Integer Overflow vulnerability in RELIC before commit 421f2e91cf2ba42473d4d54daf24e295679e290e, allows attackers to execute arbitrary code and cause a denial of service in pos argument in bn_get_prime function.
References
Configurations
History
21 Nov 2024, 08:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/relic-toolkit/relic/commit/421f2e91cf2ba42473d4d54daf24e295679e290e - Patch | |
References | () https://groups.google.com/g/relic-discuss/c/A_J2-ArVIAo/m/qgFiXsUJBQAJ?utm_medium=email&utm_source=footer - Mailing List |
Information
Published : 2023-09-01 16:15
Updated : 2024-11-21 08:09
NVD link : CVE-2023-36327
Mitre link : CVE-2023-36327
CVE.ORG link : CVE-2023-36327
JSON object : View
Products Affected
relic_project
- relic
CWE
CWE-190
Integer Overflow or Wraparound