|
Message-Id: <20160425213611.A443C6C09ED@smtpvmsrv1.mitre.org> Date: Mon, 25 Apr 2016 17:36:11 -0400 (EDT) From: cve-assign@...re.org To: jmm@...ian.org Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, security@...eshark.org Subject: Re: CVE requests: Multiple Wireshark vulnerabilities -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > there's quite a backlog of Wireshark vulnerabilities which don't > have CVE IDs assigned: The CVEs for the latest Wireshark advisories (19 through 28) are already on the cve.mitre.org web site, and the CVE IDs were sent to the upstream vendor yesterday. We realize that they aren't yet on the https://www.wireshark.org/security/wnpa-sec-2016-##.html pages. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4076 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4077 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4078 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4079 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4080 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4081 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4006 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4082 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4083 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4084 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4085 The upstream vendor did not send a request to MITRE for 12 through 18. We will process those soon. - -- CVE Assignment Team M/S M300, 202 Burlington Road, Bedford, MA 01730 USA [ A PGP key is available for encrypted communications at http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJXHo1nAAoJEHb/MwWLVhi2WUgP/1TMEQFWSvfkEqhiIKd2vFOA F+7QOUVOEgwzecoLvcYWXj9NO8qDNzDmGXPEVseaXmfwasZ1hsOiIZJHcQnaRcqN mSo+YDw6H4edGPT/iobiBy8gucV3dyvbyeJYDlpbPyLAowZLt1PAv2F9GeNcfTz+ xlja225h0TVBa999vK2Umg0XA+Oa4RXSlcXoqgz4qPfIqbtFw1zC4Dp2gxktbi0U RA5aAduQxCeu4F0DX/d9XNDvf0zLJizwkOknkRflMeagxqA2zrN3hRTEFzxf+RRg /kYlVhskSbic5bh4E+TBq5urw9wqztcHIInAfj2EFGCYDTpzXp0O/voyrh8CpA+C Y41HuOv9NiFcIiolKt/dbLg/6G3Mpwbf7J0d78Knv4ACgDLV7YkQ2fPENSsn526F ZHhMnGa/5O+xS0HcAcFl6u8Vo/71IJkepYUo+736+WhWa7dQB5vq96bCq/TzuD0F /M3kWTW5n75/S/qo+Uf/QWvD2/tA6UtKs3DUgYHfQdYU4T0JldAvMO5tTwefglot OWiAVRDz1eBUpoWT7FGYXcm8w3CRwHaXtU5hU1fLuriWBMl0gjC7jLhtBjEMjkAb EqQiw5222T3b7NjD3cruLqkNiRawSi2S8f2AmNMFAhOt8aPJl3lPFJ6YBdTjfpdv VpuTfFjKSt1zsCdfLCA3 =g9RN -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.