nss: CVE-2017-11697: Floating Point Exception in __hash_open (hash.c:229)

Related Vulnerabilities: CVE-2017-11697  

Debian Bug report logs - #873258
nss: CVE-2017-11697: Floating Point Exception in __hash_open (hash.c:229)

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Fri, 25 Aug 2017 20:54:04 UTC

Severity: important

Tags: security, upstream

Found in version nss/2:3.26-1

Forwarded to https://bugzilla.mozilla.org/show_bug.cgi?id=1360900

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>:
Bug#873258; Package src:nss. (Fri, 25 Aug 2017 20:54:06 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, team@security.debian.org, secure-testing-team@lists.alioth.debian.org, Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>. (Fri, 25 Aug 2017 20:54:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: nss: CVE-2017-11697: Floating Point Exception in __hash_open (hash.c:229)
Date: Fri, 25 Aug 2017 22:52:10 +0200
Source: nss
Version: 2:3.26-1
Severity: important
Tags: upstream security
Forwarded: https://bugzilla.mozilla.org/show_bug.cgi?id=1360900

Hi,

the following vulnerability was published for nss.

CVE-2017-11697[0]:
Floating Point Exception in __hash_open (hash.c:229)

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-11697
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11697

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Information forwarded to debian-bugs-dist@lists.debian.org, Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>:
Bug#873258; Package src:nss. (Fri, 08 Sep 2017 19:30:09 GMT) (full text, mbox, link).


Acknowledgement sent to Ola Lundqvist <ola@inguza.com>:
Extra info received and forwarded to list. Copy sent to Maintainers of Mozilla-related packages <pkg-mozilla-maintainers@lists.alioth.debian.org>. (Fri, 08 Sep 2017 19:30:09 GMT) (full text, mbox, link).


Message #10 received at 873258@bugs.debian.org (full text, mbox, reply):

From: Ola Lundqvist <ola@inguza.com>
To: 873256@bugs.debian.org, 873257@bugs.debian.org, 873258@bugs.debian.org, 873259@bugs.debian.org
Subject: According to Redhat advisory this is not actually a security problem
Date: Fri, 8 Sep 2017 21:27:08 +0200
[Message part 1 (text/plain, inline)]
Hi

I have not been able to confirm this statement as I do not have access to
the bugzilla entries but Redhat advisory claims that in order to exploit
this you actually need to create crafted NDB DBM files which is very likely
to be a problem in practice. Typically you need write access for the user
running the service and then there are easier ways to cause problems than
this. This means that this is really a minor security problem if any. It
would however be good if someone could confirm the statement from Redhat.

I have marked the issue as no-dsa for wheezy but if someone have
information that proove redhat to be wrong then we should change that
statement.

Best regards

// Ola

-- 
 --- Inguza Technology AB --- MSc in Information Technology ----
/  ola@inguza.com                    Folkebogatan 26            \
|  opal@debian.org                   654 68 KARLSTAD            |
|  http://inguza.com/                Mobile: +46 (0)70-332 1551 |
\  gpg/f.p.: 7090 A92B 18FE 7994 0C36 4FE4 18A1 B1CF 0FE5 3DD9  /
 ---------------------------------------------------------------
[Message part 2 (text/html, inline)]

Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 16:04:41 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.