summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJason E. Hale <jhale@FreeBSD.org>2022-02-24 20:11:18 -0500
committerJason E. Hale <jhale@FreeBSD.org>2022-02-24 20:55:24 -0500
commitf60441b973f66e677be53bfeca7c36e1923cab0b (patch)
tree1cbd82ed5212b4cf9b17e939a706a42bd2261774
parentsecurity/cryptopp: Update to 8.6.0 (diff)
security/vuxml: Document CVE-2021-40530 for security/cryptopp
-rw-r--r--security/vuxml/vuln-2022.xml31
1 files changed, 31 insertions, 0 deletions
diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml
index 5a185576663e..335f5c6429a9 100644
--- a/security/vuxml/vuln-2022.xml
+++ b/security/vuxml/vuln-2022.xml
@@ -1,3 +1,34 @@
+ <vuln vid="7695b0af-958f-11ec-9aa3-4ccc6adda413">
+ <topic>cryptopp -- ElGamal implementation allows plaintext recovery</topic>
+ <affects>
+ <package>
+ <name>cryptopp</name>
+ <range><lt>8.6.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Crypto++ 8.6 release notes reports:</p>
+ <blockquote cite="https://www.cryptopp.com/release860.html">
+ <p>The ElGamal implementation in Crypto++ through 8.5 allows plaintext
+ recovery because, during interaction between two cryptographic
+ libraries, a certain dangerous combination of the prime defined by
+ the receiver's public key, the generator defined by the receiver's
+ public key, and the sender's ephemeral exponents can lead to a
+ cross-configuration attack against OpenPGP.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2021-40530</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2021-40530</url>
+ </references>
+ <dates>
+ <discovery>2021-09-06</discovery>
+ <entry>2022-02-24</entry>
+ </dates>
+ </vuln>
+
<vuln vid="5e1440c6-95af-11ec-b320-f8b156b6dcc8">
<topic>flac -- fix encoder bug</topic>
<affects>