Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
aacbcb9e by Moritz Muehlenhoff at 2025-08-13T20:24:55+02:00
bookworm/trixie triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -696,8 +696,9 @@ CVE-2024-40588 (Multiple relative path traversal 
vulnerabilities [CWE-23] in For
        NOT-FOR-US: Fortinet
 CVE-2024-38805 (EDK2 contains a vulnerability in BIOS where a user may cause 
an Intege ...)
        - edk2 <unfixed>
+       [trixie] - edk2 <no-dsa> (Minor issue)
+       [bookworm] - edk2 <no-dsa> (Minor issue)
        NOTE: 
https://github.com/tianocore/edk2/security/advisories/GHSA-p7wp-52j7-6r5x
-       TODO: check details
 CVE-2024-33607 (Out-of-bounds read in some Intel(R) TDX module software before 
version ...)
        NOT-FOR-US: Intel
 CVE-2024-26009 (An authentication bypass using an alternate path or channel 
[CWE-288]  ...)
@@ -3328,6 +3329,8 @@ CVE-2025-54425 (Umbraco is an ASP.NET CMS. In versions 
13.0.0 through 13.9.2, 15
        NOT-FOR-US: Umbraco CMS
 CVE-2025-54410 (Moby is an open source container framework developed by Docker 
Inc. th ...)
        - docker.io <unfixed> (bug #1110408)
+       [trixie] - docker.io <no-dsa> (Minor issue)
+       [bookworm] - docker.io <no-dsa> (Minor issue)
        NOTE: 
https://github.com/moby/moby/security/advisories/GHSA-4vq8-7jfc-9cvp
        NOTE: Fixed by: 
https://github.com/moby/moby/commit/651b2feb27316cf907173c2a76cc6eb85f763663 
(25.0-branch)
 CVE-2025-54388 (Moby is an open source container framework developed by Docker 
Inc. th ...)
@@ -4193,6 +4196,7 @@ CVE-2024-58264 (The serde-json-wasm crate before 1.0.1 
for Rust allows stack con
        NOT-FOR-US: serde-json-wasm crate
 CVE-2023-53159 (The openssl crate before 0.10.55 for Rust allows an 
out-of-bounds read ...)
        - rust-openssl 0.10.57-1
+       [bookworm] - rust-openssl <no-dsa> (Minor issue)
        NOTE: https://rustsec.org/advisories/RUSTSEC-2023-0044.html
        NOTE: https://github.com/sfackler/rust-openssl/issues/1965
        NOTE: 
https://github.com/sfackler/rust-openssl/commit/155b3dc71700d2ff31651bbc99b991765a718c4e
@@ -6166,6 +6170,8 @@ CVE-2025-51396 (A stored cross-site scripting (XSS) 
vulnerability in Live Helper
        NOT-FOR-US: Live Helper Chat
 CVE-2025-50151 (File access paths in configuration files uploaded by users 
with admini ...)
        - apache-jena <unfixed> (bug #1109807)
+       [trixie] - apache-jena <no-dsa> (Minor issue)
+       [bookworm] - apache-jena <no-dsa> (Minor issue)
        NOTE: https://lists.apache.org/thread/12gks5z40gh9bszn1xk8mz34gz586xss
 CVE-2025-4130 (Use of Hard-coded Credentials vulnerability in PAVO Inc. PAVO 
Pay allo ...)
        NOT-FOR-US: PAVO
@@ -6175,6 +6181,8 @@ CVE-2025-4040 (Authorization Bypass Through 
User-Controlled Key vulnerability in
        NOT-FOR-US: Turpak Automatic Station Monitoring System
 CVE-2025-49656 (Users with administrator access can create databases files 
outside the ...)
        - apache-jena <unfixed> (bug #1110262)
+       [trixie] - apache-jena <no-dsa> (Minor issue)
+       [bookworm] - apache-jena <no-dsa> (Minor issue)
        NOTE: https://lists.apache.org/thread/qmm21som8zct813vx6dfd1phnfro6mwq
 CVE-2025-46123 (An issue was discovered in CommScope Ruckus Unleashed prior to 
200.15. ...)
        NOT-FOR-US: Ruckus


=====================================
data/dsa-needed.txt
=====================================
@@ -67,6 +67,8 @@ ruby-saml/oldstable
 --
 sogo/oldstable
 --
+squid/oldstable
+--
 sympa/oldstable
 --
 tomcat10



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aacbcb9e95d14bb8a7284c99648a89e36a9a5fa2

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/aacbcb9e95d14bb8a7284c99648a89e36a9a5fa2
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to