Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 18 Jun 2013 10:53:03 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: Moritz Muehlenhoff <jmm@...ian.org>
CC: oss-security@...ts.openwall.com
Subject: Re: Thoughts on a vuln/CVE?

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 06/18/2013 10:41 AM, Moritz Muehlenhoff wrote:
> On Tue, Jun 18, 2013 at 12:44:09AM -0600, Kurt Seifried wrote:
>> Also part of my thought process is that (for example) this would
>> be a good configuration to check for and ensure is disabled,
>> something for SCAP for example or the Debian security guide (e.g.
>> a generic "make sure all enabled repos are actually working as
>> expected").
> 
> Debian doesn't endorse any external repository. During package
> installation the pre/post installation scripts run with root privs.
> As such, if you enable a repository you trust the people behind
> that repository with the equivalent to root access to your system
> anyway.
> 
> Cheers, Moritz
> 

I care a lot less about what is "officially endorsed" or not endorsed
and a lot more with what is actually going on. If a large percentage
of people are exposed to a vuln, even if they "shouldn't" be then it
would still get a CVE. I see a lot of CVEs that should never be
exploitable, but people do crazy things/configurations.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=2e/6
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.