WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2024 Poal.co

585

Article focuses on Fedora, but this obviously impacts any Linux distro with these packages installed so, time to update.

Article focuses on Fedora, but this obviously impacts any Linux distro with these packages installed so, time to update.

(post is archived)

[–] 1 pt

The xz GitHub repo (github.com) is currently disabled, so unless you already have your own clone you can’t see who authored the offending commit (github.com).

I’m curious who it was. Their commits to the repo were not hard to get past review. All they did was add some binary test files, which is normal for that project. The question is how was this person able to gain access to the build process to inject the script that enabled the exploit?

This could raise questions about the security of open source projects. Some of them have little support and funding and will take contributions from anyone.