lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.GSO.4.51.0807261258480.23860@faron.mitre.org>
Date: Sat, 26 Jul 2008 13:08:25 -0400 (EDT)
From: "Steven M. Christey" <coley@...us.mitre.org>
To: tsecond@...h.net
Cc: full-disclosure@...ts.grok.org.uk, bugtraq@...urityfocus.com
Subject: Re: how to request a cve id?


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

CVE requests can be sent to cve@...re.org or to me directly.  My PGP
key is below, or accessible from the MIT public key server.
Alternately, you can request them from Candidate Numbering Authorities
(CNAs) which include the security teams at Red Hat, Microsoft, and
Debian, or third-party coordinators including iDefense and CERT/CC.

The amount of information you need to provide can vary and is somewhat
negotiable.  We need to be sure how many CVEs to assign.

Naturally, there is no charge for CVE requests.  We encourage people
to try to coordinate with the vendor, since the quality of information
almost always suffers if you don't do so.


Steve Christey
CVE Editor


- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.4 (SunOS)

mQCNAzh/k3wAAAEEAOmU/KL0g6+QQTt7AF0QQHPkkJXDYAgLJFhkk0vCxxsi8UzT
HaFEbpT7WSzpnq/vhfoh+R6tSGhSQm6lJfhDSajqldrfpw4vCxYUWsi7H6tZlGbt
Rd9z+VxW/t8AhkJ2cJE/M7OLoW26aOH/zwA5DdT6WUazFFBqspytTMxw0qbBAAUR
tChTdGV2ZSBDaHJpc3RleSBJbmZvc2VjIDxjb2xleUBtaXRyZS5vcmc+iQCVAwUQ
Oa6sHJytTMxw0qbBAQGCeQP/TwVsIy+XrKH+XVeV4aneOL2LbyPStFI8wmBQXbC7
uKkvTnO2oPiYmFBzpatccQX+SfJZiQmRe2hG8O6Jf0vQCOoEi3Jpa+de32d53MOo
mLrsBBrMNwYtTG9SlVQbUT56Iln/LwzQ0C6thNf/jn5Zv/3TEEo2dt8Ymh+Ip4qQ
SX2JAJUDBRA8s30DnK1MzHDSpsEBAd27BACYP/f8u2K0dN/fHKOy0KWRUfCfarPa
aNnRsMVuWYxxbhP4MCcpUeHyqiEZI71zxwQq4FaFU8ojH5KrQGCiPUQcGtq14qHb
0xIfKqoX0V8eOiM94fQzMaeH9pU4TCmT861qVzm0ltARoz7X4u63PDbQydrBxxgF
55CZgzW0Y47DXIkAlQMFEDmuq4vTGqO/S5EkrQEBRpMD/jTUNxMiUQXD1wewZJoD
ZDOkBy7sOW9qUzNQlPUG0KmJ+pBzacsKMuMVXZWXwERufoUuXPg1rZRweCD8FGDA
6fkYohdM4ojQd0ujgdCN8zQGbRBxTMe/Ub9TRG7vmLRq2QsOFRYhhK+Gggs15HYe
6Ea3rMWUqP0yd/kxuBNZ0QMkiEYEEBECAAYFAj5ajeMACgkQSt01hEsKzCrcogCg
19yplSUq1vxpXdh/NfT3sF+4i20AoP82mT/6lrh5LcNxDh70LFsBpNl2iQCVAwUT
QNn0uoqHRg3pndX9AQEGWQP/RJFAUO9slTd6cwj5OglfB1jE8zt4GSoXV0nMGs8C
oaSLdRjW/vbkL5ypQQZoARCn92v1RAOJNch1OpXO4oupxn0KbkH1YcbSEHc89Mno
gWB+TtYJeEExS5EBGvi9JHfDAeF0FU48JPrEd+gp5rRQZLWvh4FcIrU8O2rA0+TE
GO8=
=kBVP
- -----END PGP PUBLIC KEY BLOCK-----
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (SunOS)

iQCVAwUBSItZmZytTMxw0qbBAQKq0QP+L7+oW3sI8IbDCNbrvWviD5KZovbUmtjY
PEhJKSt/rTMePDdhfwAqvtlSejg+NOFyYqBUSBk7A/ZrFfB185C+5Ea/siSJU6ZU
nNRUX44aSRB3HWqgjRDR7riy2Lgp3N9IvmKyhk65Q8ED9qFH8DreOLevXBCMUF15
k/jBw1VmyOI=
=fhV+
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ