mastodon.online is one of the many independent Mastodon servers you can use to participate in the fediverse.
A newer server operated by the Mastodon gGmbH non-profit

Server stats:

10K
active users

#liblzma

0 posts0 participants0 posts today
Jordi Mon Companys<p>How <a href="https://mastodon.social/tags/NixOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NixOS</span></a> and reproducible builds could have detected the <a href="https://mastodon.social/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a> utils (<a href="https://mastodon.social/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a>) backdoor for the benefit of all by <span class="h-card" translate="no"><a href="https://chaos.social/@luj" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>luj</span></a></span> <a href="https://luj.fr/blog/how-nixos-could-have-detected-xz.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">luj.fr/blog/how-nixos-could-ha</span><span class="invisible">ve-detected-xz.html</span></a></p>
JdeBP<p><span class="h-card" translate="no"><a href="https://fosstodon.org/@3v1n0" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>3v1n0</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@novaTopFlex" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>novaTopFlex</span></a></span> </p><p>What code did they use instead?</p><p>I know of two fairly simple implementations of the notify protocol client, which have been around for years. I'm interested in knowing whether it was either of those, a third one, or just a quick nonce implementation.</p><p><a href="https://tty0.social/tags/systemd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemd</span></a> <a href="https://tty0.social/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> <a href="https://tty0.social/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a> <a href="https://tty0.social/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a></p><p><a href="https://jdebp.uk/FGA/unix-daemon-readiness-protocol-problems.html#CrippledAdoption" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">jdebp.uk/FGA/unix-daemon-readi</span><span class="invisible">ness-protocol-problems.html#CrippledAdoption</span></a></p>
Christian Pietsch 🍑<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@jrt" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jrt</span></a></span> <span class="h-card" translate="no"><a href="https://geraffel.social/@ph0lk3r" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ph0lk3r</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@hisolutions" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>hisolutions</span></a></span> <span class="h-card" translate="no"><a href="https://chaos.social/@HonkHase" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>HonkHase</span></a></span> </p><p>Vielen Dank für den Aufschrieb. Ich hoffe, dass jemand aus dieser Vorlage einen Krimi macht.</p><p>Hättet ihr Lust, das als szenische Lesung oder (Socken-)Puppentheater beim <a href="https://suma-ev.social/tags/38c3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>38c3</span></a> aufzuführen?</p><p><a href="https://suma-ev.social/tags/CVE20243094" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE20243094</span></a> <a href="https://suma-ev.social/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a> <a href="https://suma-ev.social/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> <a href="https://suma-ev.social/tags/Hintert%C3%BCr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hintertür</span></a></p>
Digital Human ✔<p>Kritieke kwetsbaarheid ontdekt in xz compressiebibliotheek: cve-2024-3094 <a href="https://www.trendingtech.news/trending-news/2024/04/6421/kritieke-kwetsbaarheid-ontdekt-in-xz-compressiebibliotheek-cve-2024-3094" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">trendingtech.news/trending-new</span><span class="invisible">s/2024/04/6421/kritieke-kwetsbaarheid-ontdekt-in-xz-compressiebibliotheek-cve-2024-3094</span></a> <a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>-2024-3094 <a href="https://mastodon.social/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> kwetsbaarheid <a href="https://mastodon.social/tags/Kritieke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kritieke</span></a> xz lek <a href="https://mastodon.social/tags/Red" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Red</span></a> Hat veiligheidsadvies <a href="https://mastodon.social/tags/XZ" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XZ</span></a> beveiligingsupdate <a href="https://mastodon.social/tags/Trending" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trending</span></a> <a href="https://mastodon.social/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://mastodon.social/tags/Nieuws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nieuws</span></a></p>
Digital Human ✔<p>Kritieke kwetsbaarheid in xz (cve-2024-3094): een diepgaande analyse <a href="https://www.trendingtech.news/trending-news/2024/04/6154/kritieke-kwetsbaarheid-in-xz-cve-2024-3094-een-diepgaande-analyse" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">trendingtech.news/trending-new</span><span class="invisible">s/2024/04/6154/kritieke-kwetsbaarheid-in-xz-cve-2024-3094-een-diepgaande-analyse</span></a> <a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>-2024-3094 <a href="https://mastodon.social/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> kwetsbaarheid <a href="https://mastodon.social/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a> datacompressie <a href="https://mastodon.social/tags/kritieke" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kritieke</span></a> softwarekwetsbaarheid <a href="https://mastodon.social/tags/beveiligingsbeoordeling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>beveiligingsbeoordeling</span></a> Red Hat <a href="https://mastodon.social/tags/Trending" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trending</span></a> <a href="https://mastodon.social/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://mastodon.social/tags/Nieuws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nieuws</span></a></p>
David Sandilands<p>Happy to see <a href="http://rubygems.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">http://</span><span class="">rubygems.org</span><span class="invisible"></span></a> update <a href="https://blog.rubygems.org/2024/03/31/rubygems-and-xz.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.rubygems.org/2024/03/31/r</span><span class="invisible">ubygems-and-xz.html</span></a> that they have done an internal audit not just of the software used to run RubyGems.org itself, but also every gem that has ever been published.<br>RubyGems.org is not vulnerable to this issue and no gem currently published on RubyGems.org contains the vulnerable liblzma library.</p><p><a href="https://fosstodon.org/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://fosstodon.org/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://fosstodon.org/tags/ruby" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ruby</span></a> <a href="https://fosstodon.org/tags/XZLZMA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XZLZMA</span></a> <a href="https://fosstodon.org/tags/XZ" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XZ</span></a></p>
𝗣𝗠𝗝 👽<p>also ich muss zugeben, ich bin echt fan von der art und weise wie <a href="https://social.pmj.rocks/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> / <a href="https://social.pmj.rocks/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a> / <a href="https://social.pmj.rocks/tags/xzutils" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xzutils</span></a> gehackt wurde<br>den exploit nicht in das eigentliche programm sondern in die tests zu programmieren ist echt genial</p>
Juan Lobo<p>Me tiene loco que la backdoor en la DLL <a href="https://masto.es/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> de <a href="https://masto.es/tags/xzutils" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xzutils</span></a> la descubriera un pavo porque al conectarse por SSH la conexión tardaba un cuarto de segundo más de lo habitual. I mean, quién se fija y se da cuenta de algo así, y cómo lo relaciona con una vulnerabilidad en <a href="https://masto.es/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a>. Es de locos, me sigue dejando perplejo.</p><p>Parece bastante claro que el autor es alguna agencia de inteligencia por la planificación, el nivel y los recursos. Cuentas falsas contribuyendo con código en Github durante años y ganándose reputación como contributors y la confianza del creador de XZ, y con un grado de conocimiento técnico a bajo nivel al alcance de pocos. Una verdadera operación encubierta sostenida en el tiempo, con una duración de años, para instalar una puerta trasera en equipos a nivel planetario.</p><p>Viendo las características poco creíbles de la cuenta falsa principal, aparentemente china, yo me decanto por los servicios secretos rusos o estadounidenses, pero es mera especulación.</p><p><a href="https://masto.es/tags/ciberseguridad" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ciberseguridad</span></a></p>
Digital Human ✔<p>Ontdekte malware in xz tarballs: impact op liblzma en veiligheidsmaatregelen <a href="https://www.trendingtech.news/trending-news/2024/04/5016/ontdekte-malware-in-xz-tarballs-impact-op-liblzma-en-veiligheidsmaatregelen" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">trendingtech.news/trending-new</span><span class="invisible">s/2024/04/5016/ontdekte-malware-in-xz-tarballs-impact-op-liblzma-en-veiligheidsmaatregelen</span></a> <a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>-2024-3094 <a href="https://mastodon.social/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> kwetsbaarheid <a href="https://mastodon.social/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a> tarballs malware <a href="https://mastodon.social/tags/software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>software</span></a> supply chain veiligheid <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> updates <a href="https://mastodon.social/tags/Trending" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trending</span></a> <a href="https://mastodon.social/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://mastodon.social/tags/Nieuws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nieuws</span></a></p>
Frederic Branczyk :verified:<p>Now I have to wonder if this bug report I did ~1 year ago could have already lead to discovering part of the attack. The linked binary is liblzma5.</p><p><a href="https://hachyderm.io/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://hachyderm.io/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a> <a href="https://hachyderm.io/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> <a href="https://hachyderm.io/tags/liblzma5" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma5</span></a> <br> <a href="https://github.com/golang/go/issues/59208" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/golang/go/issues/59</span><span class="invisible">208</span></a></p>
𝗣𝗠𝗝 👽<p>um so zeugs wie bei <a href="https://social.pmj.rocks/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> / <a href="https://social.pmj.rocks/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a> zu verhindern muss <a href="https://social.pmj.rocks/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> software die so tief in der supplychain verwoben ist staatlich finanziert werden bzw. proprietäre/kommerzielle software die diese libs und tools nutzen muss einen teil ihrer einnahmen zur finanzierung abliefern, die dependency lösen oder eine busse bezahlen</p>
Neustradamus :xmpp: :linux:<p><a href="https://mastodon.social/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ubuntu</span></a> 24.04 Beta "<a href="https://mastodon.social/tags/NobleNumbat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NobleNumbat</span></a>" (<a href="https://mastodon.social/tags/LTS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LTS</span></a>) has been delayed <a href="https://mastodon.social/tags/XZ" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>XZ</span></a> / <a href="https://mastodon.social/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> (<a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> / <a href="https://mastodon.social/tags/Canonical" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Canonical</span></a> / <a href="https://mastodon.social/tags/UbuntuLTS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UbuntuLTS</span></a> / <a href="https://mastodon.social/tags/UbuntuDesktop" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UbuntuDesktop</span></a> / <a href="https://mastodon.social/tags/UbuntuServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UbuntuServer</span></a> / <a href="https://mastodon.social/tags/UbuntuCloud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UbuntuCloud</span></a> / <a href="https://mastodon.social/tags/UbuntuCore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UbuntuCore</span></a> / <a href="https://mastodon.social/tags/UbuntuBase" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UbuntuBase</span></a> / <a href="https://mastodon.social/tags/Kubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kubuntu</span></a> / <a href="https://mastodon.social/tags/Lubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lubuntu</span></a> / <a href="https://mastodon.social/tags/UbuntuBudgie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UbuntuBudgie</span></a> / <a href="https://mastodon.social/tags/UbuntuKylin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UbuntuKylin</span></a> / <a href="https://mastodon.social/tags/UbuntuMate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UbuntuMate</span></a> / <a href="https://mastodon.social/tags/UbuntuStudio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UbuntuStudio</span></a> / <a href="https://mastodon.social/tags/Xubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Xubuntu</span></a> / <a href="https://mastodon.social/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a>) <a href="https://discourse.ubuntu.com/t/noble-numbat-beta-delayed-xz-liblzma-security-update/43827" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discourse.ubuntu.com/t/noble-n</span><span class="invisible">umbat-beta-delayed-xz-liblzma-security-update/43827</span></a></p>
Andreas Scherbaum<p>Oh, look, the <a href="https://mastodon.social/tags/OpenSSF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSSF</span></a> is placing the <a href="https://mastodon.social/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a> <a href="https://mastodon.social/tags/xzutils" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xzutils</span></a> problem on the sole <a href="https://mastodon.social/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> maintainer.</p><p>Instead of "remaining vigilant" they could help directing more resources to open source projects. None of this is to be seen in the article.</p><p><a href="https://openssf.org/blog/2024/03/30/xz-backdoor-cve-2024-3094/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">openssf.org/blog/2024/03/30/xz</span><span class="invisible">-backdoor-cve-2024-3094/</span></a></p>
Digital Human ✔<p>Alles wat u moet weten over cve-2024-3094: een analyse van de kwetsbaarheid in xz <a href="https://www.trendingtech.news/trending-news/2024/04/4696/alles-wat-u-moet-weten-over-cve-2024-3094-een-analyse-van-de-kwetsbaarheid-in-xz" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">trendingtech.news/trending-new</span><span class="invisible">s/2024/04/4696/alles-wat-u-moet-weten-over-cve-2024-3094-een-analyse-van-de-kwetsbaarheid-in-xz</span></a> <a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>-2024-3094 <a href="https://mastodon.social/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> kwetsbaarheid <a href="https://mastodon.social/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a> tarball beveiliging <a href="https://mastodon.social/tags/software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>software</span></a> veiligheidsanalyse <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> bedreigingen <a href="https://mastodon.social/tags/Trending" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trending</span></a> <a href="https://mastodon.social/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://mastodon.social/tags/Nieuws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nieuws</span></a></p>
CCC Freiburg<p>nice demo and explanation of <a href="https://chaos.social/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a> <a href="https://chaos.social/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> <a href="https://chaos.social/tags/ssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ssh</span></a> <a href="https://chaos.social/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> <a href="https://chaos.social/tags/backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backdoor</span></a> <a href="https://chaos.social/tags/CVE20243094" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE20243094</span></a> <br><a href="https://www.youtube.com/watch?v=vV_WdTBbww4" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=vV_WdTBbww</span><span class="invisible">4</span></a></p>
Digital Human ✔<p>De impact van cve-2024-3094 op xz: een gedetailleerde analyse <a href="https://www.trendingtech.news/trending-news/2024/04/4663/de-impact-van-cve-2024-3094-op-xz-een-gedetailleerde-analyse" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">trendingtech.news/trending-new</span><span class="invisible">s/2024/04/4663/de-impact-van-cve-2024-3094-op-xz-een-gedetailleerde-analyse</span></a> <a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>-2024-3094 <a href="https://mastodon.social/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a> kwetsbaarheid <a href="https://mastodon.social/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> veiligheid <a href="https://mastodon.social/tags/software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>software</span></a> supply chain <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> analyse <a href="https://mastodon.social/tags/Trending" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trending</span></a> <a href="https://mastodon.social/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://mastodon.social/tags/Nieuws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nieuws</span></a></p>
René Moser (resmo) レネ<p>xz/liblzma: Bash-stage Obfuscation Explained</p><p><a href="https://mstdn.social/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> <a href="https://mstdn.social/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a> <a href="https://mstdn.social/tags/backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backdoor</span></a> </p><p><a href="https://gynvael.coldwind.pl/?id=782" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">gynvael.coldwind.pl/?id=782</span><span class="invisible"></span></a></p>
Lutra Security<p>Backdoors (engl. für “Hintertür”) in Software sind geheime Zugänge, die von Entwicklern absichtlich eingebaut werden. Sie dienen dazu, auf ein System zuzugreifen, unter der Umgehung der üblichen Sicherheitsmaßnahmen. Beispielsweise um ein System per Fernwartung zu steuern. </p><p>Diese Hintertüren können aber natürlich auch von Angreifern ausgenutzt werden, um unbefugten Zugriff auf das System und seine Daten zu erlangen.</p><p>Aktuell gibt es ein gutes und sehr gefährliches Beispiel für eine Backdoor. Es handelt sich dabei scheinbar um einen lange geplanten Angriff auf die weitverbreitete Linux-Software “liblzma”.</p><p>Da liblzma in vielen Linux-Versionen der Fernwartungssoftware OpenSSH verwendet wird, handelt es sich um eine besonders gefährliche Backdoor. Aufgedeckt wurde dieser Angriff nur durch Zufall, da einem Entwickler aufgefallen ist, dass der OpenSSH-Login plötzlich 500 Millisekunden länger gedauert hat.</p><p>Dank ihm ist die IT-Welt gerade sehr knapp an einer IT-Sicherheitskatastrophe vorbeigeschrammt.</p><p><a href="https://infosec.exchange/tags/LutraKnows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LutraKnows</span></a> <a href="https://infosec.exchange/tags/ITSicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSicherheit</span></a> <a href="https://infosec.exchange/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a> <a href="https://infosec.exchange/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> <a href="https://infosec.exchange/tags/backdoor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>backdoor</span></a></p>
Digital Human ✔<p>Alles over cve-2024-3094: de achterdeur in xz-utils ontmaskerd <a href="https://www.trendingtech.news/trending-news/2024/04/4540/alles-over-cve-2024-3094-de-achterdeur-in-xz-utils-ontmaskerd" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">trendingtech.news/trending-new</span><span class="invisible">s/2024/04/4540/alles-over-cve-2024-3094-de-achterdeur-in-xz-utils-ontmaskerd</span></a> <a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>-2024-3094 <a href="https://mastodon.social/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a>-utils achterdeur <a href="https://mastodon.social/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a> kwetsbaarheid <a href="https://mastodon.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> datacompressie <a href="https://mastodon.social/tags/veiligheidslek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>veiligheidslek</span></a> update <a href="https://mastodon.social/tags/Trending" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Trending</span></a> <a href="https://mastodon.social/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://mastodon.social/tags/Nieuws" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nieuws</span></a></p>
Lobst3r (TWF1cm8gTS4=)<p>Complessa, astuta ed arzigogolata: così si potrebbe definire la vulnerabilità <a href="https://mastodon.social/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a>-2024-3094 sulla libreria <a href="https://mastodon.social/tags/xz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xz</span></a> / <a href="https://mastodon.social/tags/liblzma" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>liblzma</span></a>.</p><p>Ho scritto un articolo dove cerco di spiegare (questa volta non proprio a parole semplici) la vulnerabilità e, stante le informazioni attualmente disponibili, il processo di attacco.</p><p>Come sempre, spero che possa essere utile.</p><p><a href="https://lobsec.com/2024/04/cve-2024-3094-su-xz-utils/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">lobsec.com/2024/04/cve-2024-30</span><span class="invisible">94-su-xz-utils/</span></a></p>