GBHackers

Red Hat Warns of Malware Embedded in Popular Linux Tool, Opening Doors for Unauthorized Access


Red Hat has issued an urgent security alert regarding a highly sophisticated supply chain attack targeting the popular xz compression utility.

Cybersecurity researchers discovered malicious code embedded within recent versions of the xz libraries, which could potentially grant threat actors unauthorised remote access to affected Linux systems.

Technical Analysis of the Exploit

  • The vulnerability is tracked as CVE-2024-3094.
  • Compromised tools include the general-purpose data compression formats xz and xz-libs.
  • Malicious code is actively present in versions 5.6.0 and 5.6.1.
  • Security teams recommend reverting to the safe 5.4.x releases.
  • Affected distributions currently include Fedora Rawhide, Fedora 40 Beta, Debian unstable (Sid), and openSUSE.
  • The primary threat involves unauthorized remote system access via an SSH bypass.

The xz utility is a fundamental data compression format utilized across nearly every community and commercial Linux distribution to manage large file transfers.

The malicious injection specifically targets versions 5.6.0 and 5.6.1 of the libraries. Threat actors heavily obfuscated the payload, ensuring the complete exploit is only assembled within the official download package.

The primary Git repository lacks the specific M4 macro required to trigger the build of the malicious code, effectively hiding the threat from standard source code reviews.

During the build time, if the malicious M4 macro is present, it interacts with second-stage artifacts hidden in the Git repository to compile the compromised build.

Once successfully deployed, this malicious build actively interferes with authentication in sshd via systemd.

Because SSH serves as the standard protocol for secure remote system management, this interference is highly critical.

Under the right circumstances, a malicious actor could leverage this modified behavior to break SSH authentication protocols, ultimately gaining complete and unauthorized remote access to the entire system.

Scope and Mitigation Strategies

Current investigations confirm that the compromised packages directly impact the Red Hat community ecosystem, specifically users running Fedora 40 beta and Fedora Rawhide.

While Fedora Linux 40 beta contains two affected versions of the libraries, Red Hat currently believes the malicious code injection did not fully take effect in these specific builds.

Crucially, Red Hat has confirmed that no versions of Red Hat Enterprise Linux (RHEL) are affected by this vulnerability.

System administrators must take immediate defensive action to secure their environments.

Red Hat strongly advises users to completely halt all usage of Fedora Rawhide instances for both personal and business activities until the system is secured.

All affected users must immediately downgrade their xz installations to the safe 5.4.x version.

Red Hat has published an update reverting the package for Fedora Linux 40 users through the standard system update framework, and concerned administrators can manually force this update to accelerate protection.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link