Open Source Market Segment LS
Open Source Market Segment RS
Friday, 23 April 2021 08:23

Torvalds says submitting known buggy kernel patches is a breach of trust Featured

Linus Torvalds: "'s basically a huge waste of people's time to now go over those things again just because one source has shown itself to not be above board." Linus Torvalds: "'s basically a huge waste of people's time to now go over those things again just because one source has shown itself to not be above board." Courtesy YouTube

Linux creator Linus Torvalds says that while the submission of known buggy patches to the kernel team is not a huge deal, it is obviously a breach of trust.

Torvalds was reacting to the act by a group at the University of Minnesota who sent known buggy patches to senior developer Greg Kroah-Hartman in order to write a paper.

Kroah-Hartman, normally a man who is the epitome of politeness, lost his cool when these patches were sent as it needlessly created additional work for him. He maintains the stable line of kernels.

"I don't really know what to say, I think the email thread is likely the most relevant information," Torvalds told iTWire in response to a query.

"I don't think it has been a huge deal _technically_, but people are pissed off, and it's obviously a breach of trust."

Kroah-Hartman told the university's Aditya Pakki that the buggy patches had been sent to see how the kernel community would react, so that some others at the same institution could write a research paper.

The university's Qiushi Wu and Kangjie Lu published the paper in question, which is titled "On the feasibility of stealthily introducing vulnerabilities in open-source software via hypocrite commits".

It claimed to explore the possibility of stealthily introducing vulnerabilities in open-source software, in this case the Linux kernel.

Despite these provocations, Kroah-Hartman used polite language in responding to Pakki and the university.

"When submitting patches created by a tool, everyone who does so submits them with wording like 'found by tool XXX, we are not sure if this is correct or not, please advise." which is NOT what you did here at all," he wrote.

"Because of this, I will now have to ban all future contributions from your University and rip out your previous contributions, as they were obviously submitted in bad-faith with the intent to cause problems."

Torvalds added: "It's also annoying, because most of the patches are valid (and the ones that aren't are generally 'useless' rather than 'actively malicious'), so it's basically a huge waste of people's time to now go over those things again just because one source has shown itself to not be above board."

The university's Mats Heimdahl and Loren Terveen, head and deputy head respectively of the university's Department of Computer Science, put out a media statement after the story broke, saying: "Leadership in the University of Minnesota Department of Computer Science & Engineering learned today about the details of research being conducted by one of its faculty members and graduate students into the security of the Linux kernel.

"The research method used raised serious concerns in the Linux kernel community and, as of today, this has resulted in the University being banned from contributing to the Linux kernel.

"We take this situation extremely seriously. We have immediately suspended this line of research. We will investigate the research method and the process by which this research method was approved, determine appropriate remedial action, and safeguard against future issues, if needed."

Heimdahl and Terveen will issue a report about the incident as soon as they could, saying: "We will report our findings back to the community as soon as practical."

Read 6835 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site and prominent Newsletter promotion and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News