[Bug 1672686] Re: CVE-2017-2748 - Freeing of memory allocated on stack when validating a public key with a secp224k1 curve

2017-03-14 Thread Bug Watch Updater
** Changed in: mbedtls (Debian) Status: Incomplete => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1672686 Title: CVE-2017-2748 - Freeing of memory allocated on stack when

[Bug 1672686] Re: CVE-2017-2748 - Freeing of memory allocated on stack when validating a public key with a secp224k1 curve

2017-03-14 Thread Seth Arnold
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is

[Bug 1672686] Re: CVE-2017-2748 - Freeing of memory allocated on stack when validating a public key with a secp224k1 curve

2017-03-14 Thread Bug Watch Updater
** Changed in: polarssl (Debian) Status: Unknown => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1672686 Title: CVE-2017-2748 - Freeing of memory allocated on stack when

[Bug 1672686] Re: CVE-2017-2748 - Freeing of memory allocated on stack when validating a public key with a secp224k1 curve

2017-03-14 Thread James Cowgill
I think that only polarssl 1.3.* is affected because polarssl <= 1.2 does not support elliptic curve crypto. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1672686 Title: CVE-2017-2748 - Freeing of