[Git][security-tracker-team/security-tracker][master] wolfssl fixed in sid
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Mon Sep 23 15:19:44 BST 2024
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
949e59c6 by Moritz Muehlenhoff at 2024-09-23T16:19:33+02:00
wolfssl fixed in sid
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -5236,20 +5236,20 @@ CVE-2024-6633 (The default credentials for the setup HSQL database (HSQLDB) for
CVE-2024-6632 (A vulnerability exists in FileCatalyst Workflow whereby a field access ...)
NOT-FOR-US: FileCatalyst Workflow
CVE-2024-5991 (In function MatchDomainName(), input param str is treated as a NULL te ...)
- - wolfssl <unfixed> (bug #1081788)
+ - wolfssl 5.7.2-0.1 (bug #1081788)
[bookworm] - wolfssl <no-dsa> (Minor issue)
[bullseye] - wolfssl <postponed> (Minor issue)
NOTE: https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable
NOTE: https://github.com/wolfSSL/wolfssl/pull/7604
CVE-2024-5814 (A malicious TLS1.2 server can force a TLS1.3 client with downgrade cap ...)
- - wolfssl <unfixed> (bug #1081791)
+ - wolfssl 5.7.2-0.1 (bug #1081791)
[bookworm] - wolfssl <no-dsa> (Minor issue)
[bullseye] - wolfssl <postponed> (Minor issue)
NOTE: https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable
NOTE: https://github.com/wolfSSL/wolfssl/pull/7619
NOTE: https://tches.iacr.org/index.php/TCHES/article/view/11259
CVE-2024-5288 (An issue was discovered in wolfSSL before 5.7.0. A safe-error attack v ...)
- - wolfssl <unfixed> (bug #1081790)
+ - wolfssl 5.7.2-0.1 (bug #1081790)
[bookworm] - wolfssl <no-dsa> (Minor issue)
[bullseye] - wolfssl <postponed> (Minor issue)
NOTE: https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable
@@ -5292,7 +5292,7 @@ CVE-2024-3980 (The product allows user input to control or influence paths or fi
CVE-2024-36068 (An incorrect access control vulnerability in Rubrik CDM versions prior ...)
NOT-FOR-US: Rubrik CDM
CVE-2024-1544 (Generating the ECDSA nonce k samples a random number r and then trunc ...)
- - wolfssl <unfixed> (bug #1081789)
+ - wolfssl 5.7.2-0.1 (bug #1081789)
[bookworm] - wolfssl <no-dsa> (Minor issue)
[bullseye] - wolfssl <postponed> (Minor issue)
NOTE: https://github.com/wolfSSL/wolfssl/releases/tag/v5.7.2-stable
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/949e59c6a95957220173b274f4dd532aacf3f3fe
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/949e59c6a95957220173b274f4dd532aacf3f3fe
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240923/6798e645/attachment.htm>
More information about the debian-security-tracker-commits
mailing list