[Secure-testing-commits] r44950 - data/CVE

Moritz Muehlenhoff jmm at moszumanska.debian.org
Sat Oct 1 04:02:48 UTC 2016


Author: jmm
Date: 2016-10-01 04:02:48 +0000 (Sat, 01 Oct 2016)
New Revision: 44950

Modified:
   data/CVE/list
Log:
ffmpeg non-issue
another ffmpeg issue fixed
remove mplayer entry, plain bug and not treated as security issue by MITRE
likewise for courier
mark openhpi as n/a
mark kernel tmp races as unimportant: xfca, pycode-browser
mark protobuf as unimportant
openslp n/a
NFUs
new jackson-dataformat-xml issue
new nodejs issue
imagemagick CVEfied
new chromium issue
mark nsd as non-issue
remove node-cli, not covered by security support and neutralised by kernel hardening anyway


Modified: data/CVE/list
===================================================================
--- data/CVE/list	2016-09-30 21:42:18 UTC (rev 44949)
+++ data/CVE/list	2016-10-01 04:02:48 UTC (rev 44950)
@@ -2355,14 +2355,17 @@
 	TODO: check
 CVE-2016-7567
 	RESERVED
+	- openslp-dfsg <not-affected> (Only affects openslp 2)
 CVE-2016-7566
 	RESERVED
 CVE-2016-7565
 	RESERVED
 CVE-2016-7564
 	RESERVED
+	NOT-FOR-US: MuJS
 CVE-2016-7563
 	RESERVED
+	NOT-FOR-US: MuJS
 CVE-2016-7562
 	RESERVED
 CVE-2016-7561
@@ -2381,13 +2384,14 @@
 	RESERVED
 CVE-2016-7554 [overread end of atom 'stsd' by 4294967134 bytes]
 	REJECTED
-	- ffmpeg <unfixed>
-	NOTE: Reproducer as in afl source ffmpeg-h264-call-stack-overflow.mp4
+	- ffmpeg <unfixed> (unimportant)
+	NOTE: Non issue, will be rejected
 	NOTE: http://www.openwall.com/lists/oss-security/2016/09/25/2
 CVE-2016-7552
 	RESERVED
 CVE-2016-7549 (Google Chrome before 53.0.2785.113 does not ensure that the recipient ...)
-	TODO: check
+	- chromium-browser 53.0.2785.113-1
+	[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
 CVE-2016-7548
 	RESERVED
 CVE-2016-7547
@@ -3359,10 +3363,6 @@
 	RESERVED
 CVE-2016-7158
 	RESERVED
-CVE-2016-XXXX [SGI security bug]
-	[experimental] - imagemagick 8:6.9.5.9+dfsg-1
-	- imagemagick <unfixed> (bug #836776)
-	[jessie] - imagemagick 8:6.8.9.9-5+deb8u5
 CVE-2016-7405 [incorrect quoting may allow SQL injection]
 	RESERVED
 	{DLA-620-1}
@@ -3652,12 +3652,16 @@
 	RESERVED
 CVE-2016-7102
 	RESERVED
-CVE-2016-7101
+CVE-2016-7101 [SGI security bug]
 	RESERVED
+	[experimental] - imagemagick 8:6.9.5.9+dfsg-1
+	- imagemagick <unfixed> (bug #836776)
+	[jessie] - imagemagick 8:6.8.9.9-5+deb8u5
 CVE-2016-7100
 	RESERVED
 CVE-2016-7099
 	RESERVED
+	- nodejs <unfixed>
 CVE-2016-7096
 	RESERVED
 CVE-2016-7095
@@ -3791,6 +3795,7 @@
 	NOTE: https://www.openssl.org/news/secadv/20160926.txt 
 CVE-2016-7051
 	RESERVED
+	- jackson-dataformat-xml <unfixed>
 CVE-2016-7050
 	RESERVED
 	- resteasy <unfixed>
@@ -4120,8 +4125,10 @@
 	RESERVED
 CVE-2016-6881 [ffmpeg endless loop when dealing with craft swf]
 	RESERVED
-	- ffmpeg <unfixed>
+	- ffmpeg 7:3.1.3-1 (unimportant)
+	- libav <undetermined> (unimportant)
 	NOTE: http://www.openwall.com/lists/oss-security/2016/09/26/6
+	NOTE: https://github.com/FFmpeg/FFmpeg/commit/4770eac6
 CVE-2016-6902 [Shell outbreak due to bad syntax parse]
 	RESERVED
 	- lshell <unfixed> (bug #834949)
@@ -7019,9 +7026,9 @@
 	RESERVED
 CVE-2016-6173
 	RESERVED
-	- nsd <unfixed> (bug #830806)
-	[jessie] - nsd <no-dsa> (Minor issue)
+	- nsd <unfixed> (unimportant; bug #830806)
 	NOTE: https://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=790
+	NOTE: Not considered a security issue due to trust relationship, see #830806
 CVE-2016-6172 (PowerDNS (aka pdns) Authoritative Server before 4.0.1 allows remote ...)
 	{DSA-3664-1 DLA-627-1}
 	- pdns 4.0.1-1 (bug #830808)
@@ -9106,6 +9113,7 @@
 	NOTE: underlying bzip2 library is at fault.
 CVE-2016-5398
 	RESERVED
+	NOT-FOR-US: JBoss BPMS
 CVE-2016-5397
 	RESERVED
 CVE-2016-5396
@@ -20361,9 +20369,6 @@
 	NOTE: and the same reproducer file http://lcamtuf.coredump.cx/afl/vulns/libtiff5.tif
 	NOTE: Commit: https://github.com/vadz/libtiff/commit/b18012dae552f85dcc5c57d3bf4e997a15b1cc1c
 	NOTE: http://www.openwall.com/lists/oss-security/2016/01/24/4
-CVE-2015-XXXX [insecure use of temporary files]
-	- node-cli <unfixed> (bug #809252)
-	[jessie] - node-cli <no-dsa> (Minor issue)
 CVE-2016-2049 (examples/consumer/common.php in JanRain PHP OpenID library (aka ...)
 	- php-openid <unfixed> (unimportant)
 	NOTE: sample code only, actual vulnerable code not shipped in package
@@ -28243,12 +28248,6 @@
 	[jessie] - servefile <no-dsa> (Minor issue)
 	[wheezy] - servefile <no-dsa> (Minor issue)
 	NOTE: https://github.com/sebageek/servefile/commit/cd7eee21be3602ab6118a23eec8e2628d1a6488c
-CVE-2015-XXXX [Several reads out-of-bound in mplayer]
-	- mplayer <unfixed> (low)
-	[wheezy] - mplayer <no-dsa> (Minor issue)
-	[squeeze] - mplayer <no-dsa> (Minor issue)
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/11/10/8
-	NOTE: Possibly doesn't affect squeeze. Valgrind doesn't report the read out-of-bounds.
 CVE-2015-8102
 	RESERVED
 CVE-2015-8101
@@ -36427,10 +36426,7 @@
 	RESERVED
 CVE-2015-5237 [Integer overflow in protobuf serialization]
 	RESERVED
-	- protobuf <unfixed> (low)
-	[jessie] - protobuf <no-dsa> (Minor issue)
-	[wheezy] - protobuf <no-dsa> (Minor issue)
-	[squeeze] - protobuf <no-dsa> (Minor issue)
+	- protobuf <unfixed> (unimportant)
 	NOTE: https://github.com/google/protobuf/issues/760
 	NOTE: Upstream doesn't seem to consider this a real issue. And Florian itself closed it
 	NOTE: as CANTFIX on the RedHat side. Maybe we should tag this unimportant instead?
@@ -36984,13 +36980,6 @@
 	- ruby-redcarpet <not-affected> (Affects v3.3.0 - v3.3.1)
 	NOTE: https://github.com/vmg/redcarpet/commit/2cee777c1e5babe8a1e2683d31ea75cc4afe55fb
 	NOTE: http://www.openwall.com/lists/oss-security/2015/06/29/3
-CVE-2015-XXXX [courier issues]
-	- courier 0.75.0-1
-	[jessie] - courier <no-dsa> (Minor issue)
-	[wheezy] - courier <no-dsa> (Minor issue)
-	[squeeze] - courier <no-dsa> (Minor issue)
-	NOTE: https://blog.fuzzing-project.org/17-Courier-mail-server-Write-heap-overflow-in-mailbot-tool-and-out-of-bounds-heap-read-in-imap-folder-parser.html
-	NOTE: CVE Request: http://www.openwall.com/lists/oss-security/2015/06/29/1
 CVE-2015-5081 [CSRF]
 	RESERVED
 	- python-django-cms <itp> (bug #516183)
@@ -42065,11 +42054,7 @@
 	RESERVED
 CVE-2015-3248
 	RESERVED
-	- openhpi 3.6.1-1 (bug #789543)
-	[jessie] - openhpi <no-dsa> (Minor issue)
-	[wheezy] - openhpi <no-dsa> (Minor issue)
-	[squeeze] - openhpi <no-dsa> (Minor issue)
-	NOTE: In Debian directory is not world-writable
+	- openhpi <not-affected> (Only affects RPM packaging, in Debian directory is not world-writable, bug #789543)
 CVE-2015-3247 (Race condition in the worker_update_monitors_config function in SPICE ...)
 	{DSA-3354-1}
 	- spice 0.12.5-1.2 (bug #797976)
@@ -50257,8 +50242,8 @@
 	NOTE: https://fusionforge.org/forum/forum.php?forum_id=41
 CVE-2015-0849 [predictable temporary file vulnerability]
 	RESERVED
-	- pycode-browser 1:1.0-1 (bug #790365)
-	[jessie] - pycode-browser <no-dsa> (Minor issue)
+	- pycode-browser 1:1.0-1 (unimportant; bug #790365)
+	NOTE: Not exploitable with kernel hardening since wheezy
 CVE-2015-0848 (Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers ...)
 	{DSA-3302-1 DLA-253-1}
 	- libwmf 0.2.8.4-10.4 (bug #787644)
@@ -63604,9 +63589,8 @@
 	[wheezy] - xcfa <no-dsa> (Minor issue)
 CVE-2014-5254 [Symlink following issues]
 	RESERVED
-	- xcfa 5.0.1-1 (low; bug #756600)
-	[jessie] - xcfa <no-dsa> (Minor issue)
-	[wheezy] - xcfa <no-dsa> (Minor issue)
+	- xcfa 5.0.1-1 (unimportant; bug #756600)
+	NOTE: Not exploitable with kernel hardening since wheezy
 CVE-2014-XXXX [Enforce use of HTTPS for MathJax in IPython]
 	- ipython 0.12-1
 	[wheezy] - ipython <no-dsa> (Minor issue)
@@ -109167,7 +109151,7 @@
 	- spip 2.1.13-1 (low; bug #671264)
 CVE-2012-2150 (xfs_metadump in xfsprogs before 3.2.4 does not properly obfuscate file ...)
 	- xfsprogs 3.2.4-1 (low; bug #793495)
-	[jessie] - xfsprogs <no-dsa> (Minor issue)
+	[jessie] - xfsprogs <no-dsa> (Minor issue, too intrusive to backport)
 	[wheezy] - xfsprogs <no-dsa> (Minor issue)
 	[squeeze] - xfsprogs <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=817696




More information about the Secure-testing-commits mailing list