|
||||
This level of abstraction is…well…abstract. How do we determine what should be abstracted and to what level?
This is a slippery slope to start down.
While I concur that some level of abstraction is good. I think that we need to carefully define for the community what level of abstraction is appropriate.
Honestly, I’m not quite sure how to do that. I hate to say case-by-base but…
Ideas on how to quantify and define the right level of abstraction?
Thank you, Scott 703-509-9330
From:
<owner-cve-editorial-board-list@lists.mitre.org> on behalf of "Williams, Ken" <Ken.Williams@ca.com>
Solution: Assign a master/primary/original CVE for the "POODLE for TLS" vulnerability, and then assign CVEs as needed for all affected products-vendors. Each of these "secondary" POODLE CVEs should reference/"hashtag" the primary POODLE CVE in their description.
Regards, Ken Williams Vulnerability Response Director, Product Vulnerability Response Team CA Technologies | 520 Madison Avenue, 22nd Floor, New York NY 10022
|