Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 16 Apr 2015 16:30:51 -0700
From: Reed Loden <reed@...dloden.com>
To: Assign a CVE Identifier <cve-assign@...re.org>
Cc: oss-security@...ts.openwall.com
Subject: Re: Re: cve-assign delays

Do you have an estimated date/time as to when you'll get caught up to
present day on backlogged requests (of things sent to oss-security@)? ...
or do you have a time period in which you would like for folks to poke you
for still-pending assignments?

~reed

On Thu, Apr 16, 2015 at 12:02 AM, <cve-assign@...re.org> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> >   1. glibc http://www.openwall.com/lists/oss-security/2015/02/13/3
> >   2. xrdp http://www.openwall.com/lists/oss-security/2015/02/19/1
> >
> > Are those still on MITRE's radar screen?
>
> Yes. We are actually using the archive URLs under
> http://www.openwall.com/lists/oss-security within our internal
> tracking, so we are aware of the messages that were successfully
> entered in that archive. If there are new vulnerability reports that
> are related to a previous message, then mentioning an archive URL in
> that format (rather than, for example, the http://seclists.org/oss-sec
> format) would make it easiest for us to find the previous context.
>
> - --
> CVE assignment team, MITRE CVE Numbering Authority
> M/S M300
> 202 Burlington Road, Bedford, MA 01730 USA
> [ PGP key available through http://cve.mitre.org/cve/request_id.html ]
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.14 (SunOS)
>
> iQEcBAEBAgAGBQJVL13MAAoJEKllVAevmvmsRfUH/1P7zXrihZricUPLcgSNGMh/
> xyZh+vDzxYaVYLvC9N9K9HlAVZDD3VsMzIvHJxnwl4Prsul3b1cYn5As2+xf0zVv
> hD6aZS46MvlFs9Ys7uqm0Y/n1dpTmb9BG6yNi+xR/4NQGI9GIx+Rjqe4G/Yd/QY+
> wxm67kLJkhTXNOszDiagvsrR+WTwJ/kuJrYRYPoni5+Nif9ozhFwpyvMtYwgaF96
> dthMHWG2d5h/Clyq6kt3vsvod3z3ws5i5lGCR7gc9YAj1XdWDDzjGgRXfYvX/UD/
> MPIWWbeJIXWrZ+ylC+x76f0C/yhNyox9DU+cCQ5fx0ZoxS/ROBI+yUlfVZgvvWE=
> =zHq3
> -----END PGP SIGNATURE-----
>

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ