The outage has hampered communication concerning a critical vulnerability that gives root.
See full article...
See full article...
Seems responsible if they (and other Linux vendors) can't mitigate quickly enough. Not great but better than the alternatives.There are times where I almost feel sorry for Ubuntu being a bit of a punching bag of the Linux community. Then there are times like right now.
Suck for the users a lot though.
I'd assume any mirror would have them?Is there a reliable alternative to Canonical's website to get checksums to validate ISOs? I downloaded one yesterday and now I'm suspicious.
I never understood why someone would trust the site providing the file to also provide the checksum when trying to determine if a file has been tampered with before it was served. Checksums should be hosted elsewhere with a different set of credentials required to update it than the credentials required to upload a new file.Is there a reliable alternative to Canonical's website to get checksums to validate ISOs? I downloaded one yesterday and now I'm suspicious.
An unrelated but similar axe I've been grinding recently is the sheer number of financial web sites that have two-factor authentication, with the second factor being a texted/emailed code, but if you need to reset your password all you need to do is get a texted/emailed code. If the second factor can be used to reset the first factor, it's really only one factor!I never understood why someone would trust the site providing the file to also provide the checksum when trying to determine if a file has been tampered with before it was served. Checksums should be hosted elsewhere with a different set of credentials required to update it than the credentials required to upload a new file.
That's like asking for two pieces of ID and counting the front and the back of a card separately.
While I agree, isn't that there some security / verification that can be done from the .gpg file? Or is that moot too because compromised is compromised.I never understood why someone would trust the site providing the file to also provide the checksum when trying to determine if a file has been tampered with before it was served. Checksums should be hosted elsewhere with a different set of credentials required to update it than the credentials required to upload a new file.
That's like asking for two pieces of ID and counting the front and the back of a card separately.
It's because checksums weren't originally intended to avert supply chain attacks. They were intended to allow the user to quickly verify integrity of large files downloaded over analog modem connections.I never understood why someone would trust the site providing the file to also provide the checksum when trying to determine if a file has been tampered with before it was served. Checksums should be hosted elsewhere with a different set of credentials required to update it than the credentials required to upload a new file.
That's like asking for two pieces of ID and counting the front and the back of a card separately.
I agree that it's not suitable for demonstrating that the file hasn't been tampered with before uploading. But I always thought the point was rather to check that it had downloaded correctly.I never understood why someone would trust the site providing the file to also provide the checksum when trying to determine if a file has been tampered with before it was served. Checksums should be hosted elsewhere with a different set of credentials required to update it than the credentials required to upload a new file.
That's like asking for two pieces of ID and counting the front and the back of a card separately.
You aren't supposed to blindly trust the checksum file. You're supposed to verify its signature first.I never understood why someone would trust the site providing the file to also provide the checksum when trying to determine if a file has been tampered with before it was served.
I definitely agree with this. It'd be great to have a "consensus checksum" service for well known files like this.An unrelated but similar axe I've been grinding recently is the sheer number of financial web sites that have two-factor authentication, with the second factor being a texted/emailed code, but if you need to reset your password all you need to do is get a texted/emailed code. If the second factor can be used to reset the first factor, it's really only one factor!
487f87faaf547ea30e0aba4d5b53346292571256b25333a978db1692bcee9dd2 *ubuntu-26.04-desktop-amd64.iso
dec49008a71f6098d0bcfc822021f4d042d5f2db279e4d75bdd981304f1ca5d9 *ubuntu-26.04-live-server-amd64.iso
96c7f5fb28a7fe28245331f9bfbe4375f18dd29a4850116ad3c4f60f6700c55c *ubuntu-26.04-wsl-amd64.wsl
Nah, you have it backward. The rollout of the kernel patch couldn't even be attempted because the people who published the exploit didn't even bother to notify the distros. QED, yes it was the disclosure that was botched.I think whether the disclosure was “botched” is a matter of opinion.
What was definitely botched was the rollout of the kernel patch by many distributions.
According to the article, it's just a DDOS attack coincidental to a somewhat overblown local-only privilege escalation attack.Hopefully this is just run-of-the-mill DDOS and not anything concerning with respect to Ubuntu releases. All my servers run Ubuntu and I would be royally screwed on any supply chain attack.
But what would you be validating against? A supply chain attack would result in valid ISO xsums.Is there a reliable alternative to Canonical's website to get checksums to validate ISOs? I downloaded one yesterday and now I'm suspicious.
There are many legitimate criticisms towards Canonical and Ubuntu, but I will always be thankful to them for getting me initiated with Linux systems back when I was a kid.There are times where I almost feel sorry for Ubuntu being a bit of a punching bag of the Linux community. Then there are times like right now.
Suck for the users a lot though.
I think you'd lose a lot of good money.Checkmarx, Bitwarden are recent supply chain attacks.
I’ll bet good money, future Ubuntu updates are going to be poisoned. That’s going to be a complete cluster-****
sudo apt upgrade // malware inbound!
Ideally the checksum file is signed with some PGP key that was widely available/verifiable.I never understood why someone would trust the site providing the file to also provide the checksum when trying to determine if a file has been tampered with before it was served. Checksums should be hosted elsewhere with a different set of credentials required to update it than the credentials required to upload a new file.
That's like asking for two pieces of ID and counting the front and the back of a card separately.
There were a number of complications with the disclosure. One of which is that the original POC was needlessly obfuscated by whatever means. Whether it was LLM written or deliberately obfuscated is left as an exercise to those skilled in unraveling code obfuscations. Tangentially, there are competitions for who can contrive the most obscured, but still functional, program code for just about any programming language. Second, while the upstream people were notified, the distributions mailing list wasn't, which is a much lower traffic list the Linux distributions and packagers follow, not necessarily the very high traffic LKML*. It's considered proper to notify both lists for major problems. Besides, it's not difficult to just notify Fedora/RedHat, Debian, Arch, and Canonical/Ubuntu (CC anyone?) thereby taking care of the vast majority of Linux users. Fedora would have coordinated with RedHat (or vice versa), Debian would have managed its downstream automatically, same with Arch, and Ubuntu. To say there are issues with how notification was handled, the notification text's obvious inaccuracies and bad grammar, and the obfuscated POC is an understatement.Nah, you have it backward. The rollout of the kernel patch couldn't even be attempted because the people who published the exploit didn't even bother to notify the distros. QED, yes it was the disclosure that was botched.
They also provide a GPG-signed list of the checksums so you can assure yourself that the checksums are accurate. (Get the signing key from the usual GPG key distribution sites.)I never understood why someone would trust the site providing the file to also provide the checksum when trying to determine if a file has been tampered with before it was served. Checksums should be hosted elsewhere with a different set of credentials required to update it than the credentials required to upload a new file.
That's like asking for two pieces of ID and counting the front and the back of a card separately.
So, I’m not in any way conversant on how these things work, but why would researchers release exploit code into the wild? This seems to be a common thing, but it makes no sense to me.Ubuntu and Canonical infrastructure went down hours after researchers released potent exploit code…
They got me into Linux as well...and their forum-support model was much of why I very quickly stopped using it and went elsewhere. That and their backporting breakage that made distro upgrading a thing almost as unreliable as Windows upgrading.There are many legitimate criticisms towards Canonical and Ubuntu, but I will always be thankful to them for getting me initiated with Linux systems back when I was a kid.
FWIW, a properly executed full compromise of the supply chain would also alter the information on getting a proper GPG key to compare against. PGP doesn't protect you against first instance impersonation, nor can it. The only way you can be sure a public key is real is to receive it from the hands of the person or representative of the organization it represents. That's is why it's not uncommon for people who believe this matters to meet up at places like computer conferences and exchange thumb drives with their public key to prevent just that kind of impersonation. How they can verify the other person really is in fact the person is, of course, dependent on the circumstance.They also provide a GPG-signed list of the checksums so you can assure yourself that the checksums are accurate. (Get the signing key from the usual GPG key distribution sites.)
e.g.
https://mirror.math.princeton.edu/pub/ubuntu-iso/resolute/SHA256SUMS.gpg
To light a metaphorical fire under ones ass to fix it.So, I’m not in any way conversant on how these things work, but why would researchers release exploit code into the wild? This seems to be a common thing, but it makes no sense to me.
It's "common" if the maintainer doesn't fix the issue in a reasonable amount of time. This requires the person finding the problem to discreetly report the problem to the maintainer to give them some time to release a fix. In this case, the reporter just released the proof-of-concept without warning.To light a metaphorical fire under ones ass to fix it.
That's why there are multiple keyservers, run by independent groups. One shouldn't be copy & pasting from the website, but rather using the key ID to check at least one extra server.FWIW, a properly executed full compromise of the supply chain would also alter the information on getting a proper GPG key to compare against. PGP doesn't protect you against first instance