[c-nsp] Cisco Security Advisory: Cisco IOS Software RSVP Vulnerability
Clay Seaman-Kossmeyer (ckossmey)
ckossmey at cisco.com
Thu Sep 25 09:18:36 EDT 2014
Hi Folks -
We definitely appreciate the feedback and will put some thought into how we can satisfy this request. Behind the scenes, we’ve moved to a very different infrastructure for compiling vulnerability information for each IOS release, which allows us to greatly improve our ability to show granular, real-time exposure vs. a 6-month static snapshot.
The compromise that we always struggled with in the tables was the lack of release-level granularity, especially given the depth of branching in some (many) IOS trains.
We’ll put our heads together and kick around some ideas for how we can provide some quick-reference, summary information, though it’s unlikely we’ll be able to do anything in short order for this bundle.
Thanks again for the feedback.
Clay
On Sep 25, 2014, at 7:50 AM, Gert Doering <gert at greenie.muc.de> wrote:
> Hi,
>
> On Thu, Sep 25, 2014 at 11:35:01AM +0200, Peter Rathlev wrote:
>> IOS Software Checker is a nice tool, do keep it. But for the "helicopter
>> view" the comprehensive list is a really great help.
>
> This! +1
>
> gert
> --
> USENET is *not* the non-clickable part of WWW!
> //www.muc.de/~gert/
> Gert Doering - Munich, Germany gert at greenie.muc.de
> fax: +49-89-35655025 gert at net.informatik.tu-muenchen.de
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 204 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <https://puck.nether.net/pipermail/cisco-nsp/attachments/20140925/9bc603ad/attachment.sig>
More information about the cisco-nsp
mailing list