• 1 Post
  • 51 Comments
Joined 3 years ago
cake
Cake day: March 25th, 2022

help-circle

  • Faresh@lemmy.mltoProgrammer Humor@programming.devof=/dev/sda
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    2 days ago

    echo and alias are both shell commands. If the shell is running (which it obviously still is), those commands should still work, as it does not involve reading data from disk, but from memory.

    Edit: I just noticed the picture said cd was not found, which is also a shell built-in. So, I don’t know.

















  • I wonder what sort of mitigations we can take to prevent such kind of attacks, wherein someone contributes to an open-source project to gain trust and to ultimately work towards making users of that software vulnerable. Besides analyzing with bigger scrutiny other people’s contributions (as the article mentioned), I don’t see what else one could do. There are many ways vulnerabilities can be introduced and a lot of them are hard to spot (especially in C with stuff like undefined behavior and lack of modern safety features) , so I don’t think “being more careful” is going to be enough.

    I imagine such attacks will become more common now, and that these kind of attacks could become very appealing for governments.