oss-sec mailing list archives
Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise
From: Loganaden Velvindron <loganaden () gmail com>
Date: Sat, 30 Mar 2024 07:50:56 +0400
Github has suspended the repo: https://github.com/tukaani-project/xz Im wondering what is the next step for the xz project as a whole ? On Sat, Mar 30, 2024, 03:58 Tavis Ormandy <taviso () gmail com> wrote:
On 2024-03-29, Marc Deslauriers wrote:I think we should have a policy that if issues are suspected to beactively exploited, that the issue goes public immediately. If even there is no patch or mitigation, there's not a lot of benefit to keeping it private.In this case, we had no reason to believe it was being activelyexploited.Yeah... but you also have no reason to not believe that? What do you propose they were doing with their backdoor?If you make it public before a patch or mitigation is available, it hasnow gonefrom a single entity being able to exploit it to the whole world beingable toexploit it. That's a whole lot worse.Okay, but do we agree that if there is a mitigation available, it's better for it to be public? Isn't doing `dnf downgrade xxx` a mitigation, or `systemctl xxx stop`?I think everyone was acting in good faith here and did great work, butthere wasn't a clear policy for handling this type of issue.I would argue against having a policy requiring something like this tobe madepublic immediately. The important thing here is to do whatever it takesto makesure users are secure as fast as possible, not expose them to evenbigger attacksurface with no mitigation available. Marc.We all want users to be secure as fast as possible. The discussion is whether keeping backdoors embargoed helps achieve that. Tavis. -- _o) $ lynx lock.cmpxchg8b.com /\\ _o) _o) $ finger taviso () sdf org _\_V _( ) _( ) @taviso
Current thread:
- Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise, (continued)
- Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Marc Deslauriers (Mar 29)
- Re: backdoor in upstream xz/liblzma leading to ssh server compromise Tavis Ormandy (Mar 29)
- Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Marc Deslauriers (Mar 29)
- Re: backdoor in upstream xz/liblzma leading to ssh server compromise Tavis Ormandy (Mar 30)
- Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Marc Deslauriers (Mar 30)
- Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Marcin Wolcendorf (Mar 30)
- Re: backdoor in upstream xz/liblzma leading to ssh server compromise Tavis Ormandy (Mar 30)
- Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Marc Deslauriers (Mar 30)
- Re: backdoor in upstream xz/liblzma leading to ssh server compromise Tavis Ormandy (Mar 30)
- Re: backdoor in upstream xz/liblzma leading to ssh server compromise Bo Anderson (Mar 30)
- Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Loganaden Velvindron (Mar 30)
- Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Bjoern Franke (Mar 30)
- Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Pierre-Elliott Bécue (Mar 30)
- Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Jeffrey Walton (Mar 30)
- Re: backdoor in upstream xz/liblzma leading to ssh server compromise Solar Designer (Mar 30)
- Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Mats Wichmann (Mar 30)
- Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Jan Engelhardt (Mar 30)
- Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Pat Gunn (Mar 30)
- SV: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Markus Klyver (Mar 31)
- Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Loganaden Velvindron (Mar 31)
- Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Russ Allbery (Mar 30)