|
|
Message-ID: <CAEFhzs_s6U2xMwp3jmGK9_pOg6toiSH_4bBcp3GS7t59CUUamg@mail.gmail.com>
Date: Wed, 5 Nov 2025 15:02:44 -0300
From: Pedro Sampaio <psampaio@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: Questionable CVE's reported against dnsmasq
On Wed, Nov 5, 2025 at 12:13 PM Olle E. Johansson <oej@...ina.net> wrote:
>
>
> > On 4 Nov 2025, at 18:59, Art Manion <zmanion@...tonmail.com> wrote:
> >
> > On 2025-11-04 04:03, Olle E. Johansson wrote:
> >
> >>> On 3 Nov 2025, at 19:07, Art Manion <zmanion@...tonmail.com> wrote:
> >
> >>>>> CVEs against dnsmasq (CVE-2025-12198, CVE-2025-12199, CVE-2025-12200)
> >>>>> and Kamailio (CVE-2025-12204, CVE-2025-12205, CVE-2025-12206, and
> >>>>> CVE-2025-12207) mentioned in this thread are not yet disputed and
> have
> >>>>> no comments of this sort in their descriptions.
> >>>
> >>> I asked VulDB to mark the dnsmasq CVE IDs as disputed.
> >
> > The VulDB CNA decided to reject the dnsmasq CVE IDs.
> >
> >>>> As part of the Kamailio project I can say that we did just become
> aware
> >>>> of these CVEs in your email. They do not make sense. Trying to get to
> >>>> the report, the config files used to provoke the issue can’t be
> downloaded.
> >
> >> We’ve gone back and this was our core developer’s reaction to the mail
> we got earlier to our security address:
> >>
> >> "This is clearly spam, imo: vague/generic reporting, no explicit naming
> >> of Kamailio ... the email was not sent from the vuldb.com server
> >> but from mc20a2201.dnh.net ([185.46.57.114]) -- I would suggest to not
> >> clink on the links, they might lead to malware, etc...
> >
> > I understand both sides of this problem. Would it have helped if the
> VulDB
> > notification included details such as these (from CVE-2025-12207)?
> >
> > https://shimo.im/docs/vVqRMVMlrycMO63y/read
> >
> For us that site is not trustworthy. It could be language/cultural issues.
> One example is that the actual configuration files for some reason can’t be
> downloaded and the error message is
> in a language I have no understanding of.
>
> Trust is hard. We have to think about this. We get all kinds of strange
> emails to our
> security reporting email address so we’re very cautious unfortunately.
>
> How can we create some kind of trust system so that any open source
> developer - from one person projects to large projects with massive funding
> - know that a report is worth reacting to?
>
> /O
> > - Art
> >
> >
>
>
It seems to be that there is a hidden stage during the PSIRT function that
may require its own identification inside the CVE Program (which I assume
is the highest source of truth for us at this moment?). And that stage is
when a security issue is deemed not enough to become a full CVE, but it is
still relevant for awareness purposes. Assigning a CVE ID only to have it
disputed or rejected later seems like a process that is confusing and hard
to manage.
Disputes have no nuance and once the word is out, the possible damages are
hard to revert. Oftentimes they stay perpetually open, and resolutions seem
to not give any definitive answer, which adds to the confusion. Most CVE
record consumers do not have a way to clearly differentiate and correctly
prioritize them.
What if a new ID could be created for these cases, like a lower level CVE,
which can help raise awareness, maintain discussion history, and issues
could be elevated or degraded to it without them getting stuck at the never
ending vendor CVE grinder, but still benefiting from the current CVE
infrastructure?
--
Pedro Sampaio | Red Hat Product Security
851525C5A98E9DEB7E650ABDFAC8296FBC674B8F
Content of type "text/html" skipped
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.