>they still can't decode the xz backdoor and what home its phoning

>they still can't decode the xz backdoor and what home its phoning

Shopping Cart Returner Shirt $21.68

Tip Your Landlord Shirt $21.68

Shopping Cart Returner Shirt $21.68

  1. 2 months ago
    Anonymous

    it doesn't phone home moron, it hooks sshd to do
    >if "muh key matches" then system("muh payload")

  2. 2 months ago
    Anonymous

    You're a moronic homosexual. Everything about what it does has already been documented, and what it does is allowing for other things to be done.

  3. 2 months ago
    Anonymous

    op confirms it's chinese

  4. 2 months ago
    Anonymous

    Was getting caught part of their plan?

    • 2 months ago
      Anonymous

      It's to distract you from the real issue
      https://en.wikipedia.org/wiki/Mamatlakala_highway_accident

      • 2 months ago
        Anonymous

        Ate the victims white?

  5. 2 months ago
    Anonymous

    it's not china you're racist

    • 2 months ago
      Anonymous

      >you're racist
      Yes.

  6. 2 months ago
    Anonymous

    It's been patched fricktard. It was only an issue for 3 days. Calm down homosexual. It never affected Debian nor Arch users.

  7. 2 months ago
    Anonymous

    It's not phoning, chud. My opensnitch is silent.

    • 2 months ago
      Anonymous

      did you really test the infected sshd? i wanted to make a vm+wireshark thing but got too lazy. got any pics?

  8. 2 months ago
    Anonymous

    There's this analysis of the install script.
    https://research.swtch.com/xz-script
    The same person typed up a timeline as well.
    https://research.swtch.com/xz-timeline
    It sounds that due to how the RCE was implemented it might take a while to fully analyze.

  9. 2 months ago
    Anonymous Mogul

    Backdoors don't phone home.

  10. 2 months ago
    Anonymous

    im never installing linux

  11. 2 months ago
    Anonymous

    >OP can't read
    https://www.openwall.com/lists/oss-security/2024/03/29/4

    • 2 months ago
      Anonymous

      Not OP but that was just the initial e-mail detailing the discovery of the exploit. It is a far from complete analysis and only shows that there is an exploit and it's somehow fricking with RSA ssh shit via systemd via lzma.
      It's a little unclear what OP means because this doesn't phone home. It's possible OP is just moronic.
      Currently the speculation is that the exploit is actually an RCE.
      >Attacker disguises payload as an RSA public key and signs it with their own key.
      >Uses said public key in an attempt to connect to a compromised computer
      >If the compromised computer detects the attacker's signature then it extracts and executes the payload. Otherwise it reverts to regular behavior.
      I guess the way this works it's difficult to build network scanners for it, so possibly this is what OP meant (but again, it's highly possible OP is moronic).
      There's a lot more unknown about the code and it seems it has mechanisms for possible future updates and stuff. An extremely sophisticated attack overall.

      • 2 months ago
        Anonymous

        read the fricking emails
        there are links to at least two other very thorough analyses in it. check Saturday and Sunday. or just search for it

      • 2 months ago
        Anonymous

        there is already a PoC what the frick are you talking about
        moron stop talking

  12. 2 months ago
    Anonymous

    gov.il

  13. 2 months ago
    Anonymous

    I'm on Linux mint. I don't have to worry about any of that shit

  14. 2 months ago
    Anonymous

    Ironically the vulnerability was found by a Micosoft engineer.

    Beautiful watching Linuxtards seethe.

    • 2 months ago
      Anonymous

      It's not uncommon to have Microsoft engineers contribuiting to open source software.
      I mean, they're Linuxtards themselves.

    • 2 months ago
      Anonymous

      Because even Microsoft knows that windows is garbage for cloud. Poo in loo streetshitter.

    • 2 months ago
      Anonymous

      this linuxtard who found out about the backdoor just happens to work for micro$oft
      doesn't mean it's micro$oft who notice the backdoor

      • 2 months ago
        Anonymous

        cope

        • 2 months ago
          Anonymous

          >work for micro$oft
          >doesn't mean it's micro$oft

          No, It literally means that you copetard.

          he noticed the backdoor not because micro$oft paid him to do that

          • 2 months ago
            Anonymous

            Ok, I'll give he wasn't directed to do this. But an m$ employee found and reported the issue. idgaf about the techno tribalism, I'm just glad it was found.

      • 2 months ago
        Anonymous

        >work for micro$oft
        >doesn't mean it's micro$oft

        No, It literally means that you copetard.

    • 2 months ago
      Anonymous

      >microsoft found a backdoor they made in the first place
      behead americans

      • 2 months ago
        Anonymous
    • 2 months ago
      Anonymous

      THIS, for decades they shit on windblows and yet get caught with their pants down with shit stains. feels good to be mac

  15. 2 months ago
    Anonymous

    So as long as I downgrade to the older version, I'm fine? Is there anything I need to check?

    • 2 months ago
      Anonymous

      downgrade your xz and liblzma (if liblzma is a separate package to xz in your distro)
      but the actual cause is debian patching openssh to depend on libsystemd, in which libsystemd depends on liblzma

    • 2 months ago
      Anonymous

      Just update, afaik everyones already rolled out fixes for this the day it happened and anything stable wasn't affected.

  16. 2 months ago
    Anonymous

    just decompile it and look for yourself homosexual

Your email address will not be published. Required fields are marked *