|
Message-ID: <20240401133113.6iym7uncf2rjoeql@jwilk.net> Date: Mon, 1 Apr 2024 15:31:13 +0200 From: Jakub Wilk <jwilk@...lk.net> To: <oss-security@...ts.openwall.com> Subject: Re: backdoor in upstream xz/liblzma leading to ssh server compromise >The check whether the script is running on Linux was added in 5.6.1, >and the fact that it's repeated 5 times makes this pretty funny There's yet another Linux check in stage 2: [ ! $(uname)="Linux" ] && exit 0 ... but it doesn't work. (Note that spaces around the equals sign are missing.) -- Jakub Wilk This e-mail may contain confidential or privileged information. If you are not the intended recipient (or have received this e-mail in error) please notify the sender immediately and destroy the universe.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.