XZ-Utils Backdoor Still Found in 35+ Docker Hub Linux Images | Black Hat Ethical Hacking



How the Backdoor Works

The XZ-Utils backdoor hijacks the RSA_public_decrypt function in OpenSSH via glibc’s IFUNC mechanism.
If an attacker with a special private key connects over SSH to an affected system, they can bypass authentication and execute commands as root.

The malicious code was introduced by a long-time project contributor, “Jia Tan”, and shipped in official packages for Debian, Fedora, OpenSUSE, and Red Hat. This incident is considered one of the most severe open-source supply chain compromises of 2024.

Debian’s Controversial Response

Despite the discovery, Debian maintainers chose not to remove the affected Docker images. They argue that:

  • Exploitation would require sshd to be installed and running in the container.
  • The attacker must have network access to the container’s SSH service.
  • The attacker must possess the specific private key triggering the backdoor.

Debian maintains these images for archival purposes and advises users to only pull up-to-date images.

Debian maintainer’s response
Source: Binarly


Source link


Leave a Reply

Your email address will not be published. Required fields are marked *