[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Nov 25 08:12:33 GMT 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
56aea2b8 by security tracker role at 2023-11-25T08:12:18+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1515,7 +1515,7 @@ CVE-2023-35080 (A vulnerability has been identified in the Ivanti Secure Access
 CVE-2023-34060 (VMware Cloud Director Appliance contains an authentication bypass vuln ...)
 	NOT-FOR-US: VMware
 CVE-2023-44444 [GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerability]
-	{DLA-3659-1}
+	{DSA-5564-1 DLA-3659-1}
 	- gimp 2.10.36-1 (bug #1055984)
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1591/
 	NOTE: https://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/#fixed-vulnerabilities
@@ -1523,6 +1523,7 @@ CVE-2023-44444 [GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerabi
 	NOTE: Backport to gimp-2.10: https://gitlab.gnome.org/GNOME/gimp/-/commit/ef12c0a90752a06d4c465a768d052b07f5e8a8a0 (GIMP_2_10_36)
 	NOTE: https://gitlab.gnome.org/GNOME/gimp/-/issues/10071 (restricted)
 CVE-2023-44443 [GIMP PSP File Parsing Integer Overflow Remote Code Execution Vulnerability]
+	{DSA-5564-1}
 	- gimp 2.10.36-1 (bug #1055984)
 	[buster] - gimp <not-affected> (Vulnerable code introduced in 2.10.22)
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1593/
@@ -1532,13 +1533,14 @@ CVE-2023-44443 [GIMP PSP File Parsing Integer Overflow Remote Code Execution Vul
 	NOTE: https://gitlab.gnome.org/GNOME/gimp/-/issues/10072 (restricted)
 	NOTE: Introduced by: https://gitlab.gnome.org/GNOME/gimp/-/commit/bf66a07d207bc09f222e56c398760478a3a057fa (GIMP_2_10_22)
 CVE-2023-44442 [GIMP PSD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]
-	{DLA-3659-1}
+	{DSA-5564-1 DLA-3659-1}
 	- gimp 2.10.36-1 (bug #1055984)
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1594/
 	NOTE: https://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/#fixed-vulnerabilities
 	NOTE: https://gitlab.gnome.org/GNOME/gimp/-/commit/985c0a20e18b5b3b8a48ee9cb12287b1d5732d3d (GIMP_2_10_36)
 	NOTE: https://gitlab.gnome.org/GNOME/gimp/-/issues/10101 (restricted)
 CVE-2023-44441 [GIMP DDS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]
+	{DSA-5564-1}
 	- gimp 2.10.36-1 (bug #1055984)
 	[buster] - gimp <not-affected> (DDS plugin added in 2.10.10)
 	- gimp-dds <removed>



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/56aea2b8a6104a5628963a9c3cd3e23fed555d8a

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/56aea2b8a6104a5628963a9c3cd3e23fed555d8a
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231125/9bec63fa/attachment.htm>


More information about the debian-security-tracker-commits mailing list