Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
a2827420 by security tracker role at 2025-01-28T08:12:02+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,259 @@
+CVE-2025-24810 (Cross-site scripting vulnerability exists in Simple Image
Sizes 3.2.3 ...)
+ TODO: check
+CVE-2025-24369 (Anubis is a tool that allows administrators to protect bots
against AI ...)
+ TODO: check
+CVE-2025-24177 (A null pointer dereference was addressed with improved input
validatio ...)
+ TODO: check
+CVE-2025-24176 (A permissions issue was addressed with improved validation.
This issue ...)
+ TODO: check
+CVE-2025-24174 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2025-24169 (A logging issue was addressed with improved data redaction.
This issue ...)
+ TODO: check
+CVE-2025-24166 (This issue was addressed through improved state management.
This issue ...)
+ TODO: check
+CVE-2025-24163 (The issue was addressed with improved checks. This issue is
fixed in i ...)
+ TODO: check
+CVE-2025-24162 (This issue was addressed through improved state management.
This issue ...)
+ TODO: check
+CVE-2025-24161 (The issue was addressed with improved checks. This issue is
fixed in i ...)
+ TODO: check
+CVE-2025-24160 (The issue was addressed with improved checks. This issue is
fixed in i ...)
+ TODO: check
+CVE-2025-24159 (A validation issue was addressed with improved logic. This
issue is fi ...)
+ TODO: check
+CVE-2025-24158 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2025-24156 (An integer overflow was addressed through improved input
validation. T ...)
+ TODO: check
+CVE-2025-24154 (An out-of-bounds write was addressed with improved input
validation. T ...)
+ TODO: check
+CVE-2025-24153 (A buffer overflow issue was addressed with improved memory
handling. T ...)
+ TODO: check
+CVE-2025-24152 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2025-24151 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2025-24150 (A privacy issue was addressed with improved handling of files.
This is ...)
+ TODO: check
+CVE-2025-24149 (An out-of-bounds read was addressed with improved bounds
checking. Thi ...)
+ TODO: check
+CVE-2025-24146 (This issue was addressed with improved redaction of sensitive
informat ...)
+ TODO: check
+CVE-2025-24145 (A privacy issue was addressed with improved private data
redaction for ...)
+ TODO: check
+CVE-2025-24143 (The issue was addressed with improved access restrictions to
the file ...)
+ TODO: check
+CVE-2025-24141 (An authentication issue was addressed with improved state
management. ...)
+ TODO: check
+CVE-2025-24140 (This issue was addressed through improved state management.
This issue ...)
+ TODO: check
+CVE-2025-24139 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2025-24138 (This issue was addressed through improved state management.
This issue ...)
+ TODO: check
+CVE-2025-24137 (A type confusion issue was addressed with improved checks.
This issue ...)
+ TODO: check
+CVE-2025-24136 (This issue was addressed with improved validation of symlinks.
This is ...)
+ TODO: check
+CVE-2025-24135 (This issue was addressed with improved message validation.
This issue ...)
+ TODO: check
+CVE-2025-24134 (An information disclosure issue was addressed with improved
privacy co ...)
+ TODO: check
+CVE-2025-24131 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2025-24130 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2025-24129 (A type confusion issue was addressed with improved checks.
This issue ...)
+ TODO: check
+CVE-2025-24128 (The issue was addressed by adding additional logic. This issue
is fixe ...)
+ TODO: check
+CVE-2025-24127 (The issue was addressed with improved checks. This issue is
fixed in i ...)
+ TODO: check
+CVE-2025-24126 (An input validation issue was addressed. This issue is fixed
in vision ...)
+ TODO: check
+CVE-2025-24124 (The issue was addressed with improved checks. This issue is
fixed in i ...)
+ TODO: check
+CVE-2025-24123 (The issue was addressed with improved checks. This issue is
fixed in i ...)
+ TODO: check
+CVE-2025-24122 (A downgrade issue affecting Intel-based Mac computers was
addressed wi ...)
+ TODO: check
+CVE-2025-24121 (A logic issue was addressed with improved checks. This issue
is fixed ...)
+ TODO: check
+CVE-2025-24120 (This issue was addressed by improved management of object
lifetimes. T ...)
+ TODO: check
+CVE-2025-24118 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2025-24117 (This issue was addressed with improved redaction of sensitive
informat ...)
+ TODO: check
+CVE-2025-24116 (An access issue was addressed with additional sandbox
restrictions. Th ...)
+ TODO: check
+CVE-2025-24115 (A path handling issue was addressed with improved validation.
This iss ...)
+ TODO: check
+CVE-2025-24114 (A permissions issue was addressed with additional
restrictions. This i ...)
+ TODO: check
+CVE-2025-24113 (The issue was addressed with improved UI. This issue is fixed
in macOS ...)
+ TODO: check
+CVE-2025-24112 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2025-24109 (A downgrade issue was addressed with additional code-signing
restricti ...)
+ TODO: check
+CVE-2025-24108 (An access issue was addressed with additional sandbox
restrictions. Th ...)
+ TODO: check
+CVE-2025-24107 (A permissions issue was addressed with additional
restrictions. This i ...)
+ TODO: check
+CVE-2025-24106 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2025-24104 (This issue was addressed with improved handling of symlinks.
This issu ...)
+ TODO: check
+CVE-2025-24103 (This issue was addressed with improved validation of symlinks.
This is ...)
+ TODO: check
+CVE-2025-24102 (The issue was addressed with improved checks. This issue is
fixed in i ...)
+ TODO: check
+CVE-2025-24101 (This issue was addressed with improved redaction of sensitive
informat ...)
+ TODO: check
+CVE-2025-24100 (A logic issue was addressed with improved restrictions. This
issue is ...)
+ TODO: check
+CVE-2025-24096 (This issue was addressed through improved state management.
This issue ...)
+ TODO: check
+CVE-2025-24094 (A race condition was addressed with additional validation.
This issue ...)
+ TODO: check
+CVE-2025-24093 (A permissions issue was addressed with additional
restrictions. This i ...)
+ TODO: check
+CVE-2025-24092 (This issue was addressed with improved data protection. This
issue is ...)
+ TODO: check
+CVE-2025-24087 (The issue was addressed with additional permissions checks.
This issue ...)
+ TODO: check
+CVE-2025-24086 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2025-24085 (A use after free issue was addressed with improved memory
management. ...)
+ TODO: check
+CVE-2025-22865 (Using ParsePKCS1PrivateKey to parse a RSA key that is missing
the CRT ...)
+ TODO: check
+CVE-2025-0753 (A vulnerability classified as critical was found in Axiomatic
Bento4 u ...)
+ TODO: check
+CVE-2025-0321 (The ElementsKit Pro plugin for WordPress is vulnerable to
DOM-Based St ...)
+ TODO: check
+CVE-2024-57549 (CMSimple 5.16 allows the user to read cms source code through
manipula ...)
+ TODO: check
+CVE-2024-57548 (CMSimple 5.16 allows the user to edit log.php file via print
page.)
+ TODO: check
+CVE-2024-57547 (Insecure Permissions vulnerability in CMSimple v.5.16 allows a
remote ...)
+ TODO: check
+CVE-2024-57546 (An issue in CMSimple v.5.16 allows a remote attacker to obtain
sensiti ...)
+ TODO: check
+CVE-2024-57373 (Cross Site Request Forgery vulnerability in LifestyleStore
v.1.0 allow ...)
+ TODO: check
+CVE-2024-57052 (An issue in youdiancms v.9.5.20 and before allows a remote
attacker to ...)
+ TODO: check
+CVE-2024-56316 (In AXESS ACS (Auto Configuration Server) through 5.2.0,
unsanitized us ...)
+ TODO: check
+CVE-2024-56178 (An issue was discovered in Couchbase Server 7.6.x through
7.6.3. A use ...)
+ TODO: check
+CVE-2024-54728 (Incorrect access control in BYD QIN PLUS DM-i Dilink OS
3.0_13.1.7.220 ...)
+ TODO: check
+CVE-2024-54557 (A logic issue was addressed with improved restrictions. This
issue is ...)
+ TODO: check
+CVE-2024-54550 (This issue was addressed with improved redaction of sensitive
informat ...)
+ TODO: check
+CVE-2024-54549 (This issue was addressed with improved redaction of sensitive
informat ...)
+ TODO: check
+CVE-2024-54547 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2024-54543 (The issue was addressed with improved memory handling. This
issue is f ...)
+ TODO: check
+CVE-2024-54542 (An authentication issue was addressed with improved state
management. ...)
+ TODO: check
+CVE-2024-54541 (This issue was addressed through improved state management.
This issue ...)
+ TODO: check
+CVE-2024-54539 (This issue was addressed through improved state management.
This issue ...)
+ TODO: check
+CVE-2024-54537 (This issue was addressed with additional entitlement checks.
This issu ...)
+ TODO: check
+CVE-2024-54536 (The issue was addressed with improved validation of
environment variab ...)
+ TODO: check
+CVE-2024-54530 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2024-54523 (The issue was addressed with improved bounds checks. This
issue is fix ...)
+ TODO: check
+CVE-2024-54522 (The issue was addressed with improved bounds checks. This
issue is fix ...)
+ TODO: check
+CVE-2024-54520 (A path handling issue was addressed with improved validation.
This iss ...)
+ TODO: check
+CVE-2024-54519 (The issue was resolved by sanitizing logging. This issue is
fixed in m ...)
+ TODO: check
+CVE-2024-54518 (The issue was addressed with improved bounds checks. This
issue is fix ...)
+ TODO: check
+CVE-2024-54517 (The issue was addressed with improved bounds checks. This
issue is fix ...)
+ TODO: check
+CVE-2024-54516 (A permissions issue was addressed with additional
restrictions. This i ...)
+ TODO: check
+CVE-2024-54512 (The issue was addressed by removing the relevant flags. This
issue is ...)
+ TODO: check
+CVE-2024-54509 (An out-of-bounds write issue was addressed with improved input
validat ...)
+ TODO: check
+CVE-2024-54507 (A type confusion issue was addressed with improved memory
handling. Th ...)
+ TODO: check
+CVE-2024-54499 (A use-after-free issue was addressed with improved memory
management. ...)
+ TODO: check
+CVE-2024-54497 (The issue was addressed with improved checks. This issue is
fixed in i ...)
+ TODO: check
+CVE-2024-54488 (A logic issue was addressed with improved file handling. This
issue is ...)
+ TODO: check
+CVE-2024-54478 (An out-of-bounds access issue was addressed with improved
bounds check ...)
+ TODO: check
+CVE-2024-54475 (A privacy issue was addressed with improved private data
redaction for ...)
+ TODO: check
+CVE-2024-54468 (The issue was addressed with improved checks. This issue is
fixed in m ...)
+ TODO: check
+CVE-2024-53881 (NVIDIA vGPU software contains a vulnerability in the host
driver, wher ...)
+ TODO: check
+CVE-2024-48662 (Cross Site Scripting vulnerability in AdGuard Application
v.7.18.1 (47 ...)
+ TODO: check
+CVE-2024-45340 (Credentials provided via the new GOAUTH feature were not being
properl ...)
+ TODO: check
+CVE-2024-45339 (When logs are written to a widely-writable directory (the
default), an ...)
+ TODO: check
+CVE-2024-44172 (A privacy issue was addressed with improved private data
redaction for ...)
+ TODO: check
+CVE-2024-37526 (IBM Watson Query on Cloud Pak for Data (IBM Data
Virtualization1.8, 2. ...)
+ TODO: check
+CVE-2024-28786 (IBM QRadar SIEM 7.5 transmits sensitive or security-critical
data in c ...)
+ TODO: check
+CVE-2024-27263 (IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and
6.2.0.0 throug ...)
+ TODO: check
+CVE-2024-22315 (IBM Fusion and IBM Fusion HCI 2.3.0 through 2.8.2 is
vulnerable to ins ...)
+ TODO: check
+CVE-2024-13521 (The MailUp Auto Subscription plugin for WordPress is
vulnerable to Cro ...)
+ TODO: check
+CVE-2024-13509 (The WS Form LITE \u2013 Drag & Drop Contact Form Builder for
WordPress ...)
+ TODO: check
+CVE-2024-13448 (The ThemeREX Addons plugin for WordPress is vulnerable to
arbitrary fi ...)
+ TODO: check
+CVE-2024-12807 (The Social Share Buttons for WordPress plugin through 2.7 does
not san ...)
+ TODO: check
+CVE-2024-12723 (The Infility Global WordPress plugin through 2.9.8 does not
sanitise a ...)
+ TODO: check
+CVE-2024-12649 (Buffer overflow in XPS data font processing of Small Office
Multifunct ...)
+ TODO: check
+CVE-2024-12648 (Buffer overflow in TIFF data EXIF tag processing of Small
Office Multi ...)
+ TODO: check
+CVE-2024-12647 (Buffer overflow in CPCA font download processing of Small
Office Multi ...)
+ TODO: check
+CVE-2024-11135 (The Eventer plugin for WordPress is vulnerable to SQL
Injection via th ...)
+ TODO: check
+CVE-2024-0146 (NVIDIA vGPU software contains a vulnerability in the Virtual
GPU Manag ...)
+ TODO: check
+CVE-2024-0140 (NVIDIA RAPIDS contains a vulnerability in cuDF and cuML, where
a user ...)
+ TODO: check
+CVE-2024-0137 (NVIDIA Container Toolkit contains an improper isolation
vulnerability ...)
+ TODO: check
+CVE-2024-0136 (NVIDIA Container Toolkit contains an improper isolation
vulnerability ...)
+ TODO: check
+CVE-2024-0135 (NVIDIA Container Toolkit contains an improper isolation
vulnerability ...)
+ TODO: check
+CVE-2023-50316 (IBM Sterling B2B Integrator 6.0.0.0 through 6.1.2.5 and
6.2.0.0 throug ...)
+ TODO: check
CVE-2025-0754
- envoyproxy <itp> (bug #987544)
CVE-2025-0752
@@ -911,7 +1167,7 @@ CVE-2023-46401 (KWHotel 0.47 is vulnerable to CSV Formula
Injection in the invoi
NOT-FOR-US: KWHotel
CVE-2023-46400 (KWHotel 0.47 is vulnerable to CSV Formula Injection in the add
guest f ...)
NOT-FOR-US: KWHotel
-CVE-2024-0149
+CVE-2024-0149 (NVIDIA GPU Display Driver for Linux contains a vulnerability
which cou ...)
- nvidia-graphics-drivers <unfixed> (bug #1093908)
[bookworm] - nvidia-graphics-drivers <no-dsa> (Non-free not supported)
[bullseye] - nvidia-graphics-drivers <ignored> (Non-free not supported)
@@ -949,12 +1205,12 @@ CVE-2024-0131
- nvidia-open-gpu-kernel-modules <unfixed> (bug #1093916)
[bookworm] - nvidia-open-gpu-kernel-modules <no-dsa> (Non-free not
supported)
NOTE: https://nvidia.custhelp.com/app/answers/detail/a_id/5614
-CVE-2024-53869
+CVE-2024-53869 (NVIDIA Unified Memory driver for Linux contains a
vulnerability where ...)
- nvidia-graphics-drivers <unfixed> (bug #1093908)
[bookworm] - nvidia-graphics-drivers <no-dsa> (Non-free not supported)
[bullseye] - nvidia-graphics-drivers <ignored> (Non-free not supported)
NOTE: https://nvidia.custhelp.com/app/answers/detail/a_id/5614
-CVE-2024-0147
+CVE-2024-0147 (NVIDIA GPU display driver for Windows and Linux contains a
vulnerabili ...)
- nvidia-graphics-drivers <unfixed> (bug #1093908)
[bookworm] - nvidia-graphics-drivers <no-dsa> (Non-free not supported)
[bullseye] - nvidia-graphics-drivers <ignored> (Non-free not supported)
@@ -973,7 +1229,7 @@ CVE-2024-0147
- nvidia-open-gpu-kernel-modules <unfixed> (bug #1093916)
[bookworm] - nvidia-open-gpu-kernel-modules <no-dsa> (Non-free not
supported)
NOTE: https://nvidia.custhelp.com/app/answers/detail/a_id/5614
-CVE-2024-0150
+CVE-2024-0150 (NVIDIA GPU display driver for Windows and Linux contains a
vulnerabili ...)
- nvidia-graphics-drivers <unfixed> (bug #1093908)
[bookworm] - nvidia-graphics-drivers <no-dsa> (Non-free not supported)
[bullseye] - nvidia-graphics-drivers <ignored> (Non-free not supported)
@@ -1898,7 +2154,7 @@ CVE-2025-0411 (7-Zip Mark-of-the-Web Bypass
Vulnerability. This vulnerability al
CVE-2025-23085 [GOAWAY HTTP/2 frames cause memory leak outside heap]
- nodejs 20.18.2+dfsg-1 (bug #1094134)
NOTE:
https://nodejs.org/en/blog/vulnerability/january-2025-security-releases#goaway-http2-frames-cause-memory-leak-outside-heap-cve-2025-23085---medium
-CVE-2025-23084 [Path traversal by drive name in Windows environment]
+CVE-2025-23084 (A vulnerability has been identified in Node.js, specifically
affecting ...)
- nodejs <not-affected> (Only affect Node.js on Windows)
NOTE:
https://nodejs.org/en/blog/vulnerability/january-2025-security-releases#path-traversal-by-drive-name-in-windows-environment-cve-2025-23084---medium
CVE-2025-23083 (With the aid of the diagnostics_channel utility, an event can
be hooke ...)
@@ -2064,7 +2320,7 @@ CVE-2024-51888 (Incorrect Privilege Assignment
vulnerability in NotFound Homey L
NOT-FOR-US: WordPress plugin
CVE-2024-51818 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
NOT-FOR-US: WordPress plugin
-CVE-2024-51417 (An issue in System.Linq.Dynamic.Core Latest version v.1.4.6
allows rem ...)
+CVE-2024-51417 (An issue in System.Linq.Dynamic.Core before 1.6.0 allows
remote access ...)
NOT-FOR-US: System.Linq.Dynamic.Core
CVE-2024-49700 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
NOT-FOR-US: WordPress plugin
@@ -3085,7 +3341,7 @@ CVE-2024-11146 (TrueFiling is a collaborative, web-based
electronic filing syste
NOT-FOR-US: TrueFiling
CVE-2024-10799 (The Eventer plugin for WordPress is vulnerable to Directory
Traversal ...)
NOT-FOR-US: WordPress plugin
-CVE-2024-45341
+CVE-2024-45341 (A certificate with a URI which has a IPv6 address with a zone
ID may i ...)
- golang-1.23 1.23.5-1
- golang-1.22 1.22.11-1
- golang-1.19 <removed>
@@ -3097,7 +3353,7 @@ CVE-2024-45341
NOTE: Fixed by:
https://github.com/golang/go/commit/fdb8413fe588ec6dc31f1deaf43eb7202a76bb79
(go1.23.5)
NOTE: Fixed by:
https://github.com/golang/go/commit/19d21034157ba69d0f54318a9867d9b08730efcb
(go1.22.11)
NOTE: Certificates containing URIs are not permitted in the web PKI, so
this only affects users of private PKIs which make use of URIs
-CVE-2024-45336
+CVE-2024-45336 (The HTTP client drops sensitive headers after following a
cross-domain ...)
- golang-1.23 1.23.5-1
- golang-1.22 1.22.11-1
- golang-1.19 <removed>
@@ -57442,7 +57698,7 @@ CVE-2024-37007 (A maliciously crafted X_B and X_T file,
when parsed in pskernel.
NOT-FOR-US: Autodesk
CVE-2024-37006 (A maliciously crafted CATPRODUCT file, when parsed in
CC5Dll.dll throu ...)
NOT-FOR-US: Autodesk
-CVE-2024-37005 (A maliciously crafted X_B and X_T file, when parsed in
pskernel.DLL th ...)
+CVE-2024-37005 (A maliciously crafted X_B file, when parsed in pskernel.DLL
through Au ...)
NOT-FOR-US: Autodesk
CVE-2024-37004 (A maliciously crafted SLDPRT file, when parsed in
ASMKERN229A.dll thro ...)
NOT-FOR-US: Autodesk
@@ -57450,7 +57706,7 @@ CVE-2024-37003 (A maliciously crafted DWG and SLDPRT
file, when parsed in opennu
NOT-FOR-US: Autodesk
CVE-2024-37002 (A maliciously crafted MODEL file, when parsed in
ASMkern229A.dllthroug ...)
NOT-FOR-US: Autodesk
-CVE-2024-37001 ([A maliciously crafted 3DM file, when parsed in opennurbs.dll
through ...)
+CVE-2024-37001 (A maliciously crafted 3DM file, when parsed in opennurbs.dll
through A ...)
NOT-FOR-US: Autodesk
CVE-2024-37000 (A maliciously crafted X_B file, when parsed in pskernel.DLL
through Au ...)
NOT-FOR-US: Autodesk
@@ -195844,8 +196100,8 @@ CVE-2022-3367
RESERVED
CVE-2022-3366 (The PublishPress Capabilities WordPress plugin before 2.5.2,
PublishPr ...)
NOT-FOR-US: WordPress plugin
-CVE-2022-3365
- RESERVED
+CVE-2022-3365 (Due to reliance on a trivial substitution cipher, sent in
cleartext, a ...)
+ TODO: check
CVE-2022-3364 (Allocation of Resources Without Limits or Throttling in GitHub
reposit ...)
- rdiffweb <itp> (bug #969974)
CVE-2022-3363 (Business Logic Errors in GitHub repository ikus060/rdiffweb
prior to 2 ...)
@@ -223404,8 +223660,8 @@ CVE-2020-36524 (A vulnerability was found in Refined
Toolkit. It has been rated
NOT-FOR-US: Atlassian
CVE-2020-36523 (A vulnerability was found in PlantUML 6.43. It has been
declared as pr ...)
NOT-FOR-US: Atlassian PlantUML plugin
-CVE-2022-31749
- RESERVED
+CVE-2022-31749 (An argument injection vulnerability in the diagnose and import
pac com ...)
+ TODO: check
CVE-2022-31748 (Mozilla developers Gabriele Svelto, Timothy Nikkel, Randell
Jesup, Jon ...)
- firefox 101.0-1
NOTE:
https://www.mozilla.org/en-US/security/advisories/mfsa2022-20/#CVE-2022-31748
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a282742066ed93681c14246e71926a4a62612f5d
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a282742066ed93681c14246e71926a4a62612f5d
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits