| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <7f1d973e-3c98-43cf-bdb1-a2d6557d13b0@canonical.com> Date: Fri, 26 Jan 2024 13:55:15 -0600 From: Mark Esler <mark.esler@...onical.com> To: fulldisclosure@...lists.org Cc: abhik@...p.nus.edu.sg, ruijie@...p.nus.edu.sg Subject: [FD] CVEs based on commit messages Dear Meng Rujie, In regards to your recent FD posts, are you requesting CVEs based on the presence of strings in commit messages such as "null pointer dereference"? Are you reaching out to each upstream project before assigning a CVE? Do you believe that every null pointer bug is a vulnerability? What impact are you hoping to achieve? Please reconsider how you are requesting CVEs. CVE assignment based on commit message allows unscrupulous comitters to take advantage of CNAs who do so and _print CVEs_ for their resume. Kind regards, Mark Esler _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: https://seclists.org/fulldisclosure/
Powered by blists - more mailing lists