Within Red Hat’s Coordinated Vulnerability Disclosure (CVD) framework, an embargo is a strictly-defined window of time during which a security vulnerability is known only to a small group of trusted parties before being made public, including the vulnerability reporter and the relevant upstream community and partners.

Why are embargoes necessary? 

The primary goal of an embargo is customer protection. If a severe vulnerability is disclosed immediately upon discovery by way of "full disclosure" without an available patch, malicious actors have a window of opportunity to exploit systems while users are defenseless. An embargo provides vendors the necessary time to develop, test, and package a fix, as well as coordinate with the trusted parties mentioned above.

The role of an embargo

An embargo is not about secrecy for secrecy’s sake, it is a temporary, tactical head start for defenders.

  • Restricted access: Details are shared only with those essential to fixing the issue.
  • Time-boxed: Embargoes are never indefinite. Red Hat advocates for short timelines, typically under 30 days, to encourage fast remediation of issues  rather than keeping them private.
  • External coordination: Since vulnerabilities are often reported through external channels, such as third-party security researchers, Red Hat also operates within embargo terms set by these parties. We respect the externally-defined parameters to maintain the trust required for a successful coordinated release.
  • Coordinated release: The embargo ends on a specific "Coordinated Release Date", where the vulnerability details and the fix are published simultaneously.

Handling leaks

Trust is the currency of an embargo. If information leaks to the public— such as through an upstream bug tracker or social media—prior to the agreed date, the embargo is considered broken. In these cases, Red Hat moves to immediate public disclosure so customers are aware of the risk.

Getting in touch

If you discover a vulnerability or suspect a leak in an existing embargo process, please contact Red Hat Product Security immediately at secalert@redhat.com. We recommend using the Red Hat Product Security GPG key for encrypted communication.

Red Hat 製品セキュリティ

あらゆる場所の誰もが、セキュリティとプライバシーのリスクを軽減するために必要な質の高い情報と、そうするための手段を利用できる権利を持っている、それが Red Hat の信念です。

執筆者紹介

UI_Icon-Red_Hat-Close-A-Black-RGB

チャンネル別に見る

automation icon

自動化

テクノロジー、チームおよび環境に関する IT 自動化の最新情報

AI icon

AI (人工知能)

お客様が AI ワークロードをどこでも自由に実行することを可能にするプラットフォームについてのアップデート

open hybrid cloud icon

オープン・ハイブリッドクラウド

ハイブリッドクラウドで柔軟に未来を築く方法をご確認ください。

security icon

セキュリティ

環境やテクノロジー全体に及ぶリスクを軽減する方法に関する最新情報

edge icon

エッジコンピューティング

エッジでの運用を単純化するプラットフォームのアップデート

Infrastructure icon

インフラストラクチャ

世界有数のエンタープライズ向け Linux プラットフォームの最新情報

application development icon

アプリケーション

アプリケーションの最も困難な課題に対する Red Hat ソリューションの詳細

Virtualization icon

仮想化

オンプレミスまたは複数クラウドでのワークロードに対応するエンタープライズ仮想化の将来についてご覧ください