|
|
Log in / Subscribe / Register

Keeping administrators up to date

Keeping administrators up to date

Posted Jan 17, 2013 4:42 UTC (Thu) by joey (guest, #328)
Parent article: Keeping administrators up to date

> One could imagine a cross-distribution project that gathered the same
> kind of information as the Debian security bug tracker, but in a more
> distribution-independent fashion.

Of course that already exists in a way, in the CVE vulnerability database.

> Each distribution could have a tool that processed that data, correlated
> it to its package names and versions, and then reported on what it found.

This remains the hard part. Starting with the package name, which is fairly free-form in CVE. And then the version, which is more so, especially when distributions may carry patches to the upstream version that affect security. There's something called CPE that might eventually allow automatic package name mapping, but does not seem to be broadly used in CVE entries yet.

It seems unlikely that an automated tool could be accurate enough to work without people doing work behind the scenes. Which is how Debian's security tracker works.

The funny thing about Debian's tracker is that it started out as a nearly free-form text file, in which I took the current list of all CVEs, and started making notes. Soon I had numerous helpers also updating the file, and the ad-hoc formats used for the notes became conventions, which then became formalized and parsed. It's still just a big (145k lines) text file.

The key features that have kept it going this long seem to be that it works well with version control and so the work is easily parallelized amoung contributors; it allows quickly checking through CVE entries to find ones that are relevant; it ensures that everything gets looked at without much chance of a vulnerability falling thru the cracks.

Still, it's salt mines work. I'm continually amazed it's been updated for 9 years solid.


to post comments

Keeping administrators up to date

Posted Jan 17, 2013 17:58 UTC (Thu) by malor (guest, #2973) [Link] (1 responses)

Thank you, sir, for doing it. You're making my life better, and I appreciate it.

Keeping administrators up to date

Posted Jan 18, 2013 15:04 UTC (Fri) by ortalo (guest, #4654) [Link]

I second the previous comment.

Keeping administrators up to date

Posted Jan 28, 2013 13:01 UTC (Mon) by robbe (guest, #16131) [Link]

> Of course that already exists in a way, in the CVE vulnerability database.
CVE could be it.

My beef is that from the 20 CVEs linked to on the Jan 17 security page, six are still "reserved", i.e. contain no information. That's 30 percent duds, ten days after the LWN issue was released. Are they understaffed?

Thanks to the people at Debian doing the security tracking work.


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds