Hi, Randall S. Becker wrote: > The first one, mostly. When looking at CVE-2017-14867, there are places like > https://nvd.nist.gov/vuln/detail/CVE-2017-14867 where the issue is > discussed. It provides hyperlinks to various platform discussions. > Unfortunately for me, I am not an HPE employee - and even if I was, there is > no specific site where I can publicly discuss the vulnerability. I'm looking > to the group here for advice on how to get the word out that it does not > appear to apply to the HPE NonStop Git port. The question of where to best > do that for any CVE pertaining to git as applicable to the NonStop Port is > question #1. How do people find out about the HPE NonStop Git port? Where is it distributed? Does that distribution point allow you to publish release notes or other documentation? Do you have a web page? That's another place you can publish information. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14867 links to lots of resources that are not from the Git project. The oss-security list <http://www.openwall.com/lists/oss-security/> allows anyone to participate. It is a place that people often collaborate to figure out the impact of a published vulnerability, how to mitigate it, etc. There are other similar mailing lists elsewhere, too. > Question #2 - probably more relevant to the specific issue and this group - > is whether the vulnerability is contained to Git's use of Perl SCM and since > NonStop's Perl does not support SCM, the vulnerability may not be relevant, > but I'm not really enough of a Perl guru to make that determination. What is Perl SCM? I don't know what you're talking about. Thanks, Jonathan