|
Message-ID: <87y19zx6or.fsf@mid.deneb.enyo.de> Date: Sat, 30 Mar 2024 13:09:08 +0100 From: Florian Weimer <fw@...eb.enyo.de> To: "Liguori, Anthony" <aliguori@...zon.com> Cc: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: Re: Re: backdoor in upstream xz/liblzma leading to ssh server compromise * Anthony Liguori: > I think we should have a policy that if issues are suspected to be > actively exploited, that the issue goes public immediately. If even > there is no patch or mitigation, there's not a lot of benefit to > keeping it private. I think we are heading in this direction anyway, given that more and more people are under reporting obligations for active exploitation. Untangling who has to be notified when isn't really a good use of our time. I expect we'll have to tell reporters that if they tell us that a vulnerabilty is under active exploitation, we'll have to go public more or less immediately.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.