Announcement

Collapse
No announcement yet.

XZ Struck By Malicious Code That Could Allow Unauthorized Remote System Access

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Originally posted by avis View Post
    Whereas big corporations such as Microsoft, Google or Apple endorse every line of code that reaches you as a customer
    Hah, that's such a big assumption, so they just... read over the source code if any random app you download from the internet huh? There are no viruses at all on their systems huh?

    Not even the ones made by themselves?

    This is a riot, now you're not wrong about this being a problem. Nobody really has time to read every single line of code for every single program in their computer. We might be able to get AI to do it at some point, but AI will always be fallible, maybe less fallible than uss, but fallible still.

    As things stand though, because linux distros almost entirely rely on open source packages, every single user has equal opportunity to find out about things like this, and when they do it gets reported, and it's as we see, so we all had compromised systems for 3-4 weeks? Sure, but at least it was only 3-4 weeks and not 'until you install something else than windows'.

    Comment


    • Originally posted by wooptoo View Post


      Actually an Arch Linux maintainer noticed the discrepancy between the git source code and the distributed tarballs, and introduced this change a day before this exploit was publicly announced.

      The reason for this was because Arch Linux is currently working on making all packages reproducible, which lets users verify the distributed packages from Arch Linux.

      This is precisely the sort of issue reproducible builds can prevent: https://reproducible-builds.org

      edit: https://reproducible.archlinux.org
      Yeah I saw the commit from the day before, but I don't buy it. Security teams usually know this kind of issues in advance and I find the coincidence pretty convenient to be a chance. By the way Arch wasn't even vulnerable in the first place because it doesn't patch sshd for libsystemd.
      ## VGA ##
      AMD: X1950XTX, HD3870, HD5870
      Intel: GMA45, HD3000 (Core i5 2500K)

      Comment


      • Originally posted by Keats View Post

        You didn't ask for Microsoft's software, you asked for software they were distributing.
        By the same token you can make an argument that Google/Apple/MS distribute malware via their App Stores. No, that's not what I meant and if I didn't make myself clear at first, I'll make it clear now: I only meant software which is developed, distributed publicly and signed by these three companies.

        "Distributed publicly" is also quite important. I can imagine all three companies have security researchers/engineers who have written exploits/malware/viruses just for fun and for testing purposes.

        Originally posted by smitty3268 View Post

        They shipped a CD back in the mid-90s with malware on it.
        Here's the full story: https://grahamcluley.com/microsoft-stab-macro-viruses/ https://www.cnet.com/deals/the-88-be...ill-remaining/

        Not really malware, more like a stupid joke perhaps from someone who was heavily reprimanded. I'm still thankful you've unearthed it as I never knew about it. It was back from the time when the Internet wasn't yet a thing.

        Here we are talking about a freaking backdoor to access a system remotely.
        Last edited by avis; 30 March 2024, 04:23 AM.

        Comment


        • Originally posted by avis View Post

          By the same token you can make an argument that Google/Apple/MS distribute malware via their App Stores. No, that's not what I meant and if I didn't make myself clear at first, I'll make it clear now: I only meant software which is developed, distributed publicly and signed by these three companies.

          "Distributed publicly" is also quite important. I can imagine all three companies have security researchers/engineers who have written exploits/malware/viruses just for fun and for testing purposes.
          Linux distribution also did not develop xz.

          Comment


          • Originally posted by LightBit View Post

            Linux distribution also did not develop xz.
            Linux distributions do not develop anything by the same token. Except very special ones like RHEL. It's 100% orthogonal to this discussion.

            XZ is included by default and is an essential/integral part of the vast majority of Linux distros. You can say it's Linux software.

            Comment


            • Originally posted by HEL88 View Post




              https://www.google.com/search?q=wind...h+after+update
              "windows crash after update" - 160 mln

              https://www.google.com/search?q=linu...h+after+update
              "Linux crash after update" - 52 mln

              https://www.google.com/search?q=maco...h+after+update
              "macos crash after update" - 41 mln


              Windows has 72% market share, Linux has 4%, MacOS 15%.
              Desktop Operating System Market Share Worldwide | Statcounter Global Stats



              Linux has only 4% market share. Linux is 18 times less popular than Windows, but people only ask the "crash after update" question 4 times less often.



              Eat this. Statistics are merciless for your Linux.

              And you only know how to give links without sense and without context.​
              You have to also consider there are much more Windows users that are not tech savy and do not even know how to Google for solution. They might not even know updates were installed.

              Many Linux users are essentially running development versions on custom configuration that is not even possible on Windows.

              Comment


              • Originally posted by avis View Post

                Linux distributions do not develop anything by the same token. Except very special ones like RHEL. It's 100% orthogonal to this discussion.
                By your definition Linux distributions are not responsible for any backdoor, if they did not develop it.

                Comment


                • Originally posted by LightBit View Post

                  By your definition Linux distributions are not responsible for any backdoor, if they did not develop it.
                  XZ is distributed directly by Linux distros.

                  We are dealing with a major compromise which could have affected the vast majority of distros, if it hadn't been discovered by a Microsoft engineer, and you're talking as if "XZ is not part of Linux distors and it's not a fucking issue". Great. No idea what you're arguing about but you have won.

                  Meanwhile I've left my proposal for Fedora: https://pagure.io/fesco/issue/3185 I'm sure it will be swept under the rag: "Not our issue/not enough resources/no one cares".

                  Comment


                  • Originally posted by novideo View Post

                    Now that's terrifying


                    I wouldn't say that, it seems that avis/biride genuinely has different values and viewpoints than we do. He is often aggressive, arrogant, and/or stubborn, but his posts seem to contain some intellect unlike sophisticles's. sophisticles is definitely a troll though.
                    sophisticles is avis' sock puppet.

                    Comment


                    • Originally posted by avis View Post

                      XZ is distributed directly by Linux distros.
                      So it must be (developed and distributed and signed off) or just distributed "directly"?

                      I'm sure you will keep changing rules so that Microsoft never had backdoor and backdoors are limited to open source.

                      No proof of backdoor in Windows does not proof there is no backdoor in Windows.

                      It would be best to assume everything is potentialy backdoored.

                      Comment

                      Working...
                      X