|
Message-ID: <20170705133341.GA31268@openwall.com> Date: Wed, 5 Jul 2017 15:33:41 +0200 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Subject: Re: CVE IDs needed for PHP vulnerabilites (affects 5.6.30 and 7.0.20) On Wed, Jul 05, 2017 at 03:50:58PM +0300, Lior Kaplan wrote: > AFAIK, when the issue is already public the list is just fine. > > From the cve-assign auto reply: > > "In the special case of communications involving a publicly known > vulnerability on the oss-security mailing list, please do not use > the https://cveform.mitre.org web site at this time, and instead > send new or followup messages directly to that mailing list." I think the above is about additional "communications involving" a vulnerability that already has a CVE ID, not about the CVE request. FWIW, on the distros list wiki page, we currently ask to avoid using the private lists if one's "sole purpose of their use is to obtain a CVE ID", and in a footnote we give this alternative procedure: "In those "CVE only" cases, please start by posting about the (to be made) public issue to oss-security (without a CVE ID), request a CVE ID from MITRE directly, and finally "reply" to your own posting when you also have the CVE ID to add. With the described approach you would only approach MITRE after the issue is already public, but if you choose to do things differently and contact MITRE about an issue that is not yet public, then please do not disclose to them more than the absolute minimum needed for them to assign a CVE ID." "from MITRE directly" is a link to https://cveform.mitre.org and "the absolute minimum" is a link to http://www.openwall.com/lists/oss-security/2015/04/14/3 I hope this procedure is consistent with everyone's expectations. Salvatore reply quoted below is consistent with it. Thank you for helping run this list, Salvatore! I think that ideally we add to such boilerplate replies (the need for which will hopefully become infrequent) that we appreciate being notified of the vulnerabilities first (before the CVE IDs are requested from MITRE) and want it to stay this way going forward (just not in the form of CVE requests, but rather in the form of vulnerability notifications also stating that CVE IDs are being requested separately and will be posted in here later). I don't care about CVEs much, but we need to know where to redirect those requests to, and we also need to make it likely that we'll receive the actual vulnerability detail on oss-security (the sooner, the better). > On Wed, Jul 5, 2017 at 3:34 PM, Salvatore Bonaccorso <carnil@...ian.org> wrote: > > CVE assignement requests are not handled anymore directly via the > > oss-security list, but need to be filled/requested at > > https://cveform.mitre.org/ > > > > Once CVE are assigned, can you repost them here for benefit of other > > reader? Alexander
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.