@gregkh I like this post, I do have two questions that are related
You say "ALWAYS properly walk the git repository tree to determine range checks", don't versions also line up with the tree? Or am I missing something
And the second question is why even include the CPE data? The data you're supplying isn't usable (as much as CPE can be usable)
@gregkh "always run fsck on any untrusted filesystem image before mounting it" - is that recommendation sufficient? A sophisticated USB storage device could also alter its content after an fsck, couldn't it?
Which also reminds me of the neat hack @awlnx did with her BMW: https://social.ffmuc.net/@awlnx/111709711390403407
@gregkh also not really informed about the whole CVE process, but as a layman "Data loss/Data corruption/Filesystem corruption", wouldn't these "[cause] a negative impact to [...] integrity, or availability" as written in the quoted CVE definition?