<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>David Runge on Darren Nathanael</title><link>https://blog.darrennathanael.com/author/david-runge/</link><description>Recent content in David Runge on Darren Nathanael</description><generator>Hugo</generator><language>en</language><lastBuildDate>Fri, 29 Mar 2024 19:07:04 +0000</lastBuildDate><atom:link href="https://blog.darrennathanael.com/author/david-runge/index.xml" rel="self" type="application/rss+xml"/><item><title>[arch-announce] The xz package has been backdoored</title><link>https://blog.darrennathanael.com/posts/xz-package-backdoored/</link><pubDate>Fri, 29 Mar 2024 00:00:00 +0000</pubDate><guid>https://blog.darrennathanael.com/posts/xz-package-backdoored/</guid><description>&lt;p>TL;DR: Upgrade your systems and container images &lt;strong>now&lt;/strong>!&lt;/p>
&lt;p>As many of you may have already read &lt;a href="https://www.openwall.com/lists/oss-security/2024/03/29/4" target="_blank">1&lt;/a>, the upstream release tarballs for &lt;code>xz&lt;/code> in version &lt;code>5.6.0&lt;/code> and &lt;code>5.6.1&lt;/code> contain malicious code which adds a backdoor.&lt;/p>
&lt;p>This vulnerability is tracked in the Arch Linux security tracker &lt;a href="https://security.archlinux.org/ASA-202403-1" target="_blank">2&lt;/a>.&lt;/p>
&lt;p>The &lt;code>xz&lt;/code> packages prior to version &lt;code>5.6.1-2&lt;/code> (specifically &lt;code>5.6.0-1&lt;/code> and &lt;code>5.6.1-1&lt;/code>) contain this backdoor.&lt;/p>
&lt;p>The following release artifacts contain the compromised &lt;code>xz&lt;/code>:&lt;/p>
&lt;ul>
&lt;li>installation medium &lt;code>2024.03.01&lt;/code>&lt;/li>
&lt;li>virtual machine images &lt;code>20240301.218094&lt;/code> and &lt;code>20240315.221711&lt;/code>&lt;/li>
&lt;li>container images created between and including &lt;em>2024-02-24&lt;/em> and &lt;em>2024-03-28&lt;/em>&lt;/li>
&lt;/ul>
&lt;p>The affected release artifacts have been removed from our mirrors.&lt;/p></description></item></channel></rss>