Red Hat Warns Users of Backdoor In Most Linux Distros: Malicious code embedded in XZ Tools
- Zynder Sec
- Mar 29, 2024
- 3 min read
On a seemingly ordinary Good Friday, Red Hat, a leading software company, and the Cybersecurity and Infrastructure Security Agency (CISA) jointly issued a critical warning about a backdoor discovered in the latest XZ Utils data compression tools and libraries. This alarming discovery has significant implications for the Linux community, potentially affecting millions of users worldwide.
The XZ Utils software, essential for compressing large file formats into more manageable sizes for transfer, is widely used across various Linux distributions. However, versions 5.6.0 and 5.6.1 of XZ Utils have been compromised, raising serious concerns about unauthorized access and remote code execution on affected systems.
The advisory, released on Friday, urges users to "PLEASE IMMEDIATELY STOP USAGE OF ANY FEDORA 41 OR FEDORA RAWHIDE INSTANCES for work or personal activity."
Red Hat's Advisory and CISA's Response:
Red Hat's advisory, released on Friday afternoon, urgently advises users to halt the usage of systems running Fedora development and experimental versions immediately. While Red Hat Enterprise Linux (RHEL) is not affected, there are reports of successful injections in xz 5.6.x versions built for Debian unstable (Sid) and potentially impacting other distributions. Debian's security team has also released an advisory, cautioning users about the issue. They have reverted to the upstream 5.4.5 code on affected Debian testing, unstable, and experimental distributions.
CISA, in collaboration with the open-source community, is actively responding to reports of malicious code in XZ Utils. Their recommendation is clear: downgrade XZ Utils to a secure version, such as 5.4.6 Stable, and remain vigilant for any signs of malicious activity.
Discovery and Investigation:
The security issue was discovered by Microsoft software engineer Andres Freund while investigating slow SSH logins on a Linux box running Debian Sid. However, the exact purpose of the malicious code added to XZ versions 5.6.0 and 5.6.1 is still unclear.
Freund noted, "I have not yet analyzed precisely what is being checked for in the injected code, to allow unauthorized access. Since this is running in a pre-authentication context, it seems likely to allow some form of access or other form of remote code execution."
Red Hat has assigned the supply chain security issue CVE-2024-3094 and a critical severity score of 10/10. As a precautionary measure, they have reverted to 5.4.x versions of XZ in Fedora 40 beta.
CISA has also published an advisory, urging developers and users to downgrade to an uncompromised XZ version (i.e., 5.4.6 Stable) and to be vigilant for any signs of malicious or suspicious activity on their systems.
Implications and Recommendations:
The discovery of a backdoor in a widely-used Linux tool underscores the importance of supply chain security. Organizations and individuals relying on Linux distributions, particularly Fedora and Debian Sid users, must take immediate action to mitigate the risks posed by this vulnerability.
CISA's recommendation to downgrade to a secure version of XZ Utils and closely monitor systems for any suspicious activity is crucial. Additionally, developers and users should remain vigilant and report any unusual findings to CISA or relevant security authorities.
The discovery of a backdoor in XZ Utils serves as a stark reminder of the ever-present cybersecurity threats in today's digital landscape. Red Hat's swift response and CISA's proactive advisory demonstrate the importance of collaboration in mitigating such risks. As the investigation continues, it is imperative for Linux users to prioritize security and take necessary precautions to safeguard their systems against potential attacks.
Comments