GeistHaus
log in · sign up

NVD

nvd.nist.gov
23 pages link to this URL
Backdoored XZ Utils (CVE-2024-3094) | Rapid7 Blog

On Friday, March 29, developer Andres Freund shared that he had discovered an upstream backdoor in widely used command line tool XZ Utils (liblzma).

1 inbound link website en cybersecurity companymanaged detection and responseexposure managementmanaged security solutionsvulnerability managementexposure assessment platform
Debian Decided to Postpone the 12.6 Release

After Linux XZ Tarball's backdoor discovery, Debian's devs decided to pause the 12.6 release for an in-depth analysis of CVE effects.

1 inbound link article en Linux & Open Source NewsLinux Distros debian 12.6 postponed
Project statement about xz 5.6.1 (CVE-2024-3094)

Hi, tl;dr OpenWrt seems to be not affected by the CVE-2024-3094 As you may be aware, malicious code was identified in the xz upstream tarballs starting from version 5.6.0. The development snapshots of OpenWrt were utilizing this compromised library version. Fortunately, the snapshots builds relied on source code tarballs from GitHub releases, which are generated automatically. These contained only the dormant segment of the malicious code. The crucial component that would activate the backdoo...

2 inbound links website en
All about the xz-utils backdoor | Kali Linux Blog

As of 5:00 pm ET on March 29, 2024 the following information is accurate. Should there be updates to this situation, they will be edited onto this blog post. The xz-utils package, starting from versions 5.6.0 to 5.6.1, was found to contain a backdoor (CVE-2024-3094). This backdoor could potentially allow a malicious actor to compromise sshd authentication, granting unauthorized access to the entire system remotely.

8 inbound links en kalilinuxkalilinuxPenetrationTestingPenetration TestingDistributionAdvanced
The Dependency Avalanche — Vivian Voss

644 strangers in your package.json. The XZ backdoor was caught by one engineer noticing half a second of latency. Next time it might be 50 milliseconds. Next time it might be no perceptible drift at all.

0 inbound links website en
Kaspersky analysis of the backdoor in XZ

Kaspersky analysis of the backdoor recently found in XZ, which is used in many popular Linux distributions and in OpenSSH server process.

4 inbound links article en BackdoorCyber espionageLinuxMalwareMalware DescriptionsMalware TechnologiesSSHXZ
xz/liblzma Compromise Link Roundup

Links to analysis, discussion and more related to the xz/liblzma compromise (CVE-2024-3094).

2 inbound links article en infosec xz/liblzma Compromise Link Roundupshellsharksinfosecsupplychain
When Danger Knocks on the Door: Learning to Handle CVEs in Open Source

Learn how open source projects handle CVEs. From Heartbleed and Log4Shell to the prestd advisory, explore lessons on vulnerability disclosure, fast fixes, and building trust in software security.

0 inbound links article en blog Open Source SecurityCVE ResponseVulnerability DisclosureLog4ShellHeartbleedOpen Sourceopen source securityCVE responsevulnerability disclosure
appsec & stuff
0 inbound links website en Post-MortemIdentityVulnerability-ResearchReviewsGeneral-KnowledgeBlog-News MFAMicrosoftOAuth2TOTPProtonSimpleLoginGame SecurityResearchLuaMemory CorruptionAIONMMOzimaoscasaosresearchnasandroideinkOnyx BooxbackdoorCVE-2024-3094xzliblzmasupply-chainsecurity-engineeringsecurity theatreinfosecrantsupdates
The xz backdoor from a Security Engineer persepective

As you probably already heard, the xz package got compromised. The package was used as entrypoint to inject malicious code in sshd, altering the authentication flow. This forged vulnerability is now known as CVE-2024-3094.

1 inbound link article en posts backdoorCVE-2024-3094xzliblzmasupply-chainsecurity-engineering