[tor-relays] Backdoor in upstream xz/liblzma leading to ssh server compromise
lists at for-privacy.net
lists at for-privacy.net
Tue Apr 2 10:41:46 UTC 2024
On Samstag, 30. März 2024 01:02:54 CEST hello at relaymagic.org via tor-relays
wrote:
> Just wanted to bring this to everyone’s attention if you hadn’t seen it
> already. Developer discovered a backdoor in xz-utils
> https://www.openwall.com/lists/oss-security/2024/03/29/4
Pretty unlikely that anyone uses testing or sid for productive servers.
--
╰_╯ Ciao Marco!
Debian GNU/Linux
It's free software and it gives you freedom!
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 3872 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20240402/8f9e046c/attachment.sig>
More information about the tor-relays
mailing list