Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <51340651.7020109@redhat.com>
Date: Sun, 03 Mar 2013 19:26:25 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Michael Gilbert <mgilbert@...ian.org>
Subject: Re: CVE id request: busybox

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 03/03/2013 01:06 PM, Michael Gilbert wrote:
> On Sun, Mar 3, 2013 at 2:50 PM, Kurt Seifried wrote:
>> This actually raises a good point, due to Debian being a
>> secondary source in most cases (e.g. upstream has a bug report
>> which is then copied into Debian's bug tracker since Debian ships
>> it) the dates and sometimes information is wrong.
> 
> Aren't these problems true for any source whether it be primary, 
> secondary, tertiary, or so on?

Sorry yeah I should have been more clear. This goes for all the major
secondary sources (Debian, SUSE, etc.).

>> I will no longer be issuing CVE's for issues brought up through
>> the Debian bugtracker without an original source to back it up,
>> otherwise more mistakes will happen which is not good.
> 
> I don't understand the purpose of excluding an entire project's 
> sources.  Should redhat's bugzilla, gentoo, etc. also be excluded
> for the same reason?  If not, why do they get special treatment?

I didn't say I;'m excluding them. I simply will require an original
source, in this case the year is probably wrong.

> Is there really a problem at all?  The debian report included the 
> upstream commit, so you had a link to a primary resource anyway.
> So, I think a simple solution to this 'problem' of secondary
> sources is follow them to the primary one?

Yeah, and people can post them to the list. As stated before, I assign
a lot of CVEs. One minute extra per CVE is about 20 hours a year. It
adds up. So from now on I'll be needing original source confirmation
in the emails to oss-sec.

> Best wishes, Mike
> 


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=trUJ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.