diff options
author | security tracker role <sectracker@soriano.debian.org> | 2021-04-02 20:10:36 +0000 |
---|---|---|
committer | security tracker role <sectracker@soriano.debian.org> | 2021-04-02 20:10:36 +0000 |
commit | 58bf2556d70115e52e9e3ee7860423aeaf3fbb54 (patch) | |
tree | 28689d89c693b2292225f3f470cf933c02871106 /data/CVE/2018.list | |
parent | ef5298cf983c76f6676cb9571e750d303f0abcc5 (diff) |
automatic update
Diffstat (limited to 'data/CVE/2018.list')
-rw-r--r-- | data/CVE/2018.list | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/data/CVE/2018.list b/data/CVE/2018.list index 03fd1fc265..6fb17fad2c 100644 --- a/data/CVE/2018.list +++ b/data/CVE/2018.list @@ -42494,7 +42494,7 @@ CVE-2018-5383 (Bluetooth firmware or operating system software drivers in macOS - firmware-nonfree 20190114-1 [stretch] - firmware-nonfree 20161130-5 NOTE: http://www.cs.technion.ac.il/~biham/BT/ -CVE-2018-5382 (Bouncy Castle BKS version 1 keystore (BKS-V1) files use an HMAC that i ...) +CVE-2018-5382 (The default BKS keystore use an HMAC that is only 16 bits long, which ...) - bouncycastle 1.48+dfsg-2 [wheezy] - bouncycastle <ignored> (this only affects the integrity verification and not the content of the BKS keystore) NOTE: https://insights.sei.cmu.edu/cert/2018/03/the-curious-case-of-the-bouncy-castle-bks-passwords.html |