TheFadingOne

joined 1 year ago
[–] TheFadingOne@feddit.de 6 points 6 months ago* (last edited 6 months ago)

Though unfortunately (or I guess for most use-cases fortunately) you can't find the malicious m4/build-to-host.m4 file on there afaik. The best way to find that now, should you really want to, is by looking through the commit history of the salsa.debian.org/debian/xz-utils repository which is, as far as I understand it, the repository that the debian packages are built from and consequently also what the compromised packages were built from.

[–] TheFadingOne@feddit.de 5 points 8 months ago* (last edited 8 months ago)

If you use the GNU libc the feenableexcept function, which you can use to enable certain floating point exceptions, could be useful to catch unexpected/unwanted NaNs

[–] TheFadingOne@feddit.de 1 points 1 year ago

Don't forget to to set the "lower unpegged" flag for your door frames :)