452
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 31 Mar 2024
452 points (98.3% liked)
Open Source
31077 readers
740 users here now
All about open source! Feel free to ask questions, and share news, and interesting stuff!
Useful Links
- Open Source Initiative
- Free Software Foundation
- Electronic Frontier Foundation
- Software Freedom Conservancy
- It's FOSS
- Android FOSS Apps Megathread
Rules
- Posts must be relevant to the open source ideology
- No NSFW content
- No hate speech, bigotry, etc
Related Communities
- !libre_culture@lemmy.ml
- !libre_software@lemmy.ml
- !libre_hardware@lemmy.ml
- !linux@lemmy.ml
- !technology@lemmy.ml
Community icon from opensource.org, but we are not affiliated with them.
founded 5 years ago
MODERATORS
Source: https://infosec.exchange/@fr0gger/112189232773640259
Imagine finding a backdoor within 45 day of it's release into a supply chain instead of months after infection. This is a most astoundingly rapid discovery.
Fedora 41 and rawhide, Arch, a few testing and unstable debian distributions and some apps like HomeBrew were affected. Not including Microsoft and other corporations who don't disclose their stack.
What a time to be alive.
Source: https://turnoff.us/
Arch was never affected, as described in their news post about it. Arch users had malicious code on their hard disks, but not the part that would have called into it.
Before resting on our laurels, we should consider it's possible it's more widespread but just not being disclosed until after it's patched.
It would be wise to be on the lookout for security patches for the next few days.
Consider this the exception to the rule. There's no reason we should assume this timeline is the norm.
True. Though remarkable is still remarkable.
Notably, the timeline post-discovery is still stellar, regardless of Microsoft/GitHub cock-blocking analysis.
Disguising the virus as a corrupted test file then 'uncorrupting' it is crazy