[tor-relays] Backdoor in upstream xz/liblzma leading to ssh server compromise

lists at for-privacy.net lists at for-privacy.net
Tue Apr 2 10:41:46 UTC 2024


On Samstag, 30. März 2024 01:02:54 CEST hello at relaymagic.org via tor-relays 
wrote:
> Just wanted to bring this to everyone’s attention if you hadn’t seen it
> already. Developer discovered a backdoor in xz-utils
> https://www.openwall.com/lists/oss-security/2024/03/29/4

Pretty unlikely that anyone uses testing or sid for productive servers.

-- 
╰_╯ Ciao Marco!

Debian GNU/Linux

It's free software and it gives you freedom!
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 3872 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20240402/8f9e046c/attachment.sig>


More information about the tor-relays mailing list