Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
2339d685 by security tracker role at 2025-05-09T20:11:54+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,229 +1,445 @@
-CVE-2025-37888 [net/mlx5: Fix null-ptr-deref in 
mlx5_create_{inner_,}ttc_table()]
+CVE-2025-4488 (A vulnerability was found in itsourcecode Gym Management System 
1.0. I ...)
+       TODO: check
+CVE-2025-4487 (A vulnerability was found in itsourcecode Gym Management System 
1.0. I ...)
+       TODO: check
+CVE-2025-4486 (A vulnerability was found in itsourcecode Gym Management System 
1.0 an ...)
+       TODO: check
+CVE-2025-4485 (A vulnerability has been found in itsourcecode Gym Management 
System 1 ...)
+       TODO: check
+CVE-2025-4484 (A vulnerability, which was classified as critical, was found in 
itsour ...)
+       TODO: check
+CVE-2025-4483 (A vulnerability, which was classified as critical, has been 
found in i ...)
+       TODO: check
+CVE-2025-4482 (A vulnerability classified as critical was found in Project 
Worlds Stu ...)
+       TODO: check
+CVE-2025-4481 (A vulnerability was found in SourceCodester Apartment Visitor 
Manageme ...)
+       TODO: check
+CVE-2025-4480 (A vulnerability was found in code-projects Simple College 
Management S ...)
+       TODO: check
+CVE-2025-4472 (A vulnerability was found in code-projects Departmental Store 
Manageme ...)
+       TODO: check
+CVE-2025-4471 (A vulnerability, which was classified as critical, has been 
found in c ...)
+       TODO: check
+CVE-2025-4470 (A vulnerability classified as problematic was found in 
SourceCodester  ...)
+       TODO: check
+CVE-2025-4469 (A vulnerability classified as problematic has been found in 
SourceCode ...)
+       TODO: check
+CVE-2025-4468 (A vulnerability was found in SourceCodester Online Student 
Clearance S ...)
+       TODO: check
+CVE-2025-4467 (A vulnerability was found in SourceCodester Online Student 
Clearance S ...)
+       TODO: check
+CVE-2025-4466 (A vulnerability was found in itsourcecode Gym Management System 
1.0. I ...)
+       TODO: check
+CVE-2025-4465 (A vulnerability was found in itsourcecode Gym Management System 
1.0 an ...)
+       TODO: check
+CVE-2025-4464 (A vulnerability has been found in itsourcecode Gym Management 
System 1 ...)
+       TODO: check
+CVE-2025-4463 (A vulnerability, which was classified as critical, was found in 
itsour ...)
+       TODO: check
+CVE-2025-4462 (A vulnerability, which was classified as critical, has been 
found in T ...)
+       TODO: check
+CVE-2025-4461 (A vulnerability classified as problematic was found in TOTOLINK 
N150RT ...)
+       TODO: check
+CVE-2025-4460 (A vulnerability classified as problematic has been found in 
TOTOLINK N ...)
+       TODO: check
+CVE-2025-4459 (A vulnerability was found in code-projects Patient Record 
Management S ...)
+       TODO: check
+CVE-2025-4458 (A vulnerability was found in code-projects Patient Record 
Management S ...)
+       TODO: check
+CVE-2025-4457 (A vulnerability classified as critical was found in Project 
Worlds Car ...)
+       TODO: check
+CVE-2025-4456 (A vulnerability classified as critical has been found in 
Project World ...)
+       TODO: check
+CVE-2025-4455 (A vulnerability was found in Patch My PC Home Updater up to 
5.1.3.0. I ...)
+       TODO: check
+CVE-2025-4454 (A vulnerability was found in D-Link DIR-619L 2.04B04. It has 
been decl ...)
+       TODO: check
+CVE-2025-4453 (A vulnerability was found in D-Link DIR-619L 2.04B04. It has 
been clas ...)
+       TODO: check
+CVE-2025-4452 (A vulnerability was found in D-Link DIR-619L 2.04B04 and 
classified as ...)
+       TODO: check
+CVE-2025-4451 (A vulnerability has been found in D-Link DIR-619L 2.04B04 and 
classifi ...)
+       TODO: check
+CVE-2025-4450 (A vulnerability, which was classified as critical, was found in 
D-Link ...)
+       TODO: check
+CVE-2025-4449 (A vulnerability, which was classified as critical, has been 
found in D ...)
+       TODO: check
+CVE-2025-4448 (A vulnerability classified as critical was found in D-Link 
DIR-619L 2. ...)
+       TODO: check
+CVE-2025-4446 (A vulnerability has been found in H3C GR-5400AX up to 100R008 
and clas ...)
+       TODO: check
+CVE-2025-4445 (A vulnerability classified as critical has been found in D-Link 
DIR-60 ...)
+       TODO: check
+CVE-2025-4443 (A vulnerability was found in D-Link DIR-605L 2.13B01. It has 
been rate ...)
+       TODO: check
+CVE-2025-4442 (A vulnerability was found in D-Link DIR-605L 2.13B01. It has 
been decl ...)
+       TODO: check
+CVE-2025-4441 (A vulnerability was found in D-Link DIR-605L 2.13B01. It has 
been clas ...)
+       TODO: check
+CVE-2025-4440 (A vulnerability was found in H3C GR-1800AX up to 100R008 and 
classifie ...)
+       TODO: check
+CVE-2025-4434 (The Remote Images Grabber plugin for WordPress is vulnerable to 
Reflec ...)
+       TODO: check
+CVE-2025-4403 (The Drag and Drop Multiple File Upload for WooCommerce plugin 
for Word ...)
+       TODO: check
+CVE-2025-4382 (A flaw was found in systems utilizing LUKS-encrypted disks with 
GRUB c ...)
+       TODO: check
+CVE-2025-4377 (Improper Limitation of a Pathname caused a Path Traversal 
vulnerabilit ...)
+       TODO: check
+CVE-2025-4376 (Improper Input Validation vulnerability in Sparx Systems Pro 
Cloud Ser ...)
+       TODO: check
+CVE-2025-4375 (Cross-Site Request Forgery (CSRF) vulnerability in Sparx 
Systems Pro C ...)
+       TODO: check
+CVE-2025-4206 (The WordPress CRM, Email & Marketing Automation for WordPress | 
Award  ...)
+       TODO: check
+CVE-2025-4107
+       REJECTED
+CVE-2025-47737 (lib.rs in the trailer crate through 0.1.2 for Rust mishandles 
allocati ...)
+       TODO: check
+CVE-2025-47736 (dialect/mod.rs in the libsql-sqlite3-parser crate through 
0.13.0 befor ...)
+       TODO: check
+CVE-2025-47735 (inner::drop in inner.rs in the wgp crate through 0.2.0 for 
Rust lacks  ...)
+       TODO: check
+CVE-2025-47733 (Server-Side Request Forgery (SSRF) in Microsoft Power Apps 
allows an u ...)
+       TODO: check
+CVE-2025-47732 (Microsoft Dataverse Remote Code Execution Vulnerability)
+       TODO: check
+CVE-2025-46392 (Uncontrolled Resource Consumption vulnerability in Apache 
Commons Conf ...)
+       TODO: check
+CVE-2025-46193 (SourceCodester Client Database Management System 1.0 is 
vulnerable to  ...)
+       TODO: check
+CVE-2025-46192 (SourceCodester Client Database Management System 1.0 is 
vulnerable to  ...)
+       TODO: check
+CVE-2025-46191 (Arbitrary File Upload in user_payment_update.php in 
SourceCodester Cli ...)
+       TODO: check
+CVE-2025-46190 (SourceCodester Client Database Management System 1.0 is 
vulnerable to  ...)
+       TODO: check
+CVE-2025-46189 (SourceCodester Client Database Management System 1.0 is 
vulnerable to  ...)
+       TODO: check
+CVE-2025-46188 (SourceCodester Client Database Management System 1.0 is 
vulnerable to  ...)
+       TODO: check
+CVE-2025-45887 (Yifang CMS v2.0.2 is vulnerable to Server-Side Request Forgery 
(SSRF)  ...)
+       TODO: check
+CVE-2025-45885 (PHPGURUKUL Vehicle Parking Management System v1.13 is 
vulnerable to SQ ...)
+       TODO: check
+CVE-2025-45513 (Tenda FH451 V1.0.0.9 has a stack overflow vulnerability in the 
functio ...)
+       TODO: check
+CVE-2025-3949 (The Website Builder by SeedProd \u2014 Theme Builder, Landing 
Page Bui ...)
+       TODO: check
+CVE-2025-3897 (The EUCookieLaw plugin for WordPress is vulnerable to Arbitrary 
File R ...)
+       TODO: check
+CVE-2025-3811 (The WPBookit plugin for WordPress is vulnerable to privilege 
escalatio ...)
+       TODO: check
+CVE-2025-3810 (The WPBookit plugin for WordPress is vulnerable to privilege 
escalatio ...)
+       TODO: check
+CVE-2025-3714 (The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer 
Overflow  ...)
+       TODO: check
+CVE-2025-3713 (The LCD KVM over IP Switch CL5708IM has a Heap-based Buffer 
Overflow v ...)
+       TODO: check
+CVE-2025-3712 (The LCD KVM over IP Switch CL5708IM has a Heap-based Buffer 
Overflow v ...)
+       TODO: check
+CVE-2025-3711 (The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer 
Overflow  ...)
+       TODO: check
+CVE-2025-3710 (The LCD KVM over IP Switch CL5708IM has a Stack-based Buffer 
Overflow  ...)
+       TODO: check
+CVE-2025-3605 (The Frontend Login and Registration Blocks plugin for WordPress 
is vul ...)
+       TODO: check
+CVE-2025-3463 ("This issue is limited to motherboards and does not affect 
laptops, de ...)
+       TODO: check
+CVE-2025-3462 ("This issue is limited to motherboards and does not affect 
laptops, de ...)
+       TODO: check
+CVE-2025-3455 (The 1 Click WordPress Migration Plugin \u2013 100% FREE for a 
limited  ...)
+       TODO: check
+CVE-2025-37889 (In the Linux kernel, the following vulnerability has been 
resolved:  P ...)
+       TODO: check
+CVE-2025-33072 (Improper access control in Azure allows an unauthorized 
attacker to di ...)
+       TODO: check
+CVE-2025-31946 (Pixmeo OsiriX MD  is vulnerable to a local use after free 
scenario, wh ...)
+       TODO: check
+CVE-2025-2253 (The IMITHEMES Listing plugin is vulnerable to privilege 
escalation via ...)
+       TODO: check
+CVE-2025-29972 (Server-Side Request Forgery (SSRF) in Azure allows an 
authorized attac ...)
+       TODO: check
+CVE-2025-29827 (Improper Authorization in Azure Automation allows an 
authorized attack ...)
+       TODO: check
+CVE-2025-29813 (An elevation of privilege vulnerability exists when Visual 
Studio impr ...)
+       TODO: check
+CVE-2025-29509 (Jan v0.5.14 and before is vulnerable to remote code execution 
(RCE) wh ...)
+       TODO: check
+CVE-2025-28203 (Victure RX1800 EN_V1.0.0_r12_110933 was discovered to contain 
a comman ...)
+       TODO: check
+CVE-2025-28202 (Incorrect access control in Victure RX1800 
EN_V1.0.0_r12_110933 allows ...)
+       TODO: check
+CVE-2025-28201 (An issue in Victure RX1800 EN_V1.0.0_r12_110933 allows 
physically prox ...)
+       TODO: check
+CVE-2025-28200 (Victure RX1800 EN_V1.0.0_r12_110933 was discovered to utilize 
a weak d ...)
+       TODO: check
+CVE-2025-28074 (phpList prior to 3.6.3 is vulnerable to Cross-Site Scripting 
(XSS) due ...)
+       TODO: check
+CVE-2025-27720 (The Pixmeo Osirix MD Web Portal sends credential information 
without e ...)
+       TODO: check
+CVE-2025-27578 (Pixmeo OsiriX MD is vulnerable to a use after free scenario, 
which cou ...)
+       TODO: check
+CVE-2025-1993 (IBM App Connect Enterprise Certified Container 8.1, 8.2, 9.0, 
9.1, 9.2 ...)
+       TODO: check
+CVE-2025-1331 (IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 
11.1could  ...)
+       TODO: check
+CVE-2025-1330 (IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 
11.1 could ...)
+       TODO: check
+CVE-2025-1329 (IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 
11.1 could ...)
+       TODO: check
+CVE-2025-1087 (Kong Insomnia Desktop Application before 11.0.2 contains a 
template in ...)
+       TODO: check
+CVE-2024-9524 (Link Following Local Privilege Escalation Vulnerability in 
System Spee ...)
+       TODO: check
+CVE-2024-13962 (Link Following Local Privilege Escalation Vulnerability in 
TuneupSvc i ...)
+       TODO: check
+CVE-2024-13961 (Link Following Local Privilege Escalation Vulnerability in 
TuneupSvc i ...)
+       TODO: check
+CVE-2024-13960 (Link Following Local Privilege Escalation Vulnerability in 
TuneUp Serv ...)
+       TODO: check
+CVE-2024-13959 (Link Following Local Privilege Escalation Vulnerability in 
TuneupSvc.e ...)
+       TODO: check
+CVE-2024-13944 (Link Following Local Privilege Escalation Vulnerability in 
NortonUtili ...)
+       TODO: check
+CVE-2024-13759 (Local Privilege Escalation in Avira.Spotlight.Service.exe in 
Avira Pri ...)
+       TODO: check
+CVE-2024-12442 (EnerSys AMPA versions 24.04 through 24.16, inclusive, are 
vulnerable t ...)
+       TODO: check
+CVE-2024-11861 (EnerSys AMPA 22.09 and prior versions are vulnerable to 
command inject ...)
+       TODO: check
+CVE-2024-11617 (The Envolve Plugin plugin for WordPress is vulnerable to 
arbitrary fil ...)
+       TODO: check
+CVE-2023-31585 (Grocery-CMS-PHP-Restful-API v1.3 is vulnerable to File Upload 
via /adm ...)
+       TODO: check
+CVE-2025-37888 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux 6.12.27-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/91037037ee3d611ce17f39d75f79c7de394b122a (6.15-rc4)
-CVE-2025-37887 [pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result]
+CVE-2025-37887 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
        - linux 6.12.27-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/2567daad69cd1107fc0ec29b1615f110d7cf7385 (6.15-rc4)
-CVE-2025-37886 [pds_core: make wait_context part of q_info]
+CVE-2025-37886 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
        - linux 6.12.27-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/3f77c3dfffc7063428b100c4945ca2a7a8680380 (6.15-rc4)
-CVE-2025-37885 [KVM: x86: Reset IRTE to host control if *new* route isn't 
postable]
+CVE-2025-37885 (In the Linux kernel, the following vulnerability has been 
resolved:  K ...)
        - linux 6.12.27-1
        [bookworm] - linux 6.1.137-1
        NOTE: 
https://git.kernel.org/linus/9bcac97dc42d2f4da8229d18feb0fe2b1ce523a2 (6.15-rc4)
-CVE-2025-37884 [bpf: Fix deadlock between rcu_tasks_trace and event_mutex.]
+CVE-2025-37884 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
        - linux 6.12.27-1
        [bookworm] - linux 6.1.137-1
        NOTE: 
https://git.kernel.org/linus/4580f4e0ebdf8dc8d506ae926b88510395a0c1d1 (6.15-rc1)
-CVE-2025-37883 [s390/sclp: Add check for get_zeroed_page()]
+CVE-2025-37883 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
        - linux 6.12.27-1
        [bookworm] - linux 6.1.137-1
        NOTE: 
https://git.kernel.org/linus/3db42c75a921854a99db0a2775814fef97415bac (6.15-rc1)
-CVE-2025-37882 [usb: xhci: Fix isochronous Ring Underrun/Overrun event 
handling]
+CVE-2025-37882 (In the Linux kernel, the following vulnerability has been 
resolved:  u ...)
        - linux 6.12.27-1
        NOTE: 
https://git.kernel.org/linus/906dec15b9b321b546fd31a3c99ffc13724c7af4 (6.15-rc1)
-CVE-2025-37881 [usb: gadget: aspeed: Add NULL pointer check in 
ast_vhub_init_dev()]
+CVE-2025-37881 (In the Linux kernel, the following vulnerability has been 
resolved:  u ...)
        - linux 6.12.27-1
        [bookworm] - linux 6.1.137-1
        NOTE: 
https://git.kernel.org/linus/8c75f3e6a433d92084ad4e78b029ae680865420f (6.15-rc1)
-CVE-2025-37880 [um: work around sched_yield not yielding in time-travel mode]
+CVE-2025-37880 (In the Linux kernel, the following vulnerability has been 
resolved:  u ...)
        - linux 6.12.27-1
        NOTE: 
https://git.kernel.org/linus/887c5c12e80c8424bd471122d2e8b6b462e12874 (6.15-rc1)
-CVE-2025-37879 [9p/net: fix improper handling of bogus negative read/write 
replies]
+CVE-2025-37879 (In the Linux kernel, the following vulnerability has been 
resolved:  9 ...)
        - linux 6.12.27-1
        [bookworm] - linux 6.1.137-1
        NOTE: 
https://git.kernel.org/linus/d0259a856afca31d699b706ed5e2adf11086c73b (6.15-rc1)
-CVE-2025-37878 [perf/core: Fix WARN_ON(!ctx) in __free_event() for partial 
init]
+CVE-2025-37878 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
        - linux 6.12.27-1
        NOTE: 
https://git.kernel.org/linus/0ba3a4ab76fd3367b9cb680cad70182c896c795c (6.15-rc2)
-CVE-2025-37877 [iommu: Clear iommu-dma ops on cleanup]
+CVE-2025-37877 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
        - linux 6.12.27-1
        NOTE: 
https://git.kernel.org/linus/280e5a30100578106a4305ce0118e0aa9b866f12 (6.15-rc2)
-CVE-2025-37876 [netfs: Only create /proc/fs/netfs with CONFIG_PROC_FS]
+CVE-2025-37876 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux 6.12.27-1
        NOTE: 
https://git.kernel.org/linus/40cb48eba3b4b79e110c1a35d33a48cac54507a2 (6.15-rc3)
-CVE-2025-37875 [igc: fix PTM cycle trigger logic]
+CVE-2025-37875 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/8e404ad95d2c10c261e2ef6992c7c12dde03df0e (6.15-rc3)
-CVE-2025-37874 [net: ngbe: fix memory leak in ngbe_probe() error path]
+CVE-2025-37874 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux 6.12.25-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/88fa80021b77732bc98f73fb69d69c7cc37b9f0d (6.15-rc3)
-CVE-2025-37873 [eth: bnxt: fix missing ring index trim on error path]
+CVE-2025-37873 (In the Linux kernel, the following vulnerability has been 
resolved:  e ...)
        - linux 6.12.25-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/12f2d033fae957d84c2c0ce604d2a077e61fa2c0 (6.15-rc3)
-CVE-2025-37872 [net: txgbe: fix memory leak in txgbe_probe() error path]
+CVE-2025-37872 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux 6.12.25-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/b2727326d0a53709380aa147018085d71a6d4843 (6.15-rc3)
-CVE-2025-37871 [nfsd: decrease sc_count directly if fail to queue dl_recall]
+CVE-2025-37871 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        NOTE: 
https://git.kernel.org/linus/a1d14d931bf700c1025db8c46d6731aa5cf440f9 (6.15-rc3)
-CVE-2025-37870 [drm/amd/display: prevent hang on link training fail]
+CVE-2025-37870 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
        - linux 6.12.25-1
        NOTE: 
https://git.kernel.org/linus/8058061ed9d6bc259d1e678607b07d259342c08f (6.15-rc1)
-CVE-2025-37869 [drm/xe: Use local fence in error path of xe_migrate_clear]
+CVE-2025-37869 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
        - linux 6.12.25-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/20659d3150f1a2a258a173fe011013178ff2a197 (6.15-rc2)
-CVE-2025-37868 [drm/xe/userptr: fix notifier vs folio deadlock]
+CVE-2025-37868 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
        - linux 6.12.25-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/2577b202458cddff85cc154b1fe7f313e0d1f418 (6.15-rc3)
-CVE-2025-37867 [RDMA/core: Silence oversized kvmalloc() warning]
+CVE-2025-37867 (In the Linux kernel, the following vulnerability has been 
resolved:  R ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        NOTE: 
https://git.kernel.org/linus/9a0e6f15029e1a8a21e40f06fd05aa52b7f063de (6.15-rc3)
-CVE-2025-37866 [mlxbf-bootctl: use sysfs_emit_at() in 
secure_boot_fuse_state_show()]
+CVE-2025-37866 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
        - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/b129005ddfc0e6daf04a6d3b928a9e474f9b3918 (6.15-rc3)
-CVE-2025-37865 [net: dsa: mv88e6xxx: fix -ENOENT when deleting VLANs and MST 
is unsupported]
+CVE-2025-37865 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/ea08dfc35f83cfc73493c52f63ae4f2e29edfe8d (6.15-rc3)
-CVE-2025-37864 [net: dsa: clean up FDB, MDB, VLAN entries on unbind]
+CVE-2025-37864 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux 6.12.25-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/7afb5fb42d4950f33af2732b8147c552659f79b7 (6.15-rc3)
-CVE-2025-37863 [ovl: don't allow datadir only]
+CVE-2025-37863 (In the Linux kernel, the following vulnerability has been 
resolved:  o ...)
        - linux 6.12.25-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/eb3a04a8516ee9b5174379306f94279fc90424c4 (6.15-rc3)
-CVE-2025-37862 [HID: pidff: Fix null pointer dereference in pidff_find_fields]
+CVE-2025-37862 (In the Linux kernel, the following vulnerability has been 
resolved:  H ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        NOTE: 
https://git.kernel.org/linus/22a05462c3d0eee15154faf8d13c49e6295270a5 (6.15-rc1)
-CVE-2025-37861 [scsi: mpi3mr: Synchronous access b/w reset and tm thread for 
reply queue]
+CVE-2025-37861 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
        - linux 6.12.25-1
        NOTE: 
https://git.kernel.org/linus/f195fc060c738d303a21fae146dbf85e1595fb4c (6.15-rc1)
-CVE-2025-37859 [page_pool: avoid infinite loop to schedule delayed worker]
+CVE-2025-37859 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        NOTE: 
https://git.kernel.org/linus/43130d02baa137033c25297aaae95fd0edc41654 (6.15-rc1)
-CVE-2025-37858 [fs/jfs: Prevent integer overflow in AG size calculation]
+CVE-2025-37858 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        NOTE: 
https://git.kernel.org/linus/7fcbf789629cdb9fbf4e2172ce31136cfed11e5e (6.15-rc1)
-CVE-2025-37857 [scsi: st: Fix array overflow in st_setup()]
+CVE-2025-37857 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        NOTE: 
https://git.kernel.org/linus/a018d1cf990d0c339fe0e29b762ea5dc10567d67 (6.15-rc1)
-CVE-2025-37856 [btrfs: harden block_group::bg_list against list_del() races]
+CVE-2025-37856 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
        - linux 6.12.25-1
        NOTE: 
https://git.kernel.org/linus/7511e29cf1355b2c47d0effb39e463119913e2f6 (6.15-rc1)
-CVE-2025-37855 [drm/amd/display: Guard Possible Null Pointer Dereference]
+CVE-2025-37855 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/c87d202692de34ee71d1fd4679a549a29095658a (6.15-rc1)
-CVE-2025-37854 [drm/amdkfd: Fix mode1 reset crash issue]
+CVE-2025-37854 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        NOTE: 
https://git.kernel.org/linus/f0b4440cdc1807bb6ec3dce0d6de81170803569b (6.15-rc1)
-CVE-2025-37853 [drm/amdkfd: debugfs hang_hws skip GPU with MES]
+CVE-2025-37853 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
        - linux 6.12.25-1
        NOTE: 
https://git.kernel.org/linus/fe9d0061c413f8fb8c529b18b592b04170850ded (6.15-rc1)
-CVE-2025-37852 [drm/amdgpu: handle amdgpu_cgs_create_device() errors in 
amd_powerplay_create()]
+CVE-2025-37852 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        NOTE: 
https://git.kernel.org/linus/1435e895d4fc967d64e9f5bf81e992ac32f5ac76 (6.15-rc1)
-CVE-2025-37851 [fbdev: omapfb: Add 'plane' value check]
+CVE-2025-37851 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        NOTE: 
https://git.kernel.org/linus/3e411827f31db7f938a30a3c7a7599839401ec30 (6.15-rc1)
-CVE-2025-37850 [pwm: mediatek: Prevent divide-by-zero in pwm_mediatek_config()]
+CVE-2025-37850 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        NOTE: 
https://git.kernel.org/linus/7ca59947b5fcf94e7ea4029d1bd0f7c41500a161 (6.15-rc2)
-CVE-2025-37849 [KVM: arm64: Tear down vGIC on failed vCPU creation]
+CVE-2025-37849 (In the Linux kernel, the following vulnerability has been 
resolved:  K ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        NOTE: 
https://git.kernel.org/linus/250f25367b58d8c65a1b060a2dda037eea09a672 (6.15-rc1)
-CVE-2025-37848 [accel/ivpu: Fix PM related deadlocks in MS IOCTLs]
+CVE-2025-37848 (In the Linux kernel, the following vulnerability has been 
resolved:  a ...)
        - linux 6.12.25-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/d893da85e06edf54737bb80648bb58ba8fd56d9f (6.15-rc2)
-CVE-2025-37847 [accel/ivpu: Fix deadlock in ivpu_ms_cleanup()]
+CVE-2025-37847 (In the Linux kernel, the following vulnerability has been 
resolved:  a ...)
        - linux 6.12.25-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/9a6f56762d23a1f3af15e67901493c927caaf882 (6.15-rc2)
-CVE-2025-37846 [arm64: mops: Do not dereference src reg for a set operation]
+CVE-2025-37846 (In the Linux kernel, the following vulnerability has been 
resolved:  a ...)
        - linux 6.12.25-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/a13bfa4fe0d6949cea14718df2d1fe84c38cd113 (6.15-rc1)
-CVE-2025-37845 [tracing: fprobe events: Fix possible UAF on modules]
+CVE-2025-37845 (In the Linux kernel, the following vulnerability has been 
resolved:  t ...)
        - linux 6.12.25-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/dd941507a9486252d6fcf11814387666792020f3 (6.15-rc2)
-CVE-2025-37844 [cifs: avoid NULL pointer dereference in dbg call]
+CVE-2025-37844 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        NOTE: 
https://git.kernel.org/linus/b4885bd5935bb26f0a414ad55679a372e53f9b9b (6.15-rc1)
-CVE-2025-37843 [PCI: pciehp: Avoid unnecessary device replacement check]
+CVE-2025-37843 (In the Linux kernel, the following vulnerability has been 
resolved:  P ...)
        - linux 6.12.25-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/e3260237aaadc9799107ccb940c6688195c4518d (6.15-rc1)
-CVE-2025-37842 [spi: fsl-qspi: use devm function instead of driver remove]
+CVE-2025-37842 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/40369bfe717e96e26650eeecfa5a6363563df6e4 (6.15-rc1)
-CVE-2025-37841 [pm: cpupower: bench: Prevent NULL dereference on malloc 
failure]
+CVE-2025-37841 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        NOTE: 
https://git.kernel.org/linus/208baa3ec9043a664d9acfb8174b332e6b17fb69 (6.15-rc1)
-CVE-2025-37840 [mtd: rawnand: brcmnand: fix PM resume warning]
+CVE-2025-37840 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        NOTE: 
https://git.kernel.org/linus/ddc210cf8b8a8be68051ad958bf3e2cef6b681c2 (6.15-rc1)
-CVE-2025-37839 [jbd2: remove wrong sb->s_sequence check]
+CVE-2025-37839 (In the Linux kernel, the following vulnerability has been 
resolved:  j ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.135-1
        NOTE: 
https://git.kernel.org/linus/e6eff39dd0fe4190c6146069cc16d160e71d1148 (6.15-rc1)
-CVE-2025-37837 [iommu/tegra241-cmdqv: Fix warnings due to dmam_free_coherent()]
+CVE-2025-37837 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
        - linux 6.12.25-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/767e22001dfce64cc03b7def1562338591ab6031 (6.15-rc2)
-CVE-2025-37836 [PCI: Fix reference leak in pci_register_host_bridge()]
+CVE-2025-37836 (In the Linux kernel, the following vulnerability has been 
resolved:  P ...)
        - linux 6.12.25-1
        [bookworm] - linux 6.1.137-1
        NOTE: 
https://git.kernel.org/linus/804443c1f27883926de94c849d91f5b7d7d696e9 (6.15-rc1)
-CVE-2025-37835 [smb: client: Fix netns refcount imbalance causing leaks and 
use-after-free]
+CVE-2025-37835 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
        - linux 6.12.25-1
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/4e7f1644f2ac6d01dc584f6301c3b1d5aac4eaef (6.15-rc1)
-CVE-2025-4432
+CVE-2025-4432 (A flaw was found in Rust's Ring package. A panic may be 
triggered when ...)
        - rust-ring 0.17.14-1
        [bookworm] - rust-ring <no-dsa> (Minor issue)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2350655
        NOTE: Fixed by: 
https://github.com/briansmith/ring/commit/ec2d3cf1d91f148c84e4806b4f0b3c98f6df3b38
        NOTE: https://github.com/briansmith/ring/pull/2447
        NOTE: https://rustsec.org/advisories/RUSTSEC-2025-0009.html
-CVE-2025-4475 (Issue in my product in blah version x on y allows bad person to 
break)
+CVE-2025-4475
+       REJECTED
        TODO: check
 CVE-2025-4208 (The NEX-Forms \u2013 Ultimate Form Builder \u2013 Contact forms 
and mu ...)
        NOT-FOR-US: WordPress plugin
 CVE-2025-4207 (Buffer over-read in PostgreSQL GB18030 encoding validation 
allows a da ...)
+       {DLA-4159-1}
        - postgresql-17 17.5-1
        - postgresql-15 <removed>
        [bookworm] - postgresql-15 <no-dsa> (Minor issue)
@@ -339,6 +555,7 @@ CVE-2024-8100 (On affected versions of the Arista 
CloudVision Portal (CVP on-pre
 CVE-2024-6648 (Absolute Path Traversal vulnerability in AP Page Builder 
versions prio ...)
        NOT-FOR-US: AP Page Builder
 CVE-2024-13009 (In Eclipse Jetty versions 9.4.0 to 9.4.56 a buffer can be 
incorrectly  ...)
+       {DSA-5894-1 DLA-4106-1}
        - jetty12 <not-affected> (Only affects 9.x)
        - jetty9 9.4.57-1
        - jetty <not-affected> (Only affects 9.x)
@@ -565,11 +782,11 @@ CVE-2025-XXXX [ZDI-CAN-26752]
        - gimp <unfixed> (bug #1105005)
        NOTE: https://gitlab.gnome.org/GNOME/gimp/-/issues/13910
        NOTE: Fixed by: 
https://gitlab.gnome.org/GNOME/gimp/-/commit/c855d1df60ebaf5ef8d02807d448eb088f147a2b
-CVE-2025-1278
+CVE-2025-1278 (An issue has been discovered in GitLab CE/EE affecting all 
versions fr ...)
        - gitlab <unfixed>
-CVE-2024-8973
+CVE-2024-8973 (An issue has been discovered in GitLab CE/EE affecting all 
versions st ...)
        - gitlab <unfixed>
-CVE-2025-0549
+CVE-2025-0549 (An issue has been discovered in GitLab CE/EE affecting all 
versions st ...)
        - gitlab <unfixed>
 CVE-2025-4390
        - slurm-wlm <unfixed> (bug #1104929)
@@ -2620,7 +2837,8 @@ CVE-2025-32885 (An issue was discovered on goTenna v1 
devices with app 5.5.3 and
        NOT-FOR-US: goTenna v1 devices
 CVE-2025-32884 (An issue was discovered on goTenna Mesh devices with app 5.5.3 
and fir ...)
        NOT-FOR-US: goTenna Mesh devices
-CVE-2025-32883 (An issue was discovered on goTenna Mesh devices with app 5.5.3 
and fir ...)
+CVE-2025-32883
+       REJECTED
        NOT-FOR-US: goTenna Mesh devices
 CVE-2025-32882 (An issue was discovered on goTenna v1 devices with app 5.5.3 
and firmw ...)
        NOT-FOR-US: goTenna v1 devices
@@ -4049,7 +4267,7 @@ CVE-2025-3911 (Recording of environment variables, 
configured for running contai
 CVE-2025-3910 (A flaw was found in Keycloak. The org.keycloak.authorization 
package m ...)
        - keycloak <itp> (bug #1088287)
 CVE-2025-3891 (A flaw was found in the mod_auth_openidc module for Apache 
httpd. This ...)
-       {DLA-4155-1}
+       {DSA-5917-1 DLA-4155-1}
        - libapache2-mod-auth-openidc 2.4.14.2-1 (bug #1104484)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2361633
        NOTE: 
https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-x7cf-8wgv-5j86
@@ -4654,7 +4872,8 @@ CVE-2025-32982 (NETSCOUT nGeniusONE before 6.4.0 b2350 
has a Broken Authorizatio
        NOT-FOR-US: NETSCOUT
 CVE-2025-32981 (NETSCOUT nGeniusONE before 6.4.0 b2350 allows local users to 
leverage  ...)
        NOT-FOR-US: NETSCOUT
-CVE-2025-32980 (NETSCOUT nGeniusONE before 6.4.0 b2350 has a Weak Sudo 
Configuration.)
+CVE-2025-32980
+       REJECTED
        NOT-FOR-US: NETSCOUT
 CVE-2025-32979 (NETSCOUT nGeniusONE before 6.4.0 b2350 allows Arbitrary File 
Creation  ...)
        NOT-FOR-US: NETSCOUT
@@ -8814,7 +9033,7 @@ CVE-2024-13338 (The Clearfy Cache \u2013 WordPress 
optimization plugin, Minify H
        NOT-FOR-US: WordPress plugin
 CVE-2024-13337 (The Clearfy Cache \u2013 WordPress optimization plugin, Minify 
HTML, C ...)
        NOT-FOR-US: WordPress plugin
-CVE-2025-3528
+CVE-2025-3528 (A flaw was found in the Mirror Registry. The quay-app container 
shippe ...)
        NOT-FOR-US: quay-app container for the Mirror Registry application (Red 
Hat)
 CVE-2025-3439 (The Everest Forms \u2013 Contact Form, Quiz, Survey, Newsletter 
& Paym ...)
        NOT-FOR-US: WordPress plugin
@@ -18290,6 +18509,7 @@ CVE-2024-21760 (An improper control of generation of 
code ('Code Injection') vul
 CVE-2023-47539 (An improper access control vulnerability in FortiMail version 
7.4.0 co ...)
        NOT-FOR-US: Fortinet
 CVE-2025-0755 (The various bson_appendfunctions in the MongoDB C driver 
library may b ...)
+       {DLA-4160-1}
        - libbson-xs-perl <removed>
        [bookworm] - libbson-xs-perl <no-dsa> (Minor issue)
        - mongo-c-driver 1.27.5-1
@@ -18833,7 +19053,8 @@ CVE-2025-1657 (The Directory Listings WordPress plugin 
\u2013 uListing plugin fo
        NOT-FOR-US: WordPress plugin
 CVE-2025-1653 (The Directory Listings WordPress plugin \u2013 uListing plugin 
for Wor ...)
        NOT-FOR-US: WordPress plugin
-CVE-2024-13847 (The Portfolio and Projects plugin for WordPress is vulnerable 
to Store ...)
+CVE-2024-13847
+       REJECTED
        NOT-FOR-US: WordPress plugin
 CVE-2024-13497 (The WordPress form builder plugin for contact forms, surveys 
and quizz ...)
        NOT-FOR-US: WordPress plugin
@@ -19752,6 +19973,7 @@ CVE-2025-27789 (Babel is a compiler for writing next 
generation JavaScript. When
        NOTE: https://github.com/babel/babel/pull/17173
        NOTE: 
https://github.com/babel/babel/security/advisories/GHSA-968p-4wvh-cqc8
 CVE-2025-27773 (The SimpleSAMLphp SAML2 library is a PHP library for SAML2 
related fun ...)
+       {DLA-4161-1}
        - simplesamlphp <unfixed> (bug #1100595)
        NOTE: 
https://github.com/simplesamlphp/saml2/security/advisories/GHSA-46r4-f8gj-xg56
        NOTE: 
https://github.com/simplesamlphp/saml2/commit/7867d6099dc7f31bed1ea10e5bea159c5623d2a0
@@ -90489,6 +90711,7 @@ CVE-2024-6463
 CVE-2024-6461
        REJECTED
 CVE-2024-6383 (The bson_string_append function in MongoDB C Driver may be 
vulnerable  ...)
+       {DLA-4160-1}
        - libbson-xs-perl <removed>
        [bookworm] - libbson-xs-perl <no-dsa> (Minor issue)
        - mongo-c-driver 1.27.1-1
@@ -90733,6 +90956,7 @@ CVE-2024-6438 (A vulnerability has been found in Hitout 
Carsale 1.0 and classifi
 CVE-2024-6382 (Incorrect handling of certain string inputs may result in 
MongoDB Rust ...)
        NOT-FOR-US: MongoDB rust driver
 CVE-2024-6381 (The bson_strfreev function in the MongoDB C driver library may 
be susc ...)
+       {DLA-4160-1}
        - libbson-xs-perl <removed>
        [bookworm] - libbson-xs-perl <no-dsa> (Minor issue)
        - mongo-c-driver 1.26.2-1
@@ -201181,6 +201405,7 @@ CVE-2023-0439 (The NEX-Forms WordPress plugin before 
8.4.4 does not escape its f
 CVE-2023-0438 (Cross-Site Request Forgery (CSRF) in GitHub repository 
modoboa/modoboa ...)
        NOT-FOR-US: Modoboa
 CVE-2023-0437 (When calling bson_utf8_validateon some inputs a loop with an 
exit cond ...)
+       {DLA-4160-1}
        - libbson-xs-perl <removed>
        [bookworm] - libbson-xs-perl <no-dsa> (Minor issue)
        - mongo-c-driver 1.25.0-1
@@ -297250,7 +297475,7 @@ CVE-2022-21548 (Vulnerability in the Oracle WebLogic 
Server product of Oracle Fu
        NOT-FOR-US: Oracle
 CVE-2022-21547 (Vulnerability in the MySQL Server product of Oracle MySQL 
(component:  ...)
        - mysql-8.0 8.0.30-1 (bug #1015789)
-CVE-2022-21546 (In newer version of the SBC specs, we have a NDOB bit that 
indicates t ...)
+CVE-2022-21546 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
        - linux 5.19.6-1
        NOTE: 
https://git.kernel.org/linus/ccd3f449052449a917a3e577d8ba0368f43b8f29 (5.19-rc7)
 CVE-2022-21545 (Vulnerability in the Oracle iRecruitment product of Oracle 
E-Business  ...)
@@ -508321,6 +508546,7 @@ CVE-2018-16792 (SolarWinds SFTP/SCP server through 
2018-09-10 is vulnerable to X
 CVE-2018-16791 (In SolarWinds SFTP/SCP Server through 2018-09-10, the 
configuration fi ...)
        NOT-FOR-US: SolarWinds SFTP/SCP server
 CVE-2018-16790 (_bson_iter_next_internal in bson-iter.c in libbson 1.12.0, as 
used in  ...)
+       {DLA-4160-1}
        - libbson <removed> (bug #913896)
        [stretch] - libbson <no-dsa> (Minor issue)
        - libbson-xs-perl <removed>
@@ -564442,6 +564668,7 @@ CVE-2017-14228 (In Netwide Assembler (NASM) 2.14rc0, 
there is an illegal address
        NOTE: https://bugzilla.nasm.us/show_bug.cgi?id=3392423
        NOTE: Crash in CLI tool, no securiy impact
 CVE-2017-14227 (In MongoDB libbson 1.7.0, the bson_iter_codewscope function in 
bson-it ...)
+       {DLA-4160-1}
        - libbson 1.8.0-1 (bug #874754)
        [stretch] - libbson <no-dsa> (Minor issue)
        - libbson-xs-perl <removed>



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2339d68548c73c167b8d4ab105d862ef491c1faf

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2339d68548c73c167b8d4ab105d862ef491c1faf
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to