|
Message-ID: <20110704221721.6a1d22bd@redhat.com> Date: Mon, 4 Jul 2011 22:17:21 +0200 From: Tomas Hoger <thoger@...hat.com> To: oss-security@...ts.openwall.com Cc: secalert_us@...cle.com Subject: Re: Closed list On Fri, 01 Jul 2011 15:28:23 -0700 Oracle Security Alerts wrote: > >> We do not expect Red Hat or other vendors to evaluate impact of > >> security vulnerabilities on Oracle Linux, > > > Maybe I'm mis-reading the above statement, but it seems to imply > > it's not uncommon for you to re-do security patches that were > > applied to RHEL packages before building them as OEL updates. Do > > you have any specific examples to point to (on- or off-list), so we > > can possibly check what mistakes we did? > > We are not saying that your security fixes can be incomplete or have > mistakes. Oracle Linux is different from RHEL. > Issues that do not affect RHEL may affect Oracle Linux or vice versa. > We may also choose to fix an issue in a different way. They are different, but as OEL is based on RHEL, I believe they're still sufficiently similar (same upstream versions, mostly the same patches and spec files) to expect most flaws affecting components shipped in both should affect both distros in the same way. Hence the interest in those differences that required different fixes in the past, or were for the common component but did not affect one of the distros. -- Tomas Hoger / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.