207
this post was submitted on 16 Feb 2024
207 points (98.1% liked)
Technology
59589 readers
3394 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
So I am a bit confused on this one. Why does this particular developer or anyone really, disagree with assigning CVEs to releases code? I mean I get that it is experimental but having associated CVEs adds to disclosure on the experimental features. What is the downside of the assigned CVEs? I was all ready to jump on F5 being wrong but it sounds like they may have taken the right position. Can someone elaborate on why that may not be the case?
I believe what this is saying is that management decided to only fix CVEs in certain versions going forward, instead of older versions. It's hard to tell for sure.
There was another article I read that had a snippet from F5. As I read it, their concern was that they have two release tracks: the paid/subscription track, and the free track. They are actually the same code, but the free track is just 2 releases behind, so the idea is that if you want the "latest and greatest" stuff, you gotta pay. It's a fairly common strategy in the industry.
So, the concern is that for security vulnerabilities that are not CVEs, info about the vulnerability (and how to exploit it) is out in the wild for two whole releases, before the patch reaches the free-tier users.
Seems like an actively good position on F5's part, from this angle.
Not particularly when you consider it is standard practice to NOT be charging for CVE and emergency for released products from similar companies. Hell, even RedHat pushed upstream and downstream packages to CentOS if they were the first to patch. Happens with Canonical and the Debian team as well. This engineer saw what F5 was doing, thought it was wrong, and bailed. Seems like a valid response to me.
Thanks for that.
Its a weird that the couldn't just choose to back port the fixes that have security implications even if it wouldn't deserve a cve.
Just a reminder that most things nowadays that put greedy corporations into 'a good position' is detrimental to everyone else.
What's considered as a release in the nginx world?
Any minor update or just the major updates?
Eg. 1.25.4 was recently released. 4 months prior was 1.25.3. 2 months prior to that it was 1.25.2. etc