Skip to content

Latest commit

 

History

History
253 lines (222 loc) · 23 KB

index.mm.md

File metadata and controls

253 lines (222 loc) · 23 KB
title url markmap
apocalypxze: xz backdoor (2024) AKA CVE-2024-3094 related links
colorFreezeLevel maxWidth
2
1300

xz backdoor (2024)

known vulnerable versions

  • XZ Utils 5.6.0
  • XZ Utils 5.6.1

bad actor

  • Jia Tan (github.com/JiaT75)
    • infamy! managed to became co-maintainer of XZ-Utils by helping Lasse first, and eventually implanting sophisticated backdoor.
    • jiat0218@gmail.com
  • high likely there are more

xz author

discovery

root cause

  • by Russ Allbery (github.com/rra)
    • "The reality that we are struggling with is that the free software infrastructure on which much of computing runs is massively and painfully underfunded by society as a whole, and is almost entirely dependent on random people maintaining things in their free time because they find it fun, many of whom are close to burnout. This is, in many ways, the true root cause of this entire event." (quote from debian-devel ML) (2024-03-29)

CVE-2024-3094

bugtracker

  • Debian
    • bug: 1068024 revert to version that does not contain changes by bad actor (2024-03-29)
  • Gentoo
    • bug: 928134 (CVE-2024-3094) - >=app-arch/xz-utils-5.6.0: backdoor in release tarballs (2024-03-29)
  • Red Hat
    • bug: 2272210 (CVE-2024-3094) - CVE-2024-3094 xz: malicious code in distributed source (2024-03-29)
  • SUSE
    • bug: 1222124 (CVE-2024-3094) - VUL-0: CVE-2024-3094: xz: backdoored 5.6.0,5.6.1 version (2024-03-28)
  • Ubuntu

advisory

analysis

distillation

infographic

detection

countermeasure

comments