Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <52658A4D.6040305@redhat.com>
Date: Mon, 21 Oct 2013 14:10:53 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: cmsmadesimple before 1.11.8 / bad
 upstream behaviour vs. CVE assignment

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 10/21/2013 01:20 PM, Hanno Böck wrote:
> Hi,
> 
> I want to request a CVE, but also start some discussion about how
> to handle such issues.
> 
> The release notes for cmsmadesimple 1.11.8 mention a security
> issue: 
> http://www.cmsmadesimple.org/announcing-cmsms-1-11-8-fioreana/ 
> "This release brings a few minor features, some performance 
> improvements, documentation improvements, a Smarty upgrade, and a 
> number of bug fixes (including a minor security issue)."
> 
> Now, this is all the information you get. Nothing about the kind
> of security issue, let alone a bug nr or commit. The question is:
> What do we do with such shitty upstream behaviour?
> 
> Last time I reported something alike I was told that I should
> provide more info. The question is: How?
> 
> Sure, I could diff the release to the release before or try to
> find some repository and read all the commits in the timeframe. But
> I'm not getting paid for this, I merely want to improve overall
> security of free software voluntarily.
> 
> So how will we proceed with such stuff? In the past, we often had
> "CVE for unknown security issue in xxx"-alike assignments.
> 
> cu,
> 

Yeah, maybe if we can incentivize this research, e.g. give people
credit or something, not for discovering the issue but for researching
it and posting the details/diff/whatever. In general if no details are
available unless there's some reason not to, I would generally hand
these over to Mitre to deal with.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)
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=GvzO
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.