LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-21-2016, 10:06 PM   #1
Thionite
LQ Newbie
 
Registered: Feb 2016
Posts: 3

Rep: Reputation: Disabled
Are these security concerns about Linux Mint valid?


If you're posting here, you've probably heard about the attack on the Linux Mint website.


I run Mint on my other machine, but haven't downloaded any ISOs lately, so this specific issue doesn't apply to me directly. But I keep thinking about this Reddit thread.

The main point of contention is this:

Quote:
Exactly. They were most likely breached into over CVE-2015-7547.
Did I already say you shouldn't use Linux Mint?

Well, here I am saying it again: Don't use Linux Mint! In fact, don't use any of these distributions who do not have a dedicated security team. Please, just don't!
This again just shows that maintaining a distribution takes more than just developing your own desktop packages and creating ISOs. It's a matter of providing something people can rely on!

None of these "I make my own Linux distribution because I can." distributions have their own security team.

FYI, the vulnerability was fixed in RedHat, Debian, Ubuntu, Fedora, openSuSE the day it was announced! Simply because these distributions have dedicated security teams!
Go ahead and downvote me into oblivion. But I will continue to repeat what I have said multiple times here: Linux Mint is garbage! Don't use it. It's a FrankenDebian by design!
(One link removed)

Here's where you'll have to excuse my inexperience, but please bear with me.

Do these criticisms make sense? It seems like the user who posted that comment has aggressively decried Mint at least a few times before. This does not make him wrong, but it does make me wonder.

The other thing that I read today said that Mint hides certain security updates by default. Why would they do this?

Should Mint users consider moving away from that distro?
 
Old 02-21-2016, 10:43 PM   #2
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,323
Blog Entries: 28

Rep: Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141
Given that Mint has taken a proactive approach to dealing with the hack and that I've used Mint with no issues off and on for years, I call shenanigans on Reddit.

Panic is not your friend.
 
Old 02-21-2016, 11:08 PM   #3
rokytnji
LQ Veteran
 
Registered: Mar 2008
Location: Waaaaay out West Texas
Distribution: antiX 23, MX 23
Posts: 7,111
Blog Entries: 21

Rep: Reputation: 3474Reputation: 3474Reputation: 3474Reputation: 3474Reputation: 3474Reputation: 3474Reputation: 3474Reputation: 3474Reputation: 3474Reputation: 3474Reputation: 3474
Quote:
Should Mint users consider moving away from that distro?
Nope.

Quote:
The other thing that I read today said that Mint hides certain security updates by default
Probably because the majority of users (like me) would not understand a security update if it was a rattlesnake 10 feet in front of them.

One persons opinion does not make a mandate. I bet Mint drops using WordPress now on their sites.

Last edited by rokytnji; 02-21-2016 at 11:09 PM.
 
Old 02-21-2016, 11:19 PM   #4
astrogeek
Moderator
 
Registered: Oct 2008
Distribution: Slackware [64]-X.{0|1|2|37|-current} ::12<=X<=15, FreeBSD_12{.0|.1}
Posts: 6,263
Blog Entries: 24

Rep: Reputation: 4194Reputation: 4194Reputation: 4194Reputation: 4194Reputation: 4194Reputation: 4194Reputation: 4194Reputation: 4194Reputation: 4194Reputation: 4194Reputation: 4194
I mostly agree with frankbell, although I have never used Mint.

This particular event is not a source or binary exploit of the Mint repos - it is an exploit of yet another wordpress based site in which it was hyperlinks that were changed, not code (albeit, a small consolation to those who downloaded from the bogus links).

But those who did download and failed to check the checksums of the ISO must accept their own share of the consequences. They themselves failed to take on the ordinary user responsibility for their end of the transaction, and failed to follow the instructions on the Mint site. This is not M$ or Red Delicious - the user has choices and responsibilities.

As I have said in other threads, the real problem we are all facing is an internet infrastructure designed for a sane world, now operating in one that is anything but sane. There is not and never will be "perfect" software, and there is ultimately no tech solution for malicious human initiated activities - regardless of whether or not there is a dedicated security team!

This is not a failing of Mint (other than use of wordpress), it is just one notably successful exploit for that day, there were very many others we did not read about. And there will be more tomorrow... and the next day... until it all melts down. My optimism is that it may happen quickly.

For their part, Mint has responded quickly and taken the one meaningful action of taking the site offline - which many are not willing to do when faced with similar problems. So they do deserve credit for their response.
 
Old 02-21-2016, 11:38 PM   #5
syg00
LQ Veteran
 
Registered: Aug 2003
Location: Australia
Distribution: Lots ...
Posts: 21,126

Rep: Reputation: 4120Reputation: 4120Reputation: 4120Reputation: 4120Reputation: 4120Reputation: 4120Reputation: 4120Reputation: 4120Reputation: 4120Reputation: 4120Reputation: 4120
It does appear however that they only shut it down after a second hit. Had the intruders any sense they wouldn't have exposed the fact they still had entry after the initial "clean up".
Pretty poor effort from the Mint team really.
Especially as the user forum database was exposed as well.

And yes I still have Mint systems in the house.
 
Old 02-22-2016, 03:00 AM   #6
Captain Pinkeye
Member
 
Registered: Oct 2012
Location: The Czech Republic
Posts: 280

Rep: Reputation: 98
Well i don't think Mint is 'garbage', and the guy who wrote it sounds like being in some 'anti-Mint' rage.

Quote:
In fact, don't use any of these distributions who do not have a dedicated security team. Please, just don't!
This again just shows that maintaining a distribution takes more than just developing your own desktop packages and creating ISOs. It's a matter of providing something people can rely on!"
This i agree with fully, though.
 
Old 02-22-2016, 03:03 AM   #7
nickmartin
LQ Newbie
 
Registered: Feb 2016
Posts: 4

Rep: Reputation: Disabled
I've used Mint with no issues enable or seen away.It does appear however that they only shut it down after a second hit.But those who did download and failed to check the checksums of the ISO must accept their own share of the consequences.
 
Old 02-22-2016, 08:04 AM   #8
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
I'm not leaving Mint. The Forums, maybe, but not Mint as my preferred OS of Choice.
"most likely" seems like an opinion.

Lots of Monday Morning Quarterbacking going on in the current situation.
It is likely that the exact weakness may never be disclosed, but a weak db password is certainly alarming, at least to me.

That is my opinion.
 
Old 02-22-2016, 02:25 PM   #9
Thionite
LQ Newbie
 
Registered: Feb 2016
Posts: 3

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by nickmartin View Post
I've used Mint with no issues enable or seen away.It does appear however that they only shut it down after a second hit.But those who did download and failed to check the checksums of the ISO must accept their own share of the consequences.
It appears that the hacker modified the checksums present on the website to match the malicious upload.

http://www.zdnet.com/article/hacker-...mint-backdoor/

I'm not sure what the average user can do in situations like that. Except maybe staying away from diatros that don't encrypt that information in some way.
 
Old 02-22-2016, 03:43 PM   #10
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
wrt: http://www.zdnet.com/article/hacker-...mint-backdoor/
An article discussion with "the hacker"...
says
Quote:
The hacker then used their access to the site to change the legitimate checksum -- used to verify the integrity of a file -- on the download page with the checksum of the backdoored version.

and "Who the f**k checks those anyway?" the hacker said.
Why is the interviewer referring to the interviewee as "the hacker"?

And if users don't check md5sums (they usually don't) why bother to change the published values?

The whole article smacks of click-bait.
 
Old 02-22-2016, 04:48 PM   #11
mike acker
Member
 
Registered: Feb 2014
Location: Michigan
Distribution: Debian 10
Posts: 199

Rep: Reputation: Disabled
Quote:
Originally Posted by Habitual View Post
wrt: http://www.zdnet.com/article/hacker-...mint-backdoor/
An article discussion with "the hacker"...
says

Why is the interviewer referring to the interviewee as "the hacker"?

And if users don't check md5sums (they usually don't) why bother to change the published values?

The whole article smacks of click-bait.
I'm sure a lot of talented thought will go into the resolution of this incident. automatically linking the download might not be the best idea -- perhaps the link should go onto a site page protected with HTTPS and then let me select the download option from that point . this simply draws the second point: i really don't know which of my x.509 certs are trustworthy. we really should verify these -- and sign them -- before using them . but that is a story for another time .
 
Old 02-22-2016, 04:54 PM   #12
curtvaughan
Member
 
Registered: Nov 2014
Location: Austin, TX
Distribution: Mint, Devuan, MX, Ubuntu, ArcoLinux on hardware; vboxes of varying flavors
Posts: 42

Rep: Reputation: Disabled
Linux Mint website hack

I think that, from what I've read, the main issue is with weaknesses in Wordpress. Most likely, as has been mentioned, the Mint dev's will lose Wordpress for their web presence. I've read the same old Debian vitriol on Ars Technica that has been going on ad nauseum since Debian downstream distros ever came to the fore (they also disparage Ubuntu). Anyway, I will still continue to support the Mint distro. Debian was a great concept, and Mint makes it better; same with Ubuntu. Onward.
 
Old 02-22-2016, 05:29 PM   #13
sgosnell
Senior Member
 
Registered: Jan 2008
Location: Baja Oklahoma
Distribution: Debian Stable and Unstable
Posts: 1,943

Rep: Reputation: 542Reputation: 542Reputation: 542Reputation: 542Reputation: 542Reputation: 542
I used Mint long ago, but I never will again. If they let their website be hacked twice in one day, they need to go to WalMart and buy a clue. The Wordpress hack is just one issue. The lack of a security team is a valid criticism, and I don't think Mint will ever have anyone who knows much about security. In the current environment, security is a basic necessity, and Mint has none. None.
 
Old 02-22-2016, 06:38 PM   #14
wpeckham
LQ Guru
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS,Manjaro
Posts: 5,623

Rep: Reputation: 2695Reputation: 2695Reputation: 2695Reputation: 2695Reputation: 2695Reputation: 2695Reputation: 2695Reputation: 2695Reputation: 2695Reputation: 2695Reputation: 2695
please be not silly

I use multiple platforms. Only ONE runs Mint, but has for over a year. Others are Sparky, VSIDO, CentOS. I used to run pure Debian, and am likely to again. I used to run Ubuntu, but NEVER will again! So the MINT site is not terribly secure, and I am not likely to download a new image before they fix that, but I am not reloading this laptop running Mint until I have a LOT better reason!

I love that quote: "Panic is not your friend." Very true!
 
Old 02-22-2016, 08:37 PM   #15
frankbell
LQ Guru
 
Registered: Jan 2006
Location: Virginia, USA
Distribution: Slackware, Ubuntu MATE, Mageia, and whatever VMs I happen to be playing with
Posts: 19,323
Blog Entries: 28

Rep: Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141Reputation: 6141
I've used WordPress since v. 1.5 for its original purpose: blogging. As a result, I tend to follow WordPress news, though I don't do so slavishly.

I don't know the technical details of what happened with linuxmint.com, but, in defense of that platform, I wish to note that security issues at WordPress sites are almost always related to dodgy plugins, rather than to WP itself. (Note that I said "almost always.")
 
  


Reply

Tags
distros, linuxmint, security



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Linux Concerns: Convenience vs. Security LXer Syndicated Linux News 0 08-11-2015 06:41 PM
Switching from Ubuntu/Mint.Kindly help resolve few concerns Highjo Fedora 3 09-26-2013 09:20 AM
[SOLVED] Ping/ICMP Security Concerns kroak Linux - Security 12 09-16-2013 09:34 AM
[SOLVED] linux boot security concerns ottoshmidt Linux - Security 6 04-03-2010 07:49 AM
MRTG: security concerns? registering Linux - Security 2 08-07-2003 06:56 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 01:24 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration