author | Sebastian Harl <sh@tokkee.org> | |
Wed, 27 Jul 2016 08:35:39 +0000 (10:35 +0200) | ||
committer | Sebastian Harl <sh@tokkee.org> | |
Wed, 27 Jul 2016 08:35:39 +0000 (10:35 +0200) | ||
commit | 274d9afa3258e3e5914f59258330ddad3405b5f0 | |
tree | 4b7d76819bcc0b44e54b3d5911715c7d5c6e82ef | tree | snapshot |
parent | ac4e97fc52177387a48f70c63fc834f841fb1027 | commit | diff |
patches/bts832577-gcry-control.dpatch: Fix improper usage of gcry_control.
A team of security researchers at Columbia University and the University of
Virginia discovered that GCrypt's gcry_control is sometimes called without
checking its return value for an error. This may cause the program to be
initialized without the desired, secure settings.
Closes: #832577
A team of security researchers at Columbia University and the University of
Virginia discovered that GCrypt's gcry_control is sometimes called without
checking its return value for an error. This may cause the program to be
initialized without the desired, secure settings.
Closes: #832577
debian/changelog | diff | blob | history | |
debian/patches/00list | diff | blob | history | |
debian/patches/CVE-2016-6254.dpatch | diff | blob | history | |
debian/patches/bts832577-gcry-control.dpatch | [new file with mode: 0644] | blob |