Skip to content

Commit ca6dbcc

Browse files
committed
security: Improve our posture to announce critical CVEs
* I think we should only commit to critical severity disclosures given the size of our team.
1 parent 8715863 commit ca6dbcc

File tree

4 files changed

+55
-0
lines changed

4 files changed

+55
-0
lines changed

content/about/security.md

+4
Original file line numberDiff line numberDiff line change
@@ -23,3 +23,7 @@ While Haiku is under heavy development, we still desire to create a secure opera
2323
## Haikuports (ported software)
2424

2525
Any serious vulnerabilities should be reported to the [Haikuports issue tracker](https://github.com/haikuports/haikuports/issues)
26+
27+
## Disclosure
28+
29+
Any critical vulnerabilities with a CVE attached impacting Haiku will be disclosed on our [website](/security), and via our [haiku-security mailing list](/community/ml).

content/community/ml/_index.html

+9
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,15 @@ <h4>Main Development List</h4>
3737
<a href="https://www.freelists.org/feed/haiku-development">RSS feed</a>
3838
</p>
3939

40+
<a name="security"></a>
41+
<h4>Security Mailing List</h4>
42+
<p>A low traffic mailing list for Haiku, Inc. to announce critical security vulnerabilities in Haiku.</p>
43+
<p>
44+
<a href="https://www.freelists.org/list/haiku-security">Subscribe</a> |
45+
<a href="https://www.freelists.org/archive/haiku-security">Message archive</a> |
46+
<a href="https://www.freelists.org/feed/haiku-security">RSS feed</a>
47+
</p>
48+
4049
<a name="3rdparty-dev"></a>
4150
<h4>Third Party Development List</h4>
4251
<p>Development of third party applications that run on Haiku are discussed in this list. (e.g. new native software to run on Haiku).</p>

content/security/_index.md

+14
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
+++
2+
type = "article"
3+
title = "Security Disclosure"
4+
date = "2024-03-30T00:00:00.000Z"
5+
tags = ["security", "CVE", "Exploit"]
6+
+++
7+
8+
Here, Haiku documents critical security vulnerabilities which may impact users
9+
10+
# Critical Vulnerabilities
11+
12+
Package | CVE
13+
---------|--------------------
14+
Xz | [CVE-2024-3094](/security/CVE-2024-3094)

content/security/cve-2024-3094.md

+28
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
+++
2+
type = "article"
3+
title = "CVE-2024-3094"
4+
date = "2024-03-30T00:00:00.000Z"
5+
tags = ["security", "CVE", "Exploit"]
6+
+++
7+
8+
# Xz: malicious code in distributed source
9+
10+
* Date: 2024-03-30
11+
* Severity: Critical
12+
* Type: Authentication bypass / Remote code execution
13+
* Source: [CVE](https://www.cve.org/CVERecord?id=CVE-2024-3094)
14+
* Communication: Mailing Lists - haiku,haiku-developers,[haiku-security](https://freelists.org/post/haiku-security/NOTICE-Major-CVE-backdoor-in-xz-utils5611,1)
15+
16+
## Description
17+
18+
Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
19+
20+
## Impacts
21+
22+
While Haiku users may not be directly impacted given the Linux target for this backdoor, it's recommended to upgrade to a unaffected version as soon as possible. Haiku will closely monitor updates from the Xz team and take recommended actions.
23+
24+
## HaikuPorts
25+
26+
Package | Affected | Fixed | Fix
27+
------------|---------------------|-------------------------|------------------------------
28+
xz_utils | xz_utils-5.6.1-1 | xz_utils-5.6.1-2 | [Update SOURCE_URI](https://github.com/haikuports/haikuports/commit/3644a3db2a0ad46971aa433c105e2cce9d141b46)

0 commit comments

Comments
 (0)