A backdoor in xz
A backdoor in xz
Posted Apr 1, 2024 12:48 UTC (Mon) by pizza (subscriber, #46)In reply to: A backdoor in xz by himi
Parent article: A backdoor in xz
So... you have this human-readable language generate a malicious file that contains the payload for an exploit. What have you gained here?
The problem is that the binary data is "hostile", not "how the binary data was generated".
Posted Apr 2, 2024 3:16 UTC (Tue)
by himi (subscriber, #340)
[Link]
As I've said, even if this idea might work in some cases I suspect it wouldn't be viable for xz or similar, simply because of the nature of compression algorithms. But if you can make "has undefined binary files as part of the test data set" into a code smell that gets people to take a closer look then you're raising the bar for sneaking a malicious payload into a repository.
A backdoor in xz