Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 29 Jan 2015 11:52:02 -0500 (EST)
From: cve-assign@...re.org
To: Kurt Seifried <kseifried@...hat.com>
cc: oss-security@...ts.openwall.com, huzaifas@...hat.com,
        Mitre CVE assign department <cve-assign@...re.org>
Subject: Re: GHOST gethostbyname() heap overflow in glibc
 (CVE-2015-0235)


> On 28/01/15 06:57 PM, Huzaifa Sidhpurwala wrote:
>> On 01/29/2015 03:17 AM, Florian Weimer wrote:
>>
>>>> Use CVE-2012-6686 for "unbound alloca use in glob_in_dir" as covered
>>>> by Red Hat Bugzilla ID 797096.
>>>
>>> Oh, it seems Huzaifa posted the wrong Bugzilla reference.
>>>
>>
>> Yes, sorry wrong bz.
>>
>>> We still need assignment for this fix:
>>>
>>>   <https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=2e96f1c7>
>>>
>>> The matching Red Hat Bugzilla bug is:
>>>
>>>   <https://bugzilla.redhat.com/show_bug.cgi?id=981942>
>> The above is the correct bug  with the corresponding impact at:
>> https://bugzilla.redhat.com/show_bug.cgi?id=1186614
>>
>> MITRE,
>>
>> Can we still use the above CVE for this issue?
>
> This would be a bad idea and lead to much confusion, especially for
> people that have already consumed this CVE and written up reports that
> in turn have been shipped to other people/etc.
>
> Can we REJECT this CVE if the issue is not a security issue, obviously
> if it is a security issue we should keep this CVE.

The scope of CVE-2012-6686 has already been explicitly identified, i.e. it 
is 797096.  If 797096 does not cover a security issue, or is a duplicate, 
then we would need to REJECT the CVE.

However, 797096 reports that the issue "can lead to program crashes if 
excessively long inputs are passed to certain functions."  This still 
sounds like it could be a vulnerability.

Is this already associated with a different CVE?  797096 points to 
RHBA-2013:0022, which maps to CVE-2013-4357.  However, 797096's title does 
not include CVE-2013-4357.

> Additionally if we can get a new CVE for Bz981942 that would be great,
> thanks!

There now appear to be two different requests for two separate Bugzilla 
IDs that might be discussing the same issue.  Please clarify.

BZ 1186614 is "glibc: Invalid-free when using getaddrinfo()".  It points 
to 
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=2e96f1c7 
which is "Fix encoding name for IDN in getaddrinfo" and modifies 
gaih_inet() in sysdeps/posix/getaddrinfo.c by setting name=p and 
malloc_name=true.

CVE-2013-7424 is now assigned with the issue whose scope is defined by 
commit 2e96f1c7 / gaih_inet().  (A 2011 year is not used because 2e96f1c7 
does not clearly identify any security relevance.)

A separate Bugzilla ID, 981942, might be a duplicate.  It is titled "ping6 
with idn causes crash," includes Comment 4 (Carlos O'Donell 2013-07-08 
09:54:18 EDT) which references a discrepancy with upstream's "name = p;" 
fix in gaih_inet().  It also directly includes commit 2e96f1c7, which has 
now been associated with CVE-2013-7424/BZ1186614.  Yet, here in 981942, 
there is no apparent reference to 1186614.

Is 981942 a duplicate of CVE-2013-7424/BZ1186614, or is a separate CVE ID 
required?  If a new ID is required, please explain the difference.

---

CVE assignment team, MITRE CVE Numbering Authority M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.