Ventoy is a tool to make a USB with multiple ISOs bootable, letting you select which ISO to use on boot. Another newly-created account claims to be the dev’s friend and translator and has received no contact from the maintainer.

10 points
*

Interesting context to bring up Lemmy

Edit: from the thread, it’s pretty clear those people were not the creator?

permalink
report
reply
46 points

My name is Linus torvalds and this is why I TempleOS…

permalink
report
reply
63 points

Nobody knows who responded here. Don’t spread rumors.

permalink
report
reply
7 points

I thought it was clear from the details that it was suspicious. Edited.

permalink
report
parent
reply
12 points

Things are suspicious but you still spread gossip and maybe lies.

permalink
report
parent
reply
21 points

I understand the concern raised, but unless I’m reading this wrong there is an assumption that Ventoy may be doing something untoward, but I’m not sure how at this level. It can’t inject anything into the ISO files at rest without bricking then, and I don’t know if an OS that doesn’t verify it’s own image before booting.

Just sounds like super lazy project administration. Maybe I’m missing something?

permalink
report
reply
27 points
  1. Around April, there was this big thing where a maintainer for XZ Compression included an SSH backdoor in binaries that were only built on release. If a freaking piece of compression software can backdoor SSH, who knows what else is possible.
  2. The response to the blob concern is nonsensical, made without their previously-known accounts, and coincides with someone’s claim that they are a close friend and was on vacation to China, the country where the XZ maintainer was from.
permalink
report
parent
reply
17 points

The xz issue is something totally different though. That was a software library running and executing against flat files. I’m just not sure there’s a way to alter an ISO image before boot, undetected in the case of Ventoy.

If the goal is to alter files to provide access to something, this must be some sort of ingenious way that bypasses checksums, and targets something universal, which doesn’t seem quite possible in the case of a substitute bootloader.

permalink
report
parent
reply
5 points

Yeah, it would be really big. I wouldn’t have posted about this if it weren’t for the radio silence and blabbering statement.

permalink
report
parent
reply
5 points

It can’t inject anything into the ISO files at rest without bricking then, and I don’t know if an OS that doesn’t verify it’s own image before booting.

As far as I can tell, this is not talking about ISOs installed using Ventoy, but precompiled blobs of things like Busybox that are included in the Ventoy install package. It’s an important distinction. The developer could bundle a tampered blob, include in the documentation the checksum that matches that blob, and then if someone checks with the upstream project and calls them out, say something along the lines of, “Oh, they must have withdrawn that release,” and replace it with an untampered blob. If they don’t fight to preserve the tampered blob, they might even get away with it.

permalink
report
parent
reply
3 points

The claim of the person you’re replying to is that even if the binaries were tampered, Ventoy wouldn’t be able to do anything.

permalink
report
parent
reply
2 points

Even if the original issue had anything to do with ISOs, he’s way overestimating the level of protection on many install ISOs, in my experience—they’re just disk images, and presumably all the files read off them are passing through Ventoy itself. Even if you find one that performs some kind of verification, easy enough to change a jump instruction to a no-op somewhere in the machine code guts of a file as it passes through Ventoy, and prevent the verification from executing. (The difficult part is figuring out which instruction to change, but people have done it before.)

permalink
report
parent
reply
12 points
*

There are some random accounts that do not look like the original creator. I highly discourage from such titles like this post, because we don’t know. “Ventoy” (creator) did not respond as far as I can see.

Edit: Even if it looks legitimate, it can be impersonating to gain trust. Don’t blindly trust random people from new accounts.

permalink
report
reply
4 points

In the best case, the software is unmaintained.

permalink
report
parent
reply
2 points

It is very much actively maintained other than this supposed vacation from the developer. Everything else is purely speculation and what seems to be impersonation of the dev on the fediverse.

permalink
report
parent
reply
6 points

This big issue has been open since April, and the dev has not responded, and his last commit was in early June. Yes, most of this is pure speculation, but 4 months is unmaintained.

permalink
report
parent
reply

Linux

!linux@lemmy.ml

Create post

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word “Linux” in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

  • Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
  • No misinformation
  • No NSFW content
  • No hate speech, bigotry, etc

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

Community stats

  • 8K

    Monthly active users

  • 3.7K

    Posts

  • 48K

    Comments