3

There has been a lot of noise about the newest Intel x86 vulnerability. I've seen posts on PostgreSQL, the Linux list, Intel, AMD -- all with vague mention of what's going on.

I've seen a few pretty good and convincing write ups on the matter too. It seems like a typical shtf problem. I'm wondering if there is a list of the users that have signed an embargo? Is this "embargo" a formal thing that binds the developers? Or, is it an informal thing to create a constructive working environment?

I'm picturing all the Kernel developers having accepted a formal contract with Intel, and being contractual bound to secrecy.

Evan Carroll
  • 28,578
  • 45
  • 164
  • 290

1 Answers1

5

Note that Google Project Zero published a detailed post on the vulnerabilities at hand before the embargo date. The vulnerabilities are known as Spectre and Meltdown.

This is a general answer, not specific to this vulnerability. An embargo is in practice a gentlepersons' agreement to keep the details of a vulnerability under wraps, while ensuring its tracability (so the appropriate people get credit) and its resolution (by involving the necessary people to get it fixed), for an agreed-upon length of time.

For the kernel specifically, the security process is described here. In particular, it calls for very short embargoes, on the order of a week. Typically though, security response to big issues will be discussed in other venues and might take longer.

The contractual situation varies. Some developers will be bound by relevant clauses in their employment contracts (and contracts between companies, NDAs etc.); others will only be bound by some sort of verbal agreement (or email or whatever). Embargo handling also varies from project to project, and even incident to incident; you'd hope the embargo terms are defined and are made explicit to all participants, but that's not always the case. There is usually an more-or-less formal list of embargo participants (if only the cc list in the various emails), and rules over who is allowed to be pulled in (generally speaking, as few people as possible, but sometimes that's still a lot of people). Ultimately developers are honour-bound, or perhaps more accurately reputation-bound; mess an embargo up and you're less likely to be involved in future embargoes (which might make your work difficult).

I very much doubt there's a formal contract between all the participants in this specific embargo and Intel, except for Intel employees perhaps (where such situations are likely covered by their employment contracts anyway).

You'll find relevant information in a number of places, starting with the distros list "Handling of embargoed information" page.

Stephen Kitt
  • 411,918
  • 54
  • 1,065
  • 1,164