[{"name":"S3-241393","title":"LS to CT on IANA reservation on Security vulnerability fix for use of AES-GCM and AES-GMAC in 33.203","source":"Apple","contact":"Ivy Guo","contact-id":76339,"tdoctype":"LS out","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"3","ainame":"Reports and Liaisons from other Groups","tdoc_agenda_sort_order":13930,"status":"withdrawn","reservation_date":"2024-08-04 10:46:12","uploaded":"2024-04-08 13:26:37","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241393.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241484","title":"LS on vulnerability due to null ciphering request by network","source":"Google Inc.","contact":"Jiwan Ninglekhu","contact-id":105127,"tdoctype":"LS out","for":"Approval","abstract":"End users should have the ability to reject a connection automatically if the selected security algorithms put their privacy at risk. This would be for example in the case of a null cipher or some other feature that might eventually become weak or discove","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"3","ainame":"Reports and Liaisons from other Groups","tdoc_agenda_sort_order":14840,"status":"withdrawn","reservation_date":"2024-08-04 13:18:57","uploaded":"2024-04-08 13:41:03","revisionof":"","revisedto":"","release":"Rel-18","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT1, RAN2","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241484.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-241495","title":"Reply LS on request to change integrity algorithm of 256-NIA3 \/ 256-NCA3","source":"ETSI SAGE","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":3,"ainumber":"3","ainame":"Reports and Liaisons from other Groups","tdoc_agenda_sort_order":149500,"status":"noted","reservation_date":"2024-09-04 16:21:20","uploaded":"2024-04-09 16:21:20","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_115AdHoc-e\/Docs\/S3-241495.zip","group":"S3","meeting":"S3-115-adhoc-e","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]