Checker for CVE-2024-3094 where malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code.
[4.0K] /data/pocs/4e89e98d2b97d1b61b8890678a31d60d52edf670
├── [2.6K] readme.md
└── [4.1K] xz-utils-vuln-checker.sh
0 directories, 2 files