POC详情: 2c01f634e7f80126696dbbca9c8349ea4a26f6a6

来源
关联漏洞
标题: xz 安全漏洞 (CVE-2024-3094)
描述:xz是一个应用软件。用于支持读取和写入xz压缩流。 XZ Utils 5.6.0版本和5.6.1版本存在安全漏洞,该漏洞源于允许攻击者嵌入恶意代码。
描述
Investigation into the XZ Utils backdoor (CVE-2024-3094): chronology, attack chain, risk to SSH, and supply-chain insights. Includes slides, sources, and mitigations (parity checks, attestations, or SBOMs, as well as SLSA)
介绍
# CS50 Intro to Cybersecurity – Final Project
**Case Study:** XZ Utils Backdoor (CVE-2024-3094)

This repository supports my 7-10 minute presentation on the XZ Utils backdoor, including a recap of the backdoor, the mechanism for the backdoor via release tarballs, and relevant supply-chain mitigations.

## Materials
- **Slides (PDF):** A Near-Miss in the Supply Chain: The XZ Utils Backdoor (CVE-2024-3094).pdf
- **References:** ./References.md
- **Video (Unlisted):** [youtube-link](https://youtu.be/hZiRb05Liw0)

## Key Takeaways
- **Tarball ≠ Git:** enforce artifact–tag parity in CI; fail on any mismatch.
- **Supply-chain hardening:** attestations (in-toto), SBOMs, SLSA ≥ L3, two-person review.
- **Detect & recover:** monitor sshd anomalous behavior/symbol interposition; retain tested rollback playbooks.

## Incident Snapshot
- **CVE:** CVE-2024-3094  
- **When:** March-April 2024  
- **Impact focus:** risk to SSH auth via indirect dependency chain (ex. sshd → libsystemd → liblzma)

## Acknowledgments
**Andres Freund**, these files acknowledge everyone in the distro for finding and remediating this.

---

**Presenter:** Gianluca Milani,edX: Gianluca25,GitHub: M1lo25  
**Recorded Date:** 16/10/2025
文件快照

[4.0K] /data/pocs/2c01f634e7f80126696dbbca9c8349ea4a26f6a6 ├── [288K] A Near-Miss in the Supply Chain_ The XZ Utils Backdoor (CVE-2024-3094)”.pdf ├── [1.2K] README.md └── [2.4K] References.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。