Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 23 Jul 2015 22:58:10 -0600
From: Kurt Seifried <>
Subject: Re: Qualys Security Advisory - CVE-2015-3245 userhelper
 - CVE-2015-3246 libuser

On 07/23/2015 05:50 PM, Philip Pettersson wrote:
> On Fri, Jul 24, 2015 at 3:43 AM, Leif Nixon <> wrote:
>> Qualys Security Advisory <> writes:
>>> Hello, it is July 23, 2015, 17:00 UTC, the Coordinated Release Date for
>>> CVE-2015-3245 and CVE-2015-3246.  Please find our advisory below, and
>>> our exploit attached.
>> *Why* are you releasing a full exploit just minutes after the patch is
>> released?
>> (Disclosure: I am employed by Red Hat, but this is my purely personal question.)
> That's how coordinated release dates work. Instead of trying to shame
> Qualys for not following your arbitrary views on what is and isn't
> "Responsible Disclosure", perhaps you should make sure Red Hat
> releases patches hours before the CRD, like Ubuntu does?

So... we released within less than an hour of the CRD, the reason we
were late, ironically, is that we were waiting for Qualys to go public
(we were keeping an eye on oss-security, their blog and twitter feed),
and Qualys was waiting for us to go public before they released (we
finally asked after about 20 minutes and then it happened).

Here's something I love about Red Hat: internally we have a wide range
of views, literally the full spectrum, and we quite often debate things
internally, and even externally, both from professional and personal
perspectives (e.g. my views on embargoes actually encompass several
incompatible ideas/views, the trick is trying to find a least bad
solution that optimizes globally without completely harming various

Our CEO even wrote a book about organizations full of such people =):

Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Red Hat Product Security contact:

Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.