Oooooooof
> Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository.
Oooooooof
> Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. The tarballs included extra .m4 files, which contained instructions for building with automake that did not exist in the repository.
Guy has Go project that wraps xz to provide native Go bindings. Project has had no commits for THREE YEARS.
Suddenly some guy sends a PR to update the version of xz in use to the backdoored version: https://github.com/jamespfennell/xz/pulls/2
Then you got some guy in the HN comments astroturfing everyone claiming that he knows the guy who submitted the PR IRL and he's a "cool dude", or something.
All this shit is so sus.
CAN THE FUCKING FEDS PLEASE STOP BACKDOORING OPEN SOURCE SOFTWARE PLEASE? K THANKS
Fear not, xz users, a new developer has stepped up to take over the project:
Tia Jan <jant1203@proton.me>
The backlash thread on GitHub is already well underway: https://github.com/tukaani-project/xz/issues/92
@eriner explain what this means
@John The post you're commenting on is a bit in the weeds. At a high level, the xz compression library was intentionally subverted by one of the project maintainers and a backdoor was inserted. This impacted SSH on Debian and Fedora, two very popular linux distros.
The best high-level writeup I can find is Michael Larabel's: https://www.phoronix.com/news/XZ-CVE-2024-3094
oh yeah, and the guy who submitted the PR supposedly works at 1Password.
So that's nice.
Both of the maintainer accounts for the xz (under the https://github.com/tukaani-project) have been suspended, presumably by Github staff:
The suspension isn't listed on the account profile, but visible in the Following/Followers list for some reason, ex: https://github.com/JiaT75?tab=following
The xz project on GitHub is now disabled. Hopefully everyone who wanted the repo and full commit history already grabbed it.
@eriner public information available about a spook operation? We can't possibly have that. Time to lock it down.
@ned it is quite odd, considering that the maintainers accounts were already suspended, as I posted evidence of a few hours ago.
I don't understand the intent behind blocking access to the entire repository, essentially memory-holing all of the non-code content (issue text, pull request discussions, etc.)
Very, very strange behavior by GitHub/Microsoft.
@Moon @ned I don't buy this because you could just 500 the releases at the reverse proxy / WAF level. It's not like that kind of change would require touching the behemoth Ruby codebase that runs Github.
@echoteecat @IceCubeSoup it makes you wonder if they're hiding it because it might unravel some threads that tie back to a "fellow cooperative department".
As far as I know, this is unprecedented by GitHub.
@IceCubeSoup @eriner Sure, but why not let 4chan and internet archive also get a copy of the "crime scene".
Why does the FBI get first dibs on planting evidence... I mean investigating?
@eriner @echoteecat I might have locked it down completely too, until it can be adequately examined to figure out what the hell happened, and how far back the shenanigans go, and who was doing what, etc.
There may be some questions of legal liability which the executives want to be addressed.
It's not like they completely destroyed it, it's still there.
I agree that it will be quite questionable if it doesn't reappear within a week or so, though.
Unless GitHub reverts this change, it is now impossible for researchers to view the discussion from issues and pull requests in the xz repository.
I cannot think of a legitimate reason for GitHub to censor this content: the two members of the organization had already had their accounts suspended by GitHub; it's not as if they could forcibly push over the content in the repo.
I'm not sure what to make of this move by GitHub/Microsoft, but it sure isn't a good look.
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.