Saturday, 2024-03-30

fricklerbig warning to all people running debian sid or fedora 41 https://boehs.org/node/everything-i-know-about-the-xz-backdoor (and also to the community in general I guess)07:33
fungifrickler: also opensuse tubmleweed as clark discovered yesterday14:27
fungibut yeah, i've been following the oss-security ml thread from the moment the disclosure came through14:29
NeilHanlonlooks like it is even wider than xz ... there's at least some badness in libarchive, too .... https://github.com/libarchive/libarchive/pull/1609#issuecomment-202812558416:22
fungias much doom-n-gloom as is going around about this, i see the rapid identification, response and open dialogue as a major win for open source. these kinds of agent-saboteur developer tactics are relatively commonplace in the proprietary software world, it just doesn't get talked about. it's comparatively harder to pull off in the open, as this incident demonstrates16:35
NeilHanlonfungi: 100% agree. Things have come a **long** way since, say, Heartbleed.17:30
fungithe example i liken it to is the juniper vpn backdoor. a government agent applied for a job there, got themselves onto the dev team responsible for the gateway software, and quietly added a backdoor right under their noses. it got shipped to numerous organizations all over the world and was presumably exploited for years in production, then when it was discovered the company was pressured to17:43
fungisit on and cover it up17:43
fungibut with commercial software there are even easier ways, e.g. the crypto ag route where a company just gets completely replaced by government agents and ships malware to unwary customers for decades so it can spy on them17:49
fungior inslaw/promis where a government targets a domestic software product in use for sensitive tasks by other governments, forces it into bankruptcy and hands it over to people who are secretly on their payroll17:52
NeilHanlonyep17:59

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!