- cross-posted to:
- security@programming.dev
- cross-posted to:
- security@programming.dev
Aqua Nautilus researchers have identified a security issue that arises from the interaction between Ubuntu’s command-not-found package and the snap package repository. While command-not-found serves as a convenient tool for suggesting installations for uninstalled commands, it can be inadvertently manipulated by attackers through the snap repository, leading to deceptive recommendations of malicious packages.
Wait… Snap packages aren’t manually verified? Why Canonical? Doesn’t every other Linux package manager have their main packages repository manually vetted?
Neither Canonical"s Snapstore, nor Flathub manually verify apps. They’re both similar to the Play Store or App Store where it’s managed by the app developer.
For Flathub there are verified apps though, which are confirmed to be by the original developer.
Snap store does similar I believe
yeah, but i can still make a Github Repo for Firefoxx and be Verified on Flathub, even though i am masquerading as Firefox. That’s not the Problem.
Since you need to pass a manual review during initial submission of the app, no, you can’t
A fake malware password manager made it on to Apple’s app store, passed manual review. Manual reviews are not bulletproof
That’s still not the same as impersonating a known app or developer though
That’s exactly what they did, imitated lastpass or something
And why does Apple’s process say something about Flathubs process?
Flathub has manual reviews during initial submission though. Also they’re working on automatically needing a manual review when e.g. new permissions are granted to apps