Hello
First thanks to Alexander for reposting because I was not able to do so!
You're right Clemens, I have myself ask the question on this github 
(https://github.com/cisagov/vulnrichment/issues/130), but still no information 
for the moment.
Joel


________________________________________
De : Clemens Lang <cll...@redhat.com>
Envoyé : mardi 12 novembre 2024 16h12
À : oss-security@lists.openwall.com <oss-security@lists.openwall.com>
Objet : Re: [oss-security] CVE-2024-36905: Linux kernel: Divide-by-zero on 
shutdown of TCP_SYN_RECV sockets
 
[Vous ne recevez pas souvent de courriers de cll...@redhat.com. Découvrez 
pourquoi ceci est important à https://aka.ms/LearnAboutSenderIdentification ]

Hi,

> On 12. Nov 2024, at 15:58, Solar Designer <so...@openwall.com> wrote:
>
> So a question for this list/thread may be - where/how may we dispute
> CISA-ADP analysis?  Maybe someone would reply with specific contact info
> for them, and Joel would proceed with that.

I think the source for the CISA-ADP data is at [1]. For this specific CVE, the 
relevant file would be [2]. Their readme has a section at the bottom, where 
they encourage feedback:

> We want to hear from you, the IT cybersecurity professional community, about 
> Vulnrichment and ADP! If you see something, please feel free to say something 
> in the Issues, or even better, open a Pull Request with your suggested fix.

I’m aware of at last one prior case where a similar case of (IMHO) overblown 
CVSS scores was discussed in an issue on this particular GitHub project [3].

Somebody seems to already have opened a ticket for this CVE, too: [4]


[1]: https://github.com/cisagov/vulnrichment
[2]: 
https://github.com/cisagov/vulnrichment/blob/develop/2024/36xxx/CVE-2024-36905.json
[3]: https://github.com/cisagov/vulnrichment/issues/93
[4]: https://github.com/cisagov/vulnrichment/issues/130


HTH,
Clemens
--
Clemens Lang
RHEL Crypto Team
Red Hat

Reply via email to