[Secure-testing-commits] r55909 - data/CVE
Moritz Muehlenhoff
jmm at moszumanska.debian.org
Tue Sep 19 21:14:08 UTC 2017
Author: jmm
Date: 2017-09-19 21:14:08 +0000 (Tue, 19 Sep 2017)
New Revision: 55909
Modified:
data/CVE/list
Log:
one libexiv entry confirmed, revert the rest. <not-affected> must only
be used based on code analysis, not by running some reproducer, code
path in older releases might be entirely different
Modified: data/CVE/list
===================================================================
--- data/CVE/list 2017-09-19 21:10:15 UTC (rev 55908)
+++ data/CVE/list 2017-09-19 21:14:08 UTC (rev 55909)
@@ -4128,17 +4128,15 @@
NOTE: Crash in CLI tool, no security impact
CVE-2017-12957 (There is a heap-based buffer over-read in libexiv2 in Exiv2 0.26 that ...)
- exiv2 <unfixed>
- [stretch] - exiv2 <not-affected> (Vulnerable code not present)
- [jessie] - exiv2 <not-affected> (Vulnerable code not present)
- [wheezy] - exiv2 <not-affected> (Vulnerable code not present)
+ [stretch] - exiv2 <not-affected> (Incorrect memory allocation introduced in 0.26)
+ [jessie] - exiv2 <not-affected> (Incorrect memory allocation introduced in 0.26)
+ [wheezy] - exiv2 <not-affected> (Incorrect memory allocation introduced in 0.26)
NOTE: https://github.com/Exiv2/exiv2/issues/60
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1482423
- NOTE: Not reproducible in wheezy/jessie/stretch/sid(0.25-3.1) => "The file contains data of an unknown image type"
- NOTE: Reproducible in experimental (0.26-1).
+ NOTE: Experimental is affected, unstable is not, strictly speaking this could all
+ NOTE: be marked <not-affected>, but keeping it marked <unfixed> to ensure we track the fix
CVE-2017-12956 (There is an illegal address access in Exiv2::FileIo::path[abi:cxx11]() ...)
- exiv2 <unfixed>
- [stretch] - exiv2 <not-affected> (Vulnerable code not present)
- [jessie] - exiv2 <not-affected> (Vulnerable code not present)
[wheezy] - exiv2 <not-affected> (Vulnerable code not present)
NOTE: https://github.com/Exiv2/exiv2/issues/59
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1482296
@@ -4146,8 +4144,6 @@
NOTE: Reproducible in experimental (0.26-1).
CVE-2017-12955 (There is a heap-based buffer overflow in basicio.cpp of Exiv2 0.26. The ...)
- exiv2 <unfixed>
- [stretch] - exiv2 <not-affected> (Vulnerable code not present)
- [jessie] - exiv2 <not-affected> (Vulnerable code not present)
[wheezy] - exiv2 <not-affected> (Vulnerable code not present)
NOTE: https://github.com/Exiv2/exiv2/issues/58
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1482295
@@ -8246,8 +8242,6 @@
NOT-FOR-US: Chrome extension Markdown Preview Plus
CVE-2017-11592 (There is a Mismatched Memory Management Routines vulnerability in the ...)
- exiv2 <unfixed> (low)
- [stretch] - exiv2 <not-affected> (Vulnerable code not present)
- [jessie] - exiv2 <not-affected> (Vulnerable code not present)
[wheezy] - exiv2 <not-affected> (Vulnerable code not present)
NOTE: https://github.com/Exiv2/exiv2/issues/56
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1473889
@@ -8377,8 +8371,6 @@
NOTE: https://github.com/sass/libsass/issues/2445
CVE-2017-11553 (There is an illegal address access in the extend_alias_table function ...)
- exiv2 <unfixed> (low)
- [stretch] - exiv2 <not-affected> (Not reproducible)
- [jessie] - exiv2 <not-affected> (Not reproducible)
[wheezy] - exiv2 <not-affected> (Not reproducible)
NOTE: https://github.com/Exiv2/exiv2/issues/54
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1471772
@@ -8998,8 +8990,6 @@
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1470714
CVE-2017-11340 (There is a Segmentation fault in the XmpParser::terminate() function in ...)
- exiv2 <unfixed> (bug #868578)
- [stretch] - exiv2 <not-affected> (Not reproducible)
- [jessie] - exiv2 <not-affected> (Not reproducible)
[wheezy] - exiv2 <not-affected> (Not reproducible)
NOTE: https://github.com/Exiv2/exiv2/issues/53
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1470950
@@ -9007,8 +8997,6 @@
NOTE: Reproducible with 0.26-1 (experimental) although I get another error "free(): invalid next size (fast)".
CVE-2017-11339 (There is a heap-based buffer overflow in the Image::printIFDStructure ...)
- exiv2 <unfixed> (bug #868578)
- [stretch] - exiv2 <not-affected> (Vulnerable code not present)
- [jessie] - exiv2 <not-affected> (Vulnerable code not present)
[wheezy] - exiv2 <not-affected> (Vulnerable code not present)
NOTE: https://github.com/Exiv2/exiv2/issues/52
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1470946
@@ -9016,8 +9004,6 @@
NOTE: Reproducible with 0.26-1 (experimental) although I get another error "free(): invalid next size (fast)".
CVE-2017-11338 (There is an infinite loop in the Exiv2::Image::printIFDStructure ...)
- exiv2 <unfixed> (bug #868578)
- [stretch] - exiv2 <not-affected> (Vulnerable code not present)
- [jessie] - exiv2 <not-affected> (Vulnerable code not present)
[wheezy] - exiv2 <not-affected> (Vulnerable code not present)
NOTE: https://github.com/Exiv2/exiv2/issues/51
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1470913
@@ -9025,8 +9011,6 @@
NOTE: Reproducible with 0.26-1 (experimental).
CVE-2017-11337 (There is an invalid free in the Action::TaskFactory::cleanup function ...)
- exiv2 <unfixed> (bug #868578)
- [stretch] - exiv2 <not-affected> (Not reproducible)
- [jessie] - exiv2 <not-affected> (Not reproducible)
[wheezy] - exiv2 <not-affected> (Not reproducible)
NOTE: https://github.com/Exiv2/exiv2/issues/50
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1470737
@@ -9035,8 +9019,6 @@
NOTE: Action::TaskFactory::cleanup function is the same in all versions, so the problem is likely an earlier memory corruption.
CVE-2017-11336 (There is a heap-based buffer over-read in the Image::printIFDStructure ...)
- exiv2 <unfixed> (bug #868578)
- [stretch] - exiv2 <not-affected> (Vulnerable code not present)
- [jessie] - exiv2 <not-affected> (Vulnerable code not present)
[wheezy] - exiv2 <not-affected> (Vulnerable code not present)
NOTE: https://github.com/Exiv2/exiv2/issues/49
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1470729
More information about the Secure-testing-commits
mailing list