|
|
Message-ID: <Pine.LNX.4.64.1501291126380.25737@beijing.mitre.org>
Date: Thu, 29 Jan 2015 11:52:02 -0500 (EST)
From: cve-assign@...re.org
To: Kurt Seifried <kseifried@...hat.com>
cc: oss-security@...ts.openwall.com, huzaifas@...hat.com,
Mitre CVE assign department <cve-assign@...re.org>
Subject: Re: GHOST gethostbyname() heap overflow in glibc
(CVE-2015-0235)
> On 28/01/15 06:57 PM, Huzaifa Sidhpurwala wrote:
>> On 01/29/2015 03:17 AM, Florian Weimer wrote:
>>
>>>> Use CVE-2012-6686 for "unbound alloca use in glob_in_dir" as covered
>>>> by Red Hat Bugzilla ID 797096.
>>>
>>> Oh, it seems Huzaifa posted the wrong Bugzilla reference.
>>>
>>
>> Yes, sorry wrong bz.
>>
>>> We still need assignment for this fix:
>>>
>>> <https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=2e96f1c7>
>>>
>>> The matching Red Hat Bugzilla bug is:
>>>
>>> <https://bugzilla.redhat.com/show_bug.cgi?id=981942>
>> The above is the correct bug with the corresponding impact at:
>> https://bugzilla.redhat.com/show_bug.cgi?id=1186614
>>
>> MITRE,
>>
>> Can we still use the above CVE for this issue?
>
> This would be a bad idea and lead to much confusion, especially for
> people that have already consumed this CVE and written up reports that
> in turn have been shipped to other people/etc.
>
> Can we REJECT this CVE if the issue is not a security issue, obviously
> if it is a security issue we should keep this CVE.
The scope of CVE-2012-6686 has already been explicitly identified, i.e. it
is 797096. If 797096 does not cover a security issue, or is a duplicate,
then we would need to REJECT the CVE.
However, 797096 reports that the issue "can lead to program crashes if
excessively long inputs are passed to certain functions." This still
sounds like it could be a vulnerability.
Is this already associated with a different CVE? 797096 points to
RHBA-2013:0022, which maps to CVE-2013-4357. However, 797096's title does
not include CVE-2013-4357.
> Additionally if we can get a new CVE for Bz981942 that would be great,
> thanks!
There now appear to be two different requests for two separate Bugzilla
IDs that might be discussing the same issue. Please clarify.
BZ 1186614 is "glibc: Invalid-free when using getaddrinfo()". It points
to
https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=2e96f1c7
which is "Fix encoding name for IDN in getaddrinfo" and modifies
gaih_inet() in sysdeps/posix/getaddrinfo.c by setting name=p and
malloc_name=true.
CVE-2013-7424 is now assigned with the issue whose scope is defined by
commit 2e96f1c7 / gaih_inet(). (A 2011 year is not used because 2e96f1c7
does not clearly identify any security relevance.)
A separate Bugzilla ID, 981942, might be a duplicate. It is titled "ping6
with idn causes crash," includes Comment 4 (Carlos O'Donell 2013-07-08
09:54:18 EDT) which references a discrepancy with upstream's "name = p;"
fix in gaih_inet(). It also directly includes commit 2e96f1c7, which has
now been associated with CVE-2013-7424/BZ1186614. Yet, here in 981942,
there is no apparent reference to 1186614.
Is 981942 a duplicate of CVE-2013-7424/BZ1186614, or is a separate CVE ID
required? If a new ID is required, please explain the difference.
---
CVE assignment team, MITRE CVE Numbering Authority M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.