this post was submitted on 23 Aug 2024
93 points (98.9% liked)

Linux

5381 readers
38 users here now

A community for everything relating to the linux operating system

Also check out [email protected]

Original icon base courtesy of [email protected] and The GIMP

founded 1 year ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] FizzyOrange 1 points 3 months ago (1 children)

Should what be handled? Security vulnerabilities? Here's how you should handle security bugs differently to other bugs:

  1. Report them separately and clearly. Don't hide by omission the fact that they are security bugs (common practice in Linux apparently). Coordinate with major vendors how to push fixes.

  2. They are generally more important than other bugs so you should put more effort into detecting and preventing them. E.g. using fuzzing, sandboxing, formal methods, safer languages, safety annotations, etc.

  3. They have high value on the grey market and people actively try to create them, so you need to design your system under that assumption. An obvious thing to do is software isolation so a bug in - to pick a random example xz - can't bring down ssh. Software isolation, microkernels, sandboxing etc. help with this.

There's no way you can say "they're just bugs". Maybe in the 80s. It's not the 80s.

[–] [email protected] 3 points 3 months ago (1 children)

Report them separately and clearly. Don't hide by omission the fact that they are security bugs (common practice in Linux apparently). Coordinate with major vendors how to push fixes.

That's exactly how it works. Vulnerability found, reported and fixed in secret and when everything is in place everyone is informed to update.

They are generally more important than other bugs so you should put more effort into detecting and preventing them. E.g. using fuzzing, sandboxing, formal methods, safer languages, safety annotations, etc.

I don't want to sound condescending, but what do you think all this talk about Rust and AI tools is about?

In the end you want to prevent all bugs from happening. Some filesystem bug randomly deleting data can be just as catastrophic as remote code execution.

And if some feature turns out to be a gaping security hole you'll quickly see it turn into a bug. That's what the quote is about. Every security issue is a bug so it has to be handled like a bug and squashed.

Priority in bugs exist independent of them being security related or something else. A critical bug will always get the highest priority fix.

[–] FizzyOrange 1 points 3 months ago

I don’t want to sound condescending, but what do you think all this talk about Rust and AI tools is about?

Yeah I am aware. It's very good that they're looking at it and great that Linus is supportive and not a stuck-in-the-mud. Doesn't invalidate my comment thought. He's still saying security bugs are no worse than other bugs.

And if some feature turns out to be a gaping security hole you’ll quickly see it turn into a bug. That’s what the quote is about. Every security issue is a bug so it has to be handled like a bug and squashed.

I mean... I don't think that's what he's saying. Nobody is saying not to fix security bugs...