gf2n.cpp in Crypto++ (aka cryptopp) through 8.9.0 allows attackers to cause a denial of service (application crash) via DER public-key data for an F(2^m) curve, if the degree of each term in the polynomial is not strictly decreasing.
{ "binaries": [ { "binary_version": "5.6.4-8", "binary_name": "libcrypto++-utils" }, { "binary_version": "5.6.4-8", "binary_name": "libcrypto++6" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-50980.json"
{ "binaries": [ { "binary_version": "5.6.4-9build1", "binary_name": "libcrypto++-utils" }, { "binary_version": "5.6.4-9build1", "binary_name": "libcrypto++6" } ] }
{ "binaries": [ { "binary_version": "8.6.0-2ubuntu1", "binary_name": "libcrypto++-utils" }, { "binary_version": "8.6.0-2ubuntu1", "binary_name": "libcrypto++8" } ] }
{ "binaries": [ { "binary_version": "8.9.0-1.1build1", "binary_name": "libcrypto++-utils" }, { "binary_version": "8.9.0-1.1build1", "binary_name": "libcrypto++8t64" } ] }
{ "binaries": [ { "binary_version": "8.9.0-2", "binary_name": "libcrypto++-utils" }, { "binary_version": "8.9.0-2", "binary_name": "libcrypto++8t64" } ] }
{ "binaries": [ { "binary_version": "8.9.0-2build1", "binary_name": "libcrypto++-utils" }, { "binary_version": "8.9.0-2build1", "binary_name": "libcrypto++8t64" } ] }
{ "binaries": [ { "binary_version": "5.6.1-6+deb8u3ubuntu0.1~esm1", "binary_name": "libcrypto++-utils" }, { "binary_version": "5.6.1-6+deb8u3ubuntu0.1~esm1", "binary_name": "libcrypto++9" } ] }
{ "binaries": [ { "binary_version": "5.6.1-9ubuntu0.1+esm1", "binary_name": "libcrypto++-utils" }, { "binary_version": "5.6.1-9ubuntu0.1+esm1", "binary_name": "libcrypto++9v5" } ] }