logicbrazerzkidai.blogg.se

Imagemagick version
Imagemagick version














I think this would go a long way of fixing CVEs in widely-used packages quickly. IMO, we’d ideally pay someone several hours a week to do this work (from donations). Finally, continuously triaging CVEs is relatively boring and repetitive work. The reason is the same as why some PRs do not get reviewed quickly: there are too few people triaging them and making backport PRs.Īlso, a lot of packages have maintainers that are inactive and do not take the responsibility to track CVEs and backport fixes. Sometimes some CVEs do not get patched quickly. If it is a maintained release (such as currently NixOS 20.09), every CVE should ideally be patched. Is there some kind of “policy/guideline” to decide which CVE’s should be patched and which not (of course as there is not enough manpower “as much as possible” is probably fine ) Is this a bad thing (and part of the problem) or are such prominent packages managed in a “more organically” way and therefore don’t need a maintainer?

  • The package imagemagick currently doesn’t have any maintainer listed, but is obviously a dependency for lots of other packages.
  • so that they won’t appear in a following roundup)? Should I just create Github issues for these and CC the Maintainers or is there a preferred way to handle them (e.g. NVD - CVE-2020-8625) which may need to be patched for NixOS 20.09. debian packaging problem), but wasn’t sure of others (e.g. I could easily identify some of them as not applicable to NixOS (e.g.
  • Vulnix reported CVEs for 37 Packages built on my server and some of them aren’t in a security roundup.
  • Is there some kind of “policy/guideline” to decide which CVE’s should be patched and which not (of course as there is not enough manpower “as much as possible” is probably fine ).
  • Is there already a whitelist of CVE’s for which an issue already exists? If so, can this list be made accessible?
  • Vulnix has an entry about whitelisting in the readme.
  • Are these CVEs mainly unpatched because of missing interest/manpower?.
  • Imagemagick version plus#

    the CVE-2016-5841 is still apparently unresolved after over 4 years, plus I have some more questions : There is also security roundup 99 which detected 79 of these CVEs for imagemagick. The worst of them is imagemagick-6.9.11-60 with 81 open CVEs which go up to a score of 9.8 (and some of the CVE’s date back to 2016).

    imagemagick version

    I’ve run vulnix -system on my server which is on the 20.09 branch and it showed a LOT of open CVEs which is a bit concerning.














    Imagemagick version