Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
1dae8f7b by security tracker role at 2025-07-28T20:12:10+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,105 +1,233 @@
-CVE-2025-38497 [usb: gadget: configfs: Fix OOB read on empty string write]
+CVE-2025-8283 (A vulnerability was found in the netavark package, a network 
stack for ...)
+       TODO: check
+CVE-2025-8279 (Insufficient input validation within GitLab Language Server 
7.6.0 and  ...)
+       TODO: check
+CVE-2025-8275 (A vulnerability, which was classified as problematic, has been 
found i ...)
+       TODO: check
+CVE-2025-8274 (A vulnerability classified as critical was found in Campcodes 
Online R ...)
+       TODO: check
+CVE-2025-8273 (A vulnerability classified as critical has been found in 
code-projects ...)
+       TODO: check
+CVE-2025-8272 (A vulnerability was found in code-projects Exam Form Submission 
1.0. I ...)
+       TODO: check
+CVE-2025-8271 (A vulnerability was found in code-projects Exam Form Submission 
1.0. I ...)
+       TODO: check
+CVE-2025-8270 (A vulnerability was found in code-projects Exam Form Submission 
1.0. I ...)
+       TODO: check
+CVE-2025-8269 (A vulnerability was found in code-projects Exam Form Submission 
1.0 an ...)
+       TODO: check
+CVE-2025-8266 (A vulnerability has been found in yanyutao0402 ChanCMS up to 
3.1.2 and ...)
+       TODO: check
+CVE-2025-8265 (A vulnerability classified as critical has been found in 299Ko 
CMS 2.0 ...)
+       TODO: check
+CVE-2025-8194 (There is a defect in the CPython \u201ctarfile\u201d module 
affecting  ...)
+       TODO: check
+CVE-2025-7676 (DLL hijacking of all PE32 executables when run on Windows for 
ARM64 CP ...)
+       TODO: check
+CVE-2025-6918 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2025-6250 (Prior to 25.4.270.0, when wmic.exe is elevated with a full 
admin token ...)
+       TODO: check
+CVE-2025-5997 (Incorrect Use of Privileged APIs vulnerability in Beamsec 
PhishPro all ...)
+       TODO: check
+CVE-2025-54569 (In Malwarebytes Binisoft Windows Firewall Control before 
6.16.0.0, the ...)
+       TODO: check
+CVE-2025-54538 (In JetBrains TeamCity before 2025.07 password exposure was 
possible vi ...)
+       TODO: check
+CVE-2025-54537 (In JetBrains TeamCity before 2025.07 user credentials were 
stored in p ...)
+       TODO: check
+CVE-2025-54536 (In JetBrains TeamCity before 2025.07 a CSRF was possible on 
GraphQL en ...)
+       TODO: check
+CVE-2025-54535 (In JetBrains TeamCity before 2025.07 password reset and email 
verifica ...)
+       TODO: check
+CVE-2025-54534 (In JetBrains TeamCity before 2025.07 reflected XSS was 
possible on the ...)
+       TODO: check
+CVE-2025-54533 (In JetBrains TeamCity before 2025.07 improper access control 
allowed d ...)
+       TODO: check
+CVE-2025-54532 (In JetBrains TeamCity before 2025.07 improper access control 
allowed d ...)
+       TODO: check
+CVE-2025-54531 (In JetBrains TeamCity before 2025.07 path traversal was 
possible via p ...)
+       TODO: check
+CVE-2025-54530 (In JetBrains TeamCity before 2025.07 privilege escalation was 
possible ...)
+       TODO: check
+CVE-2025-54529 (In JetBrains TeamCity before 2025.07 a CSRF was possible in 
external O ...)
+       TODO: check
+CVE-2025-54528 (In JetBrains TeamCity before 2025.07 a CSRF was possible in 
GitHub App ...)
+       TODO: check
+CVE-2025-54527 (In JetBrains YouTrack before 2025.2.86935,  2025.2.87167,  
2025.3.8734 ...)
+       TODO: check
+CVE-2025-54423 (copyparty is a portable file server. In versions up to and 
including v ...)
+       TODO: check
+CVE-2025-54419 (A SAML library not dependent on any frameworks that runs in 
Node. In v ...)
+       TODO: check
+CVE-2025-54418 (CodeIgniter is a PHP full-stack web framework. A command 
injection vul ...)
+       TODO: check
+CVE-2025-54299 (A stored XSS vulnerability in No Boss Testimonials component 
1.0.0-3.0 ...)
+       TODO: check
+CVE-2025-54298 (A stored XSS vulnerability in CommentBox component 1.0.0-1.1.0 
for Joo ...)
+       TODO: check
+CVE-2025-53696 (iSTAR Ultra performs a firmware verification on boot, however 
the veri ...)
+       TODO: check
+CVE-2025-53695 (OS Command Injection in iSTAR Ultra products web application 
allows an ...)
+       TODO: check
+CVE-2025-50494 (Improper session invalidation in the component 
/doctor/change-password ...)
+       TODO: check
+CVE-2025-50493 (Improper session invalidation in the component 
/doctor/change-password ...)
+       TODO: check
+CVE-2025-50492 (Improper session invalidation in the component 
/edms/change-password.p ...)
+       TODO: check
+CVE-2025-50491 (Improper session invalidation in the component 
/banker/change-password ...)
+       TODO: check
+CVE-2025-50490 (Improper session invalidation in the component 
/elms/emp-changepasswor ...)
+       TODO: check
+CVE-2025-50489 (Improper session invalidation in the component 
/srms/change-password.p ...)
+       TODO: check
+CVE-2025-50488 (Improper session invalidation in the component 
/library/change-passwor ...)
+       TODO: check
+CVE-2025-50487 (Improper session invalidation in the component 
/bbdms/change-password. ...)
+       TODO: check
+CVE-2025-50486 (Improper session invalidation in the component 
/carrental/update-passw ...)
+       TODO: check
+CVE-2025-50485 (Improper session invalidation in the component 
/crm/change-password.ph ...)
+       TODO: check
+CVE-2025-50484 (Improper session invalidation in the component 
/crm/change-password.ph ...)
+       TODO: check
+CVE-2025-43023 (A potential security vulnerability has been identified in the 
HP Linux ...)
+       TODO: check
+CVE-2025-40730 (HTML injection in Vox Media's Chorus CMS. This vulnerability 
allows an ...)
+       TODO: check
+CVE-2025-32731 (A reflected cross-site scripting (xss) vulnerability exists in 
the rad ...)
+       TODO: check
+CVE-2025-30133 (An issue was discovered on IROAD Dashcam FX2 devices. Bypass 
of Device ...)
+       TODO: check
+CVE-2025-30126 (An issue was discovered on Marbella KR8s Dashcam FF 2.0.8 
devices. Via ...)
+       TODO: check
+CVE-2025-30125 (An issue was discovered on Marbella KR8s Dashcam FF 2.0.8 
devices. All ...)
+       TODO: check
+CVE-2025-30124 (An issue was discovered on Marbella KR8s Dashcam FF 2.0.8 
devices. Whe ...)
+       TODO: check
+CVE-2025-2297 (Prior to version 25.4.270.0, a local authenticated attacker can 
manipu ...)
+       TODO: check
+CVE-2025-29534 (An authenticated remote code execution vulnerability in 
PowerStick Wav ...)
+       TODO: check
+CVE-2025-27802 (The Episerver Content Management System (CMS) by Optimizely 
was affect ...)
+       TODO: check
+CVE-2025-27801 (The Episerver Content Management System (CMS) by Optimizely 
was affect ...)
+       TODO: check
+CVE-2025-27800 (The Episerver Content Management System (CMS) by Optimizely 
was affect ...)
+       TODO: check
+CVE-2025-27724 (A privilege escalation vulnerability exists in the login.php 
functiona ...)
+       TODO: check
+CVE-2025-26469 (An incorrect default permissions vulnerability exists in the 
CServerSe ...)
+       TODO: check
+CVE-2025-24485 (A server-side request forgery vulnerability exists in the 
cecho.php fu ...)
+       TODO: check
+CVE-2024-49343 (IBM Informix Dynamic Server 12.10 and 14.10 is vulnerable to 
HTML inje ...)
+       TODO: check
+CVE-2024-49342 (IBM Informix Dynamic Server 12.10 and 14.10 uses an inadequate 
account ...)
+       TODO: check
+CVE-2025-38497 (In the Linux kernel, the following vulnerability has been 
resolved:  u ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/3014168731b7930300aab656085af784edc861f6 (6.16-rc7)
-CVE-2025-38496 [dm-bufio: fix sched in atomic context]
+CVE-2025-38496 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
        - linux <unfixed>
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/b1bf1a782fdf5c482215c0c661b5da98b8e75773 (6.16-rc7)
-CVE-2025-38495 [HID: core: ensure the allocated report buffer can contain the 
reserved report ID]
+CVE-2025-38495 (In the Linux kernel, the following vulnerability has been 
resolved:  H ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/4f15ee98304b96e164ff2340e1dfd6181c3f42aa (6.16-rc7)
-CVE-2025-38494 [HID: core: do not bypass hid_hw_raw_request]
+CVE-2025-38494 (In the Linux kernel, the following vulnerability has been 
resolved:  H ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/c2ca42f190b6714d6c481dfd3d9b62ea091c946b (6.16-rc7)
-CVE-2025-38493 [tracing/osnoise: Fix crash in timerlat_dump_stack()]
+CVE-2025-38493 (In the Linux kernel, the following vulnerability has been 
resolved:  t ...)
        - linux <unfixed>
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/85a3bce695b361d85fc528e6fbb33e4c8089c806 (6.16-rc7)
-CVE-2025-38492 [netfs: Fix race between cache write completion and ALL_QUEUED 
being set]
+CVE-2025-38492 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/89635eae076cd8eaa5cb752f66538c9dc6c9fdc3 (6.16-rc7)
-CVE-2025-38491 [mptcp: make fallback action and fallback decision atomic]
+CVE-2025-38491 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/f8a1d9b18c5efc76784f5a326e905f641f839894 (6.16-rc7)
-CVE-2025-38490 [net: libwx: remove duplicate page_pool_put_full_page()]
+CVE-2025-38490 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux <unfixed>
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/1b7e585c04cd5f0731dd25ffd396277e55fae0e6 (6.16-rc7)
-CVE-2025-38489 [s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again]
+CVE-2025-38489 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
        - linux <unfixed>
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/6a5abf8cf182f577c7ae6c62f14debc9754ec986 (6.16-rc7)
-CVE-2025-38488 [smb: client: fix use-after-free in crypt_message when using 
async crypto]
+CVE-2025-38488 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/b220bed63330c0e1733dc06ea8e75d5b9962b6b6 (6.16-rc7)
-CVE-2025-38487 [soc: aspeed: lpc-snoop: Don't disable channels that aren't 
enabled]
+CVE-2025-38487 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/56448e78a6bb4e1a8528a0e2efe94eff0400c247 (6.16-rc7)
-CVE-2025-38486 [soundwire: Revert "soundwire: qcom: Add set_channel_map api 
support"]
+CVE-2025-38486 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
        - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/834bce6a715ae9a9c4dce7892454a19adf22b013 (6.16-rc7)
-CVE-2025-38485 [iio: accel: fxls8962af: Fix use after free in 
fxls8962af_fifo_flush]
+CVE-2025-38485 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
        - linux <unfixed>
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/1fe16dc1a2f5057772e5391ec042ed7442966c9a (6.16-rc7)
-CVE-2025-38484 [iio: backend: fix out-of-bound write]
+CVE-2025-38484 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
        - linux <unfixed>
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/da9374819eb3885636934c1006d450c3cb1a02ed (6.16-rc7)
-CVE-2025-38483 [comedi: das16m1: Fix bit shift out of bounds]
+CVE-2025-38483 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/ed93c6f68a3be06e4e0c331c6e751f462dee3932 (6.16-rc7)
-CVE-2025-38482 [comedi: das6402: Fix bit shift out of bounds]
+CVE-2025-38482 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/70f2b28b5243df557f51c054c20058ae207baaac (6.16-rc7)
-CVE-2025-38481 [comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large]
+CVE-2025-38481 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/08ae4b20f5e82101d77326ecab9089e110f224cc (6.16-rc7)
-CVE-2025-38480 [comedi: Fix use of uninitialized data in 
insn_rw_emulate_bits()]
+CVE-2025-38480 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/e9cb26291d009243a4478a7ffb37b3a9175bfce9 (6.16-rc7)
-CVE-2025-38478 [comedi: Fix initialization of data for instructions that write 
to subdevice]
+CVE-2025-38478 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/46d8c744136ce2454aa4c35c138cc06817f92b8e (6.16-rc7)
-CVE-2025-38477 [net/sched: sch_qfq: Fix race condition on qfq_aggregate]
+CVE-2025-38477 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/5e28d5a3f774f118896aec17a3a20a9c5c9dfc64 (6.16-rc7)
-CVE-2025-38476 [rpl: Fix use-after-free in rpl_do_srh_inline().]
+CVE-2025-38476 (In the Linux kernel, the following vulnerability has been 
resolved:  r ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/b640daa2822a39ff76e70200cb2b7b892b896dce (6.16-rc7)
-CVE-2025-38475 [smc: Fix various oops due to inet_sock type confusion.]
+CVE-2025-38475 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
        - linux <unfixed>
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/60ada4fe644edaa6c2da97364184b0425e8aeaf5 (6.16-rc7)
-CVE-2025-38474 [usb: net: sierra: check for no status endpoint]
+CVE-2025-38474 (In the Linux kernel, the following vulnerability has been 
resolved:  u ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/4c4ca3c46167518f8534ed70f6e3b4bf86c4d158 (6.16-rc7)
-CVE-2025-38473 [Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb()]
+CVE-2025-38473 (In the Linux kernel, the following vulnerability has been 
resolved:  B ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/a0075accbf0d76c2dad1ad3993d2e944505d99a0 (6.16-rc7)
-CVE-2025-38472 [netfilter: nf_conntrack: fix crash due to removal of 
uninitialised entry]
+CVE-2025-38472 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux <unfixed>
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/2d72afb340657f03f7261e9243b44457a9228ac7 (6.16-rc7)
-CVE-2025-38471 [tls: always refresh the queue when reading sock]
+CVE-2025-38471 (In the Linux kernel, the following vulnerability has been 
resolved:  t ...)
        - linux <unfixed>
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/4ab26bce3969f8fd925fe6f6f551e4d1a508c68b (6.16-rc7)
-CVE-2025-38470 [net: vlan: fix VLAN 0 refcount imbalance of toggling filtering 
during runtime]
+CVE-2025-38470 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/579d4f9ca9a9a605184a9b162355f6ba131f678d (6.16-rc7)
-CVE-2025-38469 [KVM: x86/xen: Fix cleanup logic in emulation of Xen schedop 
poll hypercalls]
+CVE-2025-38469 (In the Linux kernel, the following vulnerability has been 
resolved:  K ...)
        - linux <unfixed>
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/5a53249d149f48b558368c5338b9921b76a12f8c (6.16)
-CVE-2025-38468 [net/sched: Return NULL when htb_lookup_leaf encounters an 
empty rbtree]
+CVE-2025-38468 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
        - linux <unfixed>
        NOTE: 
https://git.kernel.org/linus/0e1d5d9b5c5966e2e42e298670808590db5ed628 (6.16-rc7)
 CVE-2025-8267 (Versions of the package ssrfcheck before 1.2.0 are vulnerable 
to Serve ...)
@@ -6902,21 +7030,21 @@ CVE-2025-49087 (In Mbed TLS 3.6.1 through 3.6.3 before 
3.6.4, a timing discrepan
        [bullseye] - mbedtls <not-affected> (Vulnerable code not present)
        NOTE: 
https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-5.md
 CVE-2025-6491 (In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* 
before ...)
-       {DLA-4254-1}
+       {DSA-5967-1 DLA-4254-1}
        - php8.4 8.4.10-1
        - php8.2 <removed>
        - php7.4 <removed>
        NOTE: 
https://github.com/php/php-src/security/advisories/GHSA-453j-q27h-5p8x
        NOTE: Fixed by: 
https://github.com/php/php-src/commit/9cb3d8d200f0c822b17bda35a2a67a97b039d3e1 
(php-8.1.33)
 CVE-2025-1220 (In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* 
before ...)
-       {DLA-4254-1}
+       {DSA-5967-1 DLA-4254-1}
        - php8.4 8.4.10-1
        - php8.2 <removed>
        - php7.4 <removed>
        NOTE: 
https://github.com/php/php-src/security/advisories/GHSA-3cr5-j632-f35r
        NOTE: Fixed by: 
https://github.com/php/php-src/commit/cac8f7f1cf4939f55f06b68120040f057682d89c 
(php-8.1.33)
 CVE-2025-1735 (In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* 
before ...)
-       {DLA-4254-1}
+       {DSA-5967-1 DLA-4254-1}
        - php8.4 8.4.10-1
        - php8.2 <removed>
        - php7.4 <removed>
@@ -27614,7 +27742,7 @@ CVE-2025-47153 (Certain build processes for libuv and 
Node.js for 32-bit systems
        - nodejs 20.19.0+dfsg1-1 (bug #922075; bug #1076350)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=892601
        NOTE: https://github.com/nodejs/node-v0.x-archive/issues/4549
-CVE-2025-4056
+CVE-2025-4056 (A flaw was found in GLib. A denial of service on Windows 
platforms may ...)
        - glib2.0 <not-affected> (Only affects Glib on Windows)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2362826
        NOTE: https://gitlab.gnome.org/GNOME/glib/-/issues/3668
@@ -161955,7 +162083,7 @@ CVE-2023-37527 (A reflected cross-site scripting 
(XSS) vulnerability in the Web
        NOT-FOR-US: HCL
 CVE-2023-32967 (An incorrect authorization vulnerability has been reported to 
affect s ...)
        NOT-FOR-US: QNAP
-CVE-2024-58265 [GHSA-7g9j-g5jg-3vv3: Unauthenticated Nonce Increment in snow]
+CVE-2024-58265 (The snow crate before 0.9.5 for Rust, when stateful 
TransportState is  ...)
        - rust-snow 0.9.6-1 (bug #1062663)
        NOTE: 
https://github.com/mcginty/snow/security/advisories/GHSA-7g9j-g5jg-3vv3
        NOTE: https://rustsec.org/advisories/RUSTSEC-2024-0011.html
@@ -163663,7 +163791,7 @@ CVE-2024-23898 (Jenkins 2.217 through 2.441 (both 
inclusive), LTS 2.222.1 throug
        - jenkins <removed>
 CVE-2024-23897 (Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not 
disable a  ...)
        - jenkins <removed>
-CVE-2024-58266 [RUSTSEC-2024-0006]
+CVE-2024-58266 (The shlex crate before 1.2.1 for Rust allows unquoted and 
unescaped in ...)
        - rust-shlex 1.3.0-1
        [bookworm] - rust-shlex <no-dsa> (Minor issue)
        [bullseye] - rust-shlex <no-dsa> (Minor issue)
@@ -199510,7 +199638,7 @@ CVE-2023-2686 (Buffer overflow in Wi-Fi Commissioning 
MicriumOS example in Silic
        NOT-FOR-US: Silicon Labs Gecko SDK
 CVE-2023-2683 (A memory leak in the EFR32 Bluetooth LE stack 5.1.0 through 
5.1.1 allo ...)
        NOT-FOR-US: silabs Bluetooth SDK
-CVE-2023-53160 [RUSTSEC-2023-0038: Out-of-bounds array access leads to panic]
+CVE-2023-53160 (The sequoia-openpgp crate before 1.16.0 for Rust allows 
out-of-bounds  ...)
        - rust-sequoia-openpgp 1.16.0-1
        [bookworm] - rust-sequoia-openpgp <no-dsa> (Minor issue)
        [bullseye] - rust-sequoia-openpgp <no-dsa> (Minor issue)
@@ -201126,7 +201254,7 @@ CVE-2015-10109 (A vulnerability was found in Video 
Playlist and Gallery Plugin u
        NOT-FOR-US: WordPress plugin
 CVE-2014-125104 (A vulnerability was found in VaultPress Plugin up to 1.6.0 on 
WordPres ...)
        NOT-FOR-US: WordPress plugin
-CVE-2023-53161 [RUSTSEC-2023-0039]
+CVE-2023-53161 (The buffered-reader crate before 1.1.5 for Rust allows 
out-of-bounds a ...)
        - rust-buffered-reader 1.2.0-1 (bug #1037018)
        [bookworm] - rust-buffered-reader <no-dsa> (Minor issue)
        [bullseye] - rust-buffered-reader <no-dsa> (Minor issue)
@@ -240941,7 +241069,7 @@ CVE-2022-45787 (Unproper laxist permissions on the 
temporary files used by MIME4
 CVE-2022-45786 (There are issues with the AGE drivers for Golang and Python 
that enabl ...)
        NOT-FOR-US: Apache AGE
 CVE-2022-4121 (In libetpan a null pointer dereference in 
mailimap_mailbox_data_status ...)
-       {DLA-3261-1}
+       {DLA-4256-1 DLA-3261-1}
        - libetpan 1.9.4-3.1 (bug #1025120)
        NOTE: https://github.com/dinhvh/libetpan/issues/420
        NOTE: 
https://github.com/dinhvh/libetpan/commit/5c9eb6b6ba64c4eb927d7a902317410181aacbba
@@ -300099,7 +300227,7 @@ CVE-2022-25872 (All versions of package 
fast-string-search are vulnerable to Out
        NOT-FOR-US: Node fast-string-search
 CVE-2022-25871 (All versions of package querymen are vulnerable to Prototype 
Pollution ...)
        NOT-FOR-US: Node querymen
-CVE-2022-25869 (All versions of package angular are vulnerable to Cross-site 
Scripting ...)
+CVE-2022-25869 (All versions of the package angular; all versions of the 
package angul ...)
        - angular.js <unfixed> (bug #1036694)
        [trixie] - angular.js <postponed> (Minor issue, revisit when fixed 
upstream)
        [bookworm] - angular.js <postponed> (Minor issue, revisit when fixed 
upstream)
@@ -304329,7 +304457,7 @@ CVE-2022-24601 (Luocms v2.0 is affected by SQL 
Injection in /admin/manager/admin
 CVE-2022-24600 (Luocms v2.0 is affected by SQL Injection through 
/admin/login.php. An  ...)
        NOT-FOR-US: Luocms
 CVE-2022-24599 (In autofile Audio File Library 0.3.6, there exists one memory 
leak vul ...)
-       {DLA-3650-1}
+       {DLA-4255-1 DLA-3650-1}
        - audiofile 0.3.6-6 (bug #1008017; unimportant)
        [bookworm] - audiofile 0.3.6-5+deb12u1
        NOTE: https://github.com/mpruett/audiofile/issues/60
@@ -358957,13 +359085,13 @@ CVE-2021-30500 (Null pointer dereference was found 
in upx PackLinuxElf::canUnpac
        NOTE: https://github.com/upx/upx/issues/485
        NOTE: 
https://github.com/upx/upx/commit/be050693f229d629f56650f67f612fc68e285600 
(v3.99)
 CVE-2021-30499 (A flaw was found in libcaca. A buffer overflow of export.c in 
function ...)
-       {DLA-3784-1}
+       {DLA-4257-1 DLA-3784-1}
        - libcaca 0.99.beta19-3 (bug #987278)
        [stretch] - libcaca <postponed> (Minor issue; can be fixed in next 
update)
        NOTE: https://github.com/cacalabs/libcaca/issues/54
        NOTE: Fixed by: 
https://github.com/cacalabs/libcaca/commit/ab04483ee1a846d6b74b2e6248e980152baec3f6
 (v0.99.beta20)
 CVE-2021-30498 (A flaw was found in libcaca. A heap buffer overflow in 
export.c in fun ...)
-       {DLA-3784-1}
+       {DLA-4257-1 DLA-3784-1}
        - libcaca 0.99.beta19-3 (bug #987278)
        [stretch] - libcaca <postponed> (Minor issue; can be fixed in next 
update)
        NOTE: https://github.com/cacalabs/libcaca/issues/53
@@ -433437,7 +433565,7 @@ CVE-2020-12764 (Gnuteca 3.8 allows 
file.php?folder=/&file= Directory Traversal.)
 CVE-2020-12763 (TRENDnet ProView Wireless camera TV-IP512WN 1.0R 1.0.4 is 
vulnerable t ...)
        NOT-FOR-US: TRENDnet ProView
 CVE-2020-12762 (json-c through 0.14 has an integer overflow and out-of-bounds 
write vi ...)
-       {DSA-4741-1 DLA-3461-1 DLA-2301-1 DLA-2228-2 DLA-2228-1}
+       {DSA-4741-1 DLA-4258-1 DLA-3461-1 DLA-2301-1 DLA-2228-2 DLA-2228-1}
        - json-c 0.13.1+dfsg-8 (bug #960326)
        - libfastjson 1.2304.0-1 (bug #1035302)
        NOTE: https://github.com/json-c/json-c/pull/592
@@ -487708,7 +487836,7 @@ CVE-2019-13149 (An issue was discovered in TRENDnet 
TEW-827DRU firmware before 2
 CVE-2019-13148 (An issue was discovered in TRENDnet TEW-827DRU firmware before 
2.05B11 ...)
        NOT-FOR-US: TRENDnet TEW-827DRU firmware
 CVE-2019-13147 (In Audio File Library (aka audiofile) 0.3.6, there exists one 
NULL poi ...)
-       {DLA-3650-1}
+       {DLA-4255-1 DLA-3650-1}
        - audiofile 0.3.6-6 (low; bug #931343)
        [bookworm] - audiofile 0.3.6-5+deb12u1
        [stretch] - audiofile <no-dsa> (Minor issue)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1dae8f7bf94a8fd21506cdeb4566bddafcd8d85e

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1dae8f7bf94a8fd21506cdeb4566bddafcd8d85e
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to