this post was submitted on 30 Mar 2024
986 points (98.5% liked)

linuxmemes

21009 readers
2558 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.

  • Please report posts and comments that break these rules!

    founded 1 year ago
    MODERATORS
     
    you are viewing a single comment's thread
    view the rest of the comments
    [–] recapitated 104 points 6 months ago (3 children)

    The xz infiltration is a proof of concept.

    Anyone who is comforted by the fact they're not affected by a particular release is misguided. We just don't yet know the ways in which we are thoroughly screwed.

    [–] BURN 20 points 6 months ago (2 children)

    This is a huge wake up call to OSS maintainers that they need to review code a lot more thoroughly. This is far from the last time we’re going to see this, and it probably wouldn’t have been caught if the attacker hadn’t been sloppy

    [–] [email protected] 28 points 6 months ago* (last edited 6 months ago) (2 children)

    https://upvote.au/comment/818245

    Nah, I'd say the chap was pretty unsloppy.
    Just that we were lucky that someone found it.

    It's a good thing that xz is a type of program that people may want to profile.

    But this is an eye opener for people saying that Linux is "secure" (not more secure, but just secure .) because the code has many eyes on it. --> jump to digression.

    This confirms my suspicion that we may be affected by the bystander effect, so we actually have less eyes than required for this.


    digression:

    • of course I don't mean that this makes Linux less secure than Windows. The point that it makes it more secure than Windows/MacOS or other closed source systems is already apparent.
      • Just that, we can't consider Linux to be secure (without comparing it to something less secure) as many ppl would, when evangelising Linux.

    My point being, tell the whole truth. The newbie that's taking your advice will thank you for that later on.

    [–] BURN 15 points 6 months ago (1 children)

    The reason I consider this sloppy is because he altered default behavior. Done properly, an injection like this probably could have been done with no change to default behavior, and we’d be even less likely to have gotten lucky.

    Looking back we can see all the signs pointing to it, but it still took a lot of getting lucky to find it.

    I’ve always considered the “source is open so people can check for vulnerabilities” saying a bit ironic, because I’d bet 99% of us never look, nor could find it if we were looking. The bystander effect is definitely here as we all just assume someone else has audited it.

    [–] [email protected] 3 points 6 months ago

    Done properly, an injection like this probably could have been done with no change to default behaviour,

    Interesting.
    So the sloppiness was in the implementation and not the social engineering.
    But then of course, people tend to be not good at both, fooling people and fooling programmers/computers at the same time. In this case, the chap turned out to be better at fooling people than programmers/computers.


    And I am being sloppy for not trying to learn enough about exploits even though I should have a good enough programming base to start it.

    [–] Theharpyeagle 5 points 6 months ago (1 children)

    It's a rough balance when you're trying to convince people unfamiliar with the internals (let alone non technical people) to make the switch. Saying "Linux is safe, but not bulletproof" may scare them back to the devil they know even if there's no greater guarantee of safety there.

    [–] [email protected] 1 points 6 months ago* (last edited 6 months ago)

    Of course, maybe I am being too hard on people by expecting everyone to put more thought into everything they make a decision for. But it is in fact the lack of thought that tends to cause problems in all areas we see nowadays.
    But that's a topic for somewhere else.


    We can simply go by "Linux is more bulletproof than Windows"; instead of calling it "safe", which would also be wrong.
    Also with, "Windows will shoot you with intent, Linux might just get some stray shrapnel."

    [–] recapitated 3 points 6 months ago

    And to have strong and continuous analysis of software bills of materials.

    [–] [email protected] 6 points 6 months ago (2 children)

    I'm just waiting for the backdoor to be found in Firefox and Chromium or some library shared by most applications.

    [–] [email protected] 5 points 6 months ago

    Like libwebp a few months back? Or Log4j?

    [–] Gabu 2 points 6 months ago

    The thing about browsers is that there are so many accidental exploits already, it makes little sense to introduce your own on top of it.

    [–] [email protected] -2 points 6 months ago

    I always just assumed all the distros I use have backdoors as a fact of life. I take comfort in not being a person of interest to anyone and just blend in with the crowd. I also don't use windows because for every backdoor my Debian may have, windows will have 100 more. Servers don't get hacked all the time because it is not linux->internet, it is linux->bunch of stuff->internet, but I am sure backdoors are there.