Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 26 Sep 2017 12:31:38 -0500 (CDT)
From: Bob Friesenhahn <bfriesen@...ple.dallas.tx.us>
To: oss-security@...ts.openwall.com
Subject: Re: Linux kernel CVEs not mentioned on oss-security

On Tue, 26 Sep 2017, Agostino Sarubbo wrote:

> This certainly does not answer to the original question, but upstream should
> consider to do something like ffmpeg does here:
> https://www.ffmpeg.org/security.html
>
> I guess this would be benefit for all.

It is incredibly difficult for most non-commercial upstreams to do 
this since they have limited manpower, they are not informed of all 
the applicable CVEs, and the CVE information received is essentially 
hearsay, received from unknown/unverifiable sources.  I am thinking 
that it is best for most non-commercial upstreams to not mention CVEs 
at all.

If someone (e.g. with identity 'bugmeister@...d.cn') informs me (an 
upsteam maintainer) that some particular bug has been assigned a 
particular CVE then how can I know that to be a fact?

Bob
-- 
Bob Friesenhahn
bfriesen@...ple.dallas.tx.us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,    http://www.GraphicsMagick.org/

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.