Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <0517227e-d2e6-cd57-55f7-ad089b34b17c@redhat.com>
Date: Mon, 26 Jun 2023 09:01:05 +0200
From: Zdenek Dohnal <zdohnal@...hat.com>
To: Solar Designer <solar@...nwall.com>, oss-security@...ts.openwall.com
Subject: Re: CVE-2023-34241: CUPS: use-after-free in
 cupsdAcceptClient()

I'm sorry for the confusion :( - yes, the emails to oss-security were 
announcing the end of embargoes and that the fixes are already merged.

I've updated the guide I was following to prevent this in the future.


Zdenek

On 6/23/23 17:02, Solar Designer wrote:
> On Thu, Jun 22, 2023 at 12:02:39PM +0200, Zdenek Dohnal wrote:
>> there is currently the embargoed CVE-2023-34241 in CUPS project:
> Of course, this wasn't actually embargoed anymore at that time - Zdenek
> simply resent the exact same message he had sent to the distros list on
> June 13, when the issue was in fact still embargoed.
>
> Similarly, the previous CUPS vulnerability disclosure on June 1 was a
> copy of the distros message from May 23:
>
> https://www.openwall.com/lists/oss-security/2023/06/01/1
>
> Let's be updating these when posting them publicly going forward to
> avoid confusion - like "was this published inadvertently when still
> under embargo?" (luckily, no).
>
> Alexander
>
-- 
Zdenek Dohnal
Senior Software Engineer
Red Hat, BRQ-TPBC

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.