oss-sec mailing list archives
Re: CVE Request for KIO/kmail
From: Richard Moore <rich () kde org>
Date: Sun, 15 Jun 2014 16:55:31 +0100
On 15 June 2014 16:17, <cve-assign () mitre org> wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [ actual security content, for people who don't want to read the meta-discussion: Is this related to an https://bugs.kde.org/show_bug.cgi?id=330795 vulnerability? ]
That is unrelated.
From: Henri Salo <henri () nerv fi> More details are needed for public CVE request.It might be worthwhile to clarify what problems we're solving, in the specific case of a request by a product's upstream vendor, by requiring that more vulnerability details be sent here at the time of the CVE request. MITRE is almost certainly willing to accept this as a valid reason, if there's general agreement: - people here don't want to see announcements of vulnerabilities that are both vague AND unfixed, and would just unsubscribe if there were many of these (vague vulnerability details for fixed issues typically haven't had objections in the past, e.g., the http://openwall.com/lists/oss-security/2013/11/28/5 post) (In 2013 and earlier, vulnerability details here had a de-duplication purpose for MITRE, but they often don't now. If we were to assign a CVE ID for this, we'd already know whether any kio CVE requests had been sent directly to us. The CVE-OpenSource-Request-HOWTO.html page and examples aren't directly applicable to us, and we're generally more concerned with knowing whether something is a unique issue that everyone will want to fix, than with knowing every possible detail. But we realize the list charter may imply a minimum level of details.) Going back to the security content, KDE Bug 330795 mentioned above says: Product kio KDE's KIO completely ignores the first part, "must not automatically redirect without prompting the user" and possibly this is (or was) a violation of RFC 7231 section 6.4, with security implications: "Automatic redirection needs to done with care for methods not known to be safe, as defined in Section 4.2.1, since the user might not wish to redirect an unsafe request." Does anyone want a CVE ID for that? Finally, for the original "a vulnerability in KIO that causes a security issue in kmail" request: to get a CVE ID for this more quickly, please send to cve-assign () mitre org mentioning whether it is or isn't Bug 330795. We don't want to send a CVE ID here immediately because MITRE doesn't determine the list charter and it might be an off-topic request.
In the past when I've tried to use the cve-assign address it has basically been a black hole. Since then I've either asked redhat or one of the other OSS vendors for a CVE. I've used the distros () vs openwall org now as a fallback. I'd also note as part of the meta discussion that I'm not going to release details of vulnerabilities to a public list before the fix, and just because someone asks for more details doesn't mean I will provide them. - I have no way to know who the person asking is. If getting a CVE assigned becomes a problem then the solution from my side will be to release the advisory then let someone else sort out assigning CVEs afterwards. Cheers Rich.
Current thread:
- CVE Request for KIO/kmail Richard Moore (Jun 15)
- Re: CVE Request for KIO/kmail Henri Salo (Jun 15)
- Re: CVE Request for KIO/kmail cve-assign (Jun 15)
- Re: CVE Request for KIO/kmail Richard Moore (Jun 15)
- Re: CVE Request for KIO/kmail cve-assign (Jun 15)
- Re: Re: CVE Request for KIO/kmail Yves-Alexis Perez (Jun 15)
- Re: Re: CVE Request for KIO/kmail Richard Moore (Jun 15)
- Re: CVE Request for KIO/kmail cve-assign (Jun 15)
- Re: CVE Request for KIO/kmail Henri Salo (Jun 15)
