72
submitted 5 months ago by possiblylinux127@lemmy.zip to c/linux@lemmy.ml
top 18 comments
sorted by: hot top controversial new old
[-] jqubed@lemmy.world 30 points 5 months ago

WARNING: Global themes and widgets created by 3rd party developers for Plasma can and will run arbitrary code. You are encouraged to exercise extreme caution when using these products.

On the one hand, if any commercial store put out a statement like this and did no vetting of submitted applications people would (rightly) be up in arms. But on the other, this is pretty much the standard with FOSS, right? Unless you’re paying for a supported commercial license from someone like Red Hat, everything is as-is, without warranty, caveat emptor. The power of open source is that anyone can review the code and look for problems or malicious behavior, but also (especially with smaller projects) there’s no guarantee that anyone else has looked at the code. So is it a best practice with Linux and FOSS to run a system backup before installing any software or update? I mean I guess that’s technically true for any OS, but especially for open source?

[-] floofloof@lemmy.ca 45 points 5 months ago

Users are probably aware of that with most software. But for something called a "theme", we're used to expecting it to be a bunch of non-executable resources. I'm sure I wasn't the only one who gave it no thought and made this assumption, since it applies almost everywhere else we see themes.

[-] oo1@kbin.social 10 points 5 months ago

Yeah 100%.
They should be given a more threatening name.

Maybe the word "global" is supposed to invoke fear (maybe it does for people who review shonky c++ code a lot).
But I don't think that is so for most people.
Better to call them "High risk unofficial theme" or something to prompt people to read the small print.

[-] henfredemars@infosec.pub 11 points 5 months ago* (last edited 5 months ago)

In my mind, it's more like a library of scripts. Scripts are powerful and could potentially do anything, and it would be wise to not run these scripts arbitrarily without reviewing them first or having some other trust basis you can rely upon.

For example, I don't think you're expected to review all open source software on your system. It's much easier to instead trust a group of people with high visibility, such as the core Debian developers, and proceed to exercise graduated caution according to the likelihood that the code has been reviewed. You probably don't need to review the Linux kernel. When it comes to random widgets and themes off the internet, it's easy to encounter code that has never been reviewed.

I think there is such a thing as a risk tolerance. You can't build a completely trust-free computer. For practical and economic reasons, you're going to have to trust somebody. I think the optimal strategy is to be smart about who you're trusting and where you're focusing your limited resources to review. Popular Debian packages? Probably safe. Widget by person you've never heard of that nobody else uses? Probably risky.

If this makes you feel uncomfortable, I suggest that a person takes a few moments to review their threat model. What kinds of attacks are you worried about? What costs are you willing to pay to mitigate these attacks?

[-] possiblylinux127@lemmy.zip 4 points 5 months ago

I would just be mindful of independently generated content. A backup will not help you if your computer is in a bot net

[-] jqubed@lemmy.world 9 points 5 months ago

Why would a backup not help with a bot net? Shouldn’t rolling the computer back to its state before installing the malware remove it? (This is a genuine question; I’ve had very little exposure to actually using Linux but am interested and will probably install it on a machine someday)

[-] imecth@fedia.io 9 points 5 months ago* (last edited 5 months ago)

Botnets work as background malware, most people never realize they're infected, as opposed to in your face malware like ransomware.
Backups are only relevant for malware if you can pinpoint when the malware was installed and the backups aren't compromised.

[-] possiblylinux127@lemmy.zip 4 points 5 months ago

You would need to know your infected

[-] d3Xt3r@lemmy.nz 3 points 5 months ago

So is it a best practice with Linux and FOSS to run a system backup before installing any software or update? I mean I guess that’s technically true for any OS, but especially for open source?

Being opensource doesn't make backups an extra special requirement. Backups should be considered a compulsory, non-optional thing these days, regardless of your choice of OS. I mean, your device could crash or fail, get stolen, get damaged, get hit by crypto - anything is possible. Being opensource or not makes little difference to the question "is it best practice to backup".

[-] pastermil@sh.itjust.works 15 points 5 months ago

As a big fan of KDE Plasma, I feel like this is a huge blunder on their side, and am rather disappointed. I do hope they can move forward learning from this.

[-] possiblylinux127@lemmy.zip 3 points 5 months ago

I wonder if it applies to GNOME extensions

[-] pastermil@sh.itjust.works 2 points 5 months ago

Haven't heard anything like that. Doesn't mean for sure it's not there, but if it is we would've heard of it, considering how popular GNOME is.

[-] possiblylinux127@lemmy.zip 0 points 5 months ago

If KDE can have it gnome certainly can

[-] pastermil@sh.itjust.works 3 points 5 months ago

In theory: yes.

In practice: depends on how things are implemented

The jump from v5 to v6 is quite a big one. It is understandable things can fall thru the cracks.

Nevertheless, allowing themes (especially of unknown source) to execute arbitrary code is never a good idea.

[-] merthyr1831@lemmy.world 1 points 5 months ago

GNOME extensions aren't themes, though. They're executable by design and intuition; they're basically applets.

However, GNOME does have themes (hidden in the GNOME-Tweaks app) and AFAIK they're purely CSS.

[-] possiblylinux127@lemmy.zip 1 points 5 months ago

Well then I wonder if a gnome extension could take over your machine and attack other machines on the network

[-] MyNameIsRichard@lemmy.ml 5 points 5 months ago

The same risks apply to any software proprietary or open source which is why Microsoft have the following in their licence agreement:

  1. DISCLAIMER OF WARRANTY.The software is licensed “as-is.” You bear the risk of using it. Microsoft gives no express warranties, guarantees or conditions. You may have additional consumer rights under your local laws which this agreement cannot change. To the extent permitted under your local laws, Microsoft excludes the implied warranties of merchantability, fitness for a particular purpose and non-infringement. FOR AUSTRALIA ONLY: You have statutory guarantees under the Australian Consumer Law and nothing in these terms is intended to affect those rights.

LIMITATION ON AND EXCLUSION OF REMEDIES AND DAMAGES. You can recover from Microsoft and its suppliers only direct damages up to U.S. $5.00. You can't recover any other damages, including consequential, lost profits, special, indirect or incidental damages.

Knowing that and knowing that themes can have code is two different things though. I wasn't particularly surprised as I thought (maybe wrongly) that global themes just installed all the other bits which would require code.

[-] merthyr1831@lemmy.world 1 points 5 months ago

KDE can't get away with "user at risk" for a DE designed for general purpose users. That means users who aren't technically minded or linux experts. Maybe hyprland and i3 can tell users to RTFM but an embedded store distributed with ALL KDE versions should have some sensible design decisions such as "maybe dont allow arbitrary JS execution as root within a feature people don't expect to be doing more than changing the background pic and some fonts"

this post was submitted on 26 Mar 2024
72 points (93.9% liked)

Linux

47223 readers
770 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS