| ▲ | Denvercoder9 2 hours ago | |||||||||||||||||||||||||||||||||||||||||||||||||
I'm not advocating for delaying the disclosure at all; my point is, if you see your initial disclosure to the kernel didn't go anywhere, to be responsible is to put in a little extra effort to ensure the fix is picked up before you disclose. | ||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | da_chicken 2 hours ago | parent [-] | |||||||||||||||||||||||||||||||||||||||||||||||||
"Didn't go anywhere"? The kernel devs patched it! They patched it weeks ago! The kernel security team needs to communicate security problems in their own releases, because that is where the distros are already looking. Requiring the security researcher to do it is insane. Should a security researcher that identifies a vulnerability in electron.js need to identify every possible project using electron.js to communicate with them the vulnerability exists? No. That's absurd. | ||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||