[Git][security-tracker-team/security-tracker][master] bugnums

Moritz Muehlenhoff (@jmm) jmm at debian.org
Wed Jul 6 22:11:32 BST 2022



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ce15aa28 by Moritz Muehlenhoff at 2022-07-06T23:11:11+02:00
bugnums

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -2554,7 +2554,7 @@ CVE-2022-34300 (In tinyexr 1.0.1, there is a heap-based buffer over-read in tiny
 	[bullseye] - tinyexr <no-dsa> (Minor issue)
 	NOTE: https://github.com/syoyo/tinyexr/issues/167
 CVE-2022-34299 (There is a heap-based buffer over-read in libdwarf 0.4.0. This issue i ...)
-	- dwarfutils <unfixed>
+	- dwarfutils <unfixed> (bug #1014493)
 	[bullseye] - dwarfutils <no-dsa> (Minor issue)
 	[buster] - dwarfutils <no-dsa> (Minor issue)
 	[stretch] - dwarfutils <no-dsa> (Minor issue)
@@ -5774,21 +5774,21 @@ CVE-2017-20053 (A vulnerability was found in XYZScripts Contact Form Manager Plu
 CVE-2017-20052 (A vulnerability classified as problematic was found in Python 2.7.13.  ...)
 	NOT-FOR-US: pgadmin on Windows
 CVE-2022-2058 (Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to  ...)
-	- tiff <unfixed>
+	- tiff <unfixed> (bug #1014494)
 	[bullseye] - tiff <no-dsa> (Minor issue)
 	[buster] - tiff <no-dsa> (Minor issue)
 	NOTE: https://gitlab.com/libtiff/libtiff/-/issues/428
 	NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/346
 	NOTE: https://gitlab.com/libtiff/libtiff/-/commit/dd1bcc7abb26094e93636e85520f0d8f81ab0fab
 CVE-2022-2057 (Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to  ...)
-	- tiff <unfixed>
+	- tiff <unfixed> (bug #1014494)
 	[bullseye] - tiff <no-dsa> (Minor issue)
 	[buster] - tiff <no-dsa> (Minor issue)
 	NOTE: https://gitlab.com/libtiff/libtiff/-/issues/427
 	NOTE: https://gitlab.com/libtiff/libtiff/-/merge_requests/346
 	NOTE: https://gitlab.com/libtiff/libtiff/-/commit/dd1bcc7abb26094e93636e85520f0d8f81ab0fab
 CVE-2022-2056 (Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to  ...)
-	- tiff <unfixed>
+	- tiff <unfixed> (bug #1014494)
 	[bullseye] - tiff <no-dsa> (Minor issue)
 	[buster] - tiff <no-dsa> (Minor issue)
 	NOTE: https://gitlab.com/libtiff/libtiff/-/issues/415
@@ -10866,14 +10866,14 @@ CVE-2022-31093 (NextAuth.js is a complete open source authentication solution fo
 CVE-2022-31092 (Pimcore is an Open Source Data & Experience Management Platform. P ...)
 	NOT-FOR-US: Pimcore
 CVE-2022-31091 (Guzzle, an extensible PHP HTTP client. `Authorization` and `Cookie` he ...)
-	- guzzle <unfixed>
+	- guzzle <unfixed> (bug #1014492)
 	- mediawiki 1:1.35.7-1
 	[bullseye] - mediawiki <postponed> (Minor issue, fix along with next security release)
 	[buster] - mediawiki <postponed> (Minor issue, fix along with next security release)
 	NOTE: https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699
 	NOTE: https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82 (7.4.5)
 CVE-2022-31090 (Guzzle, an extensible PHP HTTP client. `Authorization` headers on requ ...)
-	- guzzle <unfixed>
+	- guzzle <unfixed> (bug #1014492)
 	- mediawiki 1:1.35.7-1
 	[bullseye] - mediawiki <postponed> (Minor issue, fix along with next security release)
 	[buster] - mediawiki <postponed> (Minor issue, fix along with next security release)
@@ -42595,11 +42595,11 @@ CVE-2021-44977 (In iCMS <=8.0.0, a directory traversal vulnerability allows a
 CVE-2021-44976
 	RESERVED
 CVE-2021-44975 (radareorg radare2 5.5.2 is vulnerable to Buffer Overflow via /libr/cor ...)
-	- radare2 <unfixed>
+	- radare2 <unfixed> (bug #1014490)
 	NOTE: https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/
 	NOTE: Fixed in 5.6.0
 CVE-2021-44974 (radareorg radare2 version 5.5.2 is vulnerable to NULL Pointer Derefere ...)
-	- radare2 <unfixed>
+	- radare2 <unfixed> (bug #1014490)
 	NOTE: https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/
 	NOTE: Fixed in 5.5.4
 CVE-2021-44973
@@ -45060,7 +45060,7 @@ CVE-2021-44222
 CVE-2021-44221
 	RESERVED
 CVE-2021-4021 (A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0 ...)
-	- radare2 <unfixed>
+	- radare2 <unfixed> (bug #1014490)
 	NOTE: https://github.com/radareorg/radare2/issues/19436
 	NOTE: https://github.com/radareorg/radare2/commit/3fed0e322d9374891a3412811e5270dc535cea02
 CVE-2021-4020 (janus-gateway is vulnerable to Improper Neutralization of Input During ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ce15aa2874c0cf538a76eb53c80cbb5e6775c8d3

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ce15aa2874c0cf538a76eb53c80cbb5e6775c8d3
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220706/1eb1c28c/attachment.htm>


More information about the debian-security-tracker-commits mailing list