[Git][security-tracker-team/security-tracker][master] wolfssl fixed in sid

Moritz Muehlenhoff (@jmm) jmm at debian.org
Mon Sep 23 15:19:44 BST 2024



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
949e59c6 by Moritz Muehlenhoff at 2024-09-23T16:19:33+02:00
wolfssl fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -5236,20 +5236,20 @@ CVE-2024-6633 (The default credentials for the setup HSQL database (HSQLDB) for
 CVE-2024-6632 (A vulnerability exists in FileCatalyst Workflow whereby a field access ...)
 	NOT-FOR-US: FileCatalyst Workflow
 CVE-2024-5991 (In function MatchDomainName(), input param str is treated as a NULL te ...)
-	- wolfssl <unfixed> (bug #1081788)
+	- wolfssl 5.7.2-0.1 (bug #1081788)
 	[bookworm] - wolfssl <no-dsa> (Minor issue)
 	[bullseye] - wolfssl <postponed> (Minor issue)
 	NOTE: https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable
 	NOTE: https://github.com/wolfSSL/wolfssl/pull/7604
 CVE-2024-5814 (A malicious TLS1.2 server can force a TLS1.3 client with downgrade cap ...)
-	- wolfssl <unfixed> (bug #1081791)
+	- wolfssl 5.7.2-0.1 (bug #1081791)
 	[bookworm] - wolfssl <no-dsa> (Minor issue)
 	[bullseye] - wolfssl <postponed> (Minor issue)
 	NOTE: https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable
 	NOTE: https://github.com/wolfSSL/wolfssl/pull/7619
 	NOTE: https://tches.iacr.org/index.php/TCHES/article/view/11259
 CVE-2024-5288 (An issue was discovered in wolfSSL before 5.7.0. A safe-error attack v ...)
-	- wolfssl <unfixed> (bug #1081790)
+	- wolfssl 5.7.2-0.1 (bug #1081790)
 	[bookworm] - wolfssl <no-dsa> (Minor issue)
 	[bullseye] - wolfssl <postponed> (Minor issue)
 	NOTE: https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable
@@ -5292,7 +5292,7 @@ CVE-2024-3980 (The product allows user input to control or influence paths or fi
 CVE-2024-36068 (An incorrect access control vulnerability in Rubrik CDM versions prior ...)
 	NOT-FOR-US: Rubrik CDM
 CVE-2024-1544 (Generating the ECDSA nonce k samples a random number r and then  trunc ...)
-	- wolfssl <unfixed> (bug #1081789)
+	- wolfssl 5.7.2-0.1 (bug #1081789)
 	[bookworm] - wolfssl <no-dsa> (Minor issue)
 	[bullseye] - wolfssl <postponed> (Minor issue)
 	NOTE: https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/949e59c6a95957220173b274f4dd532aacf3f3fe

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/949e59c6a95957220173b274f4dd532aacf3f3fe
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240923/6798e645/attachment.htm>


More information about the debian-security-tracker-commits mailing list