- A core developer of Nginx, the popular web server, has quit the project and started a fork called freenginx.
- The developer cited disagreements with the new management at F5, which acquired Nginx Inc. in 2019, over security policies.
- The dispute arose from the assigning of Common Vulnerabilities and Exposures (CVEs) to bugs in the experimental HTTP/3 code.
Archive link: archive.ph/U4XRN
assembly@lemmy.world 9 months ago
So I am a bit confused on this one. Why does this particular developer or anyone really, disagree with assigning CVEs to releases code? I mean I get that it is experimental but having associated CVEs adds to disclosure on the experimental features. What is the downside of the assigned CVEs? I was all ready to jump on F5 being wrong but it sounds like they may have taken the right position. Can someone elaborate on why that may not be the case?
Deebster@programming.dev 9 months ago
I think most people share your confusion. It seems that F5 was following their responsibility as a CNA, but one guy disagreed enough to leave with all his toys.
just_another_person@lemmy.world 9 months ago
I believe what this is saying is that management decided to only fix CVEs in certain versions going forward, instead of older versions. It’s hard to tell for sure.
JakenVeina@lemm.ee 9 months ago
There was another article I read that had a snippet from F5. As I read it, their concern was that they have two release tracks: the paid/subscription track, and the free track. They are actually the same code, but the free track is just 2 releases behind, so the idea is that if you want the “latest and greatest” stuff, you gotta pay. It’s a fairly common strategy in the industry.
So, the concern is that for security vulnerabilities that are not CVEs, info about the vulnerability (and how to exploit it) is out in the wild for two whole releases, before the patch reaches the free-tier users.
Seems like an actively good position on F5’s part, from this angle.