Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20110704221721.6a1d22bd@redhat.com>
Date: Mon, 4 Jul 2011 22:17:21 +0200
From: Tomas Hoger <thoger@...hat.com>
To: oss-security@...ts.openwall.com
Cc: secalert_us@...cle.com
Subject: Re: Closed list

On Fri, 01 Jul 2011 15:28:23 -0700 Oracle Security Alerts wrote:

> >> We do not expect Red Hat or other vendors to evaluate impact of
> >> security vulnerabilities on Oracle Linux, 
> 
> > Maybe I'm mis-reading the above statement, but it seems to imply
> > it's not uncommon for you to re-do security patches that were
> > applied to RHEL packages before building them as OEL updates.  Do
> > you have any specific examples to point to (on- or off-list), so we
> > can possibly check what mistakes we did?
> 
> We are not saying that your security fixes can be incomplete or have
> mistakes. Oracle Linux is different from RHEL.
> Issues that do not affect RHEL may affect Oracle Linux or vice versa.
> We may also choose to fix an issue in a different way.

They are different, but as OEL is based on RHEL, I believe they're
still sufficiently similar (same upstream versions, mostly the same
patches and spec files) to expect most flaws affecting components
shipped in both should affect both distros in the same way.  Hence the
interest in those differences that required different fixes in the
past, or were for the common component but did not affect one of the
distros.

-- 
Tomas Hoger / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.