Possibly linux@lemmy.zip to Linux@lemmy.mlEnglish · 8 months agoXZ backdoor in a nutshelllemmy.zipimagemessage-square142fedilinkarrow-up11.22Karrow-down110 cross-posted to: [email protected]
arrow-up11.21Karrow-down1imageXZ backdoor in a nutshelllemmy.zipPossibly linux@lemmy.zip to Linux@lemmy.mlEnglish · 8 months agomessage-square142fedilink cross-posted to: [email protected]
minus-squarePossibly linux@lemmy.zipOPlinkfedilinkEnglisharrow-up19arrow-down1·8 months agoI think we need focus on zero trust when it comes to upstream software
minus-squarejackpot@lemmy.mllinkfedilinkarrow-up2·8 months agoexactly, stop depending on esoteric libraries
minus-squarePossibly linux@lemmy.zipOPlinkfedilinkEnglisharrow-up1·8 months agoIt is fine to use them just know how they work and check the commit log. That of course requires you to pull from got instead of a tarball
minus-squarebillgamesh@lemmy.mllinkfedilinkarrow-up1·8 months agothis was well hidden. not sure anyone would have spotted this by checking commit log
minus-squarePossibly linux@lemmy.zipOPlinkfedilinkEnglisharrow-up1·8 months agoIt was hidden in the Tarball
minus-squarebillgamesh@lemmy.mllinkfedilinkarrow-up1·edit-28 months agoi’m not an expert, but my reading was that it was hidden in a binary used for testing EDIT: oh yeah, i see what you mean
I think we need focus on zero trust when it comes to upstream software
exactly, stop depending on esoteric libraries
It is fine to use them just know how they work and check the commit log.
That of course requires you to pull from got instead of a tarball
this was well hidden. not sure anyone would have spotted this by checking commit log
It was hidden in the Tarball
i’m not an expert, but my reading was that it was hidden in a binary used for testing EDIT: oh yeah, i see what you mean