Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
98c8f5dc by Moritz Muehlenhoff at 2023-11-23T12:53:00+01:00
record upstream fix for libcrypto++

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -14979,14 +14979,12 @@ CVE-2022-48571 (memcached 1.6.7 allows a Denial of 
Service via multi-packet uplo
        - memcached 1.6.8+dfsg-1
        NOTE: Fixed by: 
https://github.com/memcached/memcached/commit/6b319c8c7a29e9c353dec83dc92f01905f6c8966
 (1.6.8)
 CVE-2022-48570 (Crypto++ through 8.4 contains a timing side channel in ECDSA 
signature ...)
-       - libcrypto++ <unfixed>
-       [bookworm] - libcrypto++ <no-dsa> (Minor issue)
-       [bullseye] - libcrypto++ <no-dsa> (Minor issue)
+       - libcrypto++ 8.4.0-1
        [buster] - libcrypto++ <no-dsa> (Minor issue)
        NOTE: https://github.com/weidai11/cryptopp/issues/992
        NOTE: This issue exists because the CVE-2019-14318 fix was 
intentionally removed for
        NOTE: functionality reasons.
-       TODO: check details on upstream fix (in 8.4?)
+       NOTE: 
https://github.com/weidai11/cryptopp/commit/4bc7408ae2aefac9357c16809541ecbe225b7f3a
 (CRYPTOPP_8_4_0)
 CVE-2022-48566 (An issue was discovered in compare_digest in Lib/hmac.py in 
Python thr ...)
        {DLA-3614-1 DLA-3575-1}
        - python3.9 3.9.1~rc1-1



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/98c8f5dc6bae0401a57d5334f5dd14d55c82a2d0

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/98c8f5dc6bae0401a57d5334f5dd14d55c82a2d0
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to