Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 1 May 2022 09:38:01 -0500
From: John Helmert III <ajak@...too.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2022-21449 and version reporting

On Sat, Apr 30, 2022 at 09:09:16PM +0200, Christian Fischer wrote:
> On Saturday, April 30, 2022 17:38 CEST, John Helmert III <ajak@...too.org> wrote:
> 
> > On Sat, Apr 30, 2022 at 01:24:36PM +0200, Christian Fischer wrote:
> > >  > It’s not that they didn’t/can’t verify, it’s already verified,
> > > they’re claiming those versions no longer being officially supported
> > > means they can seemingly omit them from CVE reporting.
> > >  >
> > >  > Which is dangerous, misleading, and nonsensical.
> > >
> > > While i fully agree with this be aware that CVE entries could generally
> > > contain incomplete information:
> > >
> > > After requesting an update of a CVE entry via the MITRE CVE forum in the
> > > past to add additional affected products for a different vendor (which
> > > wasn't even the assigning CNA like it is the case for Oracle here) my
> > > request was rejected by MITRE with the following rationale given:
> >
> > The CNA that assigned that CVE is Oracle, so Oracle is the CNA to talk
> > to to make changes to it. MITRE won't make changes to it as they're
> > not the CNA behind that CVE.
> >
> > >  > A CVE description does not necessarily contain all the affected 
> > > products or versions and is not part of CVE ID requirements. The
> > > products are documented in the CVE references.
> > > This is also matching my experiences with various other products / 
> > > vendors and related CVE entries for these.
> >
> > Right, this is documented in the CNA rules [1]:
> >
> > "8.2.1 MUST provide enough information for a reader to have a
> > reasonable understanding of what products are affected. If the
> > affected products are not explicitly listed in the description, then
> > the CNA MUST provide a reference that points to the known affected
> > products."
> >
> > [1] https://www.cve.org/ResourcesSupport/AllResources/CNARules#section_8-2_cve_record_prose_description_requirements
> 
> Yes, indeed / in know (since then) but it wasn't clear if all participants in this thread are aware of this fact.
> 
> But i just have noticed that my posting was only partly relevant for the quoted message and the question of the OP "Why is this being allowed…" because i have missed that Oracle (if they as the assigning CNA are aware that Java 15 and 16 are affected) AFAICT indeed haven't provided any reference so far about all known affected versions / products.
> 

Their April 2022 CPU (Critical Patch Update) Advisory, which is a
reference of CVE-2022-21449, is pretty comprehensive:

https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixJAVA

Supported versions affected: "Oracle Java SE: 17.0.2, 18; Oracle
GraalVM Enterprise Edition: 21.3.1, 22.0.0.2"
Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.