|
|
FYI, I have added this issue to the "Suggested Rules Changes" document in GitHub. https://github.com/CVEProject/docs/blob/cna-documents/cna/CNA%20Rules/CNA%20Rules%20Development/Suggested%20Rules%20Changes This document can be edited by anyone, so if you have other ideas for rules changes, or want to comment on what is already there, please do so. Thanks. -Dan From:
<owner-cve-editorial-board-list@lists.mitre.org> on behalf of "Coffin, Chris" <ccoffin@mitre.org> Kurt, It’s not clear to me whether Oracle would consider this within their scope. FYI… a quick search doesn’t find any previous CVEs for GlassFish Open Server. I think
the safest thing to do is to redirect them to Oracle. In the meantime, we will also send a note to Oracle about the issue. We will also ask the question as to whether all “Sponsored” products should be considered within the scope of Oracle, or if there would
be exceptions. If there are exceptions then I would agree, we need to push for lists that provide CNA scope information or all CNAs.
Should we consider this a discussion point for becoming a CNA Rule? For example, a rule that states a CNA must provide a page on their web site which lists the
products for which they accept vulnerability reports. Chris From: owner-cve-editorial-board-list@lists.mitre.org [mailto:owner-cve-editorial-board-list@lists.mitre.org]
On Behalf Of Williams, Ken You raise a good point that also probably applies to a number of other Sun/Oracle projects with vulnerabilities, like: Java Mail, JAXB, JMS, JNDI, MySQL. The CVE answer appears to be clear only if you’re talking about the commercially supported versions of these projects. https://www.oracle.com/technetwork/topics/security/alerts-086861.html Regards, kw From: Kurt Seifried [mailto:kseifried@redhat.com]
That is Oracle GlassFish Server which is different than the GlassFish Open Source one (as I understand it), e.g.: On Wed, Mar 29, 2017 at 1:19 PM, Williams, Ken <Ken.Williams@ca.com> wrote:
--
|