Moritz Muehlenhoff pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
aacbcb9e by Moritz Muehlenhoff at 2025-08-13T20:24:55+02:00
bookworm/trixie triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -696,8 +696,9 @@ CVE-2024-40588 (Multiple relative path traversal
vulnerabilities [CWE-23] in For
NOT-FOR-US: Fortinet
CVE-2024-38805 (EDK2 contains a vulnerability in BIOS where a user may cause
an Intege ...)
- edk2 <unfixed>
+ [trixie] - edk2 <no-dsa> (Minor issue)
+ [bookworm] - edk2 <no-dsa> (Minor issue)
NOTE:
https://github.com/tianocore/edk2/security/advisories/GHSA-p7wp-52j7-6r5x
- TODO: check details
CVE-2024-33607 (Out-of-bounds read in some Intel(R) TDX module software before
version ...)
NOT-FOR-US: Intel
CVE-2024-26009 (An authentication bypass using an alternate path or channel
[CWE-288] ...)
@@ -3328,6 +3329,8 @@ CVE-2025-54425 (Umbraco is an ASP.NET CMS. In versions
13.0.0 through 13.9.2, 15
NOT-FOR-US: Umbraco CMS
CVE-2025-54410 (Moby is an open source container framework developed by Docker
Inc. th ...)
- docker.io <unfixed> (bug #1110408)
+ [trixie] - docker.io <no-dsa> (Minor issue)
+ [bookworm] - docker.io <no-dsa> (Minor issue)
NOTE:
https://github.com/moby/moby/security/advisories/GHSA-4vq8-7jfc-9cvp
NOTE: Fixed by:
https://github.com/moby/moby/commit/651b2feb27316cf907173c2a76cc6eb85f763663
(25.0-branch)
CVE-2025-54388 (Moby is an open source container framework developed by Docker
Inc. th ...)
@@ -4193,6 +4196,7 @@ CVE-2024-58264 (The serde-json-wasm crate before 1.0.1
for Rust allows stack con
NOT-FOR-US: serde-json-wasm crate
CVE-2023-53159 (The openssl crate before 0.10.55 for Rust allows an
out-of-bounds read ...)
- rust-openssl 0.10.57-1
+ [bookworm] - rust-openssl <no-dsa> (Minor issue)
NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0044.html
NOTE: https://github.com/sfackler/rust-openssl/issues/1965
NOTE:
https://github.com/sfackler/rust-openssl/commit/155b3dc71700d2ff31651bbc99b991765a718c4e
@@ -6166,6 +6170,8 @@ CVE-2025-51396 (A stored cross-site scripting (XSS)
vulnerability in Live Helper
NOT-FOR-US: Live Helper Chat
CVE-2025-50151 (File access paths in configuration files uploaded by users
with admini ...)
- apache-jena <unfixed> (bug #1109807)
+ [trixie] - apache-jena <no-dsa> (Minor issue)
+ [bookworm] - apache-jena <no-dsa> (Minor issue)
NOTE: https://lists.apache.org/thread/12gks5z40gh9bszn1xk8mz34gz586xss
CVE-2025-4130 (Use of Hard-coded Credentials vulnerability in PAVO Inc. PAVO
Pay allo ...)
NOT-FOR-US: PAVO
@@ -6175,6 +6181,8 @@ CVE-2025-4040 (Authorization Bypass Through
User-Controlled Key vulnerability in
NOT-FOR-US: Turpak Automatic Station Monitoring System
CVE-2025-49656 (Users with administrator access can create databases files
outside the ...)
- apache-jena <unfixed> (bug #1110262)
+ [trixie] - apache-jena <no-dsa> (Minor issue)
+ [bookworm] - apache-jena <no-dsa> (Minor issue)
NOTE: https://lists.apache.org/thread/qmm21som8zct813vx6dfd1phnfro6mwq
CVE-2025-46123 (An issue was discovered in CommScope Ruckus Unleashed prior to
200.15. ...)
NOT-FOR-US: Ruckus
=====================================
data/dsa-needed.txt
=====================================
@@ -67,6 +67,8 @@ ruby-saml/oldstable
--
sogo/oldstable
--
+squid/oldstable
+--
sympa/oldstable
--
tomcat10
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aacbcb9e95d14bb8a7284c99648a89e36a9a5fa2
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aacbcb9e95d14bb8a7284c99648a89e36a9a5fa2
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits