Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 23 Jan 2012 22:31:35 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Michael Gilbert <michael.s.gilbert@...il.com>
Subject: Re: CVE id assignment dates

On 01/23/2012 06:05 PM, Michael Gilbert wrote:
> On Mon, Jan 23, 2012 at 3:04 PM, Steven M. Christey wrote:
>> We do not publish any dates related to disclosure, patch, or vendor
>> notification; interested parties can consult other databases that explicitly
>> track this information, such as OSVDB.
> 
> Just curious, why not?  It seems like this kind of information would
> be invaluable for researchers interested anthropological/statistical
> studies of security vulnerabilities.
> 
> Best wishes,
> Mike

If you'd like to do the work/research needed to nail these down I'm sure
someone (I can't speak on behalf of Mitre) would accept the data, but
speaking from experience (at iSIGHT/iDefense) it is a LOT of work in
some cases (you start going down rabbit holes pretty quickly, things
that appear simple often are not), so to do it consistently for all
issues (even within a "small" group of packages or vendors) is a full
time job for more than one person.

--

-- Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ