|
Message-ID: <uu76c4$u7g$1@ciao.gmane.io> Date: Fri, 29 Mar 2024 19:55:48 -0000 (UTC) From: Tavis Ormandy <taviso@...il.com> To: oss-security@...ts.openwall.com Subject: Re: backdoor in upstream xz/liblzma leading to ssh server compromise On 2024-03-29, Andres Freund wrote: > Hi, > > After observing a few odd symptoms around liblzma (part of the xz package) on > Debian sid installations over the last weeks (logins with ssh taking a lot of > CPU, valgrind errors) I figured out the answer: > Thanks Andres, amazing work! I have a minor procedural question for Solar though, shouldn't this have been redirected to oss-security immediately from distros? What's the rationale for an embargo here? Tavis. -- _o) $ lynx lock.cmpxchg8b.com /\\ _o) _o) $ finger taviso@....org _\_V _( ) _( ) @taviso
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.