Hi all,
I´ve been looking at the topic for a few days now and I´m still not quite sure about the implications.
The good thing is: my main system (Linux Lite 6.2) isn´t affected:
dpkg -l | grep xz-utils
ii xz-utils 5.2.5-2ubuntu1 amd64 XZ-format compression utilities
Phew.
But I´m also using Archlinux as a virtual machine in gnome-boxes
. So I took a look at it there as well.
As Archlinux is a rolling distro, and due to the fact that I upgrade the system pretty regularly it´s using the version 5.6.1-3 right now:
arch@archlinux ~> pacman -Qi xz
Name : xz
Version : 5.6.1-3
[...]
So this newer version shoulnd´t be affected anymore.
So far so good.
But I was using the Archlinux VM in the (recent) past as well. So a few questions still remain.
-
Might there have been a time when it had the backdoored version as part of the system? I don´t know.
-
What could it have done to the system…?
-
Is there a way of ascertaining that the present state of the system is alright?
Basically there are two ways I access the Archlinux VM:
On occasions I use the shared folder facility provided by gnome-boxes
in order to copy files from the host to the guest.
My main concern is: provided there was the backdoored version of xz on the VM at some time, could it have had any impact on the host
That would be rather unfortunate.
Thanks in advance for your opinions.
Many greetings from Rosika
P.S.:
Here I found the following description of the issue:
Description:
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0.
The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository. These instructions, through a series of complex obfuscations, extract a prebuilt object file from one of the test archives, which is then used to modify specific functions in the code while building the liblzma package.
This issue results in liblzma being used by additional software, like sshd, to provide functionality that will be interpreted by the modified functions.
Impact:
The malicious code path does not exist in the arch version of sshd, as it does not link to liblzma. However, out of an abundance of caution, we advise users to avoid the vulnerable code in their system as it is possible it could be triggered from other, un-identified vectors.
I suppose I lack the expertise for fully grasping the potential consequences.