|
Message-ID: <55B18624.3070706@canonical.com>
Date: Thu, 23 Jul 2015 19:26:12 -0500
From: Jamie Strandboge <jamie@...onical.com>
To: oss-security@...ts.openwall.com
Subject: Re: Qualys Security Advisory - CVE-2015-3245 userhelper
- CVE-2015-3246 libuser
On 07/23/2015 06:50 PM, Philip Pettersson wrote:
> On Fri, Jul 24, 2015 at 3:43 AM, Leif Nixon <nixon@...ator.liu.se> wrote:
>> Qualys Security Advisory <qsa@...lys.com> writes:
>>
>>> Hello, it is July 23, 2015, 17:00 UTC, the Coordinated Release Date for
>>> CVE-2015-3245 and CVE-2015-3246. Please find our advisory below, and
>>> our exploit attached.
>>
>> *Why* are you releasing a full exploit just minutes after the patch is
>> released?
>>
>> (Disclosure: I am employed by Red Hat, but this is my purely personal question.)
>
> That's how coordinated release dates work. Instead of trying to shame
> Qualys for not following your arbitrary views on what is and isn't
> "Responsible Disclosure", perhaps you should make sure Red Hat
> releases patches hours before the CRD, like Ubuntu does?
Ubuntu is actually very careful to not release anything ahead of CRD unless the
CRD is broken elsewhere. Not saying we've never made a mistake, but as you can
imagine it is quite annoying when a CRD is broken-- we certainly don't want to
be the cause of that annoyance for others. :)
(Disclosure: I am employed by Canonical)
--
Jamie Strandboge http://www.ubuntu.com/
Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.