[Secure-testing-commits] r47273 - data/CVE

Moritz Muehlenhoff jmm at moszumanska.debian.org
Wed Dec 21 12:01:16 UTC 2016


Author: jmm
Date: 2016-12-21 12:01:16 +0000 (Wed, 21 Dec 2016)
New Revision: 47273

Modified:
   data/CVE/list
Log:
openssh triage


Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-12-21 11:29:51 UTC (rev 47272)
+++ data/CVE/list	2016-12-21 12:01:16 UTC (rev 47273)
@@ -237,23 +237,20 @@
 	NOTE: https://www.openssh.com/txt/release-7.4
 	TODO: check affected versions
 CVE-2016-10011 [sshd(8): theoretical leak of host private key material to privilege-separated child processes via realloc()]
-	- openssh <unfixed> (bug #848716)
-	NOTE: Fixed in upstream 7.4
-	NOTE: http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/authfile.c
-	NOTE: https://www.openssh.com/txt/release-7.4
-	TODO: check affected versions
+	- openssh <unfixed> (low; bug #848716)
+	[jessie] - openssh <no-dsa> (Minor issue)
+	NOTE: Fixed in upstream 7.4: https://www.openssh.com/txt/release-7.4
+	NOTE: http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/authfile.c.diff?r1=1.121&r2=1.122
 CVE-2016-10010 [sshd(8): When privilege separation is disabled, forwarded Unix-domain sockets would be created by sshd(8) with the privileges of 'root']
-	- openssh <unfixed> (bug #848715)
-	NOTE: Fixed in upstream 7.4
-	NOTE: http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/serverloop.c
-	NOTE: https://www.openssh.com/txt/release-7.4
-	TODO: check affected versions
+	- openssh <unfixed> (unimportant; bug #848715)
+	NOTE: Fixed in upstream 7.4: https://www.openssh.com/txt/release-7.4
+	NOTE: http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/serverloop.c.diff?r1=1.188&r2=1.189
+	NOTE: Privilege separation is enabled in the Debian package
 CVE-2016-10009 [ssh-agent(1): load PKCS#11 modules from paths outside a trusted whitelist]
-	- openssh <unfixed> (bug #848714)
-	NOTE: Fixed in upstream 7.4
-	NOTE: http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/ssh-agent.c
-	NOTE: https://www.openssh.com/txt/release-7.4
-	TODO: check affected versions
+	- openssh <unfixed> (low; bug #848714)
+	[jessie] - openssh <no-dsa> (Minor issue)
+	NOTE: Fixed in upstream 7.4: https://www.openssh.com/txt/release-7.4
+	NOTE: http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/ssh-agent.c.diff?r1=1.214&r2=1.215
 CVE-2016-9998 (SPIP 3.1.x suffer from a Reflected Cross Site Scripting Vulnerability ...)
 	- spip <unfixed> (bug #848641)
 	NOTE: https://core.spip.net/projects/spip/repository/revisions/23288




More information about the Secure-testing-commits mailing list