Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
717a37c7 by security tracker role at 2025-09-24T20:13:11+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,16 +1,216 @@
-CVE-2025-39890 [wifi: ath12k: fix memory leak in
ath12k_service_ready_ext_event]
+CVE-2025-9353 (The Themify Builder plugin for WordPress is vulnerable to
Stored Cross ...)
+ TODO: check
+CVE-2025-9054 (The MultiLoca - WooCommerce Multi Locations Inventory
Management plugi ...)
+ TODO: check
+CVE-2025-9031 (Observable Timing Discrepancy vulnerability in DivvyDrive
Information ...)
+ TODO: check
+CVE-2025-8869 (When extracting a tar archive pip may not check symbolic links
point i ...)
+ TODO: check
+CVE-2025-59828 (Claude Code is an agentic coding tool. Prior to Claude Code
version 1. ...)
+ TODO: check
+CVE-2025-59824 (Omni manages Kubernetes on bare metal, virtual machines, or in
a cloud ...)
+ TODO: check
+CVE-2025-59525 (Horilla is a free and open source Human Resource Management
System (HR ...)
+ TODO: check
+CVE-2025-59524 (Horilla is a free and open source Human Resource Management
System (HR ...)
+ TODO: check
+CVE-2025-59343 (tar-fs provides filesystem bindings for tar-stream. Versions
prior to ...)
+ TODO: check
+CVE-2025-59305 (Improper authorization in the background migration endpoints
of Langfu ...)
+ TODO: check
+CVE-2025-59251 (Microsoft Edge (Chromium-based) Remote Code Execution
Vulnerability)
+ TODO: check
+CVE-2025-58457 (Improper permission check in ZooKeeper AdminServer lets
authorized cli ...)
+ TODO: check
+CVE-2025-57354 (A vulnerability exists in the 'counterpart' library for
Node.js and th ...)
+ TODO: check
+CVE-2025-57353 (The Runtime components of messageformat package for Node.js
prior to v ...)
+ TODO: check
+CVE-2025-57352 (A vulnerability exists in the 'min-document' package prior to
version ...)
+ TODO: check
+CVE-2025-57351 (A prototype pollution vulnerability exists in the ts-fns
package versi ...)
+ TODO: check
+CVE-2025-57350 (The csvtojson package, a tool for converting CSV data to JSON
with cus ...)
+ TODO: check
+CVE-2025-57349 (The messageformat package, an implementation of the Unicode
MessageFor ...)
+ TODO: check
+CVE-2025-57348 (The node-cube package (prior to version 5.0.0) contains a
vulnerabilit ...)
+ TODO: check
+CVE-2025-57347 (A vulnerability exists in the 'dagre-d3-es' Node.js package
version 7. ...)
+ TODO: check
+CVE-2025-57330 (The web3-core-subscriptions is a package designed to manages
web3 subs ...)
+ TODO: check
+CVE-2025-57329 (web3-core-method is a package designed to creates the methods
on the w ...)
+ TODO: check
+CVE-2025-57328 (toggle-array is a package designed to enables a property on
the object ...)
+ TODO: check
+CVE-2025-57327 (spmrc is a package that provides the rc manager for spm. A
Prototype P ...)
+ TODO: check
+CVE-2025-57326 (A Prototype Pollution vulnerability in the byGroupAndType
function of ...)
+ TODO: check
+CVE-2025-57325 (rollbar is a package designed to effortlessly track and debug
errors i ...)
+ TODO: check
+CVE-2025-57323 (mpregular is a package that provides a small program
development frame ...)
+ TODO: check
+CVE-2025-57321 (A Prototype Pollution vulnerability in the
util-deps.addFileDepend fun ...)
+ TODO: check
+CVE-2025-56819 (An issue in Datart v.1.0.0-rc.3 allows a remote attacker to
execute ar ...)
+ TODO: check
+CVE-2025-56816 (Datart 1.0.0-rc.3 is vulnerable to Directory Traversal. The
configurat ...)
+ TODO: check
+CVE-2025-56815 (Datart 1.0.0-rc.3 is vulnerable to Directory Traversal in the
POST /vi ...)
+ TODO: check
+CVE-2025-56241 (Aztech DSL5005EN firmware 1.00.AZ_2013-05-10 and possibly
other versio ...)
+ TODO: check
+CVE-2025-55322 (Binding to an unrestricted ip address in GitHub allows an
unauthorized ...)
+ TODO: check
+CVE-2025-55178 (Llama Stack prior to version v0.2.20 accepted unverified
parameters in ...)
+ TODO: check
+CVE-2025-52907 (Improper Input Validation vulnerability in TOTOLINK X6000R
allows Comm ...)
+ TODO: check
+CVE-2025-52906 (Improper Neutralization of Special Elements used in an OS
Command ('OS ...)
+ TODO: check
+CVE-2025-48869 (Horilla is a free and open source Human Resource Management
System (HR ...)
+ TODO: check
+CVE-2025-48868 (Horilla is a free and open source Human Resource Management
System (HR ...)
+ TODO: check
+CVE-2025-48867 (Horilla is a free and open source Human Resource Management
System (HR ...)
+ TODO: check
+CVE-2025-47329 (Memory corruption while handling invalid inputs in application
info se ...)
+ TODO: check
+CVE-2025-47328 (Transient DOS while processing power control requests with
invalid ant ...)
+ TODO: check
+CVE-2025-47327 (Memory corruption while encoding the image data.)
+ TODO: check
+CVE-2025-47326 (Transient DOS while handling command data during power control
process ...)
+ TODO: check
+CVE-2025-47318 (Transient DOS while parsing the EPTM test control message to
get the t ...)
+ TODO: check
+CVE-2025-47317 (Memory corruption due to global buffer overflow when a test
command us ...)
+ TODO: check
+CVE-2025-47316 (Memory corruption due to double free when multiple threads
race to set ...)
+ TODO: check
+CVE-2025-47315 (Memory corruption while handling repeated memory unmap
requests from g ...)
+ TODO: check
+CVE-2025-47314 (Memory corruption while processing data sent by FE driver.)
+ TODO: check
+CVE-2025-41716 (The web application allows an unauthenticated remote attacker
to learn ...)
+ TODO: check
+CVE-2025-41715 (The database for the web application is exposed without
authentication ...)
+ TODO: check
+CVE-2025-27077 (Memory corruption while processing message in guest VM.)
+ TODO: check
+CVE-2025-27037 (Memory corruption while processing config_dev IOCTL when
camera kernel ...)
+ TODO: check
+CVE-2025-27036 (Information disclosure when Video engine escape input data is
less tha ...)
+ TODO: check
+CVE-2025-27034 (Memory corruption while selecting the PLMN from SOR failed
list.)
+ TODO: check
+CVE-2025-27033 (Information disclosure while running video usecase having
rogue firmwa ...)
+ TODO: check
+CVE-2025-27032 (memory corruption while loading a PIL authenticated VM, when
authentic ...)
+ TODO: check
+CVE-2025-27030 (information disclosure while invoking calibration data from
user space ...)
+ TODO: check
+CVE-2025-23354 (NVIDIA Megatron-LM for all platforms contains a vulnerability
in the e ...)
+ TODO: check
+CVE-2025-23353 (NVIDIA Megatron-LM for all platforms contains a vulnerability
in the m ...)
+ TODO: check
+CVE-2025-23349 (NVIDIA Megatron-LM for all platforms contains a vulnerability
in the t ...)
+ TODO: check
+CVE-2025-23348 (NVIDIA Megatron-LM for all platforms contains a vulnerability
in the p ...)
+ TODO: check
+CVE-2025-23346 (NVIDIA CUDA Toolkit contains a vulnerability in cuobjdump,
where an un ...)
+ TODO: check
+CVE-2025-23340 (NVIDIA CUDA Toolkit for all platforms contains a vulnerability
in the ...)
+ TODO: check
+CVE-2025-23339 (NVIDIA CUDA Toolkit for all platforms contains a vulnerability
in cuob ...)
+ TODO: check
+CVE-2025-23338 (NVIDIA CUDA Toolkit for all platforms contains a vulnerability
in nvdi ...)
+ TODO: check
+CVE-2025-23308 (NVIDIA CUDA Toolkit for all platforms contains a vulnerability
in nvdi ...)
+ TODO: check
+CVE-2025-23275 (NVIDIA CUDA Toolkit for all platforms contains a vulnerability
in nvJP ...)
+ TODO: check
+CVE-2025-23274 (NVIDIA nvJPEG contains a vulnerability in jpeg encoding where
a user m ...)
+ TODO: check
+CVE-2025-23273 (NVIDIA CUDA Toolkit for all platforms contains a vulnerability
in nvJP ...)
+ TODO: check
+CVE-2025-23272 (NVIDIA nvJPEG library contains a vulnerability where an
attacker can c ...)
+ TODO: check
+CVE-2025-23271 (NVIDIA CUDA Toolkit for all platforms contains a vulnerability
in the ...)
+ TODO: check
+CVE-2025-23255 (NVIDIA CUDA Toolkit for all platforms contains a vulnerability
in the ...)
+ TODO: check
+CVE-2025-23248 (NVIDIA CUDA Toolkit for all platforms contains a vulnerability
in the ...)
+ TODO: check
+CVE-2025-21488 (Information disclosure while decoding this RTP packet headers
received ...)
+ TODO: check
+CVE-2025-21487 (Information disclosure while decoding RTP packet received by
UE from t ...)
+ TODO: check
+CVE-2025-21484 (Information disclosure when UE receives the RTP packet from
the networ ...)
+ TODO: check
+CVE-2025-21483 (Memory corruption when the UE receives an RTP packet from the
network, ...)
+ TODO: check
+CVE-2025-21482 (Cryptographic issue while performing RSA PKCS padding
decoding.)
+ TODO: check
+CVE-2025-21481 (Memory corruption while performing private key encryption in
trusted a ...)
+ TODO: check
+CVE-2025-21476 (Memory corruption when passing parameters to the Trusted
Virtual Machi ...)
+ TODO: check
+CVE-2025-20365 (A vulnerability in the IPv6 Router Advertisement (RA) packet
processin ...)
+ TODO: check
+CVE-2025-20364 (A vulnerability in the Device Analytics action frame
processing of Cis ...)
+ TODO: check
+CVE-2025-20352 (A vulnerability in the Simple Network Management Protocol
(SNMP) subsy ...)
+ TODO: check
+CVE-2025-20339 (A vulnerability in the access control list (ACL) processing of
IPv4 pa ...)
+ TODO: check
+CVE-2025-20338 (A vulnerability in the CLI of Cisco IOS XE Software could
allow an aut ...)
+ TODO: check
+CVE-2025-20334 (A vulnerability in the HTTP API subsystem of Cisco IOS XE
Software cou ...)
+ TODO: check
+CVE-2025-20327 (A vulnerability in the web UI of Cisco IOS Software could
allow an aut ...)
+ TODO: check
+CVE-2025-20316 (A vulnerability in the access control list (ACL) programming
of Cisco ...)
+ TODO: check
+CVE-2025-20315 (A vulnerability in the Network-Based Application Recognition
(NBAR) fe ...)
+ TODO: check
+CVE-2025-20314 (A vulnerability in Cisco IOS XE Software could allow an
authenticated, ...)
+ TODO: check
+CVE-2025-20313 (Multiple vulnerabilities in Cisco IOS XE Software of could
allow an au ...)
+ TODO: check
+CVE-2025-20312 (A vulnerability in the Simple Network Management Protocol
(SNMP) subsy ...)
+ TODO: check
+CVE-2025-20311 (A vulnerability in the handling of certain Ethernet frames in
Cisco IO ...)
+ TODO: check
+CVE-2025-20293 (A vulnerability in the Day One setup process of Cisco IOS XE
Software ...)
+ TODO: check
+CVE-2025-20240 (A vulnerability in the web UI of Cisco IOS XE Software could
allow an ...)
+ TODO: check
+CVE-2025-20160 (A vulnerability in the implementation of the TACACS+ protocol
in Cisco ...)
+ TODO: check
+CVE-2025-20149 (A vulnerability in the CLI of Cisco IOS Software and Cisco IOS
XE Soft ...)
+ TODO: check
+CVE-2025-10909 (A security flaw has been discovered in Mangati NovoSGA up to
2.2.9. Th ...)
+ TODO: check
+CVE-2025-10906 (A flaw has been found in Magnetism Studios Endurance up to
3.3.0 on ma ...)
+ TODO: check
+CVE-2025-10360 (In Puppet Enterprise versions 2025.4.0 and 2025.5, the
encryption key ...)
+ TODO: check
+CVE-2025-39890 (In the Linux kernel, the following vulnerability has been
resolved: w ...)
- linux 6.16.3-1
[trixie] - linux 6.12.35-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/89142d34d5602c7447827beb181fa06eb08b9d5c (6.16-rc1)
-CVE-2025-39889 [Bluetooth: l2cap: Check encryption key size on incoming
connection]
+CVE-2025-39889 (In the Linux kernel, the following vulnerability has been
resolved: B ...)
- linux 6.16.3-1
[trixie] - linux 6.12.25-1
[bookworm] - linux 6.1.135-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/522e9ed157e3c21b4dd623c79967f72c21e45b78 (6.15-rc3)
-CVE-2024-58241 [Bluetooth: hci_core: Disable works on hci_unregister_dev]
+CVE-2024-58241 (In the Linux kernel, the following vulnerability has been
resolved: B ...)
- linux 6.11.6-1
NOTE:
https://git.kernel.org/linus/989fa5171f005ecf63440057218d8aeb1795287d (6.12-rc5)
CVE-2025-9966 (Improper privilege management vulnerability in Novakon P series
allows ...)
@@ -190,16 +390,16 @@ CVE-2025-10894
NOT-FOR-US: Compromised Node nx package
CVE-2025-6921 (The huggingface/transformers library, versions prior to 4.53.0,
is vul ...)
NOT-FOR-US: huggingface/transformers
-CVE-2025-10890
+CVE-2025-10890 (Side-channel information leakage in V8 in Google Chrome prior
to 140.0 ...)
- chromium 140.0.7339.207-1
[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-10891
+CVE-2025-10891 (Integer overflow in V8 in Google Chrome prior to
140.0.7339.207 allowe ...)
- chromium 140.0.7339.207-1
[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-10892
+CVE-2025-10892 (Integer overflow in V8 in Google Chrome prior to
140.0.7339.207 allowe ...)
- chromium 140.0.7339.207-1
[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-60020 [NNCP path traversal attack]
+CVE-2025-60020 (nncp before 8.12.0 allows path traversal (for reading or
writing) duri ...)
- nncp <unfixed> (bug #1115848)
NOTE: http://www.nncpgo.org/Release-8_005f12_005f0.html
NOTE:
http://lists.cypherpunks.su/archive/nncp-devel/CAO-d-4riai9EZx4gVfekow-BCtTn07k8BB1ZdsopPVw=scw...@mail.gmail.com/T/#md678a00df1020bb811f47f42ef33c54b789cddd7
@@ -2376,19 +2576,19 @@ CVE-2025-30187 (In some circumstances, when DNSdist is
configured to use the ngh
[bullseye] - dnsdist <not-affected> (Vulnerable code not present)
NOTE: https://www.openwall.com/lists/oss-security/2025/09/18/1
NOTE:
https://www.dnsdist.org/security-advisories/powerdns-advisory-for-dnsdist-2025-05.html
-CVE-2025-10500
+CVE-2025-10500 (Use after free in Dawn in Google Chrome prior to
140.0.7339.185 allowe ...)
{DSA-6004-1}
- chromium 140.0.7339.185-1
[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-10501
+CVE-2025-10501 (Use after free in WebRTC in Google Chrome prior to
140.0.7339.185 allo ...)
{DSA-6004-1}
- chromium 140.0.7339.185-1
[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-10502
+CVE-2025-10502 (Heap buffer overflow in ANGLE in Google Chrome prior to
140.0.7339.185 ...)
{DSA-6004-1}
- chromium 140.0.7339.185-1
[bullseye] - chromium <end-of-life> (see #1061268)
-CVE-2025-10585
+CVE-2025-10585 (Type confusion in V8 in Google Chrome prior to 140.0.7339.185
allowed ...)
{DSA-6004-1}
- chromium 140.0.7339.185-1
[bullseye] - chromium <end-of-life> (see #1061268)
@@ -8169,7 +8369,7 @@ CVE-2025-55244 (Azure Bot Service Elevation of Privilege
Vulnerability)
NOT-FOR-US: Microsoft
CVE-2025-55242 (Exposure of sensitive information to an unauthorized actor in
Xbox all ...)
NOT-FOR-US: Microsoft
-CVE-2025-55241 (Azure Entra Elevation of Privilege Vulnerability)
+CVE-2025-55241 (Azure Entra ID Elevation of Privilege Vulnerability)
NOT-FOR-US: Microsoft
CVE-2025-55238 (Dynamics 365 FastTrack Implementation Assets Information
Disclosure Vu ...)
NOT-FOR-US: Microsoft
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/717a37c774632a02fe4a72d4916221ff535bd331
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/717a37c774632a02fe4a72d4916221ff535bd331
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits