Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <c04ebb34-521b-42d1-bd50-c2ea9d0e78f7@app.fastmail.com>
Date: Thu, 03 Oct 2024 20:36:47 +0200
From: "Peter van Dijk" <peter@...ts.nl>
To: oss-security@...ts.openwall.com
Subject: Re: cups-browsed vulnerable to DDoS amplification attack

Hello,

On Thu, Oct 3, 2024, at 19:54, Larry Cashdollar wrote:
> I've requested a CVE ID to be able to discern between the RCE and the DoS vulnerability.

I reported this as https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq86-c7g6-r2h8 last week, and in the edits at the top (by upstream, above the Summary heading) it looks like they did not want (or did not consider) to request a separate CVE for this. Please do coordinate with them if you decide to go ahead with this request.

(I did notice, and can see value in, Will Dormann's suggestion in the other thread that it might make sense to have more fine-grained CVEs for this collection of problems.)

-- 
  Peter van Dijk
  peter@...ts.nl

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.