FMX wrote:
eric76 wrote:
As I understand it, the fundamental problem is that those who wrote the OpenSSL code sacrificed security for efficiency. Instead of allocating and freeing memory through operating system calls when desired, they would not free it but would keep the space available for the next time they needed memory that would fit within that space.
No, that wasn't the case with this bug. The memory was allocated properly, they just read more than they allocated.
As far as I know that's correct.
The reason it went undetected for so long is that it wasn't at all obvious from the code what was happening, it took a company running extensive memory tests on the software to stumble across it.
So no, it wasn't a result of a deliberate action of any sort or even negligence on the part of the coders, but of a coding snafu in which there was a flaw in the code that stayed there for a long time because from a coding perspective it didn't look flawed & it was only through extensive, rigourous testing of the system that the bug came to light.
This is why I'm always telling people that no system with data flowing in & out can be completely secured: the systems are always too big and complicated & heterogeneous for any one person to see the whole picture, and so there will always be holes that can be exploited and people who do so.
Blaming coders, sysadmins, hosting services and/or techs happens when lay people fail to realize the ridiculously complicated nature of the whole setup, how difficult & time comsuming it is to test for all contingencies and how easy it is to inadvertantly make a mistake without ever knowing it or even realizing that it was a mistake because no one else does either, it looks right, and as far as you know it tests right.
That's what happened here, and it's kind of sad to see people pointing fingers for a problem that was really no one's fault.