Daniel Leidert pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
6d766aee by Daniel Leidert at 2025-12-14T23:02:56+01:00
lts: triage CVE-2025-12084,CVE-2025-13837,CVE-2025-13836/python3.9

Mark all of them postponed

- - - - -
3a763a56 by Daniel Leidert at 2025-12-14T23:02:56+01:00
dla: add python3.9

- - - - -
8839bb05 by Daniel Leidert at 2025-12-14T23:02:56+01:00
Add patch commit and test file for CVE-2025-12816/node-node-forge

- - - - -


2 changed files:

- data/CVE/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -5642,6 +5642,7 @@ CVE-2025-12084 (When building nested elements using 
xml.dom.minidom methods such
        - python3.11 <removed>
        [bookworm] - python3.11 <no-dsa> (Minor issue)
        - python3.9 <removed>
+       [bullseye] - python3.9 <postponed> (Minor issue)
        - python2.7 <removed>
        [bullseye] - python2.7 <end-of-life> (EOL in bullseye LTS)
        - pypy3 <unfixed>
@@ -6321,6 +6322,7 @@ CVE-2025-13837 (When loading a plist file, the plistlib 
module reads data in siz
        - python3.11 <removed>
        [bookworm] - python3.11 <no-dsa> (Minor issue)
        - python3.9 <removed>
+       [bullseye] - python3.9 <postponed> (Minor issue)
        NOTE: https://github.com/python/cpython/issues/119342
        NOTE: https://github.com/python/cpython/pull/119343
        NOTE: 
https://github.com/python/cpython/commit/694922cf40aa3a28f898b5f5ee08b71b4922df70
 (main)
@@ -6333,6 +6335,7 @@ CVE-2025-13836 (When reading an HTTP response from a 
server, if no read amount i
        - python3.11 <removed>
        [bookworm] - python3.11 <no-dsa> (Minor issue)
        - python3.9 <removed>
+       [bullseye] - python3.9 <postponed> (Minor issue)
        NOTE: https://github.com/python/cpython/issues/119451
        NOTE: https://github.com/python/cpython/pull/119454
        NOTE: 
https://github.com/python/cpython/commit/5a4c4a033a4a54481be6870aa1896fad732555b5
 (main)
@@ -7254,6 +7257,8 @@ CVE-2025-13467 (A flaw was found in the Keycloak LDAP 
User Federation provider.
 CVE-2025-12816 (An interpretation-conflict (CWE-436) vulnerability in 
node-forge versi ...)
        - node-node-forge <removed>
        NOTE: 
https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq
+       NOTE: Fixed by: 
https://github.com/digitalbazaar/forge/commit/a05dd812ec2de46ece35a11ab4b46c9d283d1505
 (v1.3.2)
+       NOTE: 
https://github.com/digitalbazaar/forge/blob/235ad3e70e4fdfdca4fdeb662dfba6588e2c38bd/tests/security/cve-2025-12816.js
 (Tests added)
 CVE-2025-0248 (HCL iNotes is susceptible to a Reflected Cross-site Scripting 
(XSS) vu ...)
        NOT-FOR-US: HCL
 CVE-2025-9803 (lunary-ai/lunary version 1.9.34 is vulnerable to an account 
takeover d ...)


=====================================
data/dla-needed.txt
=====================================
@@ -363,6 +363,10 @@ python-urllib3 (guilhem)
   NOTE: 20251208: Added by Front-Desk (dleidert)
   NOTE: 20251208: wait for secteam's triage of CVE-2025-66418 and 
CVE-2025-66471 (dleidert/front-desk)
 --
+python3.9
+  NOTE: 20251214: Added by Front-Desk (dleidert)
+  NOTE: 20251214: Another round of CVEs is due to be fixed 
(dleidert/front-desk)
+--
 rails (rouca)
   NOTE: 20250105: Added by Front-Desk (apo)
   NOTE: 20250305: Utkarsh uploaded the CVE fixes to unstable via 
rails/7.2.2.1. (utkarsh)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/2847170c4a9fa1b7bca2a5ecbda73a10a9996b6c...8839bb053b79ebca3f7f8fa44a8c958f8be7179c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/2847170c4a9fa1b7bca2a5ecbda73a10a9996b6c...8839bb053b79ebca3f7f8fa44a8c958f8be7179c
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to