On Fri, Mar 29, 2024 at 7:42 PM Dima Pasechnik <
dim...@gmail.com> wrote:
>
> On Fri, Mar 29, 2024 at 7:39 PM Matthias Koeppe
> <
matthia...@gmail.com> wrote:
> >
> > Workaround with the Sage distribution: "./configure --without-system-liblzma --without-system-xz"
> > (Our xz package dates back from before the attackers were born;)
> >
> > Incidentally, the cryptographic protection of the Sage distribution is wildly insufficient.
> > I've opened
https://github.com/sagemath/sage/issues/37691 for this -- any takers?
>
> I'd switch to sha256.
> And require PGP-signed commits, etc.
>
> well, I can't even comment on that issue :-)
By the way, the essential part of xz backdoor was sneaked in as a
modified copy of a gnulib m4 macros file.
As this is "the" way to use gnulib - just vendor what they provide in
your source code - one may wonder again
about the virtues of vendoring a lot of code.
Potentially, any tarfile we host may contain an exploit.
As well as anything produced on CI, VM, or, real, hosts running
compromised OS (latest unstable versions of Debian and Fedora were
compromised with this xz hack, Homebrew was, as well). So this is
something to review urgently, too.
Dima