You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Some package managers like Rust's provide a category to their issues' metadata. I think it really helps keep things organized. A given advisory could have multiple categories, even though I believe most will fall under just one.
privilege-escalation - issue lets attackers bypass user permissions;
thread-safety - code is not thread-safe;
For CPANSEC I would also like to consider:
malware - the distribution is or contains explicit malicious code;
memory-leak - circular references and general memory leaks;
unmaintained - distribution is abandoned;
deprecated - author recommends distribution should not be used;
What do you think?
I plan on reviewing all relevant CVEs and adding at least one category for each of them. At the end, we should have a good enough list (we can always add more later).
The text was updated successfully, but these errors were encountered:
good point, @stigtsp. At first I considered escalating the type of vulnerability from the third party, but "depends on vulnerable third-party component" without specifying the actual issue may be better as it points out the 3rd party library may expose users to other risks outside their perl code - not to mention it makes things much easier for reporters.
Some package managers like Rust's provide a category to their issues' metadata. I think it really helps keep things organized. A given advisory could have multiple categories, even though I believe most will fall under just one.
I'd like us to decide which advisory categories to use, if any. RustSec defines the following categories on their advisories:
For CPANSEC I would also like to consider:
What do you think?
I plan on reviewing all relevant CVEs and adding at least one category for each of them. At the end, we should have a good enough list (we can always add more later).
The text was updated successfully, but these errors were encountered: