|
|
Message-ID: <Pine.GSO.4.64.1112201258220.24379@faron.mitre.org>
Date: Tue, 20 Dec 2011 13:07:59 -0500 (EST)
From: "Steven M. Christey" <coley@...-smtp.mitre.org>
To: oss-security@...ts.openwall.com, kseifried@...hat.com
cc: Tim Sammut <underling@...too.org>
Subject: Re: CVE assignment from previous years
Note that the year does NOT include when the vuln was found (and if it was
silently fixed, that's not a factor either).
The year is almost always obtained from either:
1) When the CVE was first privately reserved. We already have more than
two hundred CVE-2012-XXXX numbers reserved for various CNAs who are
using them to coordinate disclosures that are scheduled to
happen in 2012. This date often correlates with the year that the vuln
was found, but not always.
2) When the issue was first made public. There can be some disagreement
about when a vuln is first published (e.g. a bug report may lie
unresolved, technically viewable by anybody, for a few years before it
reaches general awareness, or something might be published on December
31 in one part of the world when it is January 1 in another part of the
world.)
Some CNAs who have a pool of CVEs from one year, will continue to use that
pool in the next year if there are any CVEs left over, though I generally
discourage it.
In January and February 2012, you will probably still see a fairly large
number of new CVE-2011-xxxx identifiers released, as MITRE/etc. assign
CVEs to issues that were first published in 2011.
- Steve
On Mon, 19 Dec 2011, Kurt Seifried wrote:
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On 12/19/2011 07:52 PM, Tim Sammut wrote:
>> Hi,
>>
>> Is there a general guideline that is commonly used when deciding to
>> issue a CVE name from the pool of a previous year versus the current
>> year's pool?
>>
>> thanks and hope all is well
>> tim
>>
> Generally speaking the year the vuln was found or reported is the year
> that gets used for the CVE. Example: I just assigned a CVE-2005.
>
> - --
>
> - -Kurt Seifried / Red Hat Security Response Team
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2.0.14 (GNU/Linux)
>
> iQIcBAEBAgAGBQJO8AxkAAoJEBYNRVNeJnmTxqsP/R5Zo+nEt1ks1qlVe2zT1b/v
> 3OBhXhwGlzFvEHjiWb3+4PPvTc3qQBrnt+CySl5ZsIePJ4XObtwSDY6QKoP41Uvx
> CvatEQsAtAX/RN04t3B8RlB3Q4SJviin9MdaaTs7pKimNrR9ZrwiBYW0Nf/7RFG0
> r0BYhHlEr7oxTSW7ni1O80s9UFqxJvJwe36NyJPIPXEYsgZYhsYdI+8zMnxNufGP
> NKg3ZGH7CJ7vcVNbqx+EjKn2Qoi/g3VE1zCPjFdL3kX/lAD5GuN/CRAn/TlLRchZ
> R3Y2YaserNMRku/GjvBi6Fj+t1neqOrXdmH6OoUKNimMdtt7oqGZe9pe9gcr4S/K
> NHqR18t5LDJfwUphGwa62+s78CH5x2UP78hrxOf2JtI2SJkXj3t9/mg5b1RGXmae
> zge9gnO9zBE1BonR0j+llIPtG7zd0GEASq97TnGalsipsQkuNx1Yf8pTZI46Jea9
> CQyP4X+aF1+ZNNzzEiRPyQyzXMh93xLHlNOrPX7Oj9pF6sI1qpoJYgGr5TZYy4FK
> 0n7Z4WSuKwUlVNMd/koW6wGIoEvAi1F6hvjBpZTUIB+iUXTBQF526Y2ikIgJZw0L
> h7J9VI//0oLZ/76yEDk0zeV1IZyh08SwlttCQJtt/f4T7r5IzAFjH7eZ0J0zupsX
> syNxyLPeENLlA83aB+Pm
> =Srqi
> -----END PGP SIGNATURE-----
>
>
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.