I'm doing my best to make my coverage of the xz backdoor accessible to laypeople while also providing the technical details engineers need. I'm also updating as new info becomes available. I hope it's helpful.,

https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/

What we know about the xz Utils backdoor that almost infected the world

Malicious updates made to a ubiquitous tool were a few weeks away from going mainstream.

Ars Technica
@dangoodin There's nobody I'd rather have covering it.
@dangoodin thank you for this dan, and everyone else working on this.
this is a great recap. well done. thanks.
@dangoodin brilliant write up, thank you
@dangoodin
I am looking at if my distribution is affected and come across this
https://www.helpnetsecurity.com/2024/03/31/xz-backdoored-linux-affected-distros/
Perhaps also useful for us layuser?
XZ Utils backdoor update: Which Linux distros are affected and what can you do? - Help Net Security

The news that XZ Utils, a utility present in most Linux distributions, has been backdoored has rattled the open-source software community.

Help Net Security
@dangoodin the article szill says that the backdoor allows login. But in fact it allows remote code execution.
The payload is delivered as an ssh certificate. The login will fail, but the backdoor will read the certificate and extract the payload from there.
So there is never a remote login, but code can be run.

@gunstick

Thanks for pointing that out. I just reworked and am pretty sure I explained it better this time.

@dangoodin I appreciate both the summary and the links to more details.

@dangoodin
I think there needs to be more work amongst Linux distros and other libre software projects to identify libraries and other software that are critical (lots of things use xz) but need funding, as I suspect a lack of funding for the developer is at least partially responsible for setting the stage for the events that transpired.

#xz #floss

@dangoodin shared your article at work, but I may be like 1 of 4 people that care enough to read it lol
@dangoodin Thank you for this superlative run-down. Simply a fab piece. #XZ
@dangoodin this is a great summary. Thanks for sticking to what we know and keeping the speculation to a minimum!
@dangoodin It is. Thank you. Love your work 💜
@fruchiante @dangoodin si he leído algo sobre eso.
Yo entiendo bien poco como funciona el sistema y los controles que hay para actualizar y liberar software open source, pero me parece que lo ocurrido demuestra que, a pesar de cualquier falencia, de una u otra manera funciona, porque se detectó antes de que fuera liberado de forma masiva.
@dangoodin Thank you so much for this!
@dangoodin Thanks for linking to my article, Dan!