On Tuesday, 11 February 2020 at 17:53, Michael Catanzaro wrote:
> On Tue, Feb 11, 2020 at 10:00 am, Dominik 'Rathann' Mierzejewski
> <domi...@greysector.net> wrote:
> > It means that the fixes are available and can be applied to Fedora
> > package if necessary. I'm still waiting for someone to point out a
> > specific *unfixed* *critical* vulnerability that some of the folks
> > posting in this thread mentioned. Otherwise, I see no reason to prevent
> > me or anyone else from keeping gstreamer 0.10 packages alive in Fedora.
> 
> CVE-2019-9928, buffer overflow in RTSP parsing

This one is not critical. It's rated "Moderate" by Red Hat. It's also
fixed in Ubuntu and SUSE (rated High and Important, respectively).

> Yeah it would be a one-line patch to fix that, but that's not the
> point.  Point is the vast majority of security issues never get CVEs
> and we rely on regular updates to the latest upstream version to avoid
> those.

Point taken, but it doesn't justify blocking the package from
distribution just because you don't know what security vulnerabilities
it has. You could say that about any number of other packages in Fedora.

Regards,
Dominik
-- 
Fedora   https://getfedora.org  |  RPM Fusion  http://rpmfusion.org
There should be a science of discontent. People need hard times and
oppression to develop psychic muscles.
        -- from "Collected Sayings of Muad'Dib" by the Princess Irulan
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org

Reply via email to