backdoor in upstream xz/liblzma leading to ssh server compromise

Atemu@lemmy.ml to Linux@lemmy.ml – 518 points –
openwall.com
99

You are viewing a single comment

They've been contributing to xz for two years, and commited various "test" binary files.

It's looking more like a long game to compromise an upstream.

Either that or the attacker was very good at choosing their puppet…

Well the account is focused on one particular project which makes sense if you expect to get burned at some point and don't want all your other exploits to be detected. It looks like there was a second sock puppet account involved in the original attack vector support code.

We should certainly audit other projects for similar changes from other psudoanonymous accounts.

Yeah, and the 700 commits should be reverted… just in case we missed something.