oss-sec mailing list archives
Re: CVE Requests
From: Kurt Seifried <kseifried () redhat com>
Date: Fri, 16 Mar 2012 13:45:58 -0600
On 03/16/2012 12:37 PM, Tim Brown wrote:
On Friday 16 Mar 2012 16:11:04 Mark Stanislav wrote:All points being made are very much valid and I certainly understand how contextually oss-sec may be used to allocation requests under different circumstances. So here's my situation, I'm up for suggestions (of which, "wait longer", is perfectly viable!)... 1) March 1st, I sent 2 of these CVEs over to Steve Christy at MITRE who had previously allocated 9 prior CVEs in a day or two generally 2) March 8th, after not hearing back from Steve, I contacted cve@mitredirectly with all 5 3) March 15th, after not hearing back from MITRE, I contacted Kurt off list as I've noted his helpfulness doing allocations 3a) Kurt pointed me to email the list, rather than him directly (which is perfectly fine, but perhaps not the context I was aiming for initially)Josh Bressers (Josh, correct me if I'm using your name in vain) used to be quite happy to assign CVEs for undisclosed (embargoed) F/OSS issues providing details were forthcoming with the request. If Josh is no longer able to fulfil that role due to a change of circumstance at Redhat it would be nice if someone stepped into the breach - be that Redhat, Debian or one of the other CNAs. There is definately a place for "disclosed to project, being/been fixed, not public - can I have a CVE?" without deferring to the distros list or MITRE - most of the time projects can respond in a timely fashion, so a minimum effort approach is ideal.
You may have uh noticed me assigning 200+ cve's in the last few months. I took over for Josh. I am unwilling to public assign CVE's that are likely to end up with duplicates (e.g. no information CVE's already sent in as a request to Mitre). I am quite happy to assign "secret" or whatever you want to call them CVE's (I do it all the time on linux-distros list for embargoed issues) but I'm also trying to avoid duplicates and other messes. If the issue is so secret you can't even give me a version #, brief description, etc. than chances are Mitre needs to handle it. I'm asking for pretty basic info like version #'s affected and ideally fixed if you got it. This doesn't need to be complicated. http://oss-security.openwall.org/wiki/mailing-lists/distros -- Kurt Seifried Red Hat Security Response Team (SRT)
Current thread:
- Re: CVE Requests, (continued)
- Re: CVE Requests Mark Stanislav (Mar 15)
- Re: CVE Requests Solar Designer (Mar 16)
- Re: CVE Requests Kurt Seifried (Mar 16)
- Re: CVE Requests Mark Stanislav (Mar 16)
- Re: CVE Requests Kurt Seifried (Mar 16)
- Re: CVE Requests Andreas Ericsson (Mar 16)
- Re: CVE Requests Adam D. Barratt (Mar 16)
- Re: CVE Requests Mark Stanislav (Mar 16)
- Re: CVE Requests Tim Brown (Mar 16)
- Re: CVE Requests Mark Stanislav (Mar 16)
- Re: CVE Requests Kurt Seifried (Mar 16)
- Re: CVE Requests Tim Brown (Mar 16)
- Re: CVE Requests Eugene Teo (Mar 18)
- Re: CVE Requests Kurt Seifried (Mar 16)
- Re: CVE Requests Andreas Ericsson (Mar 19)