| Summary: | nrpe hardcoded 512-bit DH parameters makes it vulnerable to LOGJAM (CVE-2015-4000) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | Guillaume Rousse <guillomovitch> |
| Status: | RESOLVED WONTFIX | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | ||
| Version: | 6 | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Source RPM: | nrpe-2.15-7.mga6.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2018-06-21 00:04:07 CEST
nrpe 2.16 seems to have never been released, and I can't find the relevant commits in the git repository (way too much noise). None of the publicly available PR have been merged, in favor of a mysteriouse "complete and backward-compatible" (but unavailable) solution. So, unless an easy solution is found, this is likely to result in a "won't fix" status. Based on the date of the upstream guy's comment, he might have made a typo and this might have been fixed in 2.15. I'm fine if you want to close this. No available solution in sight, closing. Resolution:
(none) =>
WONTFIX |