Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
56aea2b8 by security tracker role at 2023-11-25T08:12:18+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1515,7 +1515,7 @@ CVE-2023-35080 (A vulnerability has been identified in 
the Ivanti Secure Access
 CVE-2023-34060 (VMware Cloud Director Appliance contains an authentication 
bypass vuln ...)
        NOT-FOR-US: VMware
 CVE-2023-44444 [GIMP PSP File Parsing Off-By-One Remote Code Execution 
Vulnerability]
-       {DLA-3659-1}
+       {DSA-5564-1 DLA-3659-1}
        - gimp 2.10.36-1 (bug #1055984)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1591/
        NOTE: 
https://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/#fixed-vulnerabilities
@@ -1523,6 +1523,7 @@ CVE-2023-44444 [GIMP PSP File Parsing Off-By-One Remote 
Code Execution Vulnerabi
        NOTE: Backport to gimp-2.10: 
https://gitlab.gnome.org/GNOME/gimp/-/commit/ef12c0a90752a06d4c465a768d052b07f5e8a8a0
 (GIMP_2_10_36)
        NOTE: https://gitlab.gnome.org/GNOME/gimp/-/issues/10071 (restricted)
 CVE-2023-44443 [GIMP PSP File Parsing Integer Overflow Remote Code Execution 
Vulnerability]
+       {DSA-5564-1}
        - gimp 2.10.36-1 (bug #1055984)
        [buster] - gimp <not-affected> (Vulnerable code introduced in 2.10.22)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1593/
@@ -1532,13 +1533,14 @@ CVE-2023-44443 [GIMP PSP File Parsing Integer Overflow 
Remote Code Execution Vul
        NOTE: https://gitlab.gnome.org/GNOME/gimp/-/issues/10072 (restricted)
        NOTE: Introduced by: 
https://gitlab.gnome.org/GNOME/gimp/-/commit/bf66a07d207bc09f222e56c398760478a3a057fa
 (GIMP_2_10_22)
 CVE-2023-44442 [GIMP PSD File Parsing Heap-based Buffer Overflow Remote Code 
Execution Vulnerability]
-       {DLA-3659-1}
+       {DSA-5564-1 DLA-3659-1}
        - gimp 2.10.36-1 (bug #1055984)
        NOTE: https://www.zerodayinitiative.com/advisories/ZDI-23-1594/
        NOTE: 
https://www.gimp.org/news/2023/11/07/gimp-2-10-36-released/#fixed-vulnerabilities
        NOTE: 
https://gitlab.gnome.org/GNOME/gimp/-/commit/985c0a20e18b5b3b8a48ee9cb12287b1d5732d3d
 (GIMP_2_10_36)
        NOTE: https://gitlab.gnome.org/GNOME/gimp/-/issues/10101 (restricted)
 CVE-2023-44441 [GIMP DDS File Parsing Heap-based Buffer Overflow Remote Code 
Execution Vulnerability]
+       {DSA-5564-1}
        - gimp 2.10.36-1 (bug #1055984)
        [buster] - gimp <not-affected> (DDS plugin added in 2.10.10)
        - gimp-dds <removed>



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/56aea2b8a6104a5628963a9c3cd3e23fed555d8a

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/56aea2b8a6104a5628963a9c3cd3e23fed555d8a
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to