this post was submitted on 30 Mar 2024
6 points (100.0% liked)

linuxmemes

20688 readers
1170 users here now

I use Arch btw


Sister communities:

Community rules

  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] squaresinger@feddit.de 0 points 5 months ago (4 children)

The only real downside on the open source side is that the fix is also public, and thus the recipe how to exploit the backdoor.

If there's a massive CVE on a closed source system, you get a super high-level description of the issue and that's it.

If there's one on an open source system, you get ready-made "proof of concepts" on github that any script kiddy can exploit.

And since not every software can be updated instantly, you are left with millions of vulnerable servers/PCs and a lot of happy script kiddies.

See, for example, Log4Shell.

[–] ris@feddit.de 0 points 5 months ago

In this case it seems the backdoor is only usable with someone who has the correct key. Seeing and reverting something fishy is in some cases, like this easier than finding an exploit. It takes a lot of time in this case to figure out what goes on.

Fixing a bug never automatically give an easy to use exploit for script kiddies

[–] oce@jlai.lu 0 points 5 months ago* (last edited 5 months ago) (2 children)

If your security relies on hidden information then it's at risk of being broken at any time by someone who will find the information in some way. Open source security is so much stronger because it works independently of system knowledge. See all the open source cryptography that secures the web for example.
Open source poc and fix increases awareness of issues and helps everyone to make progress. You will also get much more eyes to verify your analysis and fix, as well as people checking if there could other consequences in other systems. Some security specialists are probably going to create techniques to detect this kind of sophisticated attack in the future.
This doesn't happen with closed source.
If some system company/administrator is too lazy to update, the fault is on them, not on the person who made all the information available for your to understand and fix the issue.

[–] prettybunnys@sh.itjust.works 0 points 5 months ago (1 children)

Crowd sourcing vulnerability analysis and detection doesn’t make open source software inherently more secure.

Closed source software has its place and it isn’t inherently evil or bad.

This event shows the good and bad of the open source software world but says NOTHING about closed source software.

[–] oce@jlai.lu 0 points 5 months ago (1 children)

Crowd sourcing vulnerability analysis and detection doesn’t make open source software inherently more secure.

It does, because many more eyes can find issues, as illustrated by this story.

Closed source isn't inherently bad, but it's worse than open source in many cases including security.

I think you're the only one here thinking publishing PoC is bad.

[–] squaresinger@feddit.de 0 points 5 months ago

But this issue wasn't found because of code analysis per se, but because of microbenchmarking.

[–] squaresinger@feddit.de 0 points 5 months ago

If the vulnerability is in the wild, what other security mechanisms do you have until it's patched?

[–] Pantherina@feddit.de 0 points 5 months ago

It is not, it requires a private key to be used.

[–] DemSpud@lemmy.dbzer0.com 0 points 5 months ago (3 children)

bUt gUyS WhAt aBoUt sEcUrItY ThRoUgH ObScUrItY??

[–] squaresinger@feddit.de 0 points 5 months ago

hEy, yOu lEaRnEd A bUzZwOrD aNd rEcEnTlY dIsCoVeReD tHe sHiFt KeY!!!! cOnGrAtS!?!

[–] squaresinger@feddit.de 0 points 5 months ago

hEy, yOu lEaRnEd A bUzZwOrD aNd rEcEnTlY dIsCoVeReD tHe sHiFt KeY!!!! cOnGrAtS!?!

[–] squaresinger@feddit.de 0 points 5 months ago

hEy, yOu lEaRnEd A bUzZwOrD aNd rEcEnTlY dIsCoVeReD tHe sHiFt KeY!!!! cOnGrAtS!?!