| 
  | 
Message-ID: <aQeYkP4vLYBFv2QQ@yuggoth.org>
Date: Sun, 2 Nov 2025 17:44:48 +0000
From: Jeremy Stanley <fungi@...goth.org>
To: oss-security@...ts.openwall.com
Subject: Re: Questionable CVE's reported against dnsmasq
On 2025-11-02 02:26:31 +0100 (+0100), Solar Designer wrote:
[...]
>It is interesting that although Red Hat seems to dispute this CVE and 
>doesn't intend to fix it, they nevertheless give it a non-zero CVSS 
>score
[...]
While I find CVSS fairly useless for projects I work on (for the 
same reasons Greg K-H eloquently explained in a recent post about 
determining the "severity" of Linux Kernel vulnerabilities), we have 
the concept of "vulnerabilities nobody's working on fixing" too. 
Off-label or discouraged uses of software, or even seemingly 
appropriate but not common uses, may lead to vulnerabilities which 
the maintainers have not prioritized finding solutions to in their 
limited available time. Maybe it's on the roadmap to solve 
eventually, or merely the upshot of ancient design decisions that 
can't be revisited due to conflicting backward compatibility 
promises.
Point is, it's possible to acknowledge something's technically a 
vulnerability, while having no plan to solve it in the immediate 
future. Does that merit a CVE? I wouldn't personally request one for 
it, but if a third party chose to assign one I wouldn't dispute it 
either. If people refuse to use software containing "unfixed CVEs" 
that's their choice.
-- 
Jeremy Stanley
Download attachment "signature.asc" of type "application/pgp-signature" (964 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.