Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 29 Aug 2017 14:46:22 +0200
From: Agostino Sarubbo <>
To: oss-security <>
Subject: A bunch of duplicate CVEs requested for?? bho..

Hi all.

In the last time there are some people that run afl for fuzzing...that's just 
fine and great. Some people miss to communicate their findings to upstream and 
request a CVE from mitre.
However I'm noticing that every day there are new duplicates, let me post some 

1) posted by owl337 on the redhat bugzilla, found by me months ago: duplicate of:

The other recent examples here:

2) Other duplicates are filed from qflb.wu which posts on full-disclosure.
See about lame/mpg123/libmad
Some CVEs about lame was issued, also there are an high number of 
vulnerabilities never confirmed by upstream nor posted on their bug tracking 
system. Yes, sometimes I receive emails that say that the bug is not 
reproducible but I'm always trying to help to reproduce. Instead some report 
says: "If you want the poc please contact me at $email"

How to avoid to file duplicate? for the example number 1 just checking here:

Another strange thing, time ago I discovered an FPE in lame, which happens 
only in the command-line tool:

After digging I discovered it was already reported by Brian Carpenter here: which says:

"fortunately, this is all in the frontend code in
frontend/get_audio.c:parse_wave_header() and not in the library"

At the time I filed the CVE request I failed too see that it is not suitable 
for a CVE, follow what mitre said about:
"There is no CVE ID for this. Even if a web site runs the lame
command-line tool, a divide-by-zero error does not have any
availability impact for the web service, because the crash would occur
in an independent process."

Great..fine..that was my bad, but months later we have:
"There is a division-by-zero vulnerability in LAME 3.99.5, caused by a 
malformed input file."
which points to:
Fortunately the author shared the poc and the password.

I'm providing ( a screenshot md5sum-included to 
demonstrate that the issues are identically.

Does someone know:
1) How to avoid that CVE duplicates are issued?
2) Why the same issue was considered not-suitable and months later suitable 
for a CVE?

Agostino Sarubbo
Gentoo Linux Developer

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.