• @69420
      link
      English
      348 months ago
      xz --version
      
    • Possibly linux
      link
      fedilink
      English
      4
      edit-2
      8 months ago

      Even if it did, what would you do? rm -rf /?

      XZ is part of the core system

    • @[email protected]
      link
      fedilink
      English
      38 months ago

      Why? It’s not hard. They typically hash files and look for hits against a database of known vulnerabilities.

      • boredsquirrel
        link
        fedilink
        78 months ago

        Yes and if viruses use something like base64 encoding or other methods, the hashes dont match anymore.

        As far as I understood it, it is pretty easy to make your virus permanently un-hashable by just always changing some bits

        • @[email protected]
          link
          fedilink
          English
          28 months ago

          The xz backdoor was a packaged file distributed with the standard packages though. It would be trivial to find.

          • boredsquirrel
            link
            fedilink
            18 months ago

            This is obviously not about this known file.

            It is about “would this scanner detect a system package from the official repos opening an ssh connection”

      • Possibly linux
        link
        fedilink
        English
        2
        edit-2
        8 months ago

        That doesn’t work against polymorphic malware

        I think the best way is to monitor calls and behavior. Doing that is a privacy nightmare