Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160602180240.GA23506@layer-acht.org>
Date: Thu, 2 Jun 2016 18:02:40 +0000
From: Holger Levsen <holger@...er-acht.org>
To: cve-assign@...re.org
Cc: oss-security@...ts.openwall.com
Subject: Re: CVE request: mat doesn't remove metadata in embedded images in
 PDFs

On Thu, Jun 02, 2016 at 12:21:34PM -0400, cve-assign@...re.org wrote:
> We think you mean that a CVE ID can exist with the rationale of:
> 
>   - as of version 0.7, there will be a required security update in
>     which the embedded-in-a-PDF security problem is resolved
> 
>   - the CVE ID is needed to tag that required security update
> 
>   - as of version 0.7, the https://mat.boum.org/ text may be changed
>     from "images embedded inside PDF may not be cleaned" to something
>     like "images embedded inside complex documents may not be cleaned,
>     but users can rely on cleaning in the specific case of PDF
>     documents"
> 
> Does that match your intention for the CVE ID?

yes.

Though I disagree with the 3rd paragraph a bit, I don't think it's that
hard to recursivly process files, eg both
https://tracker.debian.org/pkg/strip-nondeterminism (in perl) and
https://tracker.debian.org/pkg/diffoscope (in python) do that.


-- 
cheers,
	Holger

Download attachment "signature.asc" of type "application/pgp-signature" (812 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.