On Mon, Feb 17, 2025 at 9:14 PM Santiago Ruano Rincón <santiag...@riseup.net>
wrote:

> There are two numbers accompanying the source packages: the amount of
> currently open security issues in sid, and the number of security issues
> that have been present in Debian ever (as you mention).
>

I've been biting my tongue a bit here but there's an implicit third number
(which no one is able to actually compute) here: number of actual security
issues that need attention.

CVEs are not perfect. CVE count is, charitably, a proxy for how much
security attention / research it gets (hopefully that is, in turn, a proxy
for how important a package is). Not so charitably, it's perhaps a proxy
for how many people who want to build a reputation as an expert have spent
time finding something that would pass minimal scrutiny as a security issue.

There are plenty of security issues that are solved via normal bugfixes by
people who never realize the security implications of their bugfixes. In
important security sensitive places, too!

Updating to the latest upstreams is a good idea for lots of reasons, but I
don't totally understand the nexus to CVE here. Don't let me dissuade you
from doing good work here, but I reckon CVE counting is likely going to
lead to a lot of very weird non-security related biases which you may or
may not actually want.

FWIW this will solve one real problem: Lots of companies complain endlessly
and mindlessly about CVEs based on package version(s) without regards to
the issue being exploitable or even reachable (or built into the binary, in
some cases!). Closing CVEs out will no doubt make them complain less, which
sounds nice.

  Paul

Reply via email to