Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker

Commits:
e1f9ea17 by Moritz Muehlenhoff at 2025-01-21T10:21:09+01:00
libjpeg fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -134233,12 +134233,12 @@ CVE-2023-37849 (A DLL hijacking vulnerability in 
Panda Security VPN for Windows
 CVE-2023-37839 (An arbitrary file upload vulnerability in 
/dede/file_manage_control.ph ...)
        NOT-FOR-US: Dede CMS
 CVE-2023-37837 (libjpeg commit db33a6e was discovered to contain a heap buffer 
overflo ...)
-       - libjpeg <unfixed> (bug #1041103; unimportant)
+       - libjpeg 0.0~git20241105.c719010-1 (bug #1041103; unimportant)
        NOTE: https://github.com/thorfdbg/libjpeg/issues/87#BUG0
        NOTE: Fixed by: 
https://github.com/thorfdbg/libjpeg/commit/9e0cea29d7ba7a2c1e763865391bc94b336da25e
        NOTE: Crash in CLI tool, no security impact
 CVE-2023-37836 (libjpeg commit db33a6e was discovered to contain a reachable 
assertion ...)
-       - libjpeg <unfixed> (bug #1041103; unimportant)
+       - libjpeg 0.0~git20241105.c719010-1 (bug #1041103; unimportant)
        NOTE: https://github.com/thorfdbg/libjpeg/issues/87#BUG1
        NOTE: Fixed by: 
https://github.com/thorfdbg/libjpeg/commit/9e0cea29d7ba7a2c1e763865391bc94b336da25e
        NOTE: Crash in CLI tool, no security impact



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e1f9ea17ddeebc5231c96f73d474de9ca1ab19c4

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e1f9ea17ddeebc5231c96f73d474de9ca1ab19c4
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to