[c-nsp] Cisco Security Advisory: Cisco IOS Software RSVP Vulnerability

Clay Seaman-Kossmeyer (ckossmey) ckossmey at cisco.com
Thu Sep 25 09:18:36 EDT 2014


Hi Folks -

We definitely appreciate the feedback and will put some thought into how we can satisfy this request.  Behind the scenes, we’ve moved to a very different infrastructure for compiling vulnerability information for each IOS release, which allows us to greatly improve our ability to show granular, real-time exposure vs. a 6-month static snapshot.

The compromise that we always struggled with in the tables was the lack of release-level granularity, especially given the depth of branching in some (many) IOS trains.

We’ll put our heads together and kick around some ideas for how we can provide some quick-reference, summary information, though it’s unlikely we’ll be able to do anything in short order for this bundle.

Thanks again for the feedback.

Clay

On Sep 25, 2014, at 7:50 AM, Gert Doering <gert at greenie.muc.de> wrote:

> Hi,
> 
> On Thu, Sep 25, 2014 at 11:35:01AM +0200, Peter Rathlev wrote:
>> IOS Software Checker is a nice tool, do keep it. But for the "helicopter
>> view" the comprehensive list is a really great help. 
> 
> This! +1
> 
> gert
> -- 
> USENET is *not* the non-clickable part of WWW!
>                                                           //www.muc.de/~gert/
> Gert Doering - Munich, Germany                             gert at greenie.muc.de
> fax: +49-89-35655025                        gert at net.informatik.tu-muenchen.de

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 204 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <https://puck.nether.net/pipermail/cisco-nsp/attachments/20140925/9bc603ad/attachment.sig>


More information about the cisco-nsp mailing list