| Summary: | nrpe new security issue CVE-2015-4000 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | Guillaume Rousse <guillomovitch> |
| Status: | RESOLVED INVALID | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | ||
| Version: | Cauldron | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| See Also: | https://bugs.mageia.org/show_bug.cgi?id=26957 | ||
| Whiteboard: | MGA8TOO | ||
| Source RPM: | nrpe-4.1.0-1.mga9.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2023-03-02 23:39:13 CET
David Walser
2023-03-02 23:39:43 CET
See Also:
(none) =>
https://bugs.mageia.org/show_bug.cgi?id=26957 Neither cauldron nor mageia 8 are affected, they both use 2048 bits DH parameters: #ifdef USE_SSL_DH dh = get_dh2048(); SSL_CTX_set_tmp_dh(ctx, dh); DH_free(dh); #endif And the so-called alternative, NCPA, is still incompatible with our packaging standards. Status:
NEW =>
RESOLVED |