|
Message-ID: <661F3331.3020408@gmail.com> Date: Tue, 16 Apr 2024 21:25:53 -0500 From: Jacob Bachmeyer <jcb62281@...il.com> To: oss-security@...ts.openwall.com Subject: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Solar Designer wrote: > [...] > > xz backdoor analysis > ==================== > > More findings were made about the backdoor's functionality, notably as > published on April 6 by blasty, who discovered that besides triggering > system() the backdoor also allows interactive sessions: > > https://twitter.com/bl4sty/status/1776691497506623562 > > >> [...] There is almost certainly more yet to be uncovered: Andres Freund's original report included timing for SSH client connections requesting a nonexistent account using publickey auth. The backdoored SSH server was found to require significantly longer to reject those requests than the untampered sshd. I do not believe that the currently known backdoor hooks are reachable by that means, so why did Andres Freund see that particular slowdown? (Not the backdoor initialization making sshd take longer to start up---a running sshd taking longer to reject a session for a nonexistent account, unless Andres Freund forgot to tell us that he was running sshd from inetd and thereby including sshd startup latency in his measurements.) > [...] > > OpenJS Foundation "Failed Credible Takeover Attempt" > ==================================================== > > On April 15, the OpenJS and OpenSSF foundations released the following: > > https://openjsf.org/blog/openssf-openjs-alert-social-engineering-takeovers > https://openssf.org/blog/2024/04/15/open-source-security-openssf-and-openjs-foundations-issue-alert-for-social-engineering-takeovers-of-open-source-projects/ > > I'll quote an excerpt: > > >> The OpenJS Foundation Cross Project Council received a suspicious series >> of emails with similar messages, bearing different names and overlapping >> GitHub-associated emails. These emails implored OpenJS to take action to >> update one of its popular JavaScript projects to "address any critical >> vulnerabilities," yet cited no specifics. The email author(s) wanted >> OpenJS to designate them as a new maintainer of the project despite >> having little prior involvement. This approach bears strong resemblance >> to the manner in which "Jia Tan" positioned themselves in the XZ/liblzma >> backdoor. >> >> [...] Concerning, yes, but not quite the "Jia Tan" /modus operandi/---"Jia" seems to have been contributing patches for some time (with sockpuppets pushing their acceptance as needed) before making a move to be appointed co-maintainer of xz. This looks to me like the common cybercrooks have seen the technique, decided that it sounds like a great idea, and are now trying to use it, but do not have the patience that the "Jia Tan" gang had. In other words, now the "Nigerian Princes" want to help you maintain your project, just give them write access to the source repository up front. :-P I also want to call out a critical detail: claims of vulnerabilities with no specifics that would aid in actually fixing them. This should be a general red flag: *anyone* who makes such claims is probably up to no good. Lastly, thank you for making the summary. -- Jacob
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.