|
Message-ID: <20240329191926.rvyvzgtdpfwc256c@awork3.anarazel.de> Date: Fri, 29 Mar 2024 12:19:26 -0700 From: Andres Freund <andres@...razel.de> To: oss-security@...ts.openwall.com Subject: Re: backdoor in upstream xz/liblzma leading to ssh server compromise Hi, On 2024-03-29 19:44:05 +0100, Matthias Weckbecker wrote: > I've attached a yara rule to detect the *.o droplet you attached in the > email (liblzma_la-crc64-fast.o.gz). Unfortunately xz 5.61 added further obfuscations, making it harder to detect. Should have made it clearer that the attached .o was from 5.60. Among others 5.61 removed the two symbols you're checking against here. That's why Vegard's script looks for a specific instructions sequence, but obviously is also more obscure :/ Regards, Andres
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.