Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
964f262f by security tracker role at 2025-02-13T08:12:10+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,223 @@
+CVE-2025-25286 (Crayfish is a collection of Islandora 8 microservices, one of 
which, H ...)
+       TODO: check
+CVE-2025-20097 (Uncaught exception in OpenBMC Firmware for the Intel(R) Server 
M50FCP  ...)
+       TODO: check
+CVE-2025-1229 (A vulnerability classified as critical was found in olajowon 
Loggrove  ...)
+       TODO: check
+CVE-2025-1228 (A vulnerability classified as problematic has been found in 
olajowon L ...)
+       TODO: check
+CVE-2025-1227 (A vulnerability was found in ywoa up to 2024.07.03. It has been 
rated  ...)
+       TODO: check
+CVE-2025-1226 (A vulnerability was found in ywoa up to 2024.07.03. It has been 
declar ...)
+       TODO: check
+CVE-2025-1198 (An issue discovered in GitLab CE/EE affecting all versions from 
16.11  ...)
+       TODO: check
+CVE-2025-1070 (CWE-434: Unrestricted Upload of File with Dangerous Type 
vulnerability ...)
+       TODO: check
+CVE-2025-1060 (CWE-319: Cleartext Transmission of Sensitive Information 
vulnerability ...)
+       TODO: check
+CVE-2025-1059 (CWE-770: Allocation of Resources Without Limits or Throttling 
vulnerab ...)
+       TODO: check
+CVE-2025-1058 (CWE-494: Download of Code Without Integrity Check vulnerability 
exists ...)
+       TODO: check
+CVE-2025-0896 (Orthanc server prior to version 1.5.8 does not enable basic 
authentica ...)
+       TODO: check
+CVE-2025-0837 (The Puzzles theme for WordPress is vulnerable to Stored 
Cross-Site Scr ...)
+       TODO: check
+CVE-2025-0816 (CWE-20: Improper Input Validation vulnerability exists that 
could caus ...)
+       TODO: check
+CVE-2025-0815 (CWE-20: Improper Input Validation vulnerability exists that 
could caus ...)
+       TODO: check
+CVE-2025-0814 (CWE-20: Improper Input Validation vulnerability exists that 
could caus ...)
+       TODO: check
+CVE-2025-0692 (The Simple Video Management System WordPress plugin through 
1.0.4 does ...)
+       TODO: check
+CVE-2025-0661 (The DethemeKit For Elementor plugin for WordPress is vulnerable 
to Inf ...)
+       TODO: check
+CVE-2025-0327 (CWE-269: Improper Privilege Management vulnerability exists for 
two se ...)
+       TODO: check
+CVE-2025-0113 (A problem with the network isolation mechanism of the Palo Alto 
Networ ...)
+       TODO: check
+CVE-2025-0111 (An authenticated file read vulnerability in the Palo Alto 
Networks PAN ...)
+       TODO: check
+CVE-2025-0110 (A command injection vulnerability in the Palo Alto Networks 
PAN-OS Ope ...)
+       TODO: check
+CVE-2025-0109 (An unauthenticated file deletion vulnerability in the Palo Alto 
Networ ...)
+       TODO: check
+CVE-2025-0108 (An authentication bypass in the Palo Alto Networks PAN-OS 
software ena ...)
+       TODO: check
+CVE-2024-8266 (An issue was discovered in GitLab CE/EE affecting all versions 
startin ...)
+       TODO: check
+CVE-2024-7102 (An issue was discovered in GitLab CE/EE affecting all versions 
startin ...)
+       TODO: check
+CVE-2024-57605 (Cross Site Scripting vulnerability in Daylight Studio Fuel CMS 
v.1.5.2 ...)
+       TODO: check
+CVE-2024-57604 (An issue in MaysWind ezBookkeeping 0.7.0 allows a remote 
attacker to e ...)
+       TODO: check
+CVE-2024-57603 (An issue in MaysWind ezBookkeeping 0.7.0 allows a remote 
attacker to e ...)
+       TODO: check
+CVE-2024-57602 (An issue in Alex Tselegidis EasyAppointments v.1.5.0 allows a 
remote a ...)
+       TODO: check
+CVE-2024-57601 (Cross Site Scripting vulnerability in Alex Tselegidis 
EasyAppointments ...)
+       TODO: check
+CVE-2024-56940 (An issue in the profile image upload function of LearnDash 
v6.7.1 allo ...)
+       TODO: check
+CVE-2024-56939 (LearnDash v6.7.1 was discovered to contain a stored cross-site 
scripti ...)
+       TODO: check
+CVE-2024-56938 (LearnDash v6.7.1 was discovered to contain a stored cross-site 
scripti ...)
+       TODO: check
+CVE-2024-51440 (An issue in Nothing Tech Nothing OS v.2.6 allows a local 
attacker to e ...)
+       TODO: check
+CVE-2024-51376 (Directory Traversal vulnerability in yeqifu carRental v.1.0 
allows a r ...)
+       TODO: check
+CVE-2024-51123 (An issue in Zertificon Z1 SecureMail Z1 SecureMail Gateway 
4.44.2-7240 ...)
+       TODO: check
+CVE-2024-51122 (Cross Site Scripting vulnerability in Zertificon Z1 SecureMail 
Z1 Cert ...)
+       TODO: check
+CVE-2024-47266 (Improper limitation of a pathname to a restricted directory 
('Path Tra ...)
+       TODO: check
+CVE-2024-47265 (Improper limitation of a pathname to a restricted directory 
('Path Tra ...)
+       TODO: check
+CVE-2024-47264 (Improper limitation of a pathname to a restricted directory 
('Path Tra ...)
+       TODO: check
+CVE-2024-47006 (Uncontrolled search path for the Intel(R) RealSense D400 
Series Univer ...)
+       TODO: check
+CVE-2024-46923 (An issue was discovered in Samsung Mobile Processor Exynos 
2200, 1480, ...)
+       TODO: check
+CVE-2024-46922 (An issue was discovered in Samsung Mobile Processor Exynos 
1480 and 24 ...)
+       TODO: check
+CVE-2024-42492 (Uncontrolled search path element in some BIOS and System 
Firmware Upda ...)
+       TODO: check
+CVE-2024-42419 (Incorrect default permissions for some Intel(R) GPA and 
Intel(R) GPA F ...)
+       TODO: check
+CVE-2024-42410 (Improper input validation in some Intel(R) Graphics Drivers 
may allow  ...)
+       TODO: check
+CVE-2024-42405 (Uncontrolled search path for some Intel(R) Quartus(R) Prime 
Software b ...)
+       TODO: check
+CVE-2024-41934 (Improper access control in some Intel(R) GPA software before 
version 2 ...)
+       TODO: check
+CVE-2024-41917 (Time-of-check time-of-use race condition for some Intel(R) 
Battery Lif ...)
+       TODO: check
+CVE-2024-41168 (Use after free in some Intel(R) PROSet/Wireless WiFi and 
Killer\xe2\u2 ...)
+       TODO: check
+CVE-2024-41166 (Stack-based buffer overflow in some Intel(R) PROSet/Wireless 
WiFi and  ...)
+       TODO: check
+CVE-2024-40887 (Race condition in some Intel(R) PROSet/Wireless WiFi and 
Killer\xe2\u2 ...)
+       TODO: check
+CVE-2024-39813 (Uncontrolled search path for some EPCT software before version 
1.42.8. ...)
+       TODO: check
+CVE-2024-39805 (Insufficient verification of data authenticity in some 
Intel(R) DSA so ...)
+       TODO: check
+CVE-2024-39797 (Improper access control in some drivers for Intel(R) Ethernet 
Connecti ...)
+       TODO: check
+CVE-2024-39779 (Stack-based buffer overflow in some drivers for Intel(R) 
Ethernet Conn ...)
+       TODO: check
+CVE-2024-39606 (Improper input validation in some Intel(R) PROSet/Wireless 
WiFi and Ki ...)
+       TODO: check
+CVE-2024-39372 (Uncontrolled search path for the Intel(R) XTU software for 
Windows bef ...)
+       TODO: check
+CVE-2024-39365 (Uncontrolled search path for the FPGA Support Package for the 
Intel(R) ...)
+       TODO: check
+CVE-2024-39356 (NULL pointer dereference in some Intel(R) PROSet/Wireless WiFi 
and Kil ...)
+       TODO: check
+CVE-2024-39286 (Incorrect execution-assigned permissions in the Linux kernel 
mode driv ...)
+       TODO: check
+CVE-2024-39284 (Uncontrolled search path for some Intel(R) Advisor software 
before ver ...)
+       TODO: check
+CVE-2024-39271 (Improper restriction of communication channel to intended 
endpoints in ...)
+       TODO: check
+CVE-2024-38310 (Improper access control in some Intel(R) Graphics Driver 
software inst ...)
+       TODO: check
+CVE-2024-38307 (Improper input validation in the firmware for some Intel(R) 
AMT and In ...)
+       TODO: check
+CVE-2024-37355 (Improper access control in some Intel(R) Graphics software may 
allow a ...)
+       TODO: check
+CVE-2024-36291 (Uncontrolled search path for some Intel(R) Chipset Software 
Installati ...)
+       TODO: check
+CVE-2024-36285 (Race condition in some Intel(R) PROSet/Wireless WiFi and 
Killer\xe2\u2 ...)
+       TODO: check
+CVE-2024-36283 (Uncontrolled search path for the Intel(R) Thread Director 
Visualizer s ...)
+       TODO: check
+CVE-2024-36280 (Uncontrolled search path for some Intel(R) High Level 
Synthesis Compil ...)
+       TODO: check
+CVE-2024-36274 (Out-of-bounds write in the Intel(R) 800 Series Ethernet Driver 
for Int ...)
+       TODO: check
+CVE-2024-36262 (Race condition in some Intel(R) System Security Report and 
System Reso ...)
+       TODO: check
+CVE-2024-34521 (A directory traversal vulnerability exists in the Mavenir SCE 
Applicat ...)
+       TODO: check
+CVE-2024-34520 (An authorization bypass vulnerability exists in the Mavenir 
SCE Applic ...)
+       TODO: check
+CVE-2024-32942 (Incorrect default permissions for some Intel(R) DSA installer 
for Wind ...)
+       TODO: check
+CVE-2024-32941 (NULL pointer dereference for some Intel(R) MLC software before 
version ...)
+       TODO: check
+CVE-2024-32938 (Uncontrolled search path for some Intel(R) MPI Library for 
Windows sof ...)
+       TODO: check
+CVE-2024-31858 (Out-of-bounds write for some Intel(R) QuickAssist Technology 
software  ...)
+       TODO: check
+CVE-2024-31155 (Improper buffer restrictions in the UEFI firmware for some 
Intel(R) Pr ...)
+       TODO: check
+CVE-2024-31153 (Improper input validation for some Intel(R) QuickAssist 
Technology sof ...)
+       TODO: check
+CVE-2024-30211 (Improper access control in some Intel(R) ME driver pack 
installer engi ...)
+       TODO: check
+CVE-2024-29223 (Uncontrolled search path for some Intel(R) QuickAssist 
Technology soft ...)
+       TODO: check
+CVE-2024-26021 (Improper initialization in the firmware for some Intel(R) AMT 
and Inte ...)
+       TODO: check
+CVE-2024-25571 (Improper input validation in some Intel(R) SPS firmware before 
SPS_E5_ ...)
+       TODO: check
+CVE-2024-24852 (Uncontrolled search path in some Intel(R) Ethernet Adapter 
Complete Dr ...)
+       TODO: check
+CVE-2024-21859 (Improper buffer restrictions in the UEFI firmware for some 
Intel(R) Pr ...)
+       TODO: check
+CVE-2024-21830 (Uncontrolled search path in some Intel(R) VPL software before 
version  ...)
+       TODO: check
+CVE-2024-13770 (The Puzzles | WP Magazine / Review with Store WordPress Theme 
+ RTL th ...)
+       TODO: check
+CVE-2024-13644 (The DethemeKit For Elementor plugin for WordPress is 
vulnerable to Sto ...)
+       TODO: check
+CVE-2024-13346 (The Avada | Website Builder For WordPress & WooCommerce theme 
for Word ...)
+       TODO: check
+CVE-2024-13345 (The Avada Builder plugin for WordPress is vulnerable to 
arbitrary shor ...)
+       TODO: check
+CVE-2024-13229 (The Rank Math SEO \u2013 AI SEO Tools to Dominate SEO Rankings 
plugin  ...)
+       TODO: check
+CVE-2024-13227 (The Rank Math SEO \u2013 AI SEO Tools to Dominate SEO Rankings 
plugin  ...)
+       TODO: check
+CVE-2024-13125 (The Everest Forms  WordPress plugin before 3.0.8.1 does not 
sanitise a ...)
+       TODO: check
+CVE-2024-13121 (The Paid Membership Plugin, Ecommerce, User Registration Form, 
Login F ...)
+       TODO: check
+CVE-2024-13120 (The Paid Membership Plugin, Ecommerce, User Registration Form, 
Login F ...)
+       TODO: check
+CVE-2024-13119 (The Paid Membership Plugin, Ecommerce, User Registration Form, 
Login F ...)
+       TODO: check
+CVE-2024-12673 (An improper privilege vulnerability was reported in a BIOS 
customizati ...)
+       TODO: check
+CVE-2024-12586 (The Chalet-Montagne.com Tools WordPress plugin through 2.7.8 
does not  ...)
+       TODO: check
+CVE-2024-10763 (The Campress theme for WordPress is vulnerable to Local File 
Inclusion ...)
+       TODO: check
+CVE-2024-10083 (CWE-20: Improper Input Validation vulnerability exists that 
could caus ...)
+       TODO: check
+CVE-2023-49618 (Improper buffer restrictions in some Intel(R) System Security 
Report a ...)
+       TODO: check
+CVE-2023-49615 (Improper input validation in some Intel(R) System Security 
Report and  ...)
+       TODO: check
+CVE-2023-49603 (Race condition in some Intel(R) System Security Report and 
System Reso ...)
+       TODO: check
+CVE-2023-48366 (Race condition in some Intel(R) System Security Report and 
System Reso ...)
+       TODO: check
+CVE-2023-48267 (Improper buffer restrictions in some Intel(R) System Security 
Report a ...)
+       TODO: check
+CVE-2023-32277 (Untrusted Pointer Dereference in I/O subsystem for some 
Intel(R) QAT s ...)
+       TODO: check
+CVE-2023-31276 (Heap-based buffer overflow in BMC Firmware for the Intel(R) 
Server Boa ...)
+       TODO: check
+CVE-2023-29164 (Improper access control in BMC Firmware for the Intel(R) 
Server Board  ...)
+       TODO: check
 CVE-2025-1247
        NOT-FOR-US: Quarkus
 CVE-2025-26378 (A CWE-862 "Missing Authorization" in 
maxprofile/users/routes.lua in Q- ...)
@@ -294,62 +514,62 @@ CVE-2024-57951 (In the Linux kernel, the following 
vulnerability has been resolv
        NOTE: 
https://git.kernel.org/linus/2f8dea1692eef2b7ba6a256246ed82c365fdc686 (6.13)
 CVE-2025-26467
        - cassandra <itp> (bug #585905)
-CVE-2024-31068
+CVE-2024-31068 (Improper Finite State Machines (FSMs) in Hardware Logic for 
some Intel ...)
        - intel-microcode <unfixed> (bug #1095805)
        [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-36293
+CVE-2024-36293 (Improper access control in the EDECCSSA user leaf function for 
some In ...)
        - intel-microcode <unfixed> (bug #1095805)
        [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-28047
+CVE-2024-28047 (Improper input validation in UEFI firmware for some Intel(R) 
Processor ...)
        - intel-microcode <unfixed> (bug #1095805)
        [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-31157
+CVE-2024-31157 (Improper initialization in UEFI firmware OutOfBandXML module 
in some I ...)
        - intel-microcode <unfixed> (bug #1095805)
        [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-39279
+CVE-2024-39279 (Insufficient granularity of access control in UEFI firmware in 
some In ...)
        - intel-microcode <unfixed> (bug #1095805)
        [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-28127
+CVE-2024-28127 (Improper input validation in UEFI firmware for some Intel(R) 
Processor ...)
        - intel-microcode <unfixed> (bug #1095805)
        [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-29214
+CVE-2024-29214 (Improper input validation in UEFI firmware 
CseVariableStorageSmm for s ...)
        - intel-microcode <unfixed> (bug #1095805)
        [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-24582
+CVE-2024-24582 (Improper input validation in XmlCli feature for UEFI firmware 
for some ...)
        - intel-microcode <unfixed> (bug #1095805)
        [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2023-34440
+CVE-2023-34440 (Improper input validation in UEFI firmware for some Intel(R) 
Processor ...)
        - intel-microcode <unfixed> (bug #1095805)
        [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2023-43758
+CVE-2023-43758 (Improper input validation in UEFI firmware for some Intel(R) 
processor ...)
        - intel-microcode <unfixed> (bug #1095805)
        [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-39355
+CVE-2024-39355 (Improper handling of physical or environmental conditions in 
some Inte ...)
        - intel-microcode <unfixed> (bug #1095805)
        [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
        NOTE: 
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-37020
+CVE-2024-37020 (Sequence of processor instructions leads to unexpected 
behavior in the ...)
        - intel-microcode <unfixed> (bug #1095805)
        [bookworm] - intel-microcode <postponed> (Minor issue; wait for 
unstable exposure, can be fixed via point release)
        NOTE: 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
@@ -396,9 +616,9 @@ CVE-2024-33469 (An issue in Team Amaze Amaze File Manager 
v.3.8.5 and fixed in v
        NOT-FOR-US: Team Amaze Amaze File Manager
 CVE-2024-32037 (GeoNetwork is a catalog application to manage spatially 
referenced res ...)
        NOT-FOR-US: GeoNetwork
-CVE-2024-29172 (Dell BSAFE SSL-J contains a deadlock vulnerability. A remote 
attacker  ...)
+CVE-2024-29172 (Dell BSAFE SSL-J, versions prior to 6.6 and versions 7.0 
through 7.2,  ...)
        NOT-FOR-US: Dell
-CVE-2024-29171 (Dell BSAFE SSL-J contains an Improper certificate verification 
vulnera ...)
+CVE-2024-29171 (Dell BSAFE SSL-J, versions prior to 6.6 and versions 7.0 
through 7.2,  ...)
        NOT-FOR-US: Dell
 CVE-2024-21971 (Improper input validation in AMD Crash Defender could allow an 
attacke ...)
        NOT-FOR-US: AMD
@@ -3953,7 +4173,7 @@ CVE-2025-24166
 CVE-2025-24163 (The issue was addressed with improved checks. This issue is 
fixed in i ...)
        NOT-FOR-US: Apple
 CVE-2025-24162 (This issue was addressed through improved state management. 
This issue ...)
-       {DSA-5865-1}
+       {DSA-5865-1 DLA-4051-1}
        - webkit2gtk 2.46.6-1
        - wpewebkit 2.46.6-1
        [bookworm] - wpewebkit <ignored> (wpewebkit not covered by security 
support in Bookworm)
@@ -3966,7 +4186,7 @@ CVE-2025-24160 (The issue was addressed with improved 
checks. This issue is fixe
 CVE-2025-24159 (A validation issue was addressed with improved logic. This 
issue is fi ...)
        NOT-FOR-US: Apple
 CVE-2025-24158 (The issue was addressed with improved memory handling. This 
issue is f ...)
-       {DSA-5865-1}
+       {DSA-5865-1 DLA-4051-1}
        - webkit2gtk 2.46.6-1
        - wpewebkit 2.46.6-1
        [bookworm] - wpewebkit <ignored> (wpewebkit not covered by security 
support in Bookworm)
@@ -3983,7 +4203,7 @@ CVE-2025-24152 (The issue was addressed with improved 
memory handling. This issu
 CVE-2025-24151 (The issue was addressed with improved memory handling. This 
issue is f ...)
        NOT-FOR-US: Apple
 CVE-2025-24150 (A privacy issue was addressed with improved handling of files. 
This is ...)
-       {DSA-5865-1}
+       {DSA-5865-1 DLA-4051-1}
        - webkit2gtk 2.46.6-1
        - wpewebkit 2.46.6-1
        [bookworm] - wpewebkit <ignored> (wpewebkit not covered by security 
support in Bookworm)
@@ -3996,7 +4216,7 @@ CVE-2025-24146 (This issue was addressed with improved 
redaction of sensitive in
 CVE-2025-24145 (A privacy issue was addressed with improved private data 
redaction for ...)
        NOT-FOR-US: Apple
 CVE-2025-24143 (The issue was addressed with improved access restrictions to 
the file  ...)
-       {DSA-5865-1}
+       {DSA-5865-1 DLA-4051-1}
        - webkit2gtk 2.46.6-1
        - wpewebkit 2.46.6-1
        [bookworm] - wpewebkit <ignored> (wpewebkit not covered by security 
support in Bookworm)
@@ -228095,8 +228315,7 @@ CVE-2022-31633
        RESERVED
 CVE-2022-31632
        RESERVED
-CVE-2022-31631
-       RESERVED
+CVE-2022-31631 (In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 
8.2.* before ...)
        {DSA-5363-1 DLA-3345-1}
        - php8.2 8.2.1-1
        - php8.1 <removed>



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/964f262f1412c820ba1ffeebc1241a4b9a8634dd

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/964f262f1412c820ba1ffeebc1241a4b9a8634dd
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to