- cross-posted to:
- news@lemmy.linuxuserspace.show
- cross-posted to:
- news@lemmy.linuxuserspace.show
Aqua Nautilus researchers have identified a security issue that arises from the interaction between Ubuntu’s command-not-found package and the snap package repository. While command-not-found serves as a convenient tool for suggesting installations for uninstalled commands, it can be inadvertently manipulated by attackers through the snap repository, leading to deceptive recommendations of malicious packages.
For Flathub there are verified apps though, which are confirmed to be by the original developer.
Snap store does similar I believe
yeah, but i can still make a Github Repo for Firefoxx and be Verified on Flathub, even though i am masquerading as Firefox. That’s not the Problem.
Since you need to pass a manual review during initial submission of the app, no, you can’t
A fake malware password manager made it on to Apple’s app store, passed manual review. Manual reviews are not bulletproof
That’s still not the same as impersonating a known app or developer though
That’s exactly what they did, imitated lastpass or something
And why does Apple’s process say something about Flathubs process?
Example of strict manual reviews including source code not catching malware masquerading as existing reputable software, it’s the exact same scenario minus Apple being a commercial entity. Goes to show that even when commercial interests are at stake to keep these malicious apps out, they can still get in. It’s just demonstrating manual reviews aren’t a 100% bulletproof solution, the commenter was saying it’s not possible for malware to get past manual review
This isn’t the point of the review. Verified apps only say this is the application as offered by the original vendor.
If the original vendor were to bundle malware, then that’s a bad vendor, but still verified official software. Not that I actually think this will happen. Most user install malware such as Discord willingly. /j