Author: apo
Date: 2017-09-22 18:23:13 +0000 (Fri, 22 Sep 2017)
New Revision: 56023

Modified:
   data/CVE/list
Log:
kannel,CVE-2017-14609: no-dsa for Wheezy

I think it is sensible to follow Jessie/Stretch in this case. The exploit is
limited to non-root local users and requires that someone compromises the
daemon, so at least one other condition must be fulfilled to manipulate the PID
file. This issue could be fixed when more serious issues are discovered but it
appears to be less severe at the moment.



Modified: data/CVE/list
===================================================================
--- data/CVE/list       2017-09-22 17:56:21 UTC (rev 56022)
+++ data/CVE/list       2017-09-22 18:23:13 UTC (rev 56023)
@@ -242,6 +242,7 @@
        - kannel <unfixed> (low)
        [stretch] - kannel <no-dsa> (Minor issue)
        [jessie] - kannel <no-dsa> (Minor issue)
+       [wheezy] - kannel <no-dsa> (Minor issue)
        NOTE: https://redmine.kannel.org/issues/771
 CVE-2017-14608 (In LibRaw through 0.18.4, an out of bounds read flaw related 
to ...)
        - libraw <unfixed> (low)


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to