[Git][security-tracker-team/security-tracker][master] trixie triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Wed Apr 23 07:43:47 BST 2025
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
2fdbc960 by Moritz Muehlenhoff at 2025-04-23T08:42:52+02:00
trixie triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -4201,6 +4201,7 @@ CVE-2025-32464 (HAProxy 2.2 through 3.1.6, in certain uncommon configurations, h
- haproxy <unfixed> (bug #1102673)
NOTE: Introduced with: https://github.com/haproxy/haproxy/commit/07e1e3c93e74e44389545e457f0e1ff2e807cb9a (v2.2-dev3)
NOTE: Fixed by: https://github.com/haproxy/haproxy/commit/3e3b9eebf871510aee36c3a3336faac2f38c9559 (v3.2-dev10)
+ NOTE: Fixed by: https://git.haproxy.org/?p=haproxy-3.0.git;a=commit;h=ee1a64c2a04cc2cb38efb7e44f7ea7386d627bf6 (v3.0.10)
CVE-2025-32461 (wikiplugin_includetpl in lib/wiki-plugins/wikiplugin_includetpl.php in ...)
- tikiwiki <removed>
CVE-2025-30294 (ColdFusion versions 2023.12, 2021.18, 2025.0 and earlier are affected ...)
@@ -5097,12 +5098,16 @@ CVE-2025-29482 (Buffer Overflow vulnerability in libheif 1.19.7 allows a local a
NOTE: https://github.com/lmarch2/poc/blob/main/libheif/libheif.md
NOTE: https://github.com/strukturag/libde265/issues/472
CVE-2025-29481 (Buffer Overflow vulnerability in libbpf 1.5.0 allows a local attacker ...)
- - libbpf <unfixed> (bug #1102672)
NOTE: https://github.com/lmarch2/poc/blob/main/libbpf/libbpf.md
NOTE: https://github.com/libbpf/libbpf/issues/898
NOTE: https://lore.kernel.org/bpf/20250410095517.141271-1-vmalik@redhat.com/
+ NOTE: Disputed libbpf issue (was also filed as #1102672) :
+ NOTE: https://lore.kernel.org/bpf/67b2be76-e1db-4163-995c-57073f127d7a@redhat.com/
+ NOTE: https://lore.kernel.org/bpf/CAEf4Bzb2S+1TonOp9UH86r0e6aGG2LEA4kwbQhJWr=9Xju=NEw@mail.gmail.com/
CVE-2025-29480 (Buffer Overflow vulnerability in gdal 3.10.2 allows a local attacker t ...)
- gdal <unfixed> (bug #1103839)
+ [trixie] - gdal <postponed> (Minor issue, revisit when fixed upstream)
+ [bookworm] - gdal <postponed> (Minor issue, revisit when fixed upstream)
[bullseye] - gdal <postponed> (Minor issue, revisit when fixed upstream)
NOTE: https://github.com/lmarch2/poc/blob/main/gdal/gdal.md
NOTE: https://github.com/OSGeo/gdal/issues/12188
@@ -140943,7 +140948,8 @@ CVE-2023-48795 (The SSH transport protocol with certain OpenSSH extensions, foun
- python-asyncssh 2.15.0-1 (bug #1059007)
- tinyssh 20230101-4 (bug #1059058; unimportant)
- trilead-ssh2 <unfixed> (bug #1059294)
- [bookworm] - trilead-ssh2 <ignored> (Minor issue)
+ [trixie] - trilead-ssh2 <ignored> (Minor issue, only reverse dep uses client-side only)
+ [bookworm] - trilead-ssh2 <ignored> (Minor issue, only reverse dep uses client-side only)
[bullseye] - trilead-ssh2 <no-dsa> (Minor issue)
[buster] - trilead-ssh2 <no-dsa> (Minor issue)
NOTE: https://terrapin-attack.com/
@@ -169764,6 +169770,7 @@ CVE-2023-34624 (An issue was discovered htmlcleaner thru = 2.28 allows attackers
NOTE: https://github.com/amplafi/htmlcleaner/issues/13
CVE-2023-34623 (An issue was discovered jtidy thru r938 allows attackers to cause a de ...)
- jtidy <unfixed> (bug #1038663)
+ [trixie] - jtidy <postponed> (Minor issue, revisit when fixed upstream)
[bookworm] - jtidy <postponed> (Minor issue, revisit when fixed upstream)
[bullseye] - jtidy <no-dsa> (Minor issue)
[buster] - jtidy <postponed> (Minor issue, DoS)
@@ -226756,6 +226763,7 @@ CVE-2023-3637 (An uncontrolled resource consumption flaw was found in openstack-
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2222270
CVE-2022-3277 (An uncontrolled resource consumption flaw was found in openstack-neutr ...)
- neutron <unfixed> (bug #1027150)
+ [trixie] - neutron <postponed> (Minor issue, revisit when fixed upstream)
[bookworm] - neutron <postponed> (Minor issue, revisit when fixed upstream)
[bullseye] - neutron <no-dsa> (Minor issue)
[buster] - neutron <no-dsa> (Minor issue)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2fdbc960d52c062b82c38b7850fe085cc91f37cd
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2fdbc960d52c062b82c38b7850fe085cc91f37cd
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250423/1e54c61f/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list