XZ Utils Compromised Releases
Blair Zajac
blair at orcaware.com
Fri Mar 29 17:52:49 UTC 2024
In https://www.openwall.com/lists/oss-security/2024/03/29/4 it says
== Bug reports ==
Given the apparent upstream involvement I have not reported an upstream
bug….
I suggest not waiting for an upstream release and instead revert our commit and add an epoch line.
Blair
> On Mar 29, 2024, at 10:50 AM, Rainer Müller <raimue at macports.org> wrote:
>
> On 29/03/2024 18.40, Fred Wright wrote:
>>
>> On Fri, 29 Mar 2024, Frank Dean wrote:
>>
>>> I received a security announcement on the Debian mailing list [1]. It
>>> appears versions 5.6.0 of XY Utils and later may be compromised. I
>>> also found a discussion on Openwall [2].
>>>
>>>
>>> [1]:
>>> https://lists.debian.org/debian-security-announce/2024/msg00057.html
>>> <https://lists.debian.org/debian-security-announce/2024/msg00057.html>
>>>
>>> [2]: https://www.openwall.com/lists/oss-security/2024/03/29/4
>>> <https://www.openwall.com/lists/oss-security/2024/03/29/4>
>>>
>>>
>>> I'm afraid that's all I know. Just a heads-up.
>
> Wow. That's an awful story.
>
> The exploit seems to specifically target Linux systems only ("[...] it
> is likely the backdoor can only work on glibc based systems.").
>
>> In [1] they mention reverting to 5.4.5 to fix it. It's not 100% clear
>> from that whether 5.4.6 is affected, but it sounds like it's not. Since
>> MacPorts is currently at 5.4.6, the port is probably OK as long as it
>> doesn't do any overzealous upgrading.
>
> The xz port was updated to 5.6.1 just two days ago:
> https://github.com/macports/macports-ports/commit/784e59f99e51adbadc663b1b689d66363adf193a
>
> Based on the current information, the risk seems low for macOS system.
> Should we still be cautious and revert to version 5.4.6 and bump the
> epoch to force a downgrade for everyone? Or do we expect a new upstream
> release soon to sort this out?
>
> Rainer
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.macports.org/pipermail/macports-dev/attachments/20240329/104c6976/attachment.htm>
More information about the macports-dev
mailing list