Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 16 Dec 2016 10:50:00 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security <oss-security@...ts.openwall.com>
Subject: Re: vulnerable version: 4.8.12 and previous versions
 but xml file says: cpe:/o:linux:linux_kernel:4.8.12"/>

>
> On Wed, Dec 14, 2016 at 11:57 AM, Sona Sarmadi <sona.sarmadi@...a.com>
> wrote:
>
>>
>>
>> On 2016-12-14 15:26, Kurt Seifried wrote:
>> > Why are you complaining about a nist.gov website/data on an opensource
>> > security mailing list/to MITRE? (hint: we can't fix it and neither can
>> > MITRE) Please contact NIST.
>> >
>> Thanks for being so helpful.
>>
>> I was just trying to see of there are other people out there who also
>> think this is a problem. This list seemed like a place where I could
>> find such people.
>> Perhaps someone knows a work around, perhaps some post-processing tool.
>> If none exists, I guess we have to try to fix the problem at the source
>> or use another CVE databse.
>>
>> Cheers
>> //Sona
>> > On Wed, Dec 14, 2016 at 1:19 AM, Sona Sarmadi <sona.sarmadi@...a.com>
>> wrote:
>> >
>> >> Hi all,
>> >>
>> >> It seems that nvd.xml files (e.g. nvdcve-2.0-2016.xml) does not list
>> >> vulnerable versions correctly. One example is the following CVE.
>> Vulnerable
>> >>
>>
>>
>
>
So I've been thinking about the question here (and several other recent
postings) and my response (less than ideal, and unnecessarily grumpy for
which I apologize). Here are my assumptions:

1) We (infosec, technology, basically everyone) needs better context
sensitive help/guidance. Obviously this won't happen globally so

2) We (infosec, technology, basically everyone) needs better public
documentation on things that people ask, for example the CVE
"***RESERVED*** description question I got so often I updated the CVE
Wikipedia entry, searchability and SEO ranking is an issue here (what good
are docs if google/bing/etc don't show them to people asking questions?)

3) We do have a number of specific sites we should probably target to
include the information (Wikipedia, StackExchange sites, etc.)

4) We definitely have a number of sites where people ask questions (this
list, Reddit, etc.)

This feeds into my CVE Mentor idea, we need people that can easily be
discovered and either know the answers, know where to find the answer, or
know who to ask/further direct people to for help. But we need it more
generally than just for CVE.

Now, I suspect many of my assumptions are wrong/out dated. So I would
appreciate if people would give feedback (where do you go for security
info? instagram?) I would appreciate that.

--
Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Red Hat Product Security contact: secalert@...hat.com

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ