Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
101492db by security tracker role at 2025-05-03T20:12:02+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,11 +1,37 @@
-CVE-2025-37799 [vmxnet3: Fix malformed packet sizing in vmxnet3_process_xdp]
+CVE-2025-4244 (A vulnerability, which was classified as critical, was found in 
code-p ...)
+       TODO: check
+CVE-2025-4243 (A vulnerability, which was classified as critical, has been 
found in c ...)
+       TODO: check
+CVE-2025-4242 (A vulnerability classified as critical was found in PHPGurukul 
Online  ...)
+       TODO: check
+CVE-2025-4241 (A vulnerability classified as critical has been found in 
PHPGurukul Te ...)
+       TODO: check
+CVE-2025-4240 (A vulnerability was found in PCMan FTP Server 2.0.7. It has 
been rated ...)
+       TODO: check
+CVE-2025-4239 (A vulnerability was found in PCMan FTP Server 2.0.7. It has 
been decla ...)
+       TODO: check
+CVE-2025-4238 (A vulnerability was found in PCMan FTP Server 2.0.7. It has 
been class ...)
+       TODO: check
+CVE-2025-4237 (A vulnerability was found in PCMan FTP Server 2.0.7 and 
classified as  ...)
+       TODO: check
+CVE-2025-4236 (A vulnerability has been found in PCMan FTP Server 2.0.7 and 
classifie ...)
+       TODO: check
+CVE-2025-4226 (A vulnerability classified as critical has been found in 
PHPGurukul Cy ...)
+       TODO: check
+CVE-2025-1838 (IBM Cloud Pak for Business Automation   24.0.0 and 24.0.1 
through 24.0 ...)
+       TODO: check
+CVE-2025-1495 (IBM Business Automation Workflow 24.0.0 and 24.0.1 through 
24.0.1 IF00 ...)
+       TODO: check
+CVE-2024-41753 (IBM Cloud Pak for Business Automation 24.0.0 through 24.0.0 
IF004 and  ...)
+       TODO: check
+CVE-2025-37799 (In the Linux kernel, the following vulnerability has been 
resolved:  v ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/4c2227656d9003f4d77afc76f34dd81b95e4c2c4
-CVE-2024-58135 [may generate weak HMAC session secrets]
+CVE-2024-58135 (Mojolicious versions from 7.28 through 9.39 for Perl may 
generate weak ...)
        - libmojolicious-perl <unfixed> (bug #1104633)
        NOTE: https://lists.security.metacpan.org/cve-announce/msg/29241187/
        NOTE: https://github.com/mojolicious/mojo/pull/2200
-CVE-2024-58134 [uses a hard coded string, or the application's class name, as 
a HMAC session secret by default]
+CVE-2024-58134 (Mojolicious versions from 0.999922 through 9.39 for Perl uses 
a hard c ...)
        - libmojolicious-perl <unfixed>
        NOTE: https://lists.security.metacpan.org/cve-announce/msg/29247502/
        NOTE: https://github.com/mojolicious/mojo/pull/1791



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/101492dbe9bacd8461e51f37bc4dad754b453f65

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/101492dbe9bacd8461e51f37bc4dad754b453f65
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to