oss-sec mailing list archives

Re: Malicious commits to Linux kernel as part of university study


From: Peter Bex <peter () more-magic net>
Date: Thu, 22 Apr 2021 11:59:45 +0200

On Thu, Apr 22, 2021 at 11:44:49AM +0200, Albert Veli wrote:
Supply chain attacks are a real threat to open source projects.

Absolutely, see also the recent malicious commits to the PHP project
which were injected through some security vulnerability in their git
server as just another example.

The Linux kernel is not the easiest way to introduce malicious commits.
But other projects like much used pip python modules, npm javascript
modules and ruby gem modules might be less vetted before they accept
commits and that is a serious risk.

Indeed.  My reason for posting was as a heads up to developers so they
can be extra vigilant for bad patches *from this particular group*.
But one should in general always be on the lookout, of course, because
commits might also just accidentally introduce security issues.

Cheers,
Peter

Attachment: signature.asc
Description:


Current thread: