587
submitted 7 months ago by davel@lemmy.ml to c/opensource@lemmy.ml
you are viewing a single comment's thread
view the rest of the comments
[-] KillingTimeItself@lemmy.dbzer0.com 13 points 7 months ago

as a non developer myself, to my understanding, the vulnerabilities were implemented in test binaries?

If so, i question why those were shipped to the client. Unless they were built into the package itself on the mirror, in which case, still curious as to why that would be. I would think tests are entirely benign and do nothing. Seems like it would be incredibly bad practice to do otherwise?

Seems like an obvious vector to shutdown any potential fuckery. But what do i fucking know.

[-] tomalley8342@lemmy.world 24 points 7 months ago

The compile process was modified to decrypt and unpack the "corrupted" test zip file, which was actually a code patch, and apply said code patch before assembly of the final binaries.

[-] KillingTimeItself@lemmy.dbzer0.com 1 points 7 months ago

hmm ok. Yeah idk, even from an organization aspect, i still wouldn't consider that to be ok. Test files that patch code on the fly is a recipe for a nightmare of maintenance. Which i suppose is the idea here considering that it's malicious code lol.

[-] ReversalHatchery@beehaw.org 20 points 7 months ago

They were not shipped to the client. They were shipped to the build system, executed there after deobfuscation, and they inserted an additional, opaque program file into the build process.

[-] KillingTimeItself@lemmy.dbzer0.com 1 points 7 months ago

that much i picked up on, though i didn't make it very clear. I did mention that alternative though.

[-] Fave@lemmy.world 18 points 7 months ago* (last edited 7 months ago)
[-] KillingTimeItself@lemmy.dbzer0.com 1 points 7 months ago

i know it's rather involved, i've been tailing it from the sidelines, though like i said, i am not a developer, so in terms of code and maintaining code im blind there. But everything else i understand.

It's definitely an interesting situation to observe.

[-] ksynwa@lemmygrad.ml 5 points 7 months ago

It's common to bundle test artefacts with the release tarballs. The reason is that when Linux distributions build the software from the tarballs, they often run the tests to ensure that they pass.

this post was submitted on 31 Mar 2024
587 points (97.6% liked)

Open Source

31358 readers
90 users here now

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

founded 5 years ago
MODERATORS