Summary: | <dev-libs/crypto++-5.6.2-r2: private key disclosure via timing attack (CVE-2015-2141) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Sam James <sam> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | alonbl, crypto+disabled |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-2141 | ||
Whiteboard: | B4 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Sam James
2015-07-02 18:54:31 UTC
added: crypto++-5.6.2-r2 @Maintainers: is -r2 ready for stabilisation? @Maintainers: is -r2 ready for stabilisation? (In reply to stanley - Security Padawan from comment #3) > @Maintainers: is -r2 ready for stabilisation? r2 differs from r1 only by the fix for this CVE. feel free to stabilize. Stable for HPPA PPC64. amd64 stable x86 stable Stable on alpha. ppc stable sparc stable. Maintainer(s), please cleanup. Security, please vote. Vulnerable removed. Vote: no. GLSA Vote: No |