[security] backdoor in upstream xz/liblzma
-
Some of you might have seen the recent issue in xz - https://www.openwall.com/lists/oss-security/2024/03/29/4 . There was a backdoor in the upstream release tarballs that leads to ssh server compromise. There is a detect.bin attached in the end of that email. Might want to run that to check if your server is affected.
#! /bin/bash set -eu # find path to liblzma used by sshd path="$(ldd $(which sshd) | grep liblzma | grep -o '/[^ ]*')" # does it even exist? if [ "$path" == "" ] then echo probably not vulnerable exit fi # check for function signature if hexdump -ve '1/1 "%.2x"' "$path" | grep -q f30f1efa554889f54c89ce5389fb81e7000000804883ec28488954241848894c2410 then echo probably vulnerable else echo probably not vulnerable fiI am yet to find a system that is affected, so let's see how Cloudron needs to respond.
-
I think I saw on the ubuntu forum that the 22.04 version had 5.4.x. So we can quietly breathe a sigh of relief. And in the future version 24.04 it already had a faulty version and then they started to fix it as it became known about this problem.
EDIT: https://ubuntu.com/security/CVE-2024-3094
Forum: https://askubuntu.com/questions/1509015/is-ubuntu-affected-by-the-xz-backdoor-compromise
-
@murgero yes, I think Cloudron installations are unaffected unless someone manually updated to latest openssh
Hello! It looks like you're interested in this conversation, but you don't have an account yet.
Getting fed up of having to scroll through the same posts each visit? When you register for an account, you'll always come back to exactly where you were before, and choose to be notified of new replies (either via email, or push notification). You'll also be able to save bookmarks and upvote posts to show your appreciation to other community members.
With your input, this post could be even better 💗
Register Login