<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Secret Backdoor Found in XZ Utils Library, Is ubuntu touch affected?]]></title><description><![CDATA[<p dir="auto">Secret Backdoor Found in XZ Utils Library, Impacts Major Linux Distros.<br />
Is ubuntu touch affected?</p>
]]></description><link>https://forums.ubports.com/topic/10001/secret-backdoor-found-in-xz-utils-library-is-ubuntu-touch-affected</link><generator>RSS for Node</generator><lastBuildDate>Fri, 06 Mar 2026 11:50:43 GMT</lastBuildDate><atom:link href="https://forums.ubports.com/topic/10001.rss" rel="self" type="application/rss+xml"/><pubDate>Sat, 30 Mar 2024 06:51:39 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to Secret Backdoor Found in XZ Utils Library, Is ubuntu touch affected? on Sat, 30 Mar 2024 07:48:08 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/arubislander" aria-label="Profile: arubislander">@<bdi>arubislander</bdi></a><br />
Thanks for the fast answer!</p>
]]></description><link>https://forums.ubports.com/post/79486</link><guid isPermaLink="true">https://forums.ubports.com/post/79486</guid><dc:creator><![CDATA[Charly]]></dc:creator><pubDate>Sat, 30 Mar 2024 07:48:08 GMT</pubDate></item><item><title><![CDATA[Reply to Secret Backdoor Found in XZ Utils Library, Is ubuntu touch affected? on Sat, 30 Mar 2024 08:07:57 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/user/charly" aria-label="Profile: Charly">@<bdi>Charly</bdi></a> This is a great question! The short answer is 'no'.  The version of the library available in the repositories used by UT does not contain this vulnerability.</p>
<p dir="auto">The long answer is more interesting. According to  the <a href="https://thehackernews.com/2024/03/urgent-secret-backdoor-found-in-xz.html" rel="nofollow ugc">The Hacker News</a> article I read, the vulnerable library versions are 5.6.0 and 5.6.1. The vulnerability seems to involve <em>potentially</em> exposing SSH services to unauthorized access.</p>
<p dir="auto">Opening the Terminal app and running <code>apt-cache policy xz-utils</code> on Focal gives the following output:</p>
<pre><code>phablet@ubuntu-phablet:~$ apt-cache policy xz-utils
xz-utils:
  Installed: (none)
  Candidate: 5.2.4-1ubuntu1.1
  Version table:
     5.2.4-1ubuntu1.1 500
        500 http://ports.ubuntu.com/ubuntu-ports focal-updates/main arm64 Packages
        500 http://ports.ubuntu.com/ubuntu-ports focal-security/main arm64 Packages
     5.2.4-1 500
        500 http://ports.ubuntu.com/ubuntu-ports focal/main arm64 Packages
phablet@ubuntu-phablet:~$ 
</code></pre>
<p dir="auto">As you can see Focal carries version 5.2.4 of the library. Notice that the library isn't even installed by default, which would be the case for most users. Furthermore even <em>if</em> it were installed, SSH is also disabled by default, unless you have enabled Developer mode in the System Settings, which most users will not have done.<br />
Additionally, even with Developer mode enabled, some ports still require the user to manually start the SSH server for use, on every reboot. Then even after all of this would be in place, a malicious actor would need to be on the same network your device is connected to by WiFi to even attempt to exploit this vulnerability, as the SSH daemon on UT does not listen on the mobile network interface. (That is one reason you should be mindful when connecting to public WiFi)<br />
So an out of the box install of UT is not affected by this vulnerability.</p>
<p dir="auto">What about applications that install and use their own version of the xz library? As long as they are confined and do not start their own SSH server using the library, then this vulnerability would also not be able to be exploited.<br />
Unconfined apps could potentially install a compromised version of the library system wide, but unless they also start an SSH server, and configure it to listen on the mobile interface, they would still face most of the challenges mentioned above.</p>
]]></description><link>https://forums.ubports.com/post/79485</link><guid isPermaLink="true">https://forums.ubports.com/post/79485</guid><dc:creator><![CDATA[arubislander]]></dc:creator><pubDate>Sat, 30 Mar 2024 08:07:57 GMT</pubDate></item></channel></rss>