BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] Debian 12 in the Cloud
- Subject: [Discuss] Debian 12 in the Cloud
- From: markw at mohawksoft.com (markw at mohawksoft.com)
- Date: Mon, 3 Jun 2024 08:58:02 -0400
- In-reply-to: <20240602104210.4165888d.Richard.Pieri@gmail.com>
- References: <a09a4ca0-bfc8-4c5c-ad30-e307be9e2cc1@borg.org> <f840e62cb5c88c336909575f0acc5365.squirrel@mail.mohawksoft.com> <20240601230337.2a901446@mydesk.domain.cxm> <20240602104210.4165888d.Richard.Pieri@gmail.com>
> And this is all entirely irrelevant to the XZ supply chain attack, > because the backdoor isn't in the source code. It's in the test > harness. If you used 'git clone' then you would never see it because > the payload was excluded by the .gitignore file. You had to use the > tarball, and you had to build under specific conditions, for the > payload to be injected into the source at build time. This is exactly right. The xz code was identified as something that could be attacked. This wasn't script kiddies finding a vulnerability, the was a concerted attack on infrastructure. They didn't FIND a vulnerability, they CREATED it. I don't believe that it is a systemd thing at all but a new strategy of which we all have to be aware for all of our projects. When you fork() and execute code, what is in your process space that can be capitalized upon? What is in all those seemingly trusted thirdparty libraries we use all the time? Like it or not, computers are far far bigger and more complex. It is almost impossible to know everything that they are doing. They are no longer embedded devices with 4K proms and 256 bytes of RAM, today, computers are bigger than anything we ever could have accessed 20 years ago. Just writing email, my computer has 658 processes running and doing stuff. I can track down what each is doing, sure. Then I would need to download all the source code and inspect all that. Then I would need to inspect the build system. Then I would need to inspect and try to follow the M4 nonsense. See what I'm saying? No one knows it all. That's how the xz vulnerability was created. > -- > \m/ (--) \m/ > _______________________________________________ > Discuss mailing list > Discuss at driftwood.blu.org > https://driftwood.blu.org/mailman/listinfo/discuss >
- References:
- [Discuss] Debian 12 in the Cloud
- From: slitt at troubleshooters.com (Steve Litt)
- [Discuss] Debian 12 in the Cloud
- From: richard.pieri at gmail.com (Rich Pieri)
- [Discuss] Debian 12 in the Cloud
- Prev by Date: [Discuss] Debian 12 in the Cloud
- Next by Date: [Discuss] Debian 12 in the Cloud
- Previous by thread: [Discuss] Debian 12 in the Cloud
- Next by thread: [Discuss] Debian 12 in the Cloud
- Index(es):