Re: Proper procedure for reporting possible securityvulnerabilities?

From: Alan Cox
Date: Tue Jan 11 2005 - 13:03:29 EST


On Maw, 2005-01-11 at 17:05, Jesper Juhl wrote:
> Problem is that the info can then get stuck at a vendor or maintainer
> outside of public view and risk being mothballed. It also limits the
> number of people who can work on a solution (including peole getting to
> work on auditing other code for similar issues). It also prevents admins
> from taking alternative precautions prior to availability of a fix (you
> have to assume the bad guys already know of the bug, not just the good
> guys).

The evidence is that for the most part the bad guys don't know about the
bug and the majority of the bad guys are not skilled enough to write
some of the complex exploits. They also automate extensively so given an
exploit can make very fast very effective use of it. There is an entire
field of economics and game theory tied up in this as well as papers by
some in the field who look at computer security models this way.

If you are a member of the full disclosure camp then fine, but please cc
vendor-sec when you publish the hole just in case Linus loses the email
and so vendors know too and can plan appropriately.

Alan

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/