Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANO=Ty1z+6T=r0mef55Hd1tHfiDVLT77MaD9ddVvOnNKx5td0w@mail.gmail.com>
Date: Tue, 1 Sep 2015 22:37:04 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security <oss-security@...ts.openwall.com>, cve-assign@...re.org, 
	security@...nafs.org, security@...ba.org
Subject: CVE REJECT CVE-2015-3287

So I know we said no more CVE rejects here but this one is public and
already a mess.

Long story short I assigned the following CVE's to OpenAFS:

CVE-2015-3282 OpenAFS: vos leaks stack data onto the wire in the clear when
creating vldb entries
CVE-2015-3283 OpenAFS: bos commands can be spoofed, including some which
alter server state
CVE-2015-3284 OpenAFS: pioctls leak kernel memory
CVE-2015-3285 OpenAFS: kernel pioctl support for OSD command passing can
trigger a panic
CVE-2015-3286 OpenAFS: Solaris grouplist modifications for PAGs can panic
or overwrite memory

however they also used CVE-2015-3287 for
http://www.openafs.org/pages/security/OPENAFS-SA-2015-006.txt

I definitely did NOT assign CVE-2015-3287 to OpenAFS, I double checked my
email to them and the commits to our file that we use to handle CVE
assignments.

I did in fact assign CVE-2015-3287 to Samba (for a still embargoed issue).
I was notified of this duplicate issue by Samba (basically asking me what
was going on).

Mitre: can you please REJECT CVE-2015-3287 and assign a NEW CVE for the
OpenAFS issue. I have assigned Samba a new CVE for their embargoed issue
already. Thanks.

--
Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Red Hat Product Security contact: secalert@...hat.com

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.