|
|
This level of abstraction is…well…abstract. How do we determine what should be abstracted and to what level? This is a slippery slope to start down.
While I concur that some level of abstraction is good. I think that we need to carefully define for the community what level of abstraction is appropriate.
Honestly, I’m not quite sure how to do that. I hate to say case-by-base but… Ideas on how to quantify and define the right level of abstraction? Thank you, Scott 703-509-9330 From:
<owner-cve-editorial-board-list@lists.mitre.org> on behalf of "Williams, Ken" <Ken.Williams@ca.com> Solution: Assign a master/primary/original CVE for the
"POODLE for TLS" vulnerability, and then assign CVEs as needed
for all affected products-vendors. Each of these "secondary"
POODLE CVEs should reference/"hashtag" the primary POODLE CVE
in their description. Regards, Ken Williams Vulnerability Response Director, Product Vulnerability Response Team CA Technologies | 520 Madison Avenue, 22nd Floor, New York NY 10022
|