The hidden costs of embargoes (Red Hat Security Blog)
Patch creation with an embargoed issue means only the researcher and upstream participating. The end result of this is often patches that are incomplete and do not fully address the issue. This happened with the Bash Shellshock issue (CVE-2014-6271) where the initial patch, and even subsequent patches, were incomplete resulting in several more CVEs (CVE-2014-6277, CVE-2014-6278, CVE-2014-7169). For a somewhat complete listing of such examples simply search the CVE database for 'because of an incomplete fix for'."
Posted Jun 12, 2015 18:48 UTC (Fri)
by dany (guest, #18902)
[Link] (6 responses)
in worst case (like in 175 incomplete fixes), the outcome is very similar to full disclosure scenario, so I dont see any added hidden cost of this model
Posted Jun 12, 2015 20:08 UTC (Fri)
by Wol (subscriber, #4433)
[Link] (2 responses)
Firstly the false sense of security that the problem has been fixed - which leads to sysadmins making mistakes because the security guys are treating them like mushrooms ...
Secondly, in your "worst case scenario", that's 174 lots of wasted effort trying to fix the problem, and thousands of times that of sysadmins installing dud fixes.
Cheers,
Posted Jun 14, 2015 8:30 UTC (Sun)
by NAR (subscriber, #1313)
[Link] (1 responses)
Posted Jun 14, 2015 9:39 UTC (Sun)
by Wol (subscriber, #4433)
[Link]
And the real cost is to the sysadmins :-( Every "fix" that's trapped by QA as no good saves masses and oodles of sysadmin and user time.
Cheers,
Posted Jun 12, 2015 21:12 UTC (Fri)
by raven667 (subscriber, #5198)
[Link] (2 responses)
So No QA or Manual QA are part of the cost of embargoes, with full disclosure and no embargo then security fixes can use the normal development and QA tools when those tools are publicly accessible.
Posted Jun 13, 2015 5:57 UTC (Sat)
by epa (subscriber, #39769)
[Link]
Posted Jun 17, 2015 16:48 UTC (Wed)
by jreznik (guest, #61949)
[Link]
Posted Jun 13, 2015 5:18 UTC (Sat)
by ghane (guest, #1805)
[Link]
But that is what I always do anyway. I embargo only those that really matter. Now you are debating, not embargo, but "really matter".
This is like saying ASAP. Of course I will do it as soon as it is possiblle, I cannot do it earlier. And of course I will do it when it is possible, why delay?
Posted Jun 13, 2015 13:20 UTC (Sat)
by flussence (guest, #85566)
[Link] (1 responses)
I propose we give them a taste of their own medicine, by labelling this kind of sociopathic conduct "Narcissistic Disclosure".
Posted Jun 13, 2015 17:41 UTC (Sat)
by rahulsundaram (subscriber, #21946)
[Link]
Posted Jun 16, 2015 13:50 UTC (Tue)
by jcpunk (subscriber, #95796)
[Link] (1 responses)
Posted Jun 23, 2015 13:57 UTC (Tue)
by mirabilos (subscriber, #84359)
[Link]
The hidden costs of embargoes (Red Hat Security Blog)
The hidden costs of embargoes (Red Hat Security Blog)
Wol
The hidden costs of embargoes (Red Hat Security Blog)
The hidden costs of embargoes (Red Hat Security Blog)
Wol
The hidden costs of embargoes (Red Hat Security Blog)
The hidden costs of embargoes (Red Hat Security Blog)
Yes, that's something we discussed several times in Fedora. Last time I was asked by our OpenJDK guys if we could support private infrastructure. As OpenJDK build and required test suite could take days but you can't start before embargo ends... In the end, Fedora Board (at that time, no Council) approved it. But the amount of work would be so huge, that costs of doing it would be too high. It means support in our dist GIT, support in build system (Koji), same in Bodhi (tool that issues updates). Then private QA where automation is now happening but again - in open manner... And then we have troubles with issuing updates on time, so even we have build and fix, it can take days before it hits users but that's different issue and under discussion right now.
The hidden costs of embargoes (Red Hat Security Blog)
The hidden costs of embargoes (Red Hat Security Blog)
> "The answer to the embargo question is surprisingly simple: we only embargo the issues that really matter and even then we use embargoes sparingly."
The hidden costs of embargoes (Red Hat Security Blog)
The hidden costs of embargoes (Red Hat Security Blog)
The hidden costs of embargoes (Red Hat Security Blog)
The hidden costs of embargoes (Red Hat Security Blog)