[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] Re: CVE Request for KIO/kmail
From:       Richard Moore <rich () kde ! org>
Date:       2014-06-15 15:55:31
Message-ID: CAMp7mVsOfUnN=r3GERbJYri+9uKz_07eC-VXv-2_CC7sNWscjw () mail ! gmail ! com
[Download RAW message or body]


On 15 June 2014 16:17, <cve-assign@mitre.org> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> [ actual security content, for people who don't want to read the
> meta-discussion:
>
>   Is this related to an https://bugs.kde.org/show_bug.cgi?id=330795
>   vulnerability?
> ]
>
>
That is unrelated.


> > From: Henri Salo <henri@nerv.fi>
> > More details are needed for public CVE request.
>
> It might be worthwhile to clarify what problems we're solving, in the
> specific case of a request by a product's upstream vendor, by
> requiring that more vulnerability details be sent here at the time of
> the CVE request.
>
> MITRE is almost certainly willing to accept this as a valid reason, if
> there's general agreement:
>
>   - people here don't want to see announcements of vulnerabilities
>     that are both vague AND unfixed, and would just unsubscribe if there
>     were many of these
>
>     (vague vulnerability details for fixed issues typically haven't
>      had objections in the past, e.g., the
>      http://openwall.com/lists/oss-security/2013/11/28/5 post)
>
> (In 2013 and earlier, vulnerability details here had a de-duplication
> purpose for MITRE, but they often don't now. If we were to assign a
> CVE ID for this, we'd already know whether any kio CVE requests had
> been sent directly to us. The CVE-OpenSource-Request-HOWTO.html page
> and examples aren't directly applicable to us, and we're generally
> more concerned with knowing whether something is a unique issue that
> everyone will want to fix, than with knowing every possible detail.
> But we realize the list charter may imply a minimum level of details.)
>
> Going back to the security content, KDE Bug 330795 mentioned above says:
>
>   Product  kio
>
>   KDE's KIO completely ignores the first part, "must not automatically
>   redirect without prompting the user"
>
> and possibly this is (or was) a violation of RFC 7231 section 6.4,
> with security implications:
>
>   "Automatic redirection needs to done with care for methods not
>    known to be safe, as defined in Section 4.2.1, since the user
>    might not wish to redirect an unsafe request."
>
> Does anyone want a CVE ID for that?
>
> Finally, for the original "a vulnerability in KIO that causes a security
> issue in kmail" request: to get a CVE ID for this more quickly, please send
> to cve-assign@mitre.org mentioning whether it is or isn't Bug 330795.
> We don't want to send a CVE ID here immediately because MITRE doesn't
> determine the list charter and it might be an off-topic request.
>
>
In the past when I've tried to use the cve-assign address it has basically
been a black hole. Since then I've either asked redhat or one of the other
OSS vendors for a CVE. I've used the distros@vs.openwall.org now as a
fallback.

I'd also note as part of the meta discussion that I'm not going to release
details of vulnerabilities to a public list  before the fix, and just
because someone asks for more details doesn't mean I will provide them. - I
have no way to know who the person asking is. If getting a CVE assigned
becomes a problem then the solution from my side will be to release the
advisory then let someone else sort out assigning CVEs afterwards.

Cheers

Rich.


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic