Conversation

Possibly unpopular opinion, but I feel like "only merge things after verifying they are valid" should maybe be the default policy of the most used piece of software in the world.
Image
14
443
Like, the Linux kernel maintainers are saying they can't tell if a patch is malicious so have to rely on the email address domain name. Why are we focusing on the academics, this is a problem!
Quote Tweet
the whole "it's extremely difficult for us to verify that this kernel patch isn't malicious" business is a real indictment of C twitter.com/FiloSottile/st…
14
223
Replying to
Although the Linux maintainers were inexcusably rude, running a study with intentional deception without consent or even coordinating with someone at the project in advance is against every ounce of human subjects training that I've received
5
56
Replying to
I am not defending the academics but I don't rely on them to keep everything around me running and secure. The maintainers' reaction is not rude, is concerning! It sounds like they rely on checking the evil bit to stop malicious patches. What if HackingTeam has Gmail addresses?
5
23
Replying to and
The researchers were submitting correct patches too. They say that in 3 cases, they submitted intentionally incorrect patches and then told the maintainers it was wrong and provided the correct patch instead. They were seemingly doing useful work on the kernel for the most part.
1
2
Lots of these patches appear to be correct fixes for memory corruption, etc. and are going to be reverted due to loss of trust in the authors. In reply to Greg's post on Twitter, a kernel maintainer states a patch to the code they maintain was correct but it's being reverted.
2
They genuinely seemed to want to bring attention to a legitimate problem. Nothing stops someone truly malicious from doing the same thing without telling the maintainers they shouldn't take the patch after they respond. They demonstrated a real problem, ethical research or not.
Replying to and
I think that can probably be stated for patches to the kernel in general. A lot of fixes for these kinds of issues are wrong or pointless. That's my experience with attempted fixes for static analysis diagnostics and compiler warnings in general. Doesn't mean it's malicious.
The research was unethical, but the problem goes far beyond that. Are they going to revert and review other similar patches which were not meaningfully understood, tested or reviewed? No, just these ones. The process for accepting code does not counter bad actors well at all.
1
Show replies