A widespread Blue Screen of Death (BSOD) issue on Windows PCs disrupted operations across various sectors, notably impacting airlines, banks, and healthcare providers. The issue was caused by a problematic channel file delivered via an update from the popular cybersecurity service provider, CrowdStrike. CrowdStrike confirmed that this crash did not impact Mac or Linux PCs.

It turns out that similar problems have been occurring for months without much awareness, despite the fact that many may view this as an isolated incident. Users of Debian and Rocky Linux also experienced significant disruptions as a result of CrowdStrike updates, raising serious concerns about the company’s software update and testing procedures. These occurrences highlight potential risks for customers who rely on their products daily.

193 points

The analysis revealed that the Debian Linux configuration was not included in their test matrix.

You might as well say you don’t support Linux.

“Crowdstrike’s model seems to be ‘we push software to your machines any time we want, whether or not it’s urgent, without testing it’,” lamented the team member.

I wonder how this shit works on NixOS.

permalink
report
reply
75 points

If I’m remembering right, RHEL is Crowdstrike’s primary Linux target. And NixOS wouldn’t even be a factor since it’s basically just not enterprise grade.

That said, they need a serious revision of their QA processes.

permalink
report
parent
reply
37 points
*

RHEL, Ubuntu, & Debian cover the vast majority of enterprise installs I imagine, and provide a solid testing base for developers in the Linux business software space.

Maybe you add Gentoo, some post-CentOS clones/forks, or other more niche industry/workload specific distros, but how you do skip Debian?

permalink
report
parent
reply
10 points

RHEL, Ubuntu, & Debian cover the vast majority of enterprise installs I imagine, and provide a solid testing base for developers in the Linux business software space.

Enterprises I imagine are using RHEL, Ubuntu, SUSE’s SLES and Oracle Linux and probably not Debian. But that’s a guess. Where can statistics and numbers be found ?

permalink
report
parent
reply
8 points

In the enterprise realm it is typically SUSE and RHEL.

permalink
report
parent
reply
3 points

I’m not an expert in any sense.

But it was always my impression that Ubuntu and Debian were what you use on personal machines, while RHEL is the baseline standard for professional servers.

Is that not accurate? CrowdStrike’s target customer seems to be the sort of company that would insist on using RHEL for the enterprise features.

permalink
report
parent
reply
2 points

Because their clients don’t ask them about Debian. They ask about RHEL, Ubuntu, and Amazon Linux

permalink
report
parent
reply
97 points

Users of Debian and Rocky Linux also experienced significant disruptions as a result of CrowdStrike updates, raising serious concerns about the company’s software update and testing procedures. These occurrences highlight potential risks for customers who rely on their products daily.

Hot take: maybe bossware is a fucking drain on society, and people should stop buying it.

permalink
report
reply
87 points
*

Yeah, but our leadership had a really nice lunch with their sales rep! Licenses for everyone!

permalink
report
parent
reply
42 points

It’s sad how accurate this is.

permalink
report
parent
reply
6 points

After getting a referral from your cyber insurance rep right?

permalink
report
parent
reply
17 points

Well, if the executive leech class wants workers to have bossware, there’s not all that much people can do about it. Can’t just decide to not use it if your employer demands it

permalink
report
parent
reply
19 points

Worse, my employer doesn’t care about this shit but our clients are demanding we have the bossware installed.

permalink
report
parent
reply
7 points
*

I didn’t mean the average worker. I meant the “executive leech class,” because downtime of this scale means lost profits, which is something they care deeply about.

permalink
report
parent
reply
12 points
*

which is something they care deeply about.

They care about quarterly profits. Preventing fuckups of this scale requires long-term effort which is not profitable by itself, it only prevents possible future fuckups, and this is why proper QC etc. aren’t done. Short term profits over everything else.

permalink
report
parent
reply
7 points

In that case, it’s time for the average workers to sabotage the bossware. Let the leech class solve the problem they create.

permalink
report
parent
reply
89 points

The software is not the problem. Software breaks all the time. The problem is monocultures and centralization. Building entire industry ecosystems all around a single point of failure. This is the just-in-time manufacturing supply chain disruptions and fragility all over again.

Who knew, a diverse ecosystem was a strength, not a weakness.

permalink
report
reply
45 points

The software is the problem if it’s produced with a corporate mentality of “ship first, fix later”.

permalink
report
parent
reply
11 points

Yep, at this point the “security” companies can do with imitating malware development practices.

permalink
report
parent
reply
15 points
*
Deleted by creator
permalink
report
parent
reply
7 points

Everyone got an MBA and failed to realize it was just corporate brainwashing.

permalink
report
parent
reply
7 points

Nature has been telling us all long, but we don’t listen!

permalink
report
parent
reply
73 points

“I don’t test often but when I do I test on the entire planet”

permalink
report
reply
61 points

rootkit doing rootkit things

permalink
report
reply

Linux

!linux@programming.dev

Create post

A community for everything relating to the linux operating system

Also check out !linux_memes@programming.dev

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

Community stats

  • 2.3K

    Monthly active users

  • 390

    Posts

  • 2.8K

    Comments