Hi

On Sun, Oct 27, 2024 at 07:13:00AM +0100, Salvatore Bonaccorso wrote:
> The tracking here is already correct. The shipped source is affected
> but the security impact is not present, as binaries are not built.
> this is already sufficiently reflected with the ignored note. 

It is correct, as in technically correct, the best kind of correct.
This is an mostly useless category, as it ignores everything around it.

The tracker data clearly states that the package as provided by Debian
is vulnerable.  And also the security tracker page clearly lists it as
vulnerable in red.  If I need to understand free text to even be
remotely able to identify if I might be affected, then the data is
useless.

Debian is a binary, not a source distribution.  So in all other places
we care about what we build, not what could be build from a given source
package.  But here, we now care about the source package and give free
text explanations why we are both affected and not, free text that a
non-developer might not even understand.

> Security-scanner often ignore this assessment, this might be why you
> are asking? In such case ask your vendor of your security scanner to
> include assessment of the <ignored> (explanation) tag.

Security scanners are often not even able to properly differenciate
between low priority stuff.

I even had people gloating about the number of fewer vulnerabilities in
Red Hat vs Debian.  Turns out, Red Hat simply closes those low priority
vulnerabilties, so it will not show up again, while Debian marks it and
keeps it open.  And this was about interpreting a tag without needing to
interpret a free text explanation.

But now you want to tell people, that not only they have to interpret
our own priority tags, they also have to interpret free text.  I really
fail to see what service this is to our users?

Bastian

-- 
Extreme feminine beauty is always disturbing.
                -- Spock, "The Cloud Minders", stardate 5818.4

Reply via email to