back to article Linux Foundation serves up a tasty dish of BUGS

The Linux Foundation's Core Infrastructure Initiative has completed its first-pass survey of the Linux toolset, and is highlighting which tools are most at risk. While there's lots of attention on high-profile packages like crypto tools, web servers and mail agents, there's also a lot of packages that everyone uses and nobody …

  1. Anonymous Coward
    Anonymous Coward

    "how much maintenance it actually receives"

    Why? What are they trying to infer from this?

    The diversity of the sources contributions is far more important than quantity, such that a project can easily be so overrun by a disproportionately heavy flow of code from a single source/agency that proper auditing yields to implicit trust. Of course such diversity/allegiances among contributors are intensely difficult (impossible) to establish so largely ignored.

    A "low maintenance" mature project may well be far more trustworthy than a high churn one as it allows ample opportunity for first and third party review.

    Truecrypt 7.1a

    1. Anonymous Coward
      Anonymous Coward

      Replying to self.

      Having had a chance to glance over the thing, it seems El Reg may have done it something of a disservice. It does at least appear to be a decent stab at contemplating some of the principles and practicalities of F(L)OSS triage.

      Definitely worth a more thorough read as time permits.

      Leaving my original splaff in place in case it's an invaluable insight for naïve journo types.

      ;)

    2. Anonymous Coward
      Anonymous Coward

      Guess you meant the *quality* of contributions, *diversity* really means nothing.

      Also, here it's not a matter of well maintained projects, although in "low maintenance" mode. They spotted projects where bug reports couldn't be delivered and handled, and lacking a central code repository to ensure you know what's the latest code, and what modification has been made and by who - and who approved them. These are not well maintained projects, and they can be a risk from a security point of view. How could you audit a project when there's just several tarball around? If you're a distro maintainer what code should you package?

      1. Anonymous Coward
        Anonymous Coward

        No, I meant diversity of contributors. (Dropped an "of")

  2. Anonymous Coward
    Anonymous Coward

    Help.......

    What are the relative risks of getting hit with malware or a virus on Linux? Flash and Java are not installed, just a PDF reader replacement and a recent version of Firefox. I've used system monitor to look at running tasks, but I lack the knowledge to know what to look for, not that that it would help much against keylogger / rootkit type attacks anyway. Cheers!

    1. Anonymous Coward
      Anonymous Coward

      No idea how serious you are, so offering a serious answer. Tinfoil ON

      Considerably better than elsewhere.

      Considerably better != 0

      FF itself is a veritable cornucopia of exploitable opportunities. Of course these would have to be tailored to target your minority OS which may lessen the risk.

      If you're not a high value target, you're probably reasonably likely to be OK at the moment.

      As you suggested, system monitor is a toy in this context. All tainted hardware must be simultaneously replaced.

      If you're seriously concerned you should employ stringent segregation.

      Investigate Qubes and similar as a minimum and/or use separate dedicated secure hardware linked only by "sneakernet" choosing your sneakernet medium wisely.

    2. Paul Crawford Silver badge

      Re: Help.......

      It depends on who you are. Given that 99% or so of malware by simple number is Windows-specific, the odds are pretty low for a drive-by infection. More so if cross-platform stuff like Java and Flash are disabled.

      However, if you are part of an organisation that is worth targeting then all bets are off. Most recent surveys have shown the Linux kernel and Windows kernels have similar magnitudes of vulnerabilities, so if someone wants to find a privileged escalation bug for ether then a decent hacker will. Even so, most attacks are started on other programs (web browsers, word processors, PDF readers, etc) which tend to be far buggier than kernels.

      Take some time to read GCHQ's advice on securing Ubuntu 14.04 for example, as that looks in to various aspects of security-by-configuration that are not always obvious. The list of guidance can be found here:

      https://www.gov.uk/government/collections/end-user-devices-security-guidance

      While that is for UK Gov use and so has some assumptions that might not be relevant, most still apply and you should be considering a VPN as well if you travel a lot and have a properly fitted tinfoil hat.

      1. Anonymous Coward
        Anonymous Coward

        "No idea how serious you are, so offering a serious answer."

        Thanks it was a serious genuine question....

  3. kryptylomese

    Fearmongering on the Register - who would have thought that was even possible......

    Relax everyone Linux is still more secure.

    1. cynic 2

      I don't see the fearmongering. I see some people suggesting places where security-minded devs with some spare time can contribute. Their metrics may not be perfect, but they're good enough for a first pass.

      1. LaeMing
        Boffin

        Yes

        The study (and ElReg's reporting of it) isn't saying these areas have bugs. Just that they are critical enough that they should get a long hard look-at now and again.

        (Well, yes the story title is as click-baity as you would expect from anywhere, tough I imagine that is a bit of tounge-in-cheek from ElReg's side and regular readers, at least, should know that's their style).

    2. Anonymous Coward
      Anonymous Coward

      Thus you mean that because Linux is secure "by definition" no one should look at possible future attack vectors and proactively look for any issue that could lead to Heartbleed style of vulnerability, and spot and fix them before they are exploited? Complacency is one of the worst enemy of security.

      Kudos to LF for not being complacent unlike many of its naive users, and ensure Linux secuiry is really cared of.

      1. kryptylomese

        I meant by comparison with other Operating systems....

  4. Anonymous Coward
    Anonymous Coward

    "most at risk"...compared with what. exactly?

    Quote: "...automated assessment of more than 350 projects..."

    OK...good survey, but what about all the software which is not available for any independent assessment. For example:

    - Microsoft's Windows XP, 7 and 8?

    - Cisco's IOS?

    - Apple's OS X

    - Various RSA tools (!!)

    - Adobe Flash Reader (!!)

    .......and so on. How much loving care and attention are these products getting? Perhaps more interesting would be to know which COMPONENTS of these and similar products haven't been touched for years. But of course, we will never know.

    1. LaeMing
      Happy

      Re: "most at risk"...compared with what. exactly?

      Well, the people doing this study don't really care about these pieces of software. The study is about helping make sure their own house is in the best possible order. They leave the rabid finger-pointing and scoring of cheap PR points to the commercial sector. They have better things to do.

    2. Anonymous Coward
      Anonymous Coward

      Re: "most at risk"...compared with what. exactly?

      Never heard of https://www.microsoft.com/en-us/sharedsource/, for example?

      The fact that a software is not "open source" doesn't mean its source code is not available to anyone. It just mean that access to source code is restricted to approved entities - which may not be only the entity writing it.

      We may discuss forever which approach is "better", but any discussion should start on how things are, not on what you believe they are.

  5. TrevorH

    "therefore how much TLS a particular tool or project needs."

    I'm pretty sure you meant TLC

  6. Breen Whitman

    This is occurring under that cretin Torvalds. Linux needs a true leader not some twat that just goes day to day focusing on where he can swing his dick, ruling by fear.

    Get in someone with true leader skills, vision, and who people want to be inspired by. A brain damaged brat is not that person.

    1. Paul Crawford Silver badge

      Seems you know SFA about this. Linus Torvalds is only the kernel's lead developer/manager, this is looking at all the other packages that make up a typical (and thus usable) distribution of a system and many of which lack any sort of clear guidance or leadership.

    2. Anonymous Coward
      Anonymous Coward

      "Trolling" so obvious it hardly deserves a downvote... but have one anyway.

      1. This post has been deleted by its author

    3. Anonymous Coward
      Anonymous Coward

      Steve Ballmer and Stephen Elop are available, how about one of them to replace Torvalds ?

    4. Sean Timarco Baggaley

      The problem the article highlights is that there is software that is widely used in many GNU/Linux distributions that is effectively *unsupported*. There's nobody behind it, accepting bug reports, or actively maintaining the code. This is the exact *opposite* of the Linux kernel developers!

      I'm no fan of the GNU/FOSS communities in general, and certainly not its tedious politics, but, for once, Linus Torvalds is not the problem here.

      The problem is one we used to call "bit rot". Old code, in common usage, that is a time-bomb waiting to happen. Not just because of potential security risks either, but because an important API that code relies upon might change tomorrow, causing all sorts of major headaches.

      Such code thus also acts like a drag on improving such APIs, holding back development and forcing programmers to jump through additional hoops to keep that old code happy. And it's those hoops that cause hackery and kludges to appear in code, opening up wonderful new possibilities for bugs and security issues.

      It took them long enough, but Microsoft have finally learned to say, "No!" to continued legacy support in Windows precisely because of problems like these. (Apple never said "Yes!" in the first place; they explicitly state that each major new release of OS X may break old software.)

  7. Nick Kew
    Alert

    Some of this goes deep

    We know some of what you say, like bind's long, troubled and troubling security history. If it has little developer interest, that's all the more troubling.

    But you also mention (in passing) image libraries. You'd be surprised how far their implications go. Some of the standard libs everyone uses are upwards of 20 years old, and not written for anything more demanding than a little commandline utility (for example, completely non-thread-safe). That propagates straight into applications that use them without thinking - such as PHP.

    Oh, and at least some of that code is cross-platform, and problems arising will bite exactly the same on Windows as on Linux or any *X.

  8. Primus Secundus Tertius

    Is it CSV

    The link in th Reg article claims to be a CSV but is actually an elaborate HTML file. Is there a real CSV file somewhere, that a spreadsheet can handle?

    1. Jim Mitchell

      Re: Is it CSV

      Click the "raw" button.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like