this post was submitted on 01 Jul 2024
245 points (98.8% liked)

Linux

5230 readers
208 users here now

A community for everything relating to the linux operating system

Also check out !linux_memes@programming.dev

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] unexposedhazard@discuss.tchncs.de 5 points 4 months ago (2 children)

Well only if they know about it before it gets patched...

[–] scrion@lemmy.world 10 points 4 months ago (1 children)

That's why there is a huge market for 0-day exploits.

[–] vxx@lemmy.world 3 points 4 months ago (1 children)

Isn't there attempts to sneak in vulnerabilities with new commits?

[–] scrion@lemmy.world 6 points 4 months ago* (last edited 4 months ago)

Yes, targeted attacks like that definitely exist, most famously maybe the most recent social pressure to merge a vulnerability to the xz library by actor "Jia Tan":

https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/

This started a whole discussion about relying on (often unpaid) volunteer work for critical systems and the pressure and negativity these people face, which is a discussion that was absolutely needed, and which we are still lightyears away from fixing.

Currently, open source is still treated like this: https://trac.ffmpeg.org/ticket/10341

(I can only recommend reading the whole story around this issue, which boils down to Microsoft admitting they rely on an open source project for something they consider critical to their customers, but not willing to pay the maintainer a bounty for fixing the issue)

[–] teawrecks@sopuli.xyz 6 points 4 months ago

The NSA is doubtless sitting on a trove of these types of vulnerabilities to use when they really need access to something.