Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
223664b6 by Moritz Muehlenhoff at 2022-03-14T19:25:05+01:00
apache2 fixed in sid
update two more netpbm-free issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -8990,7 +8990,7 @@ CVE-2022-23944 (User can access /plugin api without 
authentication. This issue a
        NOT-FOR-US: Apache ShenYu Admin
 CVE-2022-23943 [mod_sed: Read/write beyond bounds]
        RESERVED
-       - apache2 <unfixed>
+       - apache2 2.4.53-1
        NOTE: 
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-23943
 CVE-2022-23942
        RESERVED
@@ -13600,15 +13600,15 @@ CVE-2022-22722 (A CWE-798: Use of Hard-coded 
Credentials vulnerability exists th
        NOT-FOR-US: Schneider Electric
 CVE-2022-22721 [Possible buffer overflow with very large or unlimited 
LimitXMLRequestBody]
        RESERVED
-       - apache2 <unfixed>
+       - apache2 2.4.53-1
        NOTE: 
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22721
 CVE-2022-22720 [HTTP request smuggling vulnerability]
        RESERVED
-       - apache2 <unfixed>
+       - apache2 2.4.53-1
        NOTE: 
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22720
 CVE-2022-22719 [mod_lua Use of uninitialized value of in r:parsebody]
        RESERVED
-       - apache2 <unfixed>
+       - apache2 2.4.53-1
        NOTE: 
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-22719
 CVE-2022-22718 (Windows Print Spooler Elevation of Privilege Vulnerability. 
This CVE I ...)
        NOT-FOR-US: Microsoft
@@ -324340,14 +324340,20 @@ CVE-2017-2581 (An out-of-bounds write vulnerability 
was found in netpbm before 1
        NOTE: Similar code path seems protected by earlier stricter size checks 
("object too large")
        NOTE: Possible fix: https://sourceforge.net/p/netpbm/code/2989/ 
(10.78.05)
 CVE-2017-2580 (An out-of-bounds write vulnerability was found in netpbm before 
10.61. ...)
-       - netpbm-free <undetermined> (bug #854978)
+       - netpbm-free 2:10.97.00-1 (bug #854978)
+       [bullseye] - netpbm-free <not-affected> (Legacy fork not affected)
+       [buster] - netpbm-free <not-affected> (Legacy fork not affected)
+       [stretch] - netpbm-free <not-affected> (Legacy fork not affected)
        [jessie] - netpbm-free <not-affected> (pnm/giftopnm.c and bpm/libpm.c 
rewritten, PoC triggers clean check "Zero byte allocation" missing in later 
versions)
        NOTE: Debian uses an old fork of netpbm
        NOTE: https://www.openwall.com/lists/oss-security/2017/02/05/7
        NOTE: PoC+report attached to #854978
        NOTE: Possible fix: https://sourceforge.net/p/netpbm/code/2821 
(10.47.63)
 CVE-2017-2579 (An out-of-bounds read vulnerability was found in netpbm before 
10.61.  ...)
-       - netpbm-free <undetermined> (bug #854978)
+       - netpbm-free 2:10.97.00-1 (bug #854978)
+       [bullseye] - netpbm-free <not-affected> (Legacy fork not affected)
+       [buster] - netpbm-free <not-affected> (Legacy fork not affected)
+       [stretch] - netpbm-free <not-affected> (Legacy fork not affected)
        [jessie] - netpbm-free <not-affected> (pnm/giftopnm.c rewritten, PoC 
triggers clean application error handling)
        NOTE: Debian uses an old fork of netpbm
        NOTE: https://www.openwall.com/lists/oss-security/2017/02/05/7



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/223664b6f56aff225b8041676aab89b7710ab381

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/223664b6f56aff225b8041676aab89b7710ab381
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to