
||
Also rotation of any credentials that could have been fetched from the system is highly recommended. Otherwise, simply update to openSUSE Tumbleweed [20240328](https://lists.opensuse.org/archives/list/[email protected]/thread/6R5BPBJLB5YGTOVFE6SJMT3CEHG5IHG5/) or later and reboot the system. | ||
|
||
|
||
* [SUSE Security CVE-2024-3094 information page](https://www.suse.com/security/cve/CVE-2024-3094) | ||
* [OSS Security disclosure of the vulnerability](https://www.openwall.com/lists/oss-security/2024/03/29/4) | ||
|
||
<meta name="openSUSE, Tumbleweed, Developers, sysadmin, user, Open Source, rolling release, hacker, Linux, Security, backdoor, xz" content="HTML,CSS,XML,JavaScript"> | ||
<meta name="openSUSE, Tumbleweed, Developers, sysadmin, user, Open Source, rolling release, hacker, Linux, Security, backdoor, xz, CVE" content="HTML,CSS,XML,JavaScript"> |