Re: Security release criterion proposal

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 2011-05-18 at 14:02 -0400, Adam Jackson wrote: 
> On 5/18/11 1:44 PM, Adam Williamson wrote:
> > On Wed, 2011-05-18 at 13:37 -0400, Adam Jackson wrote:
> >> On 5/18/11 1:22 PM, Kevin Kofler wrote:
> >>> Adam Williamson wrote:
> >>>> # There must be no known remote code execution vulnerability which could
> >>>> be exploited during installation or during use of a live image shipped
> >>>> with the release
> >>>
> >>> This is just completely and utterly moot considering that there are going to
> >>> be many more unknown vulnerabilities than known ones, and that several of
> >>> those are inevitably going to come up during the 6-month lifetime of a
> >>> release.
> >>
> >> The difference between a known and an unknown security bug is that, if
> >> _you_ know about it, it's virtually certain that someone malicious
> >> already does too.
> >>
> >> We can't avoid unknown risk exposure.  You're arguing for ignoring known
> >> risk exposure entirely.  Seems a touch irresponsible.
> >>
> >> Also: twelve month.
> >
> > Well, I think his point is that it's almost certain that some 'unknown'
> > exposures will become 'known' during the life cycle of a release, at
> > which point the live images we release three months previously are
> > vulnerable to a known security exploit and there's exactly nothing we
> > can do about it - so worrying about the ones we _can_ fix at release
> > time becomes less important, when viewed from that perspective. It's a
> > good point.
> 
> It's a rationally argued position, but argued from an initial state that 
> does not reflect reality.
> 
> I mean, the conclusion from that line of reasoning is that all releases 
> are futile: any sufficiently severe bug unknown at release time could be 
> discovered later, and could be so crippling as to make the release useless.
> 
> I don't necessarily disagree with that logic either.  However, we've 
> decided to do releases.  Therefore we ought to have some standard of 
> quality for release content definition.  After that it's all a matter of 
> drawing the line.  I'd argue that knowingly exposing the user to a 
> remote root exploit is actively negligent behaviour; remote user code 
> execution, less so but still very bad; local privilege escalation, less 
> so still.
> 
> I'd rather not ship something that I _know_ will result in the user 
> getting rooted.  This is so fundamental a tenet of quality that I have 
> difficulty even believing someone could disagree.  I guess Kevin's brain 
> is simply something I should stop being surprised by.

Also note that targeting the heaps of poor users that are eager to try
the newly shipped Fedora release would be probably much more easy and
efficient than targeting one user installing the Fedora here or there a
few months later. So yes, definitely remote root and user exploits in
the installer, Live CDs, and in my opinion also the default install
should be release blockers.

By the way do we have statistics about when this kind of blockers
happened during our previous releases?
-- 
Tomas Mraz
No matter how far down the wrong road you've gone, turn back.
                                              Turkish proverb

-- 
devel mailing list
devel@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/devel


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]
  Powered by Linux