> > It seems like we need a much clearer resource for security 
> admins to 
> > check our compliance levels. This could be a source of similar 
> > refusal-to-implement PostgreSQL at other installations, so could 
> > almost be regarded as an advocacy issue. Other software 
> projects have 
> > been criticized badly for their security response and info 
> > dissemination - I don't believe that applies here, but it does 
> > indicate the general requirement and its priority. i.e. 
> don't just fix 
> > the bugs, tell everyone you've fixed the bugs.
> > 
> > Or, at very least, put stronger security warnings onto the 
> releases. 
> > (My own advice is always to watch for announcements and 
> stay current).
> 
> Well, as the original poster mentioned, they were looking for 
> a reason _not_ to use PostgreSQL, and if that is the goal, 
> you can find a reason, error numbers or not.

Sure - but it can be used as a good tool to prove such a person *wrong*.
Because it's an easy to find place.


> I am not excited about referencing error numbers from someone 
> else.  We know our errors better than anyone else, so I don't 
> see the point.

Point 1: Where do you go today to find a list of fixed security issues
in PostgreSQL, and where they are fixed? There is no central list of
this. This is the important point - to create such a list. (IMHO, of
course)


Point 2: CVE is pretty much the industry standard for naming
vulnerabilities. This is what people *use*. There's no reason *not* to
provide it as a cross reference. But sure, we shouldn't list only the
ones that have CVE numbers - if there are any that doesn't, they should
be listed as well. If you read up on CVE you will find that their only
function is to provide a common way to refer to a vulnerability, no
matter who talks about it, without any risk to get it wrong.



//Magnus

---------------------------(end of broadcast)---------------------------
TIP 4: Have you searched our list archives?

               http://archives.postgresql.org

Reply via email to