LWN: Comments on "The top open-source security events in 2024" https://lwn.net/Articles/996955/ This is a special feed containing comments posted to the individual LWN article titled "The top open-source security events in 2024". en-us Mon, 20 Oct 2025 06:07:54 +0000 Mon, 20 Oct 2025 06:07:54 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net NVD project funding at US NIST https://lwn.net/Articles/997884/ https://lwn.net/Articles/997884/ raven667 <div class="FormattedComment"> <span class="QuotedText">&gt; the NVD suddenly stopped adding new entries; it is still not clear why that happened</span><br> <p> A rhetorical question, but how is it possible that a government service relied upon by many commercial vendors just stops working an no one can get an official response as to why, or even an unofficial one? That seems like a lot of risk in the supply chain for security tools that use this data, is no one paying attention to ensure that the agency has funding and a legal mandate to continue this work. In theory we all pay taxes so we should be able to fund shared services like NVD without too much trouble, but failing that some of the companies which rely on it should fund some lobbyists to bribe officials so they prioritize this service, or they to fund a vendor consortium where security companies pool their efforts to fund a central non-profit which provides enrichment data to them all?<br> </div> Tue, 12 Nov 2024 14:19:20 +0000 open source and code review https://lwn.net/Articles/997880/ https://lwn.net/Articles/997880/ LtWorf <div class="FormattedComment"> And his curiosity could be satisfied with full access to the sources.<br> </div> Tue, 12 Nov 2024 13:57:18 +0000 open source and code review https://lwn.net/Articles/997874/ https://lwn.net/Articles/997874/ pizza <div class="FormattedComment"> <span class="QuotedText">&gt; I think the xz backdoor was an example of what code review *doesn't* easily catch</span><br> <p> As the saying goes, it takes two to tango.<br> <p> The problem with xz was that that the one supposed to be reviewing contributions (ie the only active maintainer) was actively malicious, and there was nobody else willing/able to perform meaningful reviews of that maintainer's contributions.<br> <p> <span class="QuotedText">&gt; Checking in autogenerated files, checking in binaries, having bits that can't be reproduced on non-developer systems, anything that thwarts code review shouldn't fly.</span><br> <p> They didn't check in autogenerated files; in this case the dodgy configure script was only in the release tarball, not the public repo. Meanwhile, the binary file was flagged as a defective file used in regression testing, something quite common for test suites, and it is the overwhelming norm for release tarballs to contain generated configure/build scripts versus what is in the repositories. It also takes "non-developers" to determine that things can't be reproduced on "non-developer systems". <br> <p> Tl;dr: Calls for "maintainer diligence" are meaningless in the face of actively malicious maintainers.<br> <p> </div> Tue, 12 Nov 2024 12:20:32 +0000 open source and code review https://lwn.net/Articles/997861/ https://lwn.net/Articles/997861/ josh <div class="FormattedComment"> I think the xz backdoor was an example of what code review *doesn't* easily catch, and a demonstration that code which is resistant to code review should be presumptively rejected by default. Checking in autogenerated files, checking in binaries, having bits that can't be reproduced on non-developer systems, anything that thwarts code review shouldn't fly.<br> <p> It was also an especially painful demonstration of <a href="https://xkcd.com/2347/">https://xkcd.com/2347/</a> and what happens when single-point-of-failure projects get handed off to new maintainers, or pressured to get handed off to new maintainers.<br> </div> Tue, 12 Nov 2024 06:07:12 +0000 open source and code review https://lwn.net/Articles/997844/ https://lwn.net/Articles/997844/ barryascott <div class="FormattedComment"> Code review did not find the xz vuln, it was the curiosity of a developer, Andres Freund, seeing strange test results when working with Postgresql that unearthed the problem.<br> <p> <p> </div> Mon, 11 Nov 2024 22:19:45 +0000 open source and code review https://lwn.net/Articles/997825/ https://lwn.net/Articles/997825/ ballombe <div class="FormattedComment"> The whole open source methodology is predicated on code review.<br> The detection of the xz backdoor was an effect of the open source methodology and cannot be dismissed as an artifact, so equating it with the crowstrike event is not entirely fair.<br> How much one is able to reduce a risk is a measure of success.<br> </div> Mon, 11 Nov 2024 20:01:35 +0000 Crowdstrike did happen to Linux, https://lwn.net/Articles/997834/ https://lwn.net/Articles/997834/ k3ninho <div class="FormattedComment"> <span class="QuotedText">&gt;There is a Linux version of CrowdStrike's software that didn't break; perhaps that is a result of a better architecture (including the use of BPF rather than kernel modules) on the Linux side.</span><br> <p> Similar changes to Crowdstrike's Falcon Sensor/Agent in April yielded similar unbootable circumstances for Debian and Rocky Linux ( <a href="https://www.theregister.com/2024/07/21/crowdstrike_linux_crashes_restoration_tools/">https://www.theregister.com/2024/07/21/crowdstrike_linux_...</a> / <a href="https://news.ycombinator.com/item?id=41005936">https://news.ycombinator.com/item?id=41005936</a> ).<br> <p> K3n.<br> </div> Mon, 11 Nov 2024 19:10:42 +0000 "Event" v. "Incident" https://lwn.net/Articles/997832/ https://lwn.net/Articles/997832/ JoeBuck <div class="FormattedComment"> Suggest s/events/incidents/ in the title to fix the issue.<br> <p> </div> Mon, 11 Nov 2024 18:52:32 +0000 "Event" v. "Incident" https://lwn.net/Articles/997822/ https://lwn.net/Articles/997822/ shironeko <div class="FormattedComment"> same, thought it was a list of security conferences, and wondered why this was a subscriber only article.<br> </div> Mon, 11 Nov 2024 18:22:23 +0000 "Event" v. "Incident" https://lwn.net/Articles/997821/ https://lwn.net/Articles/997821/ Heretic_Blacksheep <div class="FormattedComment"> Minor nitpick: Event tends to suggest conferences and other social ... events. But then the first sentence in the article makes it clear this is not about social gettogethers at all, but instead open source security problems. I'm willing to bet I'm not the only one that's going to look at the headline with puzzlement as there's only a few security related open source conferences every year.<br> <p> I mean, it's not *wrong*, but the context of "event" equating to "incident" or "problem" won't be the first one some will consider.<br> </div> Mon, 11 Nov 2024 18:14:50 +0000