> > It seems like we need a much clearer resource for security
> admins to
> > check our compliance levels. This could be a source of similar
> > refusal-to-implement PostgreSQL at other installations, so could
> > almost be regarded as an advocacy issue. Other software
> projects have
> > been criticized badly for their security response and info
> > dissemination - I don't believe that applies here, but it does
> > indicate the general requirement and its priority. i.e.
> don't just fix
> > the bugs, tell everyone you've fixed the bugs.
> > Or, at very least, put stronger security warnings onto the
> > (My own advice is always to watch for announcements and
> stay current).
> Well, as the original poster mentioned, they were looking for
> a reason _not_ to use PostgreSQL, and if that is the goal,
> you can find a reason, error numbers or not.
Sure - but it can be used as a good tool to prove such a person *wrong*.
Because it's an easy to find place.
> I am not excited about referencing error numbers from someone
> else. We know our errors better than anyone else, so I don't
> see the point.
Point 1: Where do you go today to find a list of fixed security issues
in PostgreSQL, and where they are fixed? There is no central list of
this. This is the important point - to create such a list. (IMHO, of
Point 2: CVE is pretty much the industry standard for naming
vulnerabilities. This is what people *use*. There's no reason *not* to
provide it as a cross reference. But sure, we shouldn't list only the
ones that have CVE numbers - if there are any that doesn't, they should
be listed as well. If you read up on CVE you will find that their only
function is to provide a common way to refer to a vulnerability, no
matter who talks about it, without any risk to get it wrong.
pgsql-hackers by date
|Next:||From: Peter Eisentraut||Date: 2005-11-25 18:28:10|
|Subject: Re: PL/php in pg_pltemplate|
|Previous:||From: Gustavo Tonini||Date: 2005-11-25 18:24:10|