Date: Mon, 16 Nov 2020 20:06:15 +0100 From: Marius Bakke <marius@....org> To: "David A. Wheeler" <dwheeler@...eeler.com>, oss-security@...ts.openwall.com Subject: Re: Buffer Overflow in raptor widely unfixed in Linux distros "David A. Wheeler" <dwheeler@...eeler.com> writes: > If you think that CVE assignment is still of “fluctuating reliability” I’d like to hear that argument > and get it fixed. It’s normally better to fix the standard process for doing something than > to create yet another process that runs in parallel. I’ve seen no recent evidence of this reliability issue. Speaking as a co-maintainer of an understaffed GNU/Linux distribution who fixed this back in 2017, I preferred the "old days" when free software security problems were almost always discussed on this list. While there's no questioning the utility of CVEs in general (Guix can check the CVE list for any given package with 'guix lint -c cve PKG'), there are still unresolved CPE mappings, and I don't know how to get informed of new problems without checking specific (or all) packages. I tried following the CVE assignment RSS feed initially, but it was not suitable for human consumption. How do other distros keep up with new CVE assignments?  https://git.savannah.gnu.org/cgit/guix.git/commit/?id=099c9fdae623e06e4fded8b0d4e55d9d5b56715b Download attachment "signature.asc" of type "application/pgp-signature" (508 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.