Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 1 Apr 2024 15:31:13 +0200
From: Jakub Wilk <>
To: <>
Subject: Re: backdoor in upstream xz/liblzma leading to ssh
 server compromise

>The check whether the script is running on Linux was added in 5.6.1, 
>and the fact that it's repeated 5 times makes this pretty funny

There's yet another Linux check in stage 2:

    [ ! $(uname)="Linux" ] && exit 0

... but it doesn't work. (Note that spaces around the equals sign are 

Jakub Wilk

This e-mail may contain confidential or privileged information. If you 
are not the intended recipient (or have received this e-mail in error) 
please notify the sender immediately and destroy the universe.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.