Newsgroups: php.internals Path: news.php.net Xref: news.php.net php.internals:73249 Return-Path: Mailing-List: contact internals-help@lists.php.net; run by ezmlm Delivered-To: mailing list internals@lists.php.net Received: (qmail 83179 invoked from network); 17 Mar 2014 22:20:52 -0000 Received: from unknown (HELO lists.php.net) (127.0.0.1) by localhost with SMTP; 17 Mar 2014 22:20:52 -0000 Authentication-Results: pb1.pair.com header.from=narf@devilix.net; sender-id=pass Authentication-Results: pb1.pair.com smtp.mail=narf@devilix.net; spf=pass; sender-id=pass Received-SPF: pass (pb1.pair.com: domain devilix.net designates 209.85.160.172 as permitted sender) X-PHP-List-Original-Sender: narf@devilix.net X-Host-Fingerprint: 209.85.160.172 mail-yk0-f172.google.com Received: from [209.85.160.172] ([209.85.160.172:50794] helo=mail-yk0-f172.google.com) by pb1.pair.com (ecelerity 2.1.1.9-wez r(12769M)) with ESMTP id 92/54-17561-24577235 for ; Mon, 17 Mar 2014 17:20:52 -0500 Received: by mail-yk0-f172.google.com with SMTP id 200so16744277ykr.3 for ; Mon, 17 Mar 2014 15:20:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=devilix.net; s=google; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=4oopQMJcGi6IGkWja5PUsLv6/sET/+uOTKPFx+XjRG0=; b=ugs2n8mC82fZ/KDPZYhERB/FUfKRbSn+QufmNPTPP8QNCcVQMbzXDTt6G8em1cU8Rh Km6Hxr71/6OGFIKRd3+nWShCjvdiUkKkfz/3wo7X/0DPk6AfRu5ynGMgnDQFk9Nbj5kF O31kDchQFSd02sCO+fanaQtEt7kZXIc9lzOCE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:cc:content-type; bh=4oopQMJcGi6IGkWja5PUsLv6/sET/+uOTKPFx+XjRG0=; b=RdoDaxxOLarqq++LGdVES0K0FG5kcp2xjgtypkRTs1+6iGBBiZBm9MzWEfpRJqbz3C k9ptVgHedfxCM3U46T4y2NKTqKTbb5zrrheRV3/t/tiBiCh63uvQe+n34ez1Ky05SV3k Uu3nRFAUDPQsjuQ7kNKJgp2v8DcDglvZuoU97jE9LyQpSVtIjc2N/jB5+v2FJ5meRXIR xweh96K36+ZTlKXbhvZbHqe0i/yPu2ES9q+or3z6Qxdz3+CSo1wFgywB1ixEbFNDcASs qFZU6EhUAEfyT33vutqABQ3IH6mQhDVTC4AV89ofMmfthL3EZQUwJyxcihKZOSuLH626 /H/w== X-Gm-Message-State: ALoCoQleK03xGrIPqT3m1zlDULvtObscjLJEb4Rr47JzOxgeXkqPIncFN8KlS0KrMSnmQQZEFo7N MIME-Version: 1.0 X-Received: by 10.236.184.136 with SMTP id s8mr118818yhm.132.1395094848423; Mon, 17 Mar 2014 15:20:48 -0700 (PDT) Received: by 10.170.188.139 with HTTP; Mon, 17 Mar 2014 15:20:48 -0700 (PDT) In-Reply-To: References: Date: Tue, 18 Mar 2014 00:20:48 +0200 Message-ID: To: Yasuo Ohgaki Cc: Pierre Joye , "internals@lists.php.net" Content-Type: text/plain; charset=UTF-8 Subject: Re: [PHP-DEV] Session: deprecating create_sid() method and add createSid()? From: narf@devilix.net (Andrey Andreev) Hi, On Tue, Mar 18, 2014 at 12:07 AM, Yasuo Ohgaki wrote: > Getting CVE is easy. One just have to describe what the vulnerability is and > send request mail to MITRE. If personnel in MITRE agrees it as new > vulnerability, > then they give us new CVE, if not, they give us existing CVE. > > I don't think this (session_regenerate_id() issue) is PHP's CVE issue as it > may > be avoided by user land like timing attack issue. No, I'm not talking about session_regenerate_id() ... sorry that I mentioned it in this thread. I'd rather not share that publicly until it's resolved, and hence why my question was - can CVEs be hidden until that happens? Cheers, Andrey.