UBUNTU-CVE-2022-29967

Source
https://ubuntu.com/security/CVE-2022-29967
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-29967.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2022-29967
Related
Published
2022-04-29T23:15:00Z
Modified
2025-01-13T10:23:28Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

staticcompressedinmemorywebsitecallback.c in Glewlwyd through 2.6.2 allows directory traversal.

References

Affected packages

Ubuntu:Pro:18.04:LTS / glewlwyd

Package

Name
glewlwyd
Purl
pkg:deb/ubuntu/glewlwyd@1.3.1-1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.1-2ubuntu1
1.2.2-1
1.3.1-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:20.04:LTS / glewlwyd

Package

Name
glewlwyd
Purl
pkg:deb/ubuntu/glewlwyd@1.4.9-3?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.4.9-2
1.4.9-3

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:22.04:LTS / glewlwyd

Package

Name
glewlwyd
Purl
pkg:deb/ubuntu/glewlwyd@2.6.1-1build1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.5.2-3
2.6.1-1
2.6.1-1build1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}