[Git][security-tracker-team/security-tracker][master] 2 commits: dompdf n/a
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Mon Oct 10 11:08:19 BST 2022
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
26bc14ac by Moritz Muehlenhoff at 2022-10-10T11:37:31+02:00
dompdf n/a
- - - - -
84134c5e by Moritz Muehlenhoff at 2022-10-10T12:07:53+02:00
more libcommons-jxpath-java issues
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -3193,7 +3193,11 @@ CVE-2022-3299 (A vulnerability was found in Open5GS up to 2.4.10. It has been de
CVE-2022-3298 (Allocation of Resources Without Limits or Throttling in GitHub reposit ...)
- rdiffweb <itp> (bug #969974)
CVE-2022-41343 (registerFont in FontMetrics.php in Dompdf before 2.0.1 allows remote f ...)
- TODO: check
+ - libphp-dompdf <not-affected> (Vulnerable code introduced later)
+ NOTE: https://github.com/dompdf/dompdf/issues/2994
+ NOTE: https://github.com/dompdf/dompdf/pull/2995
+ NOTE: https://github.com/dompdf/dompdf/releases/tag/v2.0.1
+ NOTE: https://tantosec.com/blog/cve-2022-41343/
CVE-2022-36368
RESERVED
CVE-2022-41340 (The secp256k1-js package before 1.1.0 for Node.js implements ECDSA wit ...)
@@ -6047,15 +6051,20 @@ CVE-2022-40163
CVE-2022-40162
RESERVED
CVE-2022-40161 (Those using JXPath to interpret XPath may be vulnerable to Denial of S ...)
- TODO: check
+ - libcommons-jxpath-java <unfixed>
+ NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47097
CVE-2022-40160 (Those using JXPath to interpret XPath may be vulnerable to Denial of S ...)
- TODO: check
+ - libcommons-jxpath-java <unfixed>
+ NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47053
CVE-2022-40159 (Those using JXPath to interpret XPath may be vulnerable to Denial of S ...)
- TODO: check
+ - libcommons-jxpath-java <unfixed>
+ NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47057
CVE-2022-40158 (Those using JXPath to interpret XPath may be vulnerable to Denial of S ...)
- TODO: check
+ - libcommons-jxpath-java <unfixed>
+ NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47058
CVE-2022-40157 (Those using JXPath to interpret XPath may be vulnerable to Denial of S ...)
- TODO: check
+ - libcommons-jxpath-java <unfixed>
+ NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47061
CVE-2022-40156 (Those using Xstream to seralize XML data may be vulnerable to Denial o ...)
TODO: check
CVE-2022-40155 (Those using Xstream to serialise XML data may be vulnerable to Denial ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/2fc77cb479def7b19890ff40cf727d72fa3848c3...84134c5ebbcc3d5b6bc92073354c07d11ce1c0d9
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/2fc77cb479def7b19890ff40cf727d72fa3848c3...84134c5ebbcc3d5b6bc92073354c07d11ce1c0d9
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221010/b990827f/attachment.htm>
More information about the debian-security-tracker-commits
mailing list