[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Aug 8 18:48:39 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
4bc63063 by Salvatore Bonaccorso at 2025-08-08T19:48:14+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -23,13 +23,13 @@ CVE-2025-54959 (Powered BLUE Server versions 0.20130927 and prior contain a path
 CVE-2025-54958 (Powered BLUE 870 versions 0.20130927 and prior contain an OS command i ...)
 	NOT-FOR-US: Powered BLUE 870
 CVE-2025-54952 (An integer overflow vulnerability in the loading of ExecuTorch models  ...)
-	TODO: check
+	NOT-FOR-US: ExecuTorch
 CVE-2025-54951 (A group of related buffer overflow vulnerabilities in the loading of E ...)
-	TODO: check
+	NOT-FOR-US: ExecuTorch
 CVE-2025-54950 (An out-of-bounds access vulnerability in the loading of ExecuTorch mod ...)
-	TODO: check
+	NOT-FOR-US: ExecuTorch
 CVE-2025-54949 (A heap buffer overflow vulnerability in the loading of ExecuTorch mode ...)
-	TODO: check
+	NOT-FOR-US: ExecuTorch
 CVE-2025-54940 (An HTML injection vulnerability exists in WordPress plugin "Advanced C ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2025-54887 (jwe is a Ruby implementation of the RFC 7516 JSON Web Encryption (JWE) ...)
@@ -55,9 +55,9 @@ CVE-2025-48709 (An issue was discovered in BMC Control-M 9.0.21.300. When Contro
 CVE-2025-45765 (ruby-jwt v3.0.0.beta1 was discovered to contain weak encryption. NOTE: ...)
 	TODO: check
 CVE-2025-30405 (An integer overflow vulnerability in the loading of ExecuTorch models  ...)
-	TODO: check
+	NOT-FOR-US: ExecuTorch
 CVE-2025-30404 (An integer overflow vulnerability in the loading of ExecuTorch models  ...)
-	TODO: check
+	NOT-FOR-US: ExecuTorch
 CVE-2025-26513 (The installer for SAN Host Utilities for Windows versions prior to 8.0 ...)
 	NOT-FOR-US: NetApp
 CVE-2024-58257 (EnzoH has an OS command injection vulnerability. Successful exploitati ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4bc63063518308acb248ddfbc9ee460df55fdfcc

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4bc63063518308acb248ddfbc9ee460df55fdfcc
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250808/07e94262/attachment.htm>


More information about the debian-security-tracker-commits mailing list