|
Message-ID: <0517227e-d2e6-cd57-55f7-ad089b34b17c@redhat.com> Date: Mon, 26 Jun 2023 09:01:05 +0200 From: Zdenek Dohnal <zdohnal@...hat.com> To: Solar Designer <solar@...nwall.com>, oss-security@...ts.openwall.com Subject: Re: CVE-2023-34241: CUPS: use-after-free in cupsdAcceptClient() I'm sorry for the confusion :( - yes, the emails to oss-security were announcing the end of embargoes and that the fixes are already merged. I've updated the guide I was following to prevent this in the future. Zdenek On 6/23/23 17:02, Solar Designer wrote: > On Thu, Jun 22, 2023 at 12:02:39PM +0200, Zdenek Dohnal wrote: >> there is currently the embargoed CVE-2023-34241 in CUPS project: > Of course, this wasn't actually embargoed anymore at that time - Zdenek > simply resent the exact same message he had sent to the distros list on > June 13, when the issue was in fact still embargoed. > > Similarly, the previous CUPS vulnerability disclosure on June 1 was a > copy of the distros message from May 23: > > https://www.openwall.com/lists/oss-security/2023/06/01/1 > > Let's be updating these when posting them publicly going forward to > avoid confusion - like "was this published inadvertently when still > under embargo?" (luckily, no). > > Alexander > -- Zdenek Dohnal Senior Software Engineer Red Hat, BRQ-TPBC
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.