this post was submitted on 31 Mar 2024
252 points (98.1% liked)

Open Source

30449 readers
661 users here now

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

founded 5 years ago
MODERATORS
top 24 comments
sorted by: hot top controversial new old
[–] Wes_Dev@lemmy.ml 98 points 5 months ago

Let's keep in mind that if this is a state actor or some sort of global organized crime, then they don't put all their eggs into one basket. If that's the case, they're going to have a bunch of other plans and backdoor attempts ongoing. This isn't the end and we can assume there's something else somewhere that went unnoticed.

Security is a constantly changing war of attrition, not a goal/product/configuration.

[–] BestBouclettes@jlai.lu 33 points 5 months ago (2 children)

If anything it highlights how great open source actually is when it comes to security. People saw it and immediately flagged it.

[–] 0xtero@beehaw.org 23 points 5 months ago (1 children)

I don't think this one counts as a big win to be honest It was just freakish luck

[–] BestBouclettes@jlai.lu 13 points 5 months ago (2 children)

It's definitely freakish luck but at least it got found out. A closed source software would have gone through unnoticed.

[–] vrighter@discuss.tchncs.de 11 points 5 months ago

the fact that it was found by luck, not methodically, to me implies that there probably are other backdoors we didn't get lucky with.

[–] 0xtero@beehaw.org 5 points 5 months ago

Or found out in corporate code review / pentest. We just don't know. I get that we want to say FOSS is great due to the "many eyes/shallow bugs" thing, but that didn't work for OpenSSL or log4j. The fact that it did now is great, but let's not get carried away. It was just pure luck.

[–] ChannelSix@aussie.zone 21 points 5 months ago (2 children)

Dude, the issue was found purely by coincidence, it very nearly made it through

[–] hitmyspot@aussie.zone 27 points 5 months ago (1 children)

Yes, but it didn’t. Has it made it through on closed software? Who knows?

[–] ErilElidor@feddit.de 19 points 5 months ago (3 children)

My takeaway is more like: This one almost made it through and was caught by accident. How much more backdoors actually were not caught and made it through? I would bet some money on it being more than 0 :(

[–] trolololol@lemmy.world 2 points 5 months ago

Yep for sure. But open source at least let's you examine every part of the ecosystem.

No software is perfect even if all contributors have good intentions and do all due diligence.

Throw some malice and there is a chance something will get through.

[–] Croquette@sh.itjust.works 1 points 5 months ago

Im not sure why it being caught by accident is a factor here.

If devs knew what the pitfalls were before coding, there wouldn't be security risks in software.

Hackers do the same thing. They pen test, and if by chance they find something, they exploit it.

[–] hitmyspot@aussie.zone 1 points 5 months ago

Yes, probabky, but also might be possible to now find.

[–] trolololol@lemmy.world 9 points 5 months ago

Also this was a multi year effort that employed very complex knowledge. And still didn't get thru.

If it's multi year and very complex it's telling that this is what it takes. The bar is very high.

[–] delirious_owl@discuss.online 20 points 5 months ago

Lost me at suggesting that we run EDR on prod Linux servers.

Literally installing a backdoor intentionally..wow

[–] vext01@lemmy.sdf.org 14 points 5 months ago (2 children)

Smug users who don't run systemd be like...

[–] dukatos@lemm.ee 8 points 5 months ago

Laughs in Alpine

[–] saddlebag@lemmy.world 2 points 5 months ago (1 children)

How does systemd solve this?

[–] trolololol@lemmy.world 6 points 5 months ago

The exploit only happens in systemd

[–] NocturnalMorning@lemmy.world 9 points 5 months ago (1 children)

What a dick. I couldn't imagine spending that much time contributing to a project so I could introduce security vulnerabilities.

If this is one individual, and not a nation state, somebody needs to make some friends and pick up some hobbies.

[–] breadsmasher@lemmy.world 18 points 5 months ago* (last edited 5 months ago) (1 children)

I think its more likely someone spent this time contributing to the project specifically to exploit it

[–] NocturnalMorning@lemmy.world 3 points 5 months ago

Yeah, I got that. I'm saying they need to make some friends and get some hobbies if they aren't being funded by a state.

[–] tux@lemmy.world 9 points 5 months ago (1 children)

Wish I could be a fly on the walk when the bad actor realized years of work has just gone down the drain

[–] pivot_root@lemmy.world 7 points 5 months ago

Probably fear, then subsequently followed by their brains next to you on said wall. Whichever government paid for a multi-year campaign to backdoor enterprise Linux distributions is not going to be happy about this failure.

[–] corsicanguppy@lemmy.ca 2 points 5 months ago

globally

Meanwhile, no enterprise Linux or hypervisor got nabbed; nor could it.

But, carry on.