frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Open in hackernews

XZ Utils Backdoor Still Lurking in Docker Images

https://www.binarly.io/blog/persistent-risk-xz-utils-backdoor-still-lurking-in-docker-images
55•torgoguys•2h ago

Comments

LeoPanthera•1h ago
Devs should consider migrating from xz to lzip, which is an improved LZMA container in multiple ways:

https://www.nongnu.org/lzip/xz_inadequate.html

Analemma_•1h ago
That might be true but it’s not really relevant to this post: stale Docker images with vulnerabilities lingering on DockerHub can happen to any software package.
lifthrasiir•1h ago
Not only it is irrelevant in the context of Docker images, but also lzip is not that superior to xz; the linked post only covers minor concerns and both lzip and xz are substantially simpler than the actual meat---LZMA bitstream format.
dima55•1h ago
Important nitpick: this wasn't reported to the "Debian maintainers". In DEBIAN this was fixed long ago. The problem persists and was reported to people that work with Docker images, which is primarily people that don't want to use Debian the normal way, and don't benefit from many of the Debian niceties.
jchw•1h ago
The summary of what they did on the page is largely accurate. I mean, the repository on GitHub that cooks the official Docker Debian images is indeed primarily maintained by a Debian maintainer who is a member of many different Debian teams, even if it is not an official artifact of Debian. And the problem is fixed in Docker, too, but it sounds like the issue is that they'd like the old Docker images with the backdoored packages to be removed.

And sure, you definitely lose some niceties of Debian when you run it under Docker. You also lose some niceties of Docker when you don't.

jchw•1h ago
I'm not saying this isn't an issue, but I do wonder how many of these containers that contain the backdoor can feasibly trigger it. Wouldn't you need to run OpenSSH in the container? It's not unheard of, but it's atypical.
sugarpimpdorsey•1h ago
Most Docker images have zero security anyway. Who cares if someone has a key to the back door when the front door and garage are unlocked (and running as root of course)?
creatonez•1h ago
This headline is so egregiously sensationalist.

The XZ backdoor never made it to Debian stable. It is "still lurking in docker images" because Debian publishes unstable testing images, under a tag that is segregated from the stable release tags. You can find vulnerable containers for literally any vulnerability you can imagine by searching for the exact snapshot where things went wrong.

And then downstream projects, if they choose to, can grab those images and create derivatives.

Basing your images on an experimental testing version of Debian and then never updating it is an obvious mistake. Whether XZ is backdoored is almost irrelevant at that point, it's already rotting.

> Upon discovering this issue, Binarly immediately notified the Debian maintainers and requested removal, but the affected images remain in place.

It is generally considered inappropriate to remove artifacts from an immutable repository for having a vulnerability. This wasn't even done for vulnerable Log4j versions in Maven repositories, despite Log4shell being one of the most potent vulnerabilities in history. It would just break reproducible builds and make it harder to piece together evidence related to the exploit.

Analemma_•1h ago
I have a feeling a lot of users just reflexively upvote any story about security vulnerabilities without checking if the contents have any meat at all. It's a well-intentioned heuristic, but unfortunately it's easily exploited in practice, because there are a whole bunch of C- and D-list security consultancy firms who use blogspam about exaggerated threats to get cheap publicity.

This post is a classic example and should've been buried quickly as such. You wouldn't upvote a LinkedIn "look at what MyCorp has been up to!" post from a sales associate at MyCorp, a lot of this infosec stuff is no different.

torgoguys•13m ago
I'm the one who submitted this link. (I have zero affiliation with the authors). What you say is fair enough, but I thought the article an interesting data point nonetheless. In particular, I found it interesting how a vulnerability: 1) with a tiny window during which it was published, 2) of very high potential severity, and 3) with SO MUCH publicity surrounding it could still be lingering where you might accidentally grab it. The threat isn't giant here, but I saw it as just today's reminder to keep shields up.
lmm•50m ago
> The XZ backdoor never made it to Debian stable. It is "still lurking in docker images" because Debian publishes unstable testing images, under a tag that is segregated from the stable release tags. You can find vulnerable containers for literally any vulnerability you can imagine by searching for the exact snapshot where things went wrong.

To a first approximation nothing ever makes it into Debian stable. Anyone working in an actively developed ecosystem uses the thing they pretend is an "experimental testing version". It's a marketing startegy similar to how everything from Google used to be marked as "beta".

djkoolaide•32m ago
Given my understanding of Debian, I don't believe this can be attributed to a "marketing strategy."
notherhack•55m ago
See also https://news.ycombinator.com/item?id=44924254
burnt-resistor•32m ago
Not Debian images in particular, but zillions of derived images lacking updates. This is one the many problems with using "community provided", un-curated, other people's pre-baked "golden master", old garbage rather than properly using patched and maintained systems. Apparent convenience with failure to audit.
DiabloD3•26m ago
When I was doing my stuff at my former stint as a hatrack, I made the choice to ban Docker from anywhere inside the company.

_Docker_ is a security hazard, and anything it touches is toxic.

Every single package, every single dependency, that has an actively exploited security flaw is being exploited in the Docker images you're using, unless you built them yourself, with brand new binaries. Do not trust anyone except official distro packages (unless you're on Ubuntu, then don't trust them either).

And if you're going to do that... just go to _actual_ orchestration. And if you're not going to do that, because orchestration is too big for your use case, then just roll normal actual long lived VMs the way we've done it for the past 15 years.

jiggawatts•5m ago
> Then just roll normal actual long lived VMs the way we've done it for the past 15 years.

This is easy to say if your wallet exploded because it had too much money in it, and if you don't care about the speed of operations.

Just today I'm investigating hosting options for migrating a legacy web farm with about 200 distinct apps to the cloud.

If I put everything into one VM image, then patching/upgrades and any system-wide setting changes become terrifying. The VM image build itself takes hours because this is 40 GB of apps, dependencies, frameworks, etc... There is just no way to "iterate fast" on a build script like that. Packer doesn't help.

Not to mention that giant VM images are incompatible with per-app DevOps deployment automation. How does developer 'A' roll back their app in a hurry while developer 'B' is busy rolling theirs out?

Okay, sure, let's split this into an image-per-app and a VM scale set per app. No more conflicts, each developer gets their own pipeline and image!

But now the minimum cost of an app is 4x VMs because you need 2x in prod, 1x each in test and development (or whatever). I have 200 apps, so... 800 VMs. With some apps needing a bit of scale-out, let's round this up to 1,000 VMs. In public clouds you can't really go below $50/VM/mo so that's an eye-watering $50,000 per month to replace half a dozen VMs that were "too cheap to meter" on VMware!

Wouldn't it be nicer if we could "somehow" run nested VMs with a shared base VM disk image that was thin-cloned so that only the app-specific differences need to be kept? Better yet, script the builds somehow to utilise VM snapshots so that developers can iterate fast on app-specific build steps without having to wait 30 minutes for the base platform build steps each time they change something.

Uh-oh, we've reinvented Docker!

Starting game development in JavaScript with no experience

https://jslegenddev.substack.com/p/how-to-start-making-games-in-javascript
15•JSLegendDev•55m ago•1 comments

X-ray scans reveal Buddhist prayers inside tiny Tibetan scrolls

https://www.popsci.com/technology/tibetan-prayer-scroll-scans/
52•Hooke•2d ago•3 comments

Lab-grown salmon hits the menu

https://www.smithsonianmag.com/smart-news/lab-grown-salmon-hits-the-menu-at-an-oregon-restaurant-as-the-fda-greenlights-the-cell-cultured-product-180986769/
71•bookmtn•3h ago•99 comments

Obsidian Bases

https://help.obsidian.md/bases
325•twapi•4h ago•101 comments

Croatian freediver held breath for 29 minutes

https://divernet.com/scuba-news/freediving/how-croatian-freediver-held-breath-for-29-minutes/
98•toomanyrichies•2h ago•28 comments

A minimal tensor processing unit (TPU), inspired by Google's TPU

https://github.com/tiny-tpu-v2/tiny-tpu
84•admp•5h ago•2 comments

Show HN: Whispering – Open-source, local-first dictation you can trust

https://github.com/epicenter-so/epicenter/tree/main/apps/whispering
269•braden-w•9h ago•73 comments

Precision mapping tracks woody plant spread across Great Plains grasslands

https://phys.org/news/2025-07-precision-tracks-woody-great-plains.html
8•PaulHoule•3d ago•0 comments

XZ Utils Backdoor Still Lurking in Docker Images

https://www.binarly.io/blog/persistent-risk-xz-utils-backdoor-still-lurking-in-docker-images
55•torgoguys•2h ago•16 comments

Left to Right Programming

https://graic.net/p/left-to-right-programming
205•graic•9h ago•175 comments

Counter-Strike: A billion-dollar game built in a dorm room

https://www.nytimes.com/2025/08/18/arts/counter-strike-half-life-minh-le.html
219•asnyder•11h ago•194 comments

Show HN: We started building an AI dev tool but it turned into a Sims-style game

https://www.youtube.com/watch?v=sRPnX_f2V_c
99•maxraven•7h ago•58 comments

Show HN: I built an app to block Shorts and Reels

https://scrollguard.app/
479•adrianhacar•2d ago•191 comments

An IRC-Enabled Lawn Mower

https://jotunheimr.idlerpg.net/users/jotun/lawnmower/
45•rickcarlino•2d ago•7 comments

OpenMower – An Open Source Lawn Mower

https://github.com/ClemensElflein/OpenMower
10•rickcarlino•1h ago•3 comments

Spice Data (YC S19) Is Hiring a Product Associate (New Grad)

https://www.ycombinator.com/companies/spice-data/jobs/RJz1peY-product-associate-new-grad
1•richard_pepper•4h ago

A general Fortran code for solutions of problems in space mechanics [pdf]

https://jonathanadams.pro/blog-articles/Nasa-Fortran-Code-1963.pdf
18•keepamovin•2h ago•4 comments

The Rising Returns to R&D: Ideas Are Not Getting Harder to Find

https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5242171
61•surprisetalk•4d ago•12 comments

FFmpeg Assembly Language Lessons

https://github.com/FFmpeg/asm-lessons
310•flykespice•12h ago•91 comments

What could have been

https://coppolaemilio.com/entries/what-could-have-been/
110•coppolaemilio•3h ago•90 comments

Anna's Archive: An Update from the Team

https://annas-archive.org/blog/an-update-from-the-team.html
801•jerheinze•9h ago•378 comments

Show HN: I built a toy TPU that can do inference and training on the XOR problem

https://www.tinytpu.com
55•evxxan•6h ago•11 comments

Newgrounds: Flash Forward 2025

https://www.newgrounds.com/bbs/topic/1542140
29•lsferreira42•4h ago•7 comments

Shamelessness as a strategy (2019)

https://nadia.xyz/shameless
124•wdaher•3h ago•46 comments

Show HN: Fractional jobs – part-time roles for engineers

https://www.fractionaljobs.io
164•tbird24•5h ago•78 comments

Structured (Synchronous) Concurrency

https://fsantanna.github.io/sc.html
20•jbkcc•4h ago•1 comments

GenAI FOMO has spurred businesses to light nearly $40B on fire

https://www.theregister.com/2025/08/18/generative_ai_zero_return_95_percent/
181•rntn•6h ago•86 comments

T-Mobile claimed selling location data without consent is legal–judges disagree

https://arstechnica.com/tech-policy/2025/08/t-mobile-claimed-selling-location-data-without-consent-is-legal-judges-disagree/
250•Bender•6h ago•62 comments

The Cutaway Illustrations of Fred Freeman (2016)

https://5wgraphicsblog.com/2016/10/24/the-cutaway-illustrations-of-fred-freeman/
75•Michelangelo11•2d ago•7 comments

Launch HN: Reality Defender (YC W22) – API for Deepfake and GenAI Detection

https://www.realitydefender.com/platform/api
68•bpcrd•11h ago•32 comments