Bugzilla – Bug 1218219
VUL-0: CVE-2023-50980: libcryptopp: DoS via malformed DER public key file
Last modified: 2024-05-22 10:28:04 UTC
gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (application crash) via DER public-key data for an F(2^m) curve, if the degree of each term in the polynomial is not strictly decreasing. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-50980 https://github.com/weidai11/cryptopp/issues/1248 Patch: https://github.com/weidai11/cryptopp/commit/eb383b8e1622c07da2d5d6599a8b0e17a0deee0f
Took also 641ae35258de397774744b8b17ef6632c3fa48b3
Submitted for 15sp4,15/libcryptopp.
Submit request into devel project: https://build.opensuse.org/request/show/1134476
I believe all fixed.
SUSE-SU-2023:4957-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1218219 CVE References: CVE-2023-50980 Sources used: openSUSE Leap 15.4 (src): libcryptopp-5.6.5-150000.1.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:0030-1: An update that solves one vulnerability can now be installed. Category: security (moderate) Bug References: 1218219 CVE References: CVE-2023-50980 Sources used: openSUSE Leap 15.4 (src): libcryptopp-8.6.0-150400.3.3.1 openSUSE Leap 15.5 (src): libcryptopp-8.6.0-150400.3.3.1 Basesystem Module 15-SP5 (src): libcryptopp-8.6.0-150400.3.3.1 SUSE Linux Enterprise Real Time 15 SP4 (src): libcryptopp-8.6.0-150400.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE:SFFO:Main https://build.suse.de/request/show/330342 SUSE:ALP:Source:Standard:1.0 https://build.suse.de/request/show/330340
(In reply to Petr Gajdos from comment #11) > SUSE:ALP:Source:Standard:1.0 > https://build.suse.de/request/show/330340 Reopened.