35 min

When Code Goes Rogue: The CVE-2024-3094 Saga Chaos Lever Podcast

    • Tech News

Ned and Chris discuss the impact of a sophisticated cybersecurity vulnerability, CVE-2024-3094, found in xz compression software by a Microsoft employee.
CVE-2024-3094
In this Chaos Lever episode, Ned and Chris look into the shadowy depths of cybersecurity where a malicious code, CVE-2024-3094, lurks within the seemingly benign xz compression software. This problem was deliberately created by someone with harmful intentions and essentially allows hackers to sneakily access and manipulate data in systems using this software. Ned and Chris uncover how this exploit could give hackers unfettered access to Linux systems worldwide, transforming SSH connections into potential gateways for data manipulation and unauthorized entry. Join us as they discuss the complexity of this cyber threat, its discovery, and the critical lessons in vigilance and software upkeep it teaches us. 

Links: 
https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/ https://nvd.nist.gov/vuln/detail/CVE-2024-3094 https://gynvael.coldwind.pl/?lang=en&id=782 https://github.com/libarchive/libarchive/pull/1609 https://mastodon.social/@AndresFreundTec/112180406142695845 https://www.openwall.com/lists/oss-security/2024/03/29/4 https://arstechnica.com/information-technology/2014/04/tech-giants-chastened-by-heartbleed-finally-agree-to-fund-openssl/ https://www.linuxfoundation.org/blog/open-source-maintainers-what-they-need-and-how-to-support-them 

Ned and Chris discuss the impact of a sophisticated cybersecurity vulnerability, CVE-2024-3094, found in xz compression software by a Microsoft employee.
CVE-2024-3094
In this Chaos Lever episode, Ned and Chris look into the shadowy depths of cybersecurity where a malicious code, CVE-2024-3094, lurks within the seemingly benign xz compression software. This problem was deliberately created by someone with harmful intentions and essentially allows hackers to sneakily access and manipulate data in systems using this software. Ned and Chris uncover how this exploit could give hackers unfettered access to Linux systems worldwide, transforming SSH connections into potential gateways for data manipulation and unauthorized entry. Join us as they discuss the complexity of this cyber threat, its discovery, and the critical lessons in vigilance and software upkeep it teaches us. 

Links: 
https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/ https://nvd.nist.gov/vuln/detail/CVE-2024-3094 https://gynvael.coldwind.pl/?lang=en&id=782 https://github.com/libarchive/libarchive/pull/1609 https://mastodon.social/@AndresFreundTec/112180406142695845 https://www.openwall.com/lists/oss-security/2024/03/29/4 https://arstechnica.com/information-technology/2014/04/tech-giants-chastened-by-heartbleed-finally-agree-to-fund-openssl/ https://www.linuxfoundation.org/blog/open-source-maintainers-what-they-need-and-how-to-support-them 

35 min