This page permanently redirects to gemini://gemini.techrights.org/2022/11/01/ibm-sensationalism/.

● 11.01.22

Gemini version available ♊︎

●● Red Hat (IBM) Hyped Up a Fair Pair of Flaws That Isn’t Critical, Isn’t Actively Exploited, and Even Red Hat’s Distro Isn’t Patching Yet

Posted in Deception, Free/Libre Software, FUD, GNU/Linux, IBM, Marketing, Microsoft, Red Hat, Rumour, Security, Servers, Standard at 3:14 pm by Dr. Roy Schestowitz

Video download link | md5sum 8de27c8022d55f728a4d1c5eb55026e0Irresponsible Misinformation About OpenSSL Creative Commons Attribution-No Derivative Works 4.0

=> ↺ Video download link

http://techrights.org/videos/openssl-drama.webm

Summary: Fuelling Microsoft-affiliated and sometimes Microsoft-funded “news” (noise) sites, Red Hat — and to a lesser extent Fedora — exaggerated the severity of bugs a week before their details’ release (long and purposeless suspense); it’s a case of a boy who cries “wolf!” to get “likes” in Twitter and media coverage that relies on nothing but lousy (inaccurate) "tweets", where fact-checking is impeded by NDAs/embargo

=> media coverage that relies on nothing but lousy (inaccurate) "tweets", where fact-checking is impeded by NDAs/embargo

A few days ago we took note of the overhyped (mostly by Red Hat) impending patch for OpenSSL. Red Hat ended up slipping/changing the release date of Fedora, adding some more to the perceived danger, contributing to the scare, resulting in a week’s worth of media misinformation like calling it "zero day" (even in headlines!). This irresponsible hype turns out to be have been outright disinformation (or at best misinformation) about the severity and it’s worth noting that Red Hat is in no hurry to patch its most important products and there are no actively-exploited aspects; in other words, it is not “0-day” and there is no immediate rush to patch (in some cases there is no patch, either).

=> we took note of the overhyped | misinformation like calling it "zero day"

“We perceive this to be a bit of a media blunder, taking informal “tweets” at face value and trying to compete over who produces the most scary headline/s for about a week already.”

The 8 URLs from the video are listed below in a logical order. To quote [4] below “Q: The 3.0.7 release was announced as fixing a CRITICAL vulnerability, but CVE-2022-3786 and CVE-2022-3602 are both HIGH. What happened to the CRITICAL vulnerability?”

We perceive this to be a bit of a media blunder, taking informal “tweets” at face value and trying to compete over who produces the most scary headline/s for about a week already. █

●●●● Links from the video above

OpenSSL 3.0 Series Release Notes

=> 1 OpenSSL 3.0 Series Release Notes

Vulnerabilities list

=> 2 Vulnerabilities list

OpenSSL Security Advisory [01 November 2022]

=> 3 OpenSSL Security Advisory [01 November 2022]

CVE-2022-3786 and CVE-2022-3602: X.509 Email Address Buffer Overflows

=> 4 CVE-2022-3786 and CVE-2022-3602: X.509 Email Address Buffer Overflows

Comments: OpenSSL Outlines Two High Severity Vulnerabilities

=> 5 Comments: OpenSSL Outlines Two High Severity Vulnerabilities

OpenSSL 3.0.7 released

=> 6 OpenSSL 3.0.7 released

OpenSSL Releases Patch for 2 New High-Severity Vulnerabilities

=> 7 OpenSSL Releases Patch for 2 New High-Severity Vulnerabilities

OpenSSL 3.0.7 Fixes Two High-CVEs with Buffer Overflow

=> 8 OpenSSL 3.0.7 Fixes Two High-CVEs with Buffer Overflow

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.

Permalink > Image: Mail

 Send this to a friend

=> Permalink | ↺ Send this to a friend


=> Techrights

➮ Sharing is caring. Content is available under CC-BY-SA.

Proxy Information
Original URL
gemini://gemini.techrights.org/2022/11/01/ibm-sensationalism
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
281.775542 milliseconds
Gemini-to-HTML Time
1.185645 milliseconds

This content has been proxied by September (ba2dc).