1080*80 ad

XZ Backdoor Found in Dozens of Linux Images on Docker Hub

Critical XZ Backdoor Discovered in Linux Images on Docker Hub: How to Protect Your Systems

A severe and cleverly hidden backdoor has been identified within dozens of Linux images available on Docker Hub, expanding the reach of the critical XZ Utils vulnerability (CVE-2024-3094) into the heart of the container ecosystem. This development elevates the threat from a Linux distribution issue to a widespread software supply chain crisis, potentially affecting countless applications and development pipelines.

This is not a theoretical vulnerability; it is an active, malicious implant designed to allow unauthorized remote access. Understanding its impact and taking immediate action is crucial for developers, DevOps engineers, and security professionals.

What is the XZ Backdoor (CVE-2024-3094)?

At its core, the XZ backdoor is a sophisticated supply chain attack that targets the XZ Utils package, a common data compression library found in most Linux distributions. Malicious code was intentionally added to versions 5.6.0 and 5.6.1 of the library.

This code is designed to activate under specific conditions and manipulate the OpenSSH server daemon (sshd). If triggered, it could allow an attacker with a specific private key to bypass authentication checks and gain complete remote control over the affected system. The stealthy nature of the attack, which was introduced by a long-term and seemingly trusted contributor, makes it particularly dangerous.

The Threat Spreads to Docker Hub

The latest security scans have revealed that the compromised versions of XZ Utils were not limited to standard operating system repositories. They were also integrated into numerous container images uploaded to Docker Hub, one of the world’s most popular container registries.

This discovery is alarming for several reasons:

  • Widespread Adoption: Developers frequently pull base images from Docker Hub to build their applications. An infected base image means the vulnerability is automatically inherited by every application built on top of it.
  • Hidden Danger: Many developers trust public images, especially those that appear official or are frequently updated. The vulnerability can be deeply embedded within a container’s layers, making it difficult to detect without dedicated scanning tools.
  • Attack Surface Expansion: The backdoor’s presence in containers means the attack surface is no longer just servers running a specific Linux version. It now includes any development environment, CI/CD pipeline, or production application that utilized one of these malicious images. **Your entire containerized infrastructure

Source: https://www.bleepingcomputer.com/news/security/docker-hub-still-hosts-dozens-of-linux-images-with-the-xz-backdoor/

900*80 ad

      1080*80 ad