this post was submitted on 19 Jul 2024
1992 points (99.1% liked)

linuxmemes

20629 readers
776 users here now

I use Arch btw


Sister communities:

Community rules

  1. Follow the site-wide rules and code of conduct
  2. Be civil
  3. Post Linux-related content
  4. No recent reposts

Please report posts and comments that break these rules!

founded 1 year ago
MODERATORS
 

CrowdStrike effectively bricked windows, Mac and Linux today.

Windows machines won’t boot, and Mac and Linux work is abandoned because all their users are on twitter making memes.

Incredible work.

top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 3 points 1 month ago

on twitter?!?

[–] [email protected] 2 points 1 month ago

Let your plans be dark and impenetrable as night. And when you strike fall like a thunderbolt.

[–] [email protected] 4 points 1 month ago (1 children)

Oh so its not windows only

[–] [email protected] 9 points 1 month ago (1 children)

The joke is Mac and Linux users, who aren't actually effected, are incapacitated due to being busy gloating on social media.

[–] [email protected] 1 points 1 month ago
[–] [email protected] 35 points 1 month ago* (last edited 1 month ago) (1 children)

As a career QA, i just do not understand how this got through? Do they not use their own software? Do they not have a UAT program?

Heads will roll for this

[–] [email protected] 21 points 1 month ago (2 children)

From what I've read, it sounds like the update file that was causing the problems was entirely filled with zeros; the patched file was the same size but had data in it.

My entirely speculative theory is that the update file that they intended to deploy was okay (and possibly passed internal testing), but when it was being deployed to customers there was some error which caused the file to be written incorrectly (or somehow a blank dummy file was used). Meaning the original update could have been through testing but wasn't what actually ended up being deployed to customers.

I also assume that it's very difficult for them to conduct UAT given that a core part of their protection comes from being able to fix possible security issues before they are exploited. If they did extensive UAT prior to deploying updates, it would both slow down the speed with which they can fix possible issues (and therefore allow more time for malicious actors to exploit them), but also provide time for malicious parties to update their attacks in response to the upcoming changes, which may become public knowledge when they are released for UAT.

There's also just an issue of scale; they apparently regularly release several updates like this per day, so I'm not sure how UAT testing could even be conducted at that pace. Granted I've only ever personally involved with UAT for applications that had quarterly (major) updates, so there might be ways to get it done several times a day that I'm not aware of.

None of that is to take away from the fact that this was an enormous cock up, and that whatever processes they have in place are clearly not sufficient. I completely agree that whatever they do for testing these updates has failed in a monumental way. My work was relatively unaffected by this, but I imagine there are lots of angry customers who are rightly demanding answers for how exactly this happened, and how they intend to avoid something like this happening again.

[–] [email protected] 17 points 1 month ago (1 children)

If only there were a way to check a file's integrity.

[–] [email protected] 4 points 1 month ago

or maybe even automatically like in any well done CD or CI environment. at least their customers now know that they ARE the only test environment CS actually has or uses. ¯_(ツ)_/¯

"if only" - poem ("3 seconds" edition):

if only.

if only there would exist CEOs in the world that could learn from their noob-dumb-brain-dead-faults instead of always ever speaking about their successes which were always-ever really done by others instead.

if only.

if only there were shareholders willing to really look at that wreck that tells all his false success storys and lies, so CEOs could then maybe develop at least a minimum of willingness to learn. maybe a minimum of 3 seconds of learning per decade and per ceo could already help lots of companies a really huge lot.

if only.

if only there was damage compensation in effect so that shareholders would be actually willing to take at least some seconds - maybe 3 seconds of really looking at new CEOs could already help, but its only shareholders, not sure if they would be able to concentrate that long or maybe are already too much degenerated over the generations of beeing parasitic only - to look at the CEOs and the damage they cause before giving them ability to cause that damage over and over again.

if only.

[–] [email protected] 5 points 1 month ago (1 children)

If I were part of CS management, I'd look into recently fired personnel.

[–] [email protected] 7 points 1 month ago (1 children)

I'd be looking to see who made the most shorting the stock.

A corrupt file wouldn't be nulled. I've never ran across a file with all zeroes that wasn't intentional.

[–] [email protected] 1 points 1 month ago

maybe just lookup the name of the ceo and where he already did similar ;-)

load more comments
view more: next ›