|
81 | 81 | } |
82 | 82 | ] |
83 | 83 | }, |
| 84 | + { |
| 85 | + "id": "CVE-2022-33068", |
| 86 | + "details": "An integer overflow in the component hb-ot-shape-fallback.cc of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified vectors.", |
| 87 | + "aliases": ["ROOT-OS-DEBIAN-11-CVE-2022-33068"], |
| 88 | + "modified": "<RFC3339 date with the year 2026>", |
| 89 | + "published": "2022-06-23T17:15:14.350Z", |
| 90 | + "related": [ |
| 91 | + "ALSA-2022:8384", |
| 92 | + "SUSE-SU-2022:2663-1", |
| 93 | + "SUSE-SU-2022:2664-1", |
| 94 | + "openSUSE-SU-2022:2663-1", |
| 95 | + "openSUSE-SU-2024:12168-1" |
| 96 | + ], |
| 97 | + "references": [ |
| 98 | + { |
| 99 | + "type": "WEB", |
| 100 | + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FQBJ24W6TXLSAQWCFW7IBGUMX4AJI3S4/" |
| 101 | + }, |
| 102 | + { |
| 103 | + "type": "WEB", |
| 104 | + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QQMEXOVDL3T2UXKBCON7JSOCE646G7HG/" |
| 105 | + }, |
| 106 | + { |
| 107 | + "type": "WEB", |
| 108 | + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W56WTC5IY4EIUHVUIHMCXA3BSBZLSZCI/" |
| 109 | + }, |
| 110 | + { |
| 111 | + "type": "ADVISORY", |
| 112 | + "url": "https://github.com/harfbuzz/harfbuzz/commit/62e803b36173fd096d7ad460dd1d1db9be542593" |
| 113 | + }, |
| 114 | + { |
| 115 | + "type": "ADVISORY", |
| 116 | + "url": "https://github.com/harfbuzz/harfbuzz/issues/3557" |
| 117 | + }, |
| 118 | + { |
| 119 | + "type": "ADVISORY", |
| 120 | + "url": "https://security.gentoo.org/glsa/202209-11" |
| 121 | + }, |
| 122 | + { |
| 123 | + "type": "REPORT", |
| 124 | + "url": "https://github.com/harfbuzz/harfbuzz/issues/3557" |
| 125 | + }, |
| 126 | + { |
| 127 | + "type": "FIX", |
| 128 | + "url": "https://github.com/harfbuzz/harfbuzz/commit/62e803b36173fd096d7ad460dd1d1db9be542593" |
| 129 | + }, |
| 130 | + { |
| 131 | + "type": "FIX", |
| 132 | + "url": "https://github.com/harfbuzz/harfbuzz/issues/3557" |
| 133 | + }, |
| 134 | + { |
| 135 | + "type": "EVIDENCE", |
| 136 | + "url": "https://github.com/harfbuzz/harfbuzz/issues/3557" |
| 137 | + } |
| 138 | + ], |
| 139 | + "affected": [ |
| 140 | + { |
| 141 | + "ranges": [ |
| 142 | + { |
| 143 | + "type": "GIT", |
| 144 | + "repo": "https://github.com/harfbuzz/harfbuzz", |
| 145 | + "events": [ |
| 146 | + { |
| 147 | + "introduced": "0" |
| 148 | + }, |
| 149 | + { |
| 150 | + "fixed": "62e803b36173fd096d7ad460dd1d1db9be542593" |
| 151 | + } |
| 152 | + ] |
| 153 | + } |
| 154 | + ], |
| 155 | + "versions": 154, |
| 156 | + "database_specific": "<Any value>" |
| 157 | + } |
| 158 | + ], |
| 159 | + "schema_version": "1.7.3", |
| 160 | + "severity": [ |
| 161 | + { |
| 162 | + "type": "CVSS_V3", |
| 163 | + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" |
| 164 | + } |
| 165 | + ] |
| 166 | + }, |
84 | 167 | { |
85 | 168 | "id": "CVE-2023-1055", |
86 | 169 | "details": "A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP tries to decode the userPassword attribute instead of the userCertificate attribute which could lead into sensitive information leaked. An attacker with a local account where the cockpit-389-ds is running can list the processes and display the hashed passwords. The highest threat from this vulnerability is to data confidentiality.", |
|
131 | 214 | { |
132 | 215 | "id": "CVE-2023-25193", |
133 | 216 | "details": "hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.", |
134 | | - "aliases": [ |
135 | | - "ROOT-OS-DEBIAN-11-CVE-2023-25193", |
136 | | - "ROOT-OS-DEBIAN-12-CVE-2023-25193", |
137 | | - "ROOT-OS-DEBIAN-bookworm-CVE-2023-25193", |
138 | | - "ROOT-OS-DEBIAN-bullseye-CVE-2023-25193" |
139 | | - ], |
140 | 217 | "modified": "<RFC3339 date with the year 2026>", |
141 | 218 | "published": "2023-02-04T20:15:08.027Z", |
142 | 219 | "related": [ |
|
952 | 1029 | "id": "CURL-CVE-2024-9681", |
953 | 1030 | "summary": "HSTS subdomain overwrites parent cache entry", |
954 | 1031 | "details": "When curl is asked to use HSTS, the expiry time for a subdomain might\noverwrite a parent domain's cache entry, making it end sooner or later than\notherwise intended.\n\nThis affects curl using applications that enable HSTS and use URLs with the\ninsecure `HTTP://` scheme and perform transfers with hosts like\n`x.example.com` as well as `example.com` where the first host is a subdomain\nof the second host.\n\n(The HSTS cache either needs to have been populated manually or there needs to\nhave been previous HTTPS accesses done as the cache needs to have entries for\nthe domains involved to trigger this problem.)\n\nWhen `x.example.com` responds with `Strict-Transport-Security:` headers, this\nbug can make the subdomain's expiry timeout *bleed over* and get set for the\nparent domain `example.com` in curl's HSTS cache.\n\nThe result of a triggered bug is that HTTP accesses to `example.com` get\nconverted to HTTPS for a different period of time than what was asked for by\nthe origin server. If `example.com` for example stops supporting HTTPS at its\nexpiry time, curl might then fail to access `http://example.com` until the\n(wrongly set) timeout expires. This bug can also expire the parent's entry\n*earlier*, thus making curl inadvertently switch back to insecure HTTP earlier\nthan otherwise intended.", |
955 | | - "aliases": [ |
956 | | - "CVE-2024-9681", |
957 | | - "ROOT-OS-DEBIAN-11-CVE-2024-9681", |
958 | | - "ROOT-OS-DEBIAN-bullseye-CVE-2024-9681" |
959 | | - ], |
| 1032 | + "aliases": ["CVE-2024-9681", "ROOT-OS-DEBIAN-11-CVE-2024-9681"], |
960 | 1033 | "modified": "<RFC3339 date with the year 2026>", |
961 | 1034 | "published": "2024-11-05T08:00:00Z", |
962 | 1035 | "database_specific": "<Any value>", |
|
2119 | 2192 | "repo": "https://github.com/curl/curl", |
2120 | 2193 | "events": [ |
2121 | 2194 | { |
2122 | | - "introduced": "0" |
| 2195 | + "introduced": "70812c2f32fc5734bcbbe572b9f61c380433ad6a" |
2123 | 2196 | }, |
2124 | 2197 | { |
2125 | | - "fixed": "27959ecce75cdb2809c0bdb3286e60e08fadb519" |
| 2198 | + "fixed": "83bedbd730d62b83744cc26fa0433d3f6e2e4cd6" |
2126 | 2199 | } |
2127 | 2200 | ] |
2128 | 2201 | } |
2129 | 2202 | ], |
2130 | | - "versions": 209, |
| 2203 | + "versions": 94, |
2131 | 2204 | "database_specific": "<Any value>" |
2132 | 2205 | } |
2133 | 2206 | ], |
|
2226 | 2299 | { |
2227 | 2300 | "id": "CVE-2024-9681", |
2228 | 2301 | "details": "When curl is asked to use HSTS, the expiry time for a subdomain might\noverwrite a parent domain's cache entry, making it end sooner or later than\notherwise intended.\n\nThis affects curl using applications that enable HSTS and use URLs with the\ninsecure `HTTP://` scheme and perform transfers with hosts like\n`x.example.com` as well as `example.com` where the first host is a subdomain\nof the second host.\n\n(The HSTS cache either needs to have been populated manually or there needs to\nhave been previous HTTPS accesses done as the cache needs to have entries for\nthe domains involved to trigger this problem.)\n\nWhen `x.example.com` responds with `Strict-Transport-Security:` headers, this\nbug can make the subdomain's expiry timeout *bleed over* and get set for the\nparent domain `example.com` in curl's HSTS cache.\n\nThe result of a triggered bug is that HTTP accesses to `example.com` get\nconverted to HTTPS for a different period of time than what was asked for by\nthe origin server. If `example.com` for example stops supporting HTTPS at its\nexpiry time, curl might then fail to access `http://example.com` until the\n(wrongly set) timeout expires. This bug can also expire the parent's entry\n*earlier*, thus making curl inadvertently switch back to insecure HTTP earlier\nthan otherwise intended.", |
2229 | | - "aliases": [ |
2230 | | - "CURL-CVE-2024-9681", |
2231 | | - "ROOT-OS-DEBIAN-11-CVE-2024-9681", |
2232 | | - "ROOT-OS-DEBIAN-bullseye-CVE-2024-9681" |
2233 | | - ], |
| 2302 | + "aliases": ["CURL-CVE-2024-9681", "ROOT-OS-DEBIAN-11-CVE-2024-9681"], |
2234 | 2303 | "modified": "<RFC3339 date with the year 2026>", |
2235 | 2304 | "published": "2024-11-06T08:15:03.740Z", |
2236 | 2305 | "related": [ |
|
0 commit comments