Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 15 Mar 2017 14:47:45 -0600
From: Kurt Seifried <>
To: oss-security <>
Subject: Re: Dealing with CVEs that apply to unspecified
 package versions

On Wed, Mar 15, 2017 at 2:05 PM, Leo Famulari <> wrote:

> On Wed, Mar 15, 2017 at 12:27:47PM -0700, Seth Arnold wrote:
> > I suspect the solution is for people who rely upon these scanning tools
> to
> > do the leg work themselves on the packages they care about. (i.e., the
> > packages that annoy them the most.)
> I think those of us who find these tools useful should work to improve
> the CVE database by adding the "fixed-in-version" information as it
> becomes available.

This is a major goal of

1) using the JSON format with richer data [a]
2) allowing other people (e.g. CVE Mentors) to edit the data



Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Red Hat Product Security contact:

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ