| From: | Stephen Frost <sfrost(at)snowman(dot)net> |
|---|---|
| To: | Bruce Momjian <bruce(at)momjian(dot)us> |
| Cc: | Josh Berkus <josh(at)agliodbs(dot)com>, pgsql-advocacy(at)postgresql(dot)org |
| Subject: | Re: Heroku early upgrade is raising serious questions |
| Date: | 2013-04-18 00:04:46 |
| Message-ID: | 20130418000446.GD4361@tamriel.snowman.net |
| Views: | Whole Thread | Raw Message | Download mbox | Resend email |
| Thread: | |
| Lists: | pgsql-advocacy |
* Bruce Momjian (bruce(at)momjian(dot)us) wrote:
> These are all good points. The vulnerability that got Heroku early
> access was a network port vulnerability. A different type of
> vulnerability might _not_ have gotten them early access, and might have
> gotten someone else early access. This port vulnerability was of a
> severity that historically we only see every five years, so it is hard
> to come up with a policy that might not be exercised for another five
> years.
I'm not a fan of building some massive table of who has what exposures
that we need to go and consult every time we have a security fix.
There's either "ok, certain people should know about this ahead of time"
and "this is small-potatoes and doesn't really need early notice", which
mainly boils down into unauthenticated vs. authenticated
vulnerabilities, imv.
I do agree, however, that each security issue needs to be considered
independently on a case-by-case basis.
Thanks,
Stephen
| From | Date | Subject | |
|---|---|---|---|
| Next Message | Simon Riggs | 2013-04-18 08:09:10 | Re: 9.3 Beta 1 Coming Soon! |
| Previous Message | Stephen Frost | 2013-04-18 00:01:51 | Re: Heroku early upgrade is raising serious questions |