A backdoor in xz
A backdoor in xz
Posted Mar 31, 2024 6:37 UTC (Sun) by epa (subscriber, #39769)In reply to: A backdoor in xz by judas_iscariote
Parent article: A backdoor in xz
I think if the symbol-replacing were not allowed, nor arbitrary code execution on *loading* the library, then the attack would be more difficult. The application does not call any functions from xz. An attacker would have to get a backdoor into the library and somehow persuade sshd to call it.