Florian,
I think you miss what actually is done and how, with whom / what.
Pete

On Tue, Jan 28, 2025 at 4:47 AM Florian Weimer <[email protected]> wrote:

> * Pete Allor:
>
> > It is why I would advocate for a CVSS review (as we do at Red Hat) and
> > then assign a 'Severity Rating' as that now involves how the component
> > is used within our software which changes HOW a
> > customer/downstream/user should actually view that CVE.
>
> But is this really how it works these days?  For example, if we use a
> component to render the in-program documentation (traditionally called
> “online help”, but we would consider this offline today), and the
> upstream for this component documents publicly that a vulnerability is
> being actively exploited for (user-initiated) remote code execution, we
> must fix the component even if it's just used in an offline
> documentation viewer.  CVSS impact review does not change that, as far
> as I know.
>
> Hence the suggestion of a fork, so that upstream's exploitation
> announcements do not carry over 1:1 to the product.
>
> I think this fix-regardless-of-impact requirement is new.
> Legitimate-looking sources for inflated impact ratings have been around
> for more than a decade, on the other hand.
>
> Thanks,
> Florian
>
>

Reply via email to