Package: debsecan
Version: 0.4.19~deb9u1
Severity: normal

Dear Maintainer,

This has been bugging me for a while. debsecan shows the following package as 
being vulnerable and having updates available to fix the issue: 

*** Available security updates

CVE-2017-15908 In systemd 223 through 235, a remote DNS server can...
  <https://security-tracker.debian.org/tracker/CVE-2017-15908>
  - libudev1, libpam-systemd, libsystemd0, udev, systemd
    (remotely exploitable, medium urgency)

CVE-2017-9445 In systemd through 233, certain sizes passed to...
  <https://security-tracker.debian.org/tracker/CVE-2017-9445>
  - libudev1, libpam-systemd, libsystemd0, udev, systemd
    (remotely exploitable, medium urgency)

Upon checking the secueity tracker for both CVE-2017-15908 and CVE-2017-9445 I 
saw that my I needed systemd 232-25+deb9u2 to apply the fixes. My system has 
systemd 232-25+deb9u3 installed, as shown below:

tmc@citadel:~$ dpkg -l | grep systemd
ii  libpam-systemd:amd64              232-25+deb9u3      amd64        system 
and service manager - PAM module
ii  libsystemd0:amd64                 232-25+deb9u3      amd64        systemd 
utility library
ii  systemd                           232-25+deb9u3      amd64        system 
and service manager
ii  systemd-shim                      10-3               amd64        shim for 
systemd

This leads to three (3) questions: 

1. Is there a bug or flaw in debsecan logic that means that 232-25+deb9u3 which 
should contain fixes included in 232-25+deb9u2 is not recognised as fixed?

2. Is there a bug or flaw in the vulnerability database that debsecan uses that 
means that 232-25+deb9u3 which should contain fixes included in 232-25+deb9u2 
is not recognised as fixed?

3. Are the fixes in systemd 232-25+deb9u2 not applied in systemd 232-25+deb9u3

This issue is happening across all debian systems that I manage.

happy to provide more debug and/or testing.

Cheers


-- System Information:
Debian Release: 9.4
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-6-amd64 (SMP w/1 CPU core)
Locale: LANG=en_AU, LC_CTYPE=en_AU (charmap=ISO-8859-1), LANGUAGE=en_AU 
(charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages debsecan depends on:
ii  ca-certificates        20161130+nmu1
ii  debconf [debconf-2.0]  1.5.61
ii  python                 2.7.13-2
ii  python-apt             1.4.0~beta3

Versions of packages debsecan recommends:
ii  cron                            3.0pl1-128+deb9u1
ii  postfix [mail-transport-agent]  3.1.8-0+deb9u1

debsecan suggests no packages.

-- debconf information:
* debsecan/suite: stretch
* debsecan/report: true
* debsecan/mailto: root
* debsecan/source:

Reply via email to