|
Message-Id: <201302071933.r17JXXJP011224@linus.mitre.org> Date: Thu, 7 Feb 2013 14:33:33 -0500 (EST) From: cve-assign@...re.org To: hanno@...eck.de Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE request: TLS CBC padding timing flaw in various SSL / TLS implementations -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 >Can you assign one more for matrixssl? >http://www.matrixssl.org/news.html The short answer is that you should map that MatrixSSL changelog to CVE-2013-0169. Here's how MITRE is currently looking at the set of issues: CVE-2013-0169 is the identifier for the multi-vendor issue in the TLS and DTLS protocols discussed in the http://www.isg.rhul.ac.uk/tls/TLStiming.pdf paper. We anticipate that several more vendors will release changelogs, with various levels of detail, mapping to that paper: -- If the changelog simply reports a new release to address that paper's issue, MITRE will consider that changelog to be a CVE-2013-0169 reference. A new CVE will not be created for that single vendor or a single product. -- If the vendor states that it uses a codebase corresponding to one of the other http://openwall.com/lists/oss-security/2013/02/05/24 CVEs (aka side issues), then the changelog will become a reference for that CVE. -- If the vendor makes any other statement about a vulnerability fix for a side issue, a new CVE will be created for the new side issue. This approach should enable MITRE to provide reasonably consistent CVE abstraction without detailed study of each vendor's code. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.11 (SunOS) iQEcBAEBAgAGBQJRFADmAAoJEGvefgSNfHMdC1AH/A2Fr8fg2pZP49U513DBwQhp 7zdffXlwA/FF5dv2D7Pl3UJeGOgWtmott9kvrpIh1tKKnGFoNgqvQwAsaEL9/1rd Smr1dJisFvy7qDjrZEM96EiOM/3+J90StXFE3cVn72KGGs03g/e3+sUI3D8dp7Z3 SxJTNLgiVCxDCld06f5CmMwinl2DUx/VkuNgbfHUg+NnNzhw3WmIj8NMT0Om+OxZ 0UDCbWZ3SgH3DrIH75l+W3wKma0KgyQD+M2voUuCqmlSENI1Hkc6LhSKjxVaHeo/ ALJ4bWrpYtAv5JpyWL5mEY6NXOVcc0nl3M4EDsI9CKqeR8gtb0rjyK/gLQ4lydE= =LRzJ -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.