Processed: Re: Bug#1091435: percona-toolkit: CVE-2024-7701

2025-02-13 Thread Debian Bug Tracking System
Processing control commands: > severity -1 important Bug #1091435 [src:percona-toolkit] percona-toolkit: CVE-2024-7701 Severity set to 'important' from 'grave' -- 1091435: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091435 Debian Bug Tracking System Contact ow...@bugs.debian.org with prob

Bug#1091435: percona-toolkit: CVE-2024-7701

2025-02-13 Thread David Prevot
Control: severity -1 important Hi, On 2024-12-26 09:15, Salvatore Bonaccorso wrote: > Source: percona-toolkit […] > CVE-2024-7701[0]: > | Use of Password Hash With Insufficient Computational Effort > | vulnerability in percona percona-toolkit allows Encryption Brute > | Forcing.This issue affects

Bug#1091435: percona-toolkit: CVE-2024-7701

2024-12-26 Thread Salvatore Bonaccorso
Source: percona-toolkit Version: 3.2.1-1 Severity: grave Tags: security upstream Forwarded: https://github.com/percona/percona-toolkit/pull/896 X-Debbugs-Cc: car...@debian.org, Debian Security Team Hi, The following vulnerability was published for percona-toolkit. CVE-2024-7701[0]: | Use of Pas