El 23/10/24 a las 13:03, Arturo Borrero Gonzalez escribió:
> Hi, sorry for the late follow up.
> 
> On 10/16/24 00:38, Santiago Ruano Rincón wrote:
> > 
> > Again, you can also ask upstream. They are in a better position to tell
> > you if the vulnerability is present in 3.61 or not.
> > 
> 
> For the record, I have just now sent an email to upstream:
> 
> https://groups.google.com/a/mozilla.org/g/dev-tech-crypto/c/h3Q2S0n2vTg/m/-moy2IT7AQAJ
> 
> > > 
> > > So, I wonder if the commit introducing the vulnerability has been
> > > incorrectly identified?
> > 
> > Where does that reference (the introducing commit) come from?
> > 
> 
> I have no idea, I haven't investigated that bit.

I added the reference to the commit that introduced the vulnerability
after you committed it to the elts security tracker. At a first glance,
the reference made sense, but I could be wrong (too?). If you are unsure
about the origin of the reference and you are unsure that it effectively
introduced the issue, I would strongly suggest to remove it from the
security tracker data to avoid creating any more confusion.

Again, upstream may help here.

Cheers,

 -- Santiago

Attachment: signature.asc
Description: PGP signature

Reply via email to