[Secure-testing-commits] r30542 - data/CVE

Moritz Muehlenhoff jmm at moszumanska.debian.org
Thu Dec 4 15:21:14 UTC 2014


Author: jmm
Date: 2014-12-04 15:21:14 +0000 (Thu, 04 Dec 2014)
New Revision: 30542

Modified:
   data/CVE/list
Log:
procmail bug not a security issue
nss no-dsa
mountall n/a
keystone fixed


Modified: data/CVE/list
===================================================================
--- data/CVE/list	2014-12-04 15:04:58 UTC (rev 30541)
+++ data/CVE/list	2014-12-04 15:21:14 UTC (rev 30542)
@@ -9,10 +9,6 @@
 	- mediawiki <unfixed>
 	[squeeze] - mediawiki <end-of-life>
 	NOTE: https://bugzilla.wikimedia.org/show_bug.cgi?id=71478
-CVE-2014-XXXX [heap overflow in getlline()]
-	- procmail 3.22-23 (bug #771958)
-	[wheezy] - procmail <no-dsa> (Problem happens with specifically-crafted user-controlled ~/.procmailrc)
-	[squeeze] - procmail <no-dsa> (Problem happens with specifically-crafted user-controlled ~/.procmailrc)
 CVE-2015-0360
 	RESERVED
 CVE-2015-0359
@@ -14240,6 +14236,9 @@
 	- midori <unfixed> (unimportant)
 	- netsurf <unfixed> (unimportant)
 	- nss <unfixed>
+	[jessie] - nss <no-dsa> (Upstream doesn't plan to disable SSLv3, stick with that)
+	[squeeze] - nss <no-dsa> (Upstream doesn't plan to disable SSLv3, stick with that)
+	[wheezy] - nss <no-dsa> (Upstream doesn't plan to disable SSLv3, stick with that)
 	- openjdk-6 <unfixed>
 	[squeeze] - openjdk-6 <no-dsa> (Upstream doesn't plan to disable SSLv3, stick with that)
 	[wheezy] - openjdk-6 <no-dsa> (Upstream doesn't plan to disable SSLv3, stick with that)
@@ -20646,13 +20645,9 @@
 CVE-2014-1422
 	RESERVED
 CVE-2014-1421 (mountall 1.54, as used in Ubuntu 14.10, does not properly handle the ...)
-	- mountall <unfixed>
-	[wheezy] - mountall <not-affected> (Only affected when using more recent mount versions)
+	- mountall <not-affected> (partman-efi in jessies uses ecure umask, mount in older releases not affected)
 	NOTE: See https://bugs.launchpad.net/ubuntu/+source/partman-efi/+bug/1390183
 	NOTE: and http://www.ubuntu.com/usn/usn-2411-1
-	NOTE: There is a note in ubuntu's tracker mentioning that this is an issue
-	NOTE: only in combination with newer mount utilities.
-	TODO: check which combination vulnerable
 CVE-2014-1420
 	RESERVED
 CVE-2014-1419 (Race condition in the power policy functions in policy-funcs in ...)
@@ -37027,13 +37022,14 @@
 CVE-2013-2255 [Inconsistent and non-validating HTTPS client]
 	RESERVED
 	- cinder <unfixed>
-	- keystone <unfixed>
+	- keystone 2014.1-1
 	[wheezy] - keystone <no-dsa> (Minor issue)
 	- nova <unfixed>
 	[wheezy] - nova <no-dsa> (Minor issue)
 	- quantum <unfixed>
 	[wheezy] - quantum <no-dsa> (Minor issue)
 	- swift <not-affected> (See https://bugs.launchpad.net/keystone/+bug/1188189/comments/5)
+	NOTE: Fixes for keystone: https://review.openstack.org/#/c/76476/
 CVE-2013-2254 (The deepGetOrCreateNode function in ...)
 	NOT-FOR-US: Apache Sling
 CVE-2013-2253




More information about the Secure-testing-commits mailing list