mort

(replying to Morten Linderud)
2 replies →
2 replies

tbodt

(replying to mort)

@mort @Foxboron i scrolled briefly through the list of cves assigned last friday and it looks like the largest chunk are memory safety issues. maybe you should update your kernel... though most of them are in optional components. maybe it would be useful to include metadata on the cve describing what kconfig you need for the affected code to be compiled in


Saagar Jha

(replying to mort)
@mort @Foxboron You can keep saying no all you want; it doesn’t make it any more true. CVEs have basically never been an accurate representation of changes that have security impact. Actually trying to do this remains an open problem that requires significant resources.

Saagar Jha

(replying to Saagar Jha)
@mort @Foxboron You’re upset that the situation went from “these are 10% of the security bugs and each one is definitely bad” to “this is 100% of the security bugs and maybe 10% of them are definitely bad”. Neither helps you solve the problem you have of “should I update”.