[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] backdoor in upstream xz/liblzma leading to ssh server compromise
From:       Jakub Wilk <jwilk () jwilk ! net>
Date:       2024-04-01 13:31:13
Message-ID: 20240401133113.6iym7uncf2rjoeql () jwilk ! net
[Download RAW message or body]

>The check whether the script is running on Linux was added in 5.6.1, 
>and the fact that it's repeated 5 times makes this pretty funny

There's yet another Linux check in stage 2:

    [ ! $(uname)="Linux" ] && exit 0

... but it doesn't work. (Note that spaces around the equals sign are 
missing.)

-- 
Jakub Wilk

This e-mail may contain confidential or privileged information. If you 
are not the intended recipient (or have received this e-mail in error) 
please notify the sender immediately and destroy the universe.
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic