MJJ出征
9.41K subscribers
5.95K photos
3.34K videos
37 files
7.01K links
Download Telegram
关键词识别很厉害🤔

左边这位吉利老板,右边这位新东方老板。🥸
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
😁8🤣61🤡1
看来昨天卖的不错
🤡4👍1
No.2
👏8👍2🎉2🤡2😁1
🐳2🤡1
彻底干掉alibabaprotect这个逼

毫无用处,占用资源还监控我文件。
太流氓了,静悄悄偷吃CPU内存就算了,MD我删除个文件(非alibaba的关联)说我被占用,过分了。我删个非关联文件你还说我占用那就离谱了😡
年初装个旺旺就给我恶心这玩意。🌚

处理方案:
https://www.zhihu.com/question/66806851/answer/2648426483
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
😁13👍6🤡5💊1
🥰22🤡4👎1👌1💊1
#安全通知
关联漏洞
https://t.me/wearemjj/6699

TL;DR
用 ArchLinux / macOS / 追新系统版本 的可能需要关注下

有一个 Linux 系统级别的漏洞已公布,该漏洞可让攻击者无需通过 SSH 验证即可登录服务器执行任意代码

Debian/Ubuntu 的检查命令:
apt list --installed 2>&1 | grep xz | grep -E '5.6.0|5.6.1' && echo "Check your system now" || echo "Everything is ok"

macOS 的检查命令:
brew info xz | grep xz | grep -E '5.6.0|5.6.1' && echo 'Check your system now' || echo 'Everything is ok'

* 显示 Everything is ok 即不受影响

如何修复:
降级 xz-utils 即可

macOS 修复:
brew install xz

相关链接:
https://avd.aliyun.com/detail?id=AVD-2024-3094 (中文)
https://nvd.nist.gov/vuln/detail/CVE-2024-3094
https://www.helpnetsecurity.com/2024/03/29/cve-2024-3094-linux-backdoor/
文本来源
🤡8😱3❤‍🔥1👍1😁1