|
|
Message-ID: <20240401133113.6iym7uncf2rjoeql@jwilk.net>
Date: Mon, 1 Apr 2024 15:31:13 +0200
From: Jakub Wilk <jwilk@...lk.net>
To: <oss-security@...ts.openwall.com>
Subject: Re: backdoor in upstream xz/liblzma leading to ssh
server compromise
>The check whether the script is running on Linux was added in 5.6.1,
>and the fact that it's repeated 5 times makes this pretty funny
There's yet another Linux check in stage 2:
[ ! $(uname)="Linux" ] && exit 0
... but it doesn't work. (Note that spaces around the equals sign are
missing.)
--
Jakub Wilk
This e-mail may contain confidential or privileged information. If you
are not the intended recipient (or have received this e-mail in error)
please notify the sender immediately and destroy the universe.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.