[Git][security-tracker-team/security-tracker][master] 2 commits: dompdf n/a

Moritz Muehlenhoff (@jmm) jmm at debian.org
Mon Oct 10 11:08:19 BST 2022



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
26bc14ac by Moritz Muehlenhoff at 2022-10-10T11:37:31+02:00
dompdf n/a

- - - - -
84134c5e by Moritz Muehlenhoff at 2022-10-10T12:07:53+02:00
more libcommons-jxpath-java issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -3193,7 +3193,11 @@ CVE-2022-3299 (A vulnerability was found in Open5GS up to 2.4.10. It has been de
 CVE-2022-3298 (Allocation of Resources Without Limits or Throttling in GitHub reposit ...)
 	- rdiffweb <itp> (bug #969974)
 CVE-2022-41343 (registerFont in FontMetrics.php in Dompdf before 2.0.1 allows remote f ...)
-	TODO: check
+	- libphp-dompdf <not-affected> (Vulnerable code introduced later)
+	NOTE: https://github.com/dompdf/dompdf/issues/2994
+	NOTE: https://github.com/dompdf/dompdf/pull/2995
+	NOTE: https://github.com/dompdf/dompdf/releases/tag/v2.0.1
+	NOTE: https://tantosec.com/blog/cve-2022-41343/
 CVE-2022-36368
 	RESERVED
 CVE-2022-41340 (The secp256k1-js package before 1.1.0 for Node.js implements ECDSA wit ...)
@@ -6047,15 +6051,20 @@ CVE-2022-40163
 CVE-2022-40162
 	RESERVED
 CVE-2022-40161 (Those using JXPath to interpret XPath may be vulnerable to Denial of S ...)
-	TODO: check
+	- libcommons-jxpath-java <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47097
 CVE-2022-40160 (Those using JXPath to interpret XPath may be vulnerable to Denial of S ...)
-	TODO: check
+	- libcommons-jxpath-java <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47053
 CVE-2022-40159 (Those using JXPath to interpret XPath may be vulnerable to Denial of S ...)
-	TODO: check
+	- libcommons-jxpath-java <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47057
 CVE-2022-40158 (Those using JXPath to interpret XPath may be vulnerable to Denial of S ...)
-	TODO: check
+	- libcommons-jxpath-java <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47058
 CVE-2022-40157 (Those using JXPath to interpret XPath may be vulnerable to Denial of S ...)
-	TODO: check
+	- libcommons-jxpath-java <unfixed>
+	NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47061
 CVE-2022-40156 (Those using Xstream to seralize XML data may be vulnerable to Denial o ...)
 	TODO: check
 CVE-2022-40155 (Those using Xstream to serialise XML data may be vulnerable to Denial  ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/2fc77cb479def7b19890ff40cf727d72fa3848c3...84134c5ebbcc3d5b6bc92073354c07d11ce1c0d9

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/2fc77cb479def7b19890ff40cf727d72fa3848c3...84134c5ebbcc3d5b6bc92073354c07d11ce1c0d9
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221010/b990827f/attachment.htm>


More information about the debian-security-tracker-commits mailing list