El Fri, 29 Mar 2024 22:55:26 +0100
Christian Weisgerber <na...@mips.inka.de> escribió:
> Christian Weisgerber:
> 
> > > It sounds like a backdoor made it into the upstream repository:
> > > https://www.openwall.com/lists/oss-security/2024/03/29/4  
> > 
> > Yes, I just learned.  I am investigating.  
> 
> The xz 5.6.1 update hasn't been committed yet, so this mostly
> concerns only me anyway.
> 
> * A malicious m4/build-to-host.m4 has been inserted and its code
>   is used in the generated configure script.
> 
> * This extracts and executes a shell script from
>   tests/files/bad-3-corrupt_lzma2.xz.
>   That script aborts if $(uname) is not Linux.  <=== IT ENDS HERE.
>   If the script continued, it would fail because it uses "head -c"
>   and "tail -c" which are a nonstandard extension that the
> corresponding OpenBSD commands don't support.
> 
> * The script extracts the next stage shell script from
>   tests/files/good-large_compressed.lzma.
>   This stage aborts again early when $(uname) is not Linux.
>   It then proceeds to manipulate the build in some way I won't waste
>   my time to figure out.
> 
> In short, it's a supply chain attack on Linux that doesn't concern
> OpenBSD.
> 
> 
> PS:
> If anybody wants to compare build-to-host.m4, here's the GNU upstream:
> https://git.savannah.gnu.org/gitweb/?p=gnulib.git;a=blob;f=m4/build-to-host.m4;h=f928e9ab403b3633e3d1d974abcf478e65d4b0aa;hb=HEAD
> 

Good to know! Thanks for this analysis! 

-- 
*********************************************************
Dios en su cielo, todo bien en la Tierra

Reply via email to