Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1728044852.266451931@f125.i.mail.ru>
Date: Fri, 04 Oct 2024 15:27:32 +0300
From: larry0@...com
To: oss-security@...ts.openwall.com
Subject: Re[2]: cups-browsed vulnerable to DDoS amplification attack



Hello oss-security,


Thursday, October 3, 2024 at 2:58 PM -04:00 from peter@...ts.nl  <peter@...ts.nl>:
>Hello,
>
>On Thu, Oct 3, 2024, at 19:54, Larry Cashdollar wrote:
>> I've requested a CVE ID to be able to discern between the RCE and the DoS vulnerability.
>
>I reported this as  https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-rq86-c7g6-r2h8 last week, and in the edits at the top (by upstream, above the Summary heading) it looks like they did not want (or did not consider) to request a separate CVE for this. Please do coordinate with them if you decide to go ahead with this request.
>
>(I did notice, and can see value in, Will Dormann's suggestion in the other thread that it might make sense to have more fine-grained CVEs for this collection of problems.)
>
>-- 
>  Peter van Dijk
>   peter@...ts.nl
This vulnerability has been assigned CVE-2024-47850.

Thanks,
Larry C$

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.