Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <56E6E3ED.6050903@igalia.com>
Date: Mon, 14 Mar 2016 17:16:45 +0100
From: Carlos Alberto Lopez Perez <clopez@...lia.com>
To: oss-security@...ts.openwall.com
Subject: Re: WebKitGTK+ Security Advisory WSA-2016-0002

On 14/03/16 13:29, Tomas Hoger wrote:
> On Fri, 11 Mar 2016 15:25:39 +0100 Carlos Alberto Lopez Perez wrote:
> 
>> Advisory ID        : WSA-2016-0002
>> Advisory URL       : http://webkitgtk.org/security/WSA-2016-0002.html
>> CVE identifiers    : CVE-2016-1723, CVE-2016-1724, CVE-2016-1725,
>>                      CVE-2016-1726, CVE-2016-1727, CVE-2016-1728.
>>
>> Several vulnerabilities were discovered on WebKitGTK+.
> 
> Are further details of these issues available anywhere?  WSA only
> re-uses Mitre CVE descriptions derived form Apple advisories, but is
> there info which bugs/commits these CVEs correspond to?
> 

Per policy [1], the details of security bugs in WebKit and their fixes
are available only to members of the WebKit Security Group.

If you have a legitimate reason that you need to know specific details
about any of this bugs, then you should state the reason in a inquiry
directed to security@...kit.org rather than to this mailing list.


[1] https://webkit.org/security-policy/



Download attachment "signature.asc" of type "application/pgp-signature" (884 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.