Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu,  9 Jun 2016 10:10:15 -0400 (EDT)
From: cve-assign@...re.org
To: astieger@...e.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request: wireshark releases

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> Please assign CVEs to the current wireshark releases (if not done so).

CVE-2016-5350
https://www.wireshark.org/security/wnpa-sec-2016-29
https://github.com/wireshark/wireshark/commit/b4d16b4495b732888e12baf5b8a7e9bf2665e22b


CVE-2016-5351
https://www.wireshark.org/security/wnpa-sec-2016-30
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11585
https://github.com/wireshark/wireshark/commit/9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4


CVE-2016-5352
https://www.wireshark.org/security/wnpa-sec-2016-31
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12175
https://github.com/wireshark/wireshark/commit/b6d838eebf4456192360654092e5587c5207f185


CVE-2016-5353
https://www.wireshark.org/security/wnpa-sec-2016-32
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12191
https://github.com/wireshark/wireshark/commit/7d7190695ce2ff269fdffb04e87139995cde21f4


CVE-2016-5354
https://www.wireshark.org/security/wnpa-sec-2016-33
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12356
https://github.com/wireshark/wireshark/commit/2cb5985bf47bdc8bea78d28483ed224abdd33dc6


CVE-2016-5355
https://www.wireshark.org/security/wnpa-sec-2016-34
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12394
https://github.com/wireshark/wireshark/commit/3270dfac43da861c714df76513456b46765ff47f
https://github.com/wireshark/wireshark/commit/5efb45231671baa2db2011d8f67f9d6e72bc455b


CVE-2016-5356
https://www.wireshark.org/security/wnpa-sec-2016-35
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12395
https://github.com/wireshark/wireshark/commit/a66628e425db725df1ac52a3c573a03357060ddd
https://github.com/wireshark/wireshark/commit/f5ec0afb766f19519ea9623152cca3bbe2229500


CVE-2016-5357
https://www.wireshark.org/security/wnpa-sec-2016-36
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12396
https://github.com/wireshark/wireshark/commit/11edc83b98a61e890d7bb01855389d40e984ea82
https://github.com/wireshark/wireshark/commit/6a140eca7b78b230f1f90a739a32257476513c78


CVE-2016-5358
https://www.wireshark.org/security/wnpa-sec-2016-37
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12440
https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7


CVE-2016-5359
https://www.wireshark.org/security/wnpa-sec-2016-38
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12408
https://github.com/wireshark/wireshark/commit/b8e0d416898bb975a02c1b55883342edc5b4c9c0

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=/yKn
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ