@ryanc@jik@ocdtrekkie Wow... "We have not stopped issuance and we are not planning to stop issuance or to revoke certificates issued" (Because it will annoy out customers) Some time later: Entrust nuked from existence.
@GossiTheDog@chort@reverseics@cR0w The thing was clearly made about 20 years ago without changing anything fundamental about how it works. The only reason for its existence is to collect licensing fees.
CVE wonders: Apache created CVE-2023-49070 to capture: "Our OFBiz product has Apache XML-RPC, which is vulnerable to CVE-2019-17570". This seems... wrong? If every vendor created a new CVE to capture "Hey, we use library <foo> that already has a CVE", how can this possibly scale?
This isn't the first time CVE abuse for libraries has happened. Take the recent libweb vulnerability. Apple got the report and assigned CVE-2023-41064 to "ImageIO" Google got the report and assigned CVE-2023-4863 to "Chrome" Eventually MITRE fixed the latter CVE to be libwebp.
CVE has assignment "rules" to avoid problems like these, but I get the impression that they're not really enforced anywhere by anyone. What do you call rules that aren't enforced? "Suggestions"?