-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Publish hash and signature of the compromise version for detection #5
Comments
According to Rapid7's blog, the MD5 hash of the compromised version is 1e26d9dd3110af79a9595f1a77a82de7 |
@FQuen is correct... tainted file's md5sum is 1e26d9dd3110af79a9595f1a77a82de7. |
does anyone have a md5 for the corresponding non-tainted version? the version i d/l'd on 1/14 does not match the above, but i'd feel much more secure knowing that it does match the clean version. |
@bbaald history of good hashes is visible here -- https://gist.github.com/ashnazg/f40be76c05da965bc749c914828c0dba Your |
@ashnazg many thanks. FWIW if anyone wants a forensic data point, my 1/14 download is A-OK. |
Hey,
Is it possible to publish the hashes and signature of the tainted version for detection. If you have any other idea for easy detection it would be great.
Thanks!
The text was updated successfully, but these errors were encountered: