Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 25 Apr 2016 17:36:11 -0400 (EDT)
From: cve-assign@...re.org
To: jmm@...ian.org
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, security@...eshark.org
Subject: Re: CVE requests: Multiple Wireshark vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> there's quite a backlog of Wireshark vulnerabilities which don't
> have CVE IDs assigned:

The CVEs for the latest Wireshark advisories (19 through 28) are
already on the cve.mitre.org web site, and the CVE IDs were sent to
the upstream vendor yesterday. We realize that they aren't yet on the
https://www.wireshark.org/security/wnpa-sec-2016-##.html pages.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4076
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4077
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4078
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4079
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4080
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4081
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4006
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4082
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4083
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4084
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4085

The upstream vendor did not send a request to MITRE for 12 through 18.
We will process those soon.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJXHo1nAAoJEHb/MwWLVhi2WUgP/1TMEQFWSvfkEqhiIKd2vFOA
F+7QOUVOEgwzecoLvcYWXj9NO8qDNzDmGXPEVseaXmfwasZ1hsOiIZJHcQnaRcqN
mSo+YDw6H4edGPT/iobiBy8gucV3dyvbyeJYDlpbPyLAowZLt1PAv2F9GeNcfTz+
xlja225h0TVBa999vK2Umg0XA+Oa4RXSlcXoqgz4qPfIqbtFw1zC4Dp2gxktbi0U
RA5aAduQxCeu4F0DX/d9XNDvf0zLJizwkOknkRflMeagxqA2zrN3hRTEFzxf+RRg
/kYlVhskSbic5bh4E+TBq5urw9wqztcHIInAfj2EFGCYDTpzXp0O/voyrh8CpA+C
Y41HuOv9NiFcIiolKt/dbLg/6G3Mpwbf7J0d78Knv4ACgDLV7YkQ2fPENSsn526F
ZHhMnGa/5O+xS0HcAcFl6u8Vo/71IJkepYUo+736+WhWa7dQB5vq96bCq/TzuD0F
/M3kWTW5n75/S/qo+Uf/QWvD2/tA6UtKs3DUgYHfQdYU4T0JldAvMO5tTwefglot
OWiAVRDz1eBUpoWT7FGYXcm8w3CRwHaXtU5hU1fLuriWBMl0gjC7jLhtBjEMjkAb
EqQiw5222T3b7NjD3cruLqkNiRawSi2S8f2AmNMFAhOt8aPJl3lPFJ6YBdTjfpdv
VpuTfFjKSt1zsCdfLCA3
=g9RN
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ