Pink Hat is warning {that a} vulnerability in XZ Utils, the XZ format compression utility included in lots of Linux distributions is a backdoor. Customers ought to both downgrade the utility to a safer model or disable ssh fully in order that the backdoor can’t be exploited.
The code injection vulnerability (CVE-2024-3094), injects code into the authentication course of that permits malicious actor to realize distant entry to the system. Pink Hat stated in its advisory to “PLEASE IMMEDIATELY STOP USAGE OF ANY FEDORA RAWHIDE INSTANCES for work or private exercise” — emphasis theirs — till the corporate reverted its xz model to five.4.x and gave the all-clear. The flaw has been assigned a CVSS (Widespread Vulnerability Scoring System) rating of 10.0.
The flaw is current in xz variations 5.6.0 (launched Feb. 24) and 5.6.1 (launched March 9). The US Cybersecurity and Infrastructure Safety Company (CISA) suggested builders and customers to downgrade XZ Utils to an earlier, uncompromised model, similar to XZ Utils 5.4.6 Steady.
Here is learn how to inform if the system is operating the affected model:
xz –version
If the output says xz (XZ UTils) 5.6.1 or liblzma 5.6.1, then customers ought to both apply the replace for his or her distribution (if accessible), downgrade xz, or disable ssh in the intervening time.
Whereas the difficulty primarily impacts Linux distributions, there are stories that some variations of MacOS could also be operating the compromised packages. If that’s the case, operating brew improve on the Mac ought to downgrade xz from 5.6.0 to five.4.6.
Which Linux Distros Are Affected?
Whereas severe, the impression could also be restricted. The problematic code is within the newer variations of xz/liblzma, so it will not be as extensively deployed. Linux distributions that haven’t but launched the newer variations are much less more likely to be affected.
Pink Hat: Weak packages are current in Fedora 41 and Fedora Rawhide. No variations of Pink Hat Enterprise Linux (RHEL) are affected. Pink Hat says customers ought to instantly cease utilizing the affected variations till the corporate has had an opportunity to vary the xz model.
SUSE: An replace is accessible for openSUSE (Tumbleweed or MicroOS).
Debian Linux: No steady variations of the distribution are affected, however compromised packages had been a part of the testing, unstable, and experimental variations. Customers ought to replace xz-utils.
Kali Linux: If methods had been up to date between March 26 and March 29, then customers ought to replace once more to get the repair. If Kali’s final replace was earlier than the twenty sixth, it isn’t affected by this backdoor.
This listing shall be up to date as different distributions present info.