Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 21 Aug 2013 14:30:53 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Donald Stufft <donald@...fft.io>
Subject: Re: CVE Request: Insecure Software Download in pip

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 08/21/2013 02:28 PM, Donald Stufft wrote:
> 
> On Aug 21, 2013, at 4:19 PM, Kurt Seifried <kseifried@...hat.com>
> wrote:
> 
>> Signed PGP part On 08/07/2013 11:23 AM, Donald Stufft wrote:
>>> 
>>> On Jul 31, 2013, at 4:11 AM, Kurt Seifried
>>> <kseifried@...hat.com <mailto:kseifried@...hat.com>> wrote:
>>> 
>>>> Ok I have no info on that CVE, is it embargoed? I can't find
>>>> it in google after a quick search. I need to see that one
>>>> before I can assign anything. As for the reserved thing:
>>> 
>>> This CVE has been fixed, and it is for the issue where pip
>>> prior to 1.3 did not download from the central repository using
>>> TLS
>>> 
>>> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1629
>>> 
>>> So back to the question of mirroring, possible to get a CVE
>>> for that now? :)
>>> 
>>> ----------------- Donald Stufft PGP: 0x6E3CBCE93372DCFA //
>>> 7C6B 7C5D 5E2B 6356 A926 F04F 6E3C BCE9 3372 DCFA
>>> 
>> 
>> Ack sorry catching up. Please use CVE-2013-4266  for the
>> insecure mirroring stuff. Can you post the Python bug URL for
>> this again? thanks.
>> 
>> - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP:
>> 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
>> 
> 
> @Kurt can you reject CVE-2013-4266,
> 
> I had assumed you weren't going to assign one so I contacted
> cve-assign@...re and they assigned CVE-2013-5123

Ack,I deserved that =) Please REJECT CVE-2013-4266, use CVE-2013-5123
instead.


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)
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=+jrH
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.