Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 18 Jul 2013 03:11:33 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: mancha <mancha1@...h.com>
Subject: Re: CVE Request - xlockmore 5.43 fixes a security
 flaw

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/16/2013 03:17 PM, mancha wrote:
> On Tue, 16 Jul 2013 20:18:06 +0000 "Kurt Seifried" wrote:
>> To reiterate: so I can confirm CVE assignments, and prevent 
>> duplicate assignments you *MUST* provide links to the code 
>> commits/vulnerable code.
> 
>> People need to start making better CVE requests, or you're not
>> going to get CVEs from me.
> 
> I am relatively new at CVE requests so I am learning-by-doing. I
> must have missed the original comment you feel you're re-iterating
> to me.
> 
> Relevant code can be found here:
> 
> [1] 
> http://sourceforge.net/projects/miscellaneouspa/files/glibc217/xlock
>
> 
more-5.42-glibc217-crypt.diff

Thanks, Please use CVE-2013-4143 for this issue.

> Upstream doesn't appear to have a public version control repo which
> is why I didn't post link(s) to commit(s). I mistakenly thought
> their changelog annoucement would be enough.

Huh? So just the release tarballs? That's annoying :P As for the
requirements it depends, different CVE requesters have different
requirements depending on how well they do things. E.g. Some do CVE
very well, but to make absolutely sure SPLIT/MERGE is done right I
request some details, others like Drupal have security advisories that
are sufficiently detailed that i can assign based on them alone, so
until a CVE requester proves that they know what they are doing,
reliably, I'm going to need details to make sure the CVE assignment is
done correctly. Part of the issue is scale, I do 1000+ CVE assignments
a year, so if they start taking more then 5-10 minutes I won't have
time to do anything else (like my day job, or sleep).

> I enjoy contributing time to the community via code submissions and
> by making flaws/fixes known to vendors via this list. I just hope
> they don't all have to raise my blood pressure in the future.


Welcome to security where just contacting some of them can be an epic
task.

> --mancha
> 


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=ZSyP
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ