- cross-posted to:
- netsec@lemmy.world
- cross-posted to:
- netsec@lemmy.world
Aqua Nautilus researchers have identified a security issue that arises from the interaction between Ubuntu’s command-not-found package and the snap package repository. While command-not-found serves as a convenient tool for suggesting installations for uninstalled commands, it can be inadvertently manipulated by attackers through the snap repository, leading to deceptive recommendations of malicious packages.
That’s exactly what they did, imitated lastpass or something
And why does Apple’s process say something about Flathubs process?
Example of strict manual reviews including source code not catching malware masquerading as existing reputable software, it’s the exact same scenario minus Apple being a commercial entity. Goes to show that even when commercial interests are at stake to keep these malicious apps out, they can still get in. It’s just demonstrating manual reviews aren’t a 100% bulletproof solution, the commenter was saying it’s not possible for malware to get past manual review
This isn’t the point of the review. Verified apps only say this is the application as offered by the original vendor.
If the original vendor were to bundle malware, then that’s a bad vendor, but still verified official software. Not that I actually think this will happen. Most user install malware such as Discord willingly. /j