|
|
Dave Waltermire and Harold Booth, Do you agree with Kurt's suggestion that the email quoted in the link below is sufficient for your analysts at NIST to understand and describe the issue as required by NIST's processes? I ask because I have heard from CVE consumers that they rely on the plain-language description since often non-technical people are reading them to get an understanding of how to
react to the vulnerability. If it turns out that those people cannot understand the info in the quote, would those people be able to get what they need out of NIST's enriched version of the vulnerability description? For that to be, NIST would have to be able
to write the description for them. Thanks. -Dan From:
Kurt Seifried <kurt@seifried.org> One note: in order to supply the full description/information needed so that references are not we will need some basic formatting, at an absolute minimum line breaks.
It's hard to find a good example because the distros emails are private, but a spice thing posted to the distros list was forwarded to a public list, and is a good example of a description that would have all the
details: As you can see the quoted email includes code patches, explanation of the issue, etc. Being able to simply drop a CVE into MITRE's database when the embargo lifts and not have to wait for URL's would be advantageous,
and as you can see fromt he quoted email above the level of detail is sufficient to understand the issue and even fix it. On Wed, Sep 13, 2017 at 9:15 AM, Adinolfi, Daniel R <dadinolfi@mitre.org> wrote:
-- Kurt Seifried |