[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 26 May 2011 10:29:42 -1000
From: akuster <akuster@...sta.com>
To: Dan Rosenberg <dan.j.rosenberg@...il.com>
CC: oss-security@...ts.openwall.com
Subject: Re: Closed list
Dan,
Thanks for the feedback. I sent the vulnerability to the folks responsible.
Mahalo,
Armin
On 05/26/2011 07:44 AM, Dan Rosenberg wrote:
> Hi Armin,
>
> You've got a reflected cross-site scripting vulnerability in your CVE tracker:
>
> http://www.mvista.com/cve_details.php?year=%3Cscript%3Ealert%28%27xss%27%29%3C/script%3E
>
> Regards,
> Dan
>
> On Thu, May 26, 2011 at 11:42 AM, akuster <akuster@...sta.com> wrote:
>> Aloha,
>>
>> You can find our security Advisories at:
>> http://www.mvista.com/cve_vulnerabilities.php
>>
>> I have updated
>> http://oss-security.openwall.org/wiki/vendors
>> http://oss-security.openwall.org/wiki/distro-patches
>>
>>
>> Mahalo,
>> Armin
>>
>> On 04/09/2011 10:39 AM, Solar Designer wrote:
>>> On Fri, Apr 08, 2011 at 11:40:45AM -1000, akuster wrote:
>>>> Can I get a status on this? (+, -, Ack, Nack)
>>>
>>> Postponed. I'd like to see any support for you getting onto the Linux
>>> distros security contacts list, with reasoning, or/and any other
>>> suggestions on what to do in this case. Josh - what do you think (as
>>> someone who advocated the setup of a vendor-sec replacement)?
>>>
>>> Formally, you sort of qualify (you were on vendor-sec and presumably you
>>> have a Linux distro, although I failed to quickly find a way to see what
>>> kind of software your distro contains). However, from your own
>>> statement (quoted below), it appears that we're not going to be able to
>>> see whether and how you make intended use of the advance notifications:
>>>
>>>> Our advisories are via a paid subscription service so they are not public.
>>>
>>> Obviously, this goes against the attempt at transparency, and also it
>>> means that we won't be able to evaluate your need to be on the list in
>>> the same way that we do/should/will for other vendors - e.g., we may
>>> re-check Frugalware and rPath in a few months from now to see if their
>>> security response has sufficiently improved to warrant the advance
>>> notifications to them or not, but what do we do for MontaVista? grant
>>> you an unconditional exception?
>>>
>>> You also wrote:
>>>
>>>> Our customers require vulnerabilities to be addressed in a timely manner.
>>>
>>> So you have contractual relationships with your customers and you're
>>> going to use the advance notifications in your business. Well, many of
>>> the more open Linux distros also have paying customers, but in your case
>>> this is all you have (if I understood you correctly).
>>>
>>> For both kinds of distros, it is possible that the vendor will misuse
>>> the advance notifications to notify their customers before the issue is
>>> disclosed publicly (which normally happens on the CRD). We ask and hope
>>> that vendors won't do this, but the risk is there. Arguably, for a
>>> vendor that is not making their advisories and updates public, this
>>> temptation and thus the risk are higher.
>>>
>>> Then, a closed Linux vendor like MontaVista, working for their paying
>>> customers only, is somewhat similar to an end-user of Linux who
>>> maintains their own Linux distro in-house. Where do we draw the line?
>>> Many legal entities vs. one? I doubt that this is going to work as
>>> desired (and I imagine that different people in here would want it to
>>> work differently anyway). For example, a large enterprise is likely to
>>> use multiple legal entities. Substantially same ownership? This gets
>>> too tricky, non-technical, non-specific, and subject to change.
>>>
>>> Clearly, we can't reasonably start to accept end-users of Linux merely
>>> because they build their own distro... or just claim to.
>>>
>>> I understand that generalization and reductio ad absurdum may lead to a
>>> logical fallacy, however unfortunately we're setting a precedent here
>>> (one way or the other), so we may need to generalize and consider likely
>>> consequences of the precedent... unless we're happy to drop the list
>>> when it grows too large and maybe start anew, with stricter rules.
>>>
>>> Finally, here's an additional aspect/concern. The list is being setup
>>> as a hopefully better alternative to explicit CC lists. "Members" of
>>> those lists are picked by whoever reports the issue - this person
>>> could be from one of the distros or it could be an external reporter.
>>> Would many (or any) of those people want to report to MontaVista
>>> specifically (along with other distros) or to closed Linux vendors in
>>> general? I think not. I think that having such vendors on the list
>>> would feel like a tax to many reporters, who would have to weigh the
>>> pros and cons of using the exploder (ease of use, an up-to-date list of
>>> contact persons, encryption, but extra vendors notified) vs. direct e-mail
>>> (excluding those who they don't want to or don't care to notify).
>>> I think that many would choose the latter (and end up excluding some of
>>> the open distros as well, even though they would not mind notifying
>>> them), thereby reducing the usefulness of the list.
>>>
>>> And you also wrote:
>>>
>>>> will revisit the wiki issue soon.
>>>
>>> Since you pinged me about the status on your subscription, let me ping
>>> you about the status on the wiki updates as well. ;-) Any progress?
>>> The pages to update with your info are:
>>>
>>> http://oss-security.openwall.org/wiki/vendors
>>> http://oss-security.openwall.org/wiki/distro-patches
>>>
>>> Please don't take any of the above personal. I am just trying to
>>> provide a useful service to the community. This is a thankless job, and
>>> I'd be happy if someone else does it - and does it better, or just
>>> differently to provide an alternative. I'd be happy if the alternative
>>> wins, letting me happily shutdown the list. (I've been privately asked
>>> to provide a hopefully more secure alternative to vendor-sec long before
>>> vendor-sec ceased to exist, but I really did not want to get Openwall
>>> into the mess, nor did I have time for it. I only felt like I had to do
>>> it when it became clear that the lst.de folks would not host something
>>> like this anymore.)
>>>
>>> In fact, MontaVista may host such a list as well, which would include
>>> MontaVista and more... but I would not expect many (maybe even most?)
>>> other distros and reporters to want to write to that list, which would
>>> kind of confirm the problem with having MontaVista on the list.
>>>
>>> Please let me know if I misunderstood anything or if you have any
>>> suggestions.
>>>
>>> Thanks,
>>>
>>> Alexander
>>
Powered by blists - more mailing lists
Please check out the
Open Source Software Security Wiki, which is counterpart to this
mailing list.
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ