<?xml version='1.0' encoding='UTF-8'?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://jdsalaro.com</id>
  <title>Jayson Salazar Rodriguez | @jdsalaro | Blog - Posts tagged supply chain</title>
  <updated>2025-12-26T16:36:53.755422+00:00</updated>
  <link href="https://jdsalaro.com"/>
  <link href="https://jdsalaro.com/blog/tag/supply-chain/atom.xml" rel="self"/>
  <generator uri="https://ablog.readthedocs.io/" version="0.11.4.post1">ABlog</generator>
  <subtitle>@jdsalaro</subtitle>
  <entry>
    <id>https://jdsalaro.com/reflection/xz-liblzma-linux-backdoor-foss-pitfalls-strengths/</id>
    <title>🚨 On the XZ Utils Backdoor (CVE-2024-3094): FOSS Delivered on its Pitfalls and Strengths</title>
    <updated>2024-03-31T00:00:00+00:00</updated>
    <author>
      <name>Jayson Salazar Rodriguez</name>
    </author>
    <content type="html">&lt;p class="ablog-post-excerpt"&gt;&lt;p&gt;The newly discovered backdoor&lt;a class="footnote-reference brackets" href="#openwall" id="id1" role="doc-noteref"&gt;&lt;span class="fn-bracket"&gt;[&lt;/span&gt;1&lt;span class="fn-bracket"&gt;]&lt;/span&gt;&lt;/a&gt; in the &lt;code class="docutils literal notranslate"&gt;&lt;span class="pre"&gt;XZ&lt;/span&gt; &lt;span class="pre"&gt;Utils&lt;/span&gt;&lt;/code&gt; package&lt;a class="footnote-reference brackets" href="#xzpackage" id="id2" role="doc-noteref"&gt;&lt;span class="fn-bracket"&gt;[&lt;/span&gt;2&lt;span class="fn-bracket"&gt;]&lt;/span&gt;&lt;/a&gt; affecting numerous Linux distributions&lt;a class="footnote-reference brackets" href="#arstechnica" id="id3" role="doc-noteref"&gt;&lt;span class="fn-bracket"&gt;[&lt;/span&gt;3&lt;span class="fn-bracket"&gt;]&lt;/span&gt;&lt;/a&gt; and assigned &lt;code class="docutils literal notranslate"&gt;&lt;span class="pre"&gt;CVE-2024-3094&lt;/span&gt;&lt;/code&gt;&lt;a class="footnote-reference brackets" href="#cve20243094" id="id4" role="doc-noteref"&gt;&lt;span class="fn-bracket"&gt;[&lt;/span&gt;4&lt;span class="fn-bracket"&gt;]&lt;/span&gt;&lt;/a&gt; is being dismissed by some members of the technology and security communities as &lt;em&gt;yet&lt;/em&gt; another supply chain attack; relevant only because of how blatant it was and that it affected the Open Source ecosystem but in essence nothing out of the ordinary. Regardless of whether this perspective is gaining traction due to cynicism, as hyperbole for clicks or as a coping mechanism, I &lt;em&gt;vehemently&lt;/em&gt; disagree with that stance.&lt;/p&gt;
&lt;img alt="https://jdsalaro.com/_images/openwall-andres-freund-report.png" src="https://jdsalaro.com/_images/openwall-andres-freund-report.png" /&gt;&lt;/p&gt;

    &lt;script type="text/x-thebe-config"&gt;
    {
        requestKernel: true,
        binderOptions: {
            repo: "binder-examples/jupyter-stacks-datascience",
            ref: "master",
        },
        codeMirrorConfig: {
            theme: "abcdef",
            mode: "python"
        },
        kernelOptions: {
            name: "python3",
            path: "./blog/tag"
        },
        predefinedOutput: true
    }
    &lt;/script&gt;
    &lt;script&gt;kernelName = 'python3'&lt;/script&gt;</content>
    <link href="https://jdsalaro.com/reflection/xz-liblzma-linux-backdoor-foss-pitfalls-strengths/" rel="alternate"/>
    <summary>The newly discovered backdoor1 in the XZ Utils package2 affecting numerous Linux distributions3 and assigned CVE-2024-30944 is being dismissed by some members of the technology and security communities as yet another supply chain attack; relevant only because of how blatant it was and that it affected the Open Source ecosystem but in essence nothing out of the ordinary. Regardless of whether this perspective is gaining traction due to cynicism, as hyperbole for clicks or as a coping mechanism, I vehemently disagree with that stance.</summary>
    <category term="APT" label="APT"/>
    <category term="FOSS" label="FOSS"/>
    <category term="hacking" label="hacking"/>
    <category term="highlight" label="highlight"/>
    <category term="linux" label="linux"/>
    <category term="security" label="security"/>
    <category term="supplychain" label="supply chain"/>
    <category term="technology" label="technology"/>
    <published>2024-03-31T00:00:00+00:00</published>
  </entry>
</feed>
