this post was submitted on 30 Mar 2024
182 points (98.4% liked)

Linux

48220 readers
877 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
top 18 comments
sorted by: hot top controversial new old
[–] [email protected] 44 points 7 months ago (2 children)

Me: fixes exposure to vuln

Also me: grabs popcorn

This is going to be an interesting story once this all quiets down...

[–] [email protected] 50 points 7 months ago* (last edited 7 months ago) (2 children)

Gonna take a bit. The dudes been doing the releases for over a year, everything they touched is suspect now even if nothing earlier is known. Also some other associated accounts have been doing shady stuff too.

And that’s just one project that had a burnt out maintainer who welcomed some help from this guy. There are probably others. The hobby project becoming a core piece is a big issue.

[–] [email protected] 20 points 7 months ago

Yeah, it looks like that little Jenga block from the xkcd meme was XZ and a bunch of infrastructure is gonna have issues because of it.

[–] [email protected] 10 points 7 months ago (1 children)

Gonna take a bit. The dudes been doing the releases for over a year, everything they touched is suspect now even if nothing earlier is known. Also some other associated accounts have been doing shady stuff too.

gonna take even a bit more now. Github closed the account and project making it really difficult to see their commits and merges and analyze them.

[–] [email protected] 6 points 7 months ago (1 children)

Fixes exposure

It says F39 users are not affected. Are you running Rawhide/F40 Beta? p

[–] [email protected] 10 points 7 months ago

Running Arch, so not really exposed, but still had a compromised version installed.

[–] [email protected] 26 points 7 months ago* (last edited 7 months ago) (1 children)

Supply chain attacks are extremely cheap/easy and very effective, so get prepared for more of them in the future.

It really bothers me, that many companies make billions utilizing open source without contributing money/employees etc. to secure/supply/maintain supply chains.

[–] [email protected] 12 points 7 months ago (2 children)

This one might not have been that cheap. The malicious code was added by a maintainer on the project for two years. That is some patience

[–] [email protected] 7 points 7 months ago

Agreed. I am more speaking of 'in general', for example there was a supply chain attack on a widely used npm package by writing an email to the author of the npm package. There are other 'cheap' attacks like dependency confusion, typo squatting etc.

[–] [email protected] 2 points 7 months ago (1 children)

What about finding someone like this and then blackmailing them?

That would be cheaper

[–] [email protected] 3 points 7 months ago (1 children)
[–] [email protected] 1 points 7 months ago

Lol, too true. It's either that or honeytraps

[–] [email protected] 25 points 7 months ago (1 children)
[–] [email protected] 12 points 7 months ago

Happy it doesn’t affect stable versions

[–] [email protected] 3 points 7 months ago

Did they intentionally not put the package name in the headline just to draw more clicks? Ffs

[–] [email protected] 1 points 3 months ago

CVE-2024-3094 represents a serious security threat for Pokerogue Fedora Linux 40 and Rawhide users. Promptly updating your system and applying the necessary patches are crucial steps in mitigating this vulnerability.