[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: Re: [oss-security] backdoor in upstream xz/liblzma leading to ssh server compromise
From: Jakub Wilk <jwilk () jwilk ! net>
Date: 2024-04-01 13:31:13
Message-ID: 20240401133113.6iym7uncf2rjoeql () jwilk ! net
[Download RAW message or body]
>The check whether the script is running on Linux was added in 5.6.1,
>and the fact that it's repeated 5 times makes this pretty funny
There's yet another Linux check in stage 2:
[ ! $(uname)="Linux" ] && exit 0
... but it doesn't work. (Note that spaces around the equals sign are
missing.)
--
Jakub Wilk
This e-mail may contain confidential or privileged information. If you
are not the intended recipient (or have received this e-mail in error)
please notify the sender immediately and destroy the universe.
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic