Date: Mon, 7 Mar 2016 09:10:46 +0100 From: Markus Vervier <markus.vervier@...-dsec.de> To: oss-security@...ts.openwall.com Subject: Re: Concerns about CVE coverage shrinking - direct impact to researchers/companies On 03/04/2016 07:24 PM, Kurt Seifried wrote: > So I've now heard from several security researchers that they are > unable to get CVEs for issues that need CVEs (e.g. widely used > hardware/software with flaws that have real world impacts and need to > be properly tracked. This has definitely resulted in issues being > publicized with no CVE that then makes it much harder to track and > deal with these issues. > Hi, just in order to second that: We have had similar experience with delays and with rejections that seemed random. Especially regarding vulnerabilities that did not fit into existing vulnerability classes or would require some amount of work to validate. It seems to me MITRE currently wants to improve CVE quality but does not have the resources to do a real and fair validation. In my mind having a globally accepted enumeration systems and unique vulnerability identifiers is more important than a small curated but outdated list of selected vulnerabilities. Therefore I would appreciate to move back to the old process where you would request a CVE, get it assigned - but with the possibility of revocation later. Or move to a fully automated process like OVE as proposed here before. Markus -- Markus Vervier (Managing Director) X41 D-SEC GmbH, Dennewartstr. 25-27, D-52068 Aachen Unternehmenssitz: Aachen, Amtsgericht Aachen: HRB19989 Geschäftsführer: Markus Vervier Download attachment "smime.p7s" of type "application/pkcs7-signature" (3843 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.