Within Red Hat’s Coordinated Vulnerability Disclosure (CVD) framework, an embargo is a strictly-defined window of time during which a security vulnerability is known only to a small group of trusted parties before being made public, including the vulnerability reporter and the relevant upstream community and partners.
Why are embargoes necessary?
The primary goal of an embargo is customer protection. If a severe vulnerability is disclosed immediately upon discovery by way of "full disclosure" without an available patch, malicious actors have a window of opportunity to exploit systems while users are defenseless. An embargo provides vendors the necessary time to develop, test, and package a fix, as well as coordinate with the trusted parties mentioned above.
The role of an embargo
An embargo is not about secrecy for secrecy’s sake, it is a temporary, tactical head start for defenders.
- Restricted access: Details are shared only with those essential to fixing the issue.
- Time-boxed: Embargoes are never indefinite. Red Hat advocates for short timelines, typically under 30 days, to encourage fast remediation of issues rather than keeping them private.
- External coordination: Since vulnerabilities are often reported through external channels, such as third-party security researchers, Red Hat also operates within embargo terms set by these parties. We respect the externally-defined parameters to maintain the trust required for a successful coordinated release.
- Coordinated release: The embargo ends on a specific "Coordinated Release Date", where the vulnerability details and the fix are published simultaneously.
Handling leaks
Trust is the currency of an embargo. If information leaks to the public— such as through an upstream bug tracker or social media—prior to the agreed date, the embargo is considered broken. In these cases, Red Hat moves to immediate public disclosure so customers are aware of the risk.
Getting in touch
If you discover a vulnerability or suspect a leak in an existing embargo process, please contact Red Hat Product Security immediately at secalert@redhat.com. We recommend using the Red Hat Product Security GPG key for encrypted communication.
Red Hat Product Security
Sull'autore
Altri risultati simili a questo
MCP security: Implementing robust authentication and authorization
AI trust through open collaboration: A new chapter for responsible innovation
Post-quantum Cryptography | Compiler
Understanding AI Security Frameworks | Compiler
Ricerca per canale
Automazione
Novità sull'automazione IT di tecnologie, team e ambienti
Intelligenza artificiale
Aggiornamenti sulle piattaforme che consentono alle aziende di eseguire carichi di lavoro IA ovunque
Hybrid cloud open source
Scopri come affrontare il futuro in modo più agile grazie al cloud ibrido
Sicurezza
Le ultime novità sulle nostre soluzioni per ridurre i rischi nelle tecnologie e negli ambienti
Edge computing
Aggiornamenti sulle piattaforme che semplificano l'operatività edge
Infrastruttura
Le ultime novità sulla piattaforma Linux aziendale leader a livello mondiale
Applicazioni
Approfondimenti sulle nostre soluzioni alle sfide applicative più difficili
Virtualizzazione
Il futuro della virtualizzazione negli ambienti aziendali per i carichi di lavoro on premise o nel cloud