[kde-announce] KDE Security Advisory: Konqueror Referer
Authentication Leak
Waldo Bastian
bastian at kde.org
Tue Jul 29 18:19:42 CEST 2003
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Tuesday 29 July 2003 14:46, Rob Kaper wrote:
> On Tue, Jul 29, 2003 at 11:38:08AM +0200, Dirk Mueller wrote:
> > 07/03/2003 Notification of security at kde.org by George Staikos
> > 07/10/2003 Fixed in KDE CVS.
> > 07/11/2003 OS vendors / binary package providers alerted and
> > provided with patches.
> > 07/29/2003 Public Security Advisory by the KDE Security team.
>
> Why does it take 18 days to release a security update?
It was waiting for KDE 3.1.3 to be released.
> "If an immediate fix is not considered necessary a security alert is issued
> via dot.kde.org, bugtraq and kde-announce at kde.org"
>
> As I do not recall a security alert on July 11th, I assume that an
> "immediate fix" *was* indeed considered necessary. In what way is 18 days
> even close to "immediate" ?
Compared with patching it in CVS HEAD and waiting for 3.2 to be released, I
think 18 days is reasonably immediate. If KDE 3.1.3 hadn't been planned so
close by already the advisory had been sooner.
> Why do KDE users and developers have to be vulnerable for an extended
> period of time based on the responsiveness of packagers? What is the exact
> policy for releasing security fixes? 50% of packages done? All packages
> done? SuSE packages done?
>
> http://www.kde.org/info/security/policy.php is not clear on this.
>
> "We then give them a reasonable amount of time to prepare binary packages."
>
> Who is the KDE Security Team to decide this "reasonable amount of time" and
> why doesn't the entire KDE contributor base get a say in this?
The idea is to reduce the time between the problem becoming widely publicized
and most of our userbase being able to upgrade to a fixed version in order to
keep the overall risk for our userbase to a minimum.
This is based on the assumption that most of our userbase depends on binary
packages and that publication of the vulnerability increases the risk to
unpatched systems.
> In what way are we an open project when OS vendors / binary package
> providers are given special treatment over users and contributors?
>
> "Applications will be evaluated on a case by case basis by the current
> members. The main criteria is the extent to which someone can be helpful in
> excuting [sic] the security policy as described here. That includes a
> willingness not to disclose issues prematurely."
>
> How come the security policy has been locked down, as the "team" can only
> be extended by those who want to execute the policy as described? In what
> way does the KDE Security team justify the special privileges over the KDE
> release process they have taken?
Feel free to suggest improvements to the process.
> Please do not reply with the "black hat", "white hat", "Red Hat" arguments.
> I am fully aware of it and - to a certain degree - can even follow the
> logic, up to the point where it breaks:
>
> Why should users of system A have an extended period of vulnerability
> because system B has a slow packaging and distribution process? There is a
> *reason* I run a vanilla Slackware with many compilations from source:
> source tarballs are faster to fix than waiting for new packages. That is,
> in a world were source tarballs don't depend on the availability of binary
> packages.
I don't think the advantage of having a fix a few days earlier available to
source-users weighs up against the advantage of having the fix not
immediately available to binary-users after it has been publicized. Keep in
mind that this particular problem has been present in KDE for the last 5
years or so.
> Just answer one question: who decided that 18 days was "a reasonable time"
> and under what authority?
Dirk and I made the decision to wait for KDE 3.1.3
Cheers,
Waldo
- --
bastian at kde.org -=|[ SuSE, The Linux Desktop Experts ]|=- bastian at suse.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE/JpCON4pvrENfboIRArdSAJsGgNhFKFZNVmbxTtGpCULDcqGOCACfamr6
g4+euhu3k2a4wWhpfOy5wqQ=
=2fXX
-----END PGP SIGNATURE-----
More information about the Kde-policies
mailing list