[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Aug 11 09:12:18 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
decf8a25 by security tracker role at 2025-08-11T08:12:11+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,73 @@
+CVE-2025-8854 (Stack-based buffer overflow in LoadOFF in bulletphysics bullet3 before ...)
+	TODO: check
+CVE-2025-8836 (A vulnerability was determined in JasPer up to 4.2.5. Affected by this ...)
+	TODO: check
+CVE-2025-8835 (A vulnerability was found in JasPer up to 4.2.5. Affected by this vuln ...)
+	TODO: check
+CVE-2025-8834 (A vulnerability has been found in JCG Link-net LW-N915R 17s.20.001.908 ...)
+	TODO: check
+CVE-2025-8833 (A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE65 ...)
+	TODO: check
+CVE-2025-8832 (A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE65 ...)
+	TODO: check
+CVE-2025-8831 (A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, R ...)
+	TODO: check
+CVE-2025-8830 (A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE65 ...)
+	TODO: check
+CVE-2025-8829 (A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE65 ...)
+	TODO: check
+CVE-2025-8828 (A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE65 ...)
+	TODO: check
+CVE-2025-8827 (A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, R ...)
+	TODO: check
+CVE-2025-8826 (A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE65 ...)
+	TODO: check
+CVE-2025-8825 (A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE65 ...)
+	TODO: check
+CVE-2025-8824 (A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE65 ...)
+	TODO: check
+CVE-2025-8823 (A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, R ...)
+	TODO: check
+CVE-2025-8822 (A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE65 ...)
+	TODO: check
+CVE-2025-8821 (A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE65 ...)
+	TODO: check
+CVE-2025-8820 (A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE65 ...)
+	TODO: check
+CVE-2025-8819 (A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, R ...)
+	TODO: check
+CVE-2025-8818 (A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE65 ...)
+	TODO: check
+CVE-2025-8817 (A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE65 ...)
+	TODO: check
+CVE-2025-8747 (A safe mode bypass vulnerability in the `Model.load_model` method in K ...)
+	TODO: check
+CVE-2025-8661 (A stored Cross-Site Scripting vulnerability (XSS) occurs when the serv ...)
+	TODO: check
+CVE-2025-8660 (Privilege escalation occurs when a user gets access to more resources  ...)
+	TODO: check
+CVE-2025-7965 (The CBX Restaurant Booking WordPress plugin through 1.2.1 does not hav ...)
+	TODO: check
+CVE-2025-27577 (in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitr ...)
+	TODO: check
+CVE-2025-27562 (in OpenHarmony v5.0.3 and prior versions allow a local attacker case D ...)
+	TODO: check
+CVE-2025-27536 (in OpenHarmony v5.0.3 and prior versions allow a local attacker cause  ...)
+	TODO: check
+CVE-2025-27128 (in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitr ...)
+	TODO: check
+CVE-2025-26690 (in OpenHarmony v5.0.3 and prior versions allow a local attacker case D ...)
+	TODO: check
+CVE-2025-25278 (in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitr ...)
+	TODO: check
+CVE-2025-25212 (in OpenHarmony v5.0.3 and prior versions allow a local attacker case D ...)
+	TODO: check
+CVE-2025-24925 (in OpenHarmony v5.0.3 and prior versions allow a local attacker case D ...)
+	TODO: check
+CVE-2025-24844 (in OpenHarmony v5.0.3 and prior versions allow a local attacker case D ...)
+	TODO: check
+CVE-2025-24298 (in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitr ...)
+	TODO: check
 CVE-2025-8816 (A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE65 ...)
 	NOT-FOR-US: Linksys
 CVE-2025-8815 (A vulnerability was found in \u732b\u5b81i Morning up to bc782730c74ff ...)
@@ -4185,8 +4255,8 @@ CVE-2025-8058 (The regcomp function in the GNU C library version from 2.4 to 2.4
 	NOTE: https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2025-0005
 	NOTE: Inroduced with: https://sourceware.org/git/?p=glibc.git;a=commit;h=963d8d782fc98fb6dc3a66f0068795f9920c269d
 	NOTE: Fixed by: https://sourceware.org/git/?p=glibc.git;a=commit;h=7ea06e994093fa0bcca0d0ee2c1db271d8d7885d
-CVE-2025-8022
-	REJECTED
+CVE-2025-8022 (Versions of the package bun after 0.0.12 are vulnerable to Improper Ne ...)
+	TODO: check
 CVE-2025-8021 (All versions of the package files-bucket-server are vulnerable to Dire ...)
 	NOT-FOR-US: files-bucket-server Node.js module
 CVE-2025-8020 (All versions of the package private-ip are vulnerable to Server-Side R ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/decf8a2542b2473bf17f6d2dbff70c893e18f906

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/decf8a2542b2473bf17f6d2dbff70c893e18f906
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250811/fd25d06e/attachment.htm>


More information about the debian-security-tracker-commits mailing list