Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 13 Apr 2011 22:42:43 +0200
From: Ronald van den Blink <>
To: <>
Subject: Re: Closed list

On 4/13/11 5:17 PM, "akuster" <> wrote:

>On 04/12/2011 11:25 PM, Ronald van den Blink wrote:
>> On 4/12/11 11:49 PM, "akuster" <> wrote:
>>> On 04/11/2011 09:57 AM, Josh Bressers wrote:
>>>> ----- Original Message -----
>>>>> Postponed. I'd like to see any support for you getting onto the Linux
>>>>> distros security contacts list, with reasoning, or/and any other
>>>>> suggestions on what to do in this case. Josh - what do you think (as
>>>>> someone who advocated the setup of a vendor-sec replacement)?
>>>> My initial thought is that a vendor without public advisories is a
>>>> liability.
>>> Making our Advisories public could put our customers' customers at risk
>>> depending on when we publish and when our customers can get the fixes
>>> into their customers hands and so on down the line.
>>> - Armin
>> Hi Armin,
>> Sorry for putting my $0.02 in the bucket here as well, but the whole
>> purpose of a closed list is that you can fix them before releasing a
>> public advisory. When you fixed it, the customers can (just like other
>> dist's do, just get it patched before you publish it.
>Are you joking? I was told Embargoes could not be released to our
>customers until the agreed to release date. That would change some
>things and would be more like .02 euros.
>- Armin
The specifics for this list are not clear to me, but fixing a security
issue/bug can be done before the public release of the advisory. The
second the advisory hits "the news" you have the patches ready for you
customers. That's what I was trying to say. What Dan is pointing out as
well is important here, I'm sure that only advisories for your own
specific distri's and keeping those "in house" are providing your
customers with a false sense of security. A clever sysadmin will be aware
that a security fix for $distri will also mean that your software is
affected. And an evil hacker will know this as well.

But I'm taking my ass out of this discussion. I'm not providing a Linux
distribution, only part of the development team of an open source
e-commerce solution with the luck of only having one security bug / CVE in
the last 4 releases :P



>It's not that this
>> is so strange, as closed source OS makers are doing the same (remember
>> Black Tuesday's at MS and Apple's releases).
>> Just my 2 cents.
>> Ronald 

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.