[Secure-testing-team] Bug#873259: nss: CVE-2017-11698: heap-buffer-overflow (write of size 2) in __get_page (lib/dbm/src/h_page.c:704)
Salvatore Bonaccorso
carnil at debian.org
Fri Aug 25 20:53:11 UTC 2017
Source: nss
Version: 2:3.26-1
Severity: important
Tags: security upstream
Forwarded: https://bugzilla.mozilla.org/show_bug.cgi?id=1360779
Hi,
the following vulnerability was published for nss.
CVE-2017-11698[0]:
|heap-buffer-overflow (write of size 2) in __get_page
|(lib/dbm/src/h_page.c:704)
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-11698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11698
Please adjust the affected versions in the BTS as needed.
-- System Information:
Debian Release: buster/sid
APT prefers unstable
APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Kernel: Linux 4.12.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
More information about the Secure-testing-team
mailing list