[Secure-testing-commits] r52779 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Wed Jun 21 12:27:09 UTC 2017


Author: carnil
Date: 2017-06-21 12:27:09 +0000 (Wed, 21 Jun 2017)
New Revision: 52779

Modified:
   data/CVE/list
Log:
Add more references for openvpn issues

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2017-06-21 12:18:08 UTC (rev 52778)
+++ data/CVE/list	2017-06-21 12:27:09 UTC (rev 52779)
@@ -6587,19 +6587,24 @@
 CVE-2017-7522 [Crash mbed TLS/PolarSSL-based server]
 	RESERVED
 	- openvpn <unfixed> (unimportant)
+	NOTE: Fixed by: https://github.com/OpenVPN/openvpn/commit/426392940c
+	NOTE: https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
 	NOTE: http://www.openwall.com/lists/oss-security/2017/06/21/6
 	NOTE: In Debian openvpn is compiled against OpenSSL, thus even affected
-	NOTE: code present
-CVE-2017-7521 [Remote server crashes/double-free/memory leaks in certificate processing]
+	NOTE: code present.
+CVE-2017-7521 [Potential double-free in --x509-alt-username and memory leaks]
 	RESERVED
 	- openvpn <unfixed>
+	NOTE: Fixed by: https://github.com/OpenVPN/openvpn/commit/cb4e35ece4
+	NOTE: Fixed by: https://github.com/OpenVPN/openvpn/commit/2d032c7fcd
+	NOTE: https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
 	NOTE: http://www.openwall.com/lists/oss-security/2017/06/21/6
-	TODO: check
-CVE-2017-7520 [Remote (including MITM) client crash, data leak]
+CVE-2017-7520 [Pre-authentication remote crash/information disclosure for clients]
 	RESERVED
 	- openvpn <unfixed>
+	NOTE: Fixed by: https://github.com/OpenVPN/openvpn/commit/7718c8984f
+	NOTE: https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
 	NOTE: http://www.openwall.com/lists/oss-security/2017/06/21/6
-	TODO: check
 CVE-2017-7519 [libradosstriper processes arbitrary printf placeholders in user input]
 	RESERVED
 	- ceph <unfixed> (bug #864535)
@@ -6633,11 +6638,12 @@
 CVE-2017-7509
 	RESERVED
 	NOT-FOR-US: Red Hat Certificate System
-CVE-2017-7508 [Remote server crash (forced assertion failure)]
+CVE-2017-7508 [Remotely-triggerable ASSERT() on malformed IPv6 packet]
 	RESERVED
 	- openvpn <unfixed>
 	NOTE: http://www.openwall.com/lists/oss-security/2017/06/21/6
-	TODO: check
+	NOTE: https://community.openvpn.net/openvpn/wiki/VulnerabilitiesFixedInOpenVPN243
+	NOTE: Fixed by: https://github.com/OpenVPN/openvpn/commit/c3f47077a7
 CVE-2017-7507 (GnuTLS version 3.5.12 and earlier is vulnerable to a NULL pointer ...)
 	{DSA-3884-1}
 	[experimental] - gnutls28 3.5.13-1




More information about the Secure-testing-commits mailing list