this post was submitted on 19 Jul 2024
1992 points (99.1% liked)

linuxmemes

20629 readers
776 users here now

I use Arch btw


Sister communities:

Community rules

  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

founded 1 year ago
MODERATORS
 

CrowdStrike effectively bricked windows, Mac and Linux today.

Windows machines won’t boot, and Mac and Linux work is abandoned because all their users are on twitter making memes.

Incredible work.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 35 points 1 month ago* (last edited 1 month ago) (6 children)

As a career QA, i just do not understand how this got through? Do they not use their own software? Do they not have a UAT program?

Heads will roll for this

[–] [email protected] 21 points 1 month ago (5 children)

From what I've read, it sounds like the update file that was causing the problems was entirely filled with zeros; the patched file was the same size but had data in it.

My entirely speculative theory is that the update file that they intended to deploy was okay (and possibly passed internal testing), but when it was being deployed to customers there was some error which caused the file to be written incorrectly (or somehow a blank dummy file was used). Meaning the original update could have been through testing but wasn't what actually ended up being deployed to customers.

I also assume that it's very difficult for them to conduct UAT given that a core part of their protection comes from being able to fix possible security issues before they are exploited. If they did extensive UAT prior to deploying updates, it would both slow down the speed with which they can fix possible issues (and therefore allow more time for malicious actors to exploit them), but also provide time for malicious parties to update their attacks in response to the upcoming changes, which may become public knowledge when they are released for UAT.

There's also just an issue of scale; they apparently regularly release several updates like this per day, so I'm not sure how UAT testing could even be conducted at that pace. Granted I've only ever personally involved with UAT for applications that had quarterly (major) updates, so there might be ways to get it done several times a day that I'm not aware of.

None of that is to take away from the fact that this was an enormous cock up, and that whatever processes they have in place are clearly not sufficient. I completely agree that whatever they do for testing these updates has failed in a monumental way. My work was relatively unaffected by this, but I imagine there are lots of angry customers who are rightly demanding answers for how exactly this happened, and how they intend to avoid something like this happening again.

[–] [email protected] 5 points 1 month ago (2 children)

If I were part of CS management, I'd look into recently fired personnel.

[–] [email protected] 7 points 1 month ago (1 children)

I'd be looking to see who made the most shorting the stock.

A corrupt file wouldn't be nulled. I've never ran across a file with all zeroes that wasn't intentional.

[–] [email protected] 1 points 1 month ago

maybe just lookup the name of the ceo and where he already did similar ;-)

load more comments (2 replies)
load more comments (2 replies)