[Secure-testing-commits] r56030 - data/CVE

Salvatore Bonaccorso carnil at moszumanska.debian.org
Fri Sep 22 20:19:47 UTC 2017


Author: carnil
Date: 2017-09-22 20:19:47 +0000 (Fri, 22 Sep 2017)
New Revision: 56030

Modified:
   data/CVE/list
Log:
Followup on nss issues, update status

Mark the issues as unimportant, negligible impact, needs local access to
the NSS DBM files to be crafted.

Modified: data/CVE/list
===================================================================
--- data/CVE/list	2017-09-22 19:41:14 UTC (rev 56029)
+++ data/CVE/list	2017-09-22 20:19:47 UTC (rev 56030)
@@ -8119,46 +8119,34 @@
 	RESERVED
 CVE-2017-11698 [heap-buffer-overflow (write of size 2) in __get_page (lib/dbm/src/h_page.c:704)]
 	RESERVED
-	- nss <unfixed> (bug #873259)
-	[wheezy] - nss <ignored> (Minor issue)
-	NOTE: From the redhat advisory it is possible to conclude that the
-	NOTE: exploit requires specially crafted NSS NDB files and it is very unlikely
-	NOTE: a problem for services or client software using NSS.
-	NOTE: It would be good if someone with actual access to
-	NOTE: the mozilla bug can confirm this so we do not rely on redhat solely.
+	- nss <unfixed> (bug #873259; unimportant)
+	NOTE: Issues triggered by crafted DBM databases, which would
+	NOTE: require local user access to a machine running NSS and
+	NOTE: crafting the local DBM files.
 	NOTE: http://seclists.org/fulldisclosure/2017/Aug/17
 	NOTE: https://bugzilla.mozilla.org/show_bug.cgi?id=1360779
 CVE-2017-11697 [Floating Point Exception in __hash_open (hash.c:229)]
 	RESERVED
-	- nss <unfixed> (bug #873258)
-	[wheezy] - nss <ignored> (Minor issue)
-	NOTE: From the redhat advisory it is possible to conclude that the
-	NOTE: exploit requires specially crafted NSS NDB files and it is very unlikely
-	NOTE: a problem for services or client software using NSS.
-	NOTE: It would be good if someone with actual access to
-	NOTE: the mozilla bug can confirm this so we do not rely on redhat solely.
+	- nss <unfixed> (bug #873258; unimportant)
+	NOTE: Issues triggered by crafted DBM databases, which would
+	NOTE: require local user access to a machine running NSS and
+	NOTE: crafting the local DBM files.
 	NOTE: http://seclists.org/fulldisclosure/2017/Aug/17
 	NOTE: https://bugzilla.mozilla.org/show_bug.cgi?id=1360900
 CVE-2017-11696 [heap-buffer-overflow (write of size 65544) in __hash_open (lib/dbm/src/hash.c:241)]
 	RESERVED
-	- nss <unfixed> (bug #873257)
-	[wheezy] - nss <ignored> (Minor issue)
-	NOTE: From the redhat advisory it is possible to conclude that the
-	NOTE: exploit requires specially crafted NSS NDB files and it is very unlikely
-	NOTE: a problem for services or client software using NSS.
-	NOTE: It would be good if someone with actual access to
-	NOTE: the mozilla bug can confirm this so we do not rely on redhat solely.
+	- nss <unfixed> (bug #873257; unimportant)
+	NOTE: Issues triggered by crafted DBM databases, which would
+	NOTE: require local user access to a machine running NSS and
+	NOTE: crafting the local DBM files.
 	NOTE: http://seclists.org/fulldisclosure/2017/Aug/17
 	NOTE: https://bugzilla.mozilla.org/show_bug.cgi?id=1360778
 CVE-2017-11695 [heap-buffer-overflow (write of size 8) in alloc_segs (lib/dbm/src/hash.c:1105)]
 	RESERVED
-	- nss <unfixed> (bug #873256)
-	[wheezy] - nss <ignored> (Minor issue)
-	NOTE: From the redhat advisory it is possible to conclude that the
-	NOTE: exploit requires specially crafted NSS NDB files and it is very unlikely
-	NOTE: a problem for services or client software using NSS.
-	NOTE: It would be good if someone with actual access to
-	NOTE: the mozilla bug can confirm this so we do not rely on redhat solely.
+	- nss <unfixed> (bug #873256; unimportant)
+	NOTE: Issues triggered by crafted DBM databases, which would
+	NOTE: require local user access to a machine running NSS and
+	NOTE: crafting the local DBM files.
 	NOTE: http://seclists.org/fulldisclosure/2017/Aug/17
 	NOTE: https://bugzilla.mozilla.org/show_bug.cgi?id=1360782
 CVE-2017-11694 (MEDHOST Document Management System contains hard-coded credentials that ...)




More information about the Secure-testing-commits mailing list