[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sat Nov 25 08:12:33 GMT 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
56aea2b8 by security tracker role at 2023-11-25T08:12:18+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1515,7 +1515,7 @@ CVE-2023-35080 (A vulnerability has been identified in the Ivanti Secure Access
CVE-2023-34060 (VMware Cloud Director Appliance contains an authentication bypass vuln ...)
NOT-FOR-US: VMware
CVE-2023-44444 [GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerability]
- {DLA-3659-1}
+ {DSA-5564-1 DLA-3659-1}
- gimp 2.10.36-1 (bug #1055984)
NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1591/
NOTE: https://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/#fixed-vulnerabilities
@@ -1523,6 +1523,7 @@ CVE-2023-44444 [GIMP PSP File Parsing Off-By-One Remote Code Execution Vulnerabi
NOTE: Backport to gimp-2.10: https://gitlab.gnome.org/GNOME/gimp/-/commit/ef12c0a90752a06d4c465a768d052b07f5e8a8a0 (GIMP_2_10_36)
NOTE: https://gitlab.gnome.org/GNOME/gimp/-/issues/10071 (restricted)
CVE-2023-44443 [GIMP PSP File Parsing Integer Overflow Remote Code Execution Vulnerability]
+ {DSA-5564-1}
- gimp 2.10.36-1 (bug #1055984)
[buster] - gimp <not-affected> (Vulnerable code introduced in 2.10.22)
NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1593/
@@ -1532,13 +1533,14 @@ CVE-2023-44443 [GIMP PSP File Parsing Integer Overflow Remote Code Execution Vul
NOTE: https://gitlab.gnome.org/GNOME/gimp/-/issues/10072 (restricted)
NOTE: Introduced by: https://gitlab.gnome.org/GNOME/gimp/-/commit/bf66a07d207bc09f222e56c398760478a3a057fa (GIMP_2_10_22)
CVE-2023-44442 [GIMP PSD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]
- {DLA-3659-1}
+ {DSA-5564-1 DLA-3659-1}
- gimp 2.10.36-1 (bug #1055984)
NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1594/
NOTE: https://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/#fixed-vulnerabilities
NOTE: https://gitlab.gnome.org/GNOME/gimp/-/commit/985c0a20e18b5b3b8a48ee9cb12287b1d5732d3d (GIMP_2_10_36)
NOTE: https://gitlab.gnome.org/GNOME/gimp/-/issues/10101 (restricted)
CVE-2023-44441 [GIMP DDS File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability]
+ {DSA-5564-1}
- gimp 2.10.36-1 (bug #1055984)
[buster] - gimp <not-affected> (DDS plugin added in 2.10.10)
- gimp-dds <removed>
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/56aea2b8a6104a5628963a9c3cd3e23fed555d8a
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/56aea2b8a6104a5628963a9c3cd3e23fed555d8a
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231125/9bec63fa/attachment.htm>
More information about the debian-security-tracker-commits
mailing list