Shut down the ability to distribute fake "source code" in releases #116557
Unanswered
AngryLoki
asked this question in
Code Security
Replies: 1 comment 2 replies
-
AFAIK the autogenerated source tarballs are missing git submodules, without which many projects won't build at all, so for these projects the autogenerated source tarballs are useless even if they are guaranteed to keep the same hash forever. |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Select Topic Area
General
Body
Hi Team,
Earlier on on github.blog it was announced that
Unfortunately, this decision caused probably the biggest supply chain attack in the history known as XZ Utils backdoor.
This attack was multistage, but in reality only one step was important - ability to distribute modified blob with seemingly autogenerated code, which was patched manually. The other changes didn't make any difference. When JiaT75 uploaded modified archive, the whole security model was broken and all other ifunc or landlock-related changes could be patched directly in archive.
From this point of view, the timeline of attack was:
GitHub's actions had a significant impact on the success of this attack. In my opinion, this cannot go unanswered. I would like to ask the GitHub team to publish a response post to this attack, with these key points:
In the end, any appearance of some arbitrarily attached archive with supposedly autogenerated source code should be subconsciously rejected by all maintainers, thus generating a responsible attitude to security and stopping such attacks at the root.
Thank you in advance!
Beta Was this translation helpful? Give feedback.
All reactions