Control: severity -1 important

Hi,

On 2024-12-26 09:15, Salvatore Bonaccorso wrote:
> Source: percona-toolkit
[…]
> CVE-2024-7701[0]:
> | Use of Password Hash With Insufficient Computational Effort
> | vulnerability in percona percona-toolkit allows Encryption Brute
> | Forcing.This issue affects percona-toolkit: 3.6.0.
[…]
> [1] https://github.com/percona/percona-toolkit/pull/896

Looks like the affected code is exclusively part of the Go source
(inside /src/go) that is not built, nor distributed with the binary
package, hence lowering the severity.

On the other hand, the package has not been updated in years within
Debian, and maybe the Go part could be interesting, but these are two
unrelated issues that should be filed separately.

Regards,
-- 
David Prévot
Marseille (37 rue Guibal, Pôle Média, 13003) / Paris / Montréal
http://evolix.com | mastodon.evolix.org/@evolix | http://blog.evolix.com

Reply via email to