Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 24 Jul 2015 15:56:25 +0000
From: mancha <mancha1@...o.com>
To: oss-security@...ts.openwall.com
Cc: Qualys Security Advisory <qsa@...lys.com>
Subject: Re: Qualys Security Advisory - CVE-2015-3245
 userhelper - CVE-2015-3246 libuser

On Thu, Jul 23, 2015 at 08:43:43PM +0200, Leif Nixon wrote:
> Qualys Security Advisory <qsa@...lys.com> writes:
> 
> > Hello, it is July 23, 2015, 17:00 UTC, the Coordinated Release Date
> > for CVE-2015-3245 and CVE-2015-3246.  Please find our advisory
> > below, and our exploit attached.
> 
> *Why* are you releasing a full exploit just minutes after the patch is
> released?
> 
> (Disclosure: I am employed by Red Hat, but this is my purely personal
> question.)
> 
> -- Leif Nixon

There was absolutely nothing wrong with Qualys' timing. When the embargo
ends, it ends.  

The real problem is the underlying model: "responsible disclosure". It's
nothing more than a CYA strategy that doesn't maximize the ecosystem's
welfare. The positive-sounding name fools some into thinking it a good
thing.

--mancha

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.