• Rentlar@lemmy.ca
    link
    fedilink
    arrow-up
    0
    ·
    9 months ago

    Specifically, SSH logins were consuming too many CPU cycles and were generating errors with valgrind, a utility for monitoring computer memory.

    Through sheer luck and Freund’s careful eye, he eventually discovered the problems were the result of updates that had been made to xz Utils. On Friday, Freund took to the Open Source Security List to disclose the updates were the result of someone intentionally planting a backdoor in the compression software.

    It is lucky that Andres Freund checked and found the issue in valgrind that was maybe intentionally or maybe unintentionally.

    https://www.openwall.com/lists/oss-security/2024/03/29/4

    I’m interested in figuring out what happened and more information on the contributor behind the attack.

    • derptastic@lemmy.nz
      link
      fedilink
      arrow-up
      0
      ·
      9 months ago

      to me: the most chilling thing is that someone involved in the open source ecosystem introduced this vulnerability and, if it was intentional, what else did they do?

      • Flipper@feddit.de
        link
        fedilink
        English
        arrow-up
        0
        ·
        9 months ago

        It isn’t if it was intentional. It was intentional. Otherwise the exploit chain wouldn’t be so convoluted.