Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 15 Oct 2013 23:51:27 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: cve-assign@...re.org, leon@...nweber.de
Subject: Re: Re: CVE request: pyxtrlock

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/15/2013 05:47 PM, cve-assign@...re.org wrote:
>> Honestly I don't know what the rule is, 10? 100? 1000? 10000?
>> 65536?
> 
> At least at the moment, those numbers seem very high. From our 
> perspective, the minimum required number of users is approximately
> 2. The closed issues page is sufficient:
> 
> https://github.com/leonnnn/pyxtrlock/issues?page=1&state=closed
> 
> Situations in which MITRE has previously declined a CVE are much
> more marginal; for example:
> 
> - some cases of code that wasn't packaged in any way, and not even 
> necessarily intended for use as-is, e.g., something similar to 
> example code posted as a stackoverflow.com answer
> 
> - people a few years ago who were creating fake products that
> didn't have any reasonable purpose, and then asking for CVEs in
> order to have inbound links to their "vendor" web site

Heh. I'll have to rmemeber that =)

So for pyxtrlock please use:

CVE-2013-4426 pyxtrlock mis-spelled variable name

CVE-2013-4427 pyxtrlock Incorrect return value checking


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
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=CNl8
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.