From 526efa9d524543d6d0a2086efd785386c0104970 Mon Sep 17 00:00:00 2001
From: inference
Date: Mon, 1 Apr 2024 20:56:49 +0000
Subject: [PATCH] Update webpage "News" from version "1.1.0" to "1.2.0"
---
news.xhtml | 11 +++++++----
1 file changed, 7 insertions(+), 4 deletions(-)
diff --git a/news.xhtml b/news.xhtml
index 5710744..5a3182c 100644
--- a/news.xhtml
+++ b/news.xhtml
@@ -1,7 +1,7 @@
-
+
@@ -48,7 +48,9 @@
- On 2024-03-29, a backdoor was discovered in the
+
On 2024-03-29, a
+ backdoor was publicly disclosed
+ in the
xz-utils
software. Inferencium systems did have the affected versions of
this software installed, and the tools were used. The software has since been downgraded to
@@ -71,10 +73,11 @@
The only criteria met by Inferencium systems is amd64 as the system
architecture; this is not enough for the backdoor to be effective. Even if all criteria
other than running glibc were met, Inferencium systems would still be unaffected by this
- attack due to musl not supporting the required IFUNC
functionality.
+ attack due to musl not supporting the required IFUNC
functionality which
+ the backdoor seems heavily dependent on.
Despite the evidence, it is unknown exactly what this malicious code does and is
capable of in entirety. As a precautionary measure, I have generated a new SSH key and
- classifed the previous key as compromised. You can find my new key on the
+ classified the previous key as compromised. You can find my new key on the
Key webpage.
There is no evidence that my previous key was compromised, so this is entirely a
precautionary measure. All files and Git commits, tags, and releases signed with the