qaz@lemmy.world to Selfhosted@lemmy.worldEnglish · 2 months agoAxios JavaScript library has been compromised with malware in supply chain attackgithub.comexternal-linkmessage-square12linkfedilinkarrow-up1229arrow-down10
arrow-up1229arrow-down1external-linkAxios JavaScript library has been compromised with malware in supply chain attackgithub.comqaz@lemmy.world to Selfhosted@lemmy.worldEnglish · 2 months agomessage-square12linkfedilink
minus-squarePetteriPano@lemmy.worldlinkfedilinkEnglisharrow-up39arrow-down2·2 months agoIt’s a good way to keep the exploit around for seven days, too, if you apply it right away.
minus-squaretaco_shale032@lemmy.mllinkfedilinkEnglisharrow-up8·2 months agoI agree, I think it would be better to use something like dependabot or renovatebot so you can know of and apply security updates right away.
minus-squareEskuero@lemmy.fromshado.wslinkfedilinkEnglisharrow-up11·2 months agoAs long as the bot is not allowed to automatically merge minor version bumps in libraries…
minus-squaremagikmw@piefed.sociallinkfedilinkEnglisharrow-up3·2 months agoWell yes, one can misuse any tool.
minus-squareEskuero@lemmy.fromshado.wslinkfedilinkEnglisharrow-up2·2 months agoHow? If you got hit by this you are looking at restoring the system from a safe previous version. And the compromised versions get pulled, not superseeded by a new release, so once you rebuild you would go back to a safe version…
It’s a good way to keep the exploit around for seven days, too, if you apply it right away.
I agree, I think it would be better to use something like dependabot or renovatebot so you can know of and apply security updates right away.
As long as the bot is not allowed to automatically merge minor version bumps in libraries…
Well yes, one can misuse any tool.
How? If you got hit by this you are looking at restoring the system from a safe previous version.
And the compromised versions get pulled, not superseeded by a new release, so once you rebuild you would go back to a safe version…