Author: jmm Date: 2017-03-31 14:50:12 +0000 (Fri, 31 Mar 2017) New Revision: 50226
Modified: data/CVE/list Log: initial ntp triage libgit no-dsa/not-affected Modified: data/CVE/list =================================================================== --- data/CVE/list 2017-03-31 11:14:25 UTC (rev 50225) +++ data/CVE/list 2017-03-31 14:50:12 UTC (rev 50226) @@ -2440,23 +2440,25 @@ - ntp 1:4.2.8p10+dfsg-1 NOTE: http://support.ntp.org/bin/view/Main/NtpBug3387 CVE-2017-6462 (Buffer overflow in the legacy Datum Programmable Time Server (DPTS) ...) - - ntp 1:4.2.8p10+dfsg-1 - [wheezy] - ntp <no-dsa> (Minor issue) + - ntp 1:4.2.8p10+dfsg-1 (unimportant) NOTE: http://support.ntp.org/bin/view/Main/NtpBug3388 + NOTE: Obscure legacy feature, no real impact CVE-2017-6461 REJECTED CVE-2017-6460 (Stack-based buffer overflow in the reslist function in ntpq in NTP ...) - ntp 1:4.2.8p10+dfsg-1 + [jessie] - ntp <not-affected> (Vulnerable code not present) + [wheezy] - ntp <not-affected> (Vulnerable code not present) NOTE: http://support.ntp.org/bin/view/Main/NtpBug3377 + NOTE: https://cure53.de/pentest-report_ntp.pdf CVE-2017-6459 (The Windows installer for NTP before 4.2.8p10 and 4.3.x before 4.3.94 ...) - ntp <not-affected> (NTP on Windows) NOTE: http://support.ntp.org/bin/view/Main/NtpBug3382 CVE-2017-6458 (Multiple buffer overflows in the ctl_put* functions in NTP before ...) - - ntp 1:4.2.8p10+dfsg-1 - [wheezy] - ntp <no-dsa> (Minor issue) + - ntp 1:4.2.8p10+dfsg-1 (unimportant) NOTE: http://support.ntp.org/bin/view/Main/NtpBug3379 - NOTE: The vulnerability can only be triggered by adding very long - NOTE: variable names (200 bytes or more) in ntpd.conf file. + NOTE: https://cure53.de/pentest-report_ntp.pdf + NOTE: This is not a vulnerability per se, but a weakness in an internal helper function CVE-2017-6457 REJECTED CVE-2017-6456 @@ -6505,14 +6507,17 @@ NOTE: https://github.com/libgit2/libgit2/commit/ca531956619f021913ac01669b3818a705b7b676 (v0.24.6) CVE-2016-10130 (The http_connect function in transports/http.c in libgit2 before ...) - libgit2 <unfixed> (bug #851406) + [jessie] - libgit2 <not-affected> (Vulnerable code not present) NOTE: https://github.com/libgit2/libgit2/commit/9a64e62f0f20c9cf9b2e1609f037060eb2d8eb22 (v0.25.1) NOTE: https://github.com/libgit2/libgit2/commit/b5c6a1b407b7f8b952bded2789593b68b1876211 (v0.24.6) CVE-2016-10129 (The Git Smart Protocol support in libgit2 before 0.24.6 and 0.25.x ...) - libgit2 <unfixed> (bug #851406) + [jessie] - libgit2 <no-dsa> (Minor issue) NOTE: https://github.com/libgit2/libgit2/commit/2fdef641fd0dd2828bd948234ae86de75221a11a (v0.25.1) NOTE: https://github.com/libgit2/libgit2/commit/84d30d569ada986f3eef527cbdb932643c2dd037 (v0.24.6) CVE-2016-10128 (Buffer overflow in the git_pkt_parse_line function in ...) - libgit2 <unfixed> (bug #851406) + [jessie] - libgit2 <no-dsa> (Minor issue) NOTE: https://github.com/libgit2/libgit2/commit/66e3774d279672ee51c3b54545a79d20d1ada834 (v0.25.1) NOTE: https://github.com/libgit2/libgit2/commit/4ac39c76c0153d1ee6889a0984c39e97731684b2 (v0.24.6) CVE-2016-10126 (Splunk Web in Splunk Enterprise 5.0.x before 5.0.17, 6.0.x before ...) _______________________________________________ Secure-testing-commits mailing list Secure-testing-commits@lists.alioth.debian.org http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits