The backdoor was caught before propagating into more highly used stable releases, but evidence shows attackers pressuring distribution maintainers for faster deployment.
The backdoor impacted the SSH remote login protocol, requiring a specific key to enable, allowing the upload and execution of arbitrary code on the target machine.
Collection
[
|
...
]