[Git][security-tracker-team/security-tracker][master] binutils fixed in sid
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Tue Aug 19 10:43:49 BST 2025
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
67f4d5a5 by Moritz Muehlenhoff at 2025-08-19T11:43:32+02:00
binutils fixed in sid
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -41691,7 +41691,7 @@ CVE-2025-3202 (A vulnerability classified as critical has been found in ageerle
CVE-2025-3199 (A vulnerability was found in ageerle ruoyi-ai up to 2.0.1 and classifi ...)
NOT-FOR-US: ageerle ruoyi-ai
CVE-2025-3198 (A vulnerability has been found in GNU Binutils 2.43/2.44 and classifie ...)
- - binutils <unfixed> (unimportant)
+ - binutils 2.45-3 (unimportant)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32716
NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=ba6ad3a18cb26b79e0e3b84c39f707535bbc344d
NOTE: binutils not covered by security support
@@ -61335,12 +61335,12 @@ CVE-2025-23187 (Due to missing authorization check in an RFC enabled function mo
CVE-2025-1211 (Versions of the package hackney before 1.21.0 are vulnerable to Server ...)
NOT-FOR-US: hackney
CVE-2025-1181 (A vulnerability classified as critical was found in GNU Binutils 2.43. ...)
- - binutils <unfixed> (unimportant; bug #1108986)
+ - binutils 2.45-3 (unimportant; bug #1108986)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32643
NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=931494c9a89558acb36a03a340c01726545eef24
NOTE: binutils not covered by security support
CVE-2025-1180 (A vulnerability classified as problematic has been found in GNU Binuti ...)
- - binutils <unfixed> (unimportant; bug #1108986)
+ - binutils 2.45-3 (unimportant; bug #1108986)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32642
NOTE: binutils not covered by security support
CVE-2025-1179 (A vulnerability was found in GNU Binutils 2.43. It has been rated as c ...)
@@ -61349,14 +61349,14 @@ CVE-2025-1179 (A vulnerability was found in GNU Binutils 2.43. It has been rated
NOTE: binutils not covered by security support
NOTE: No exact commits pinpointed, but upstream confirms this fixed in 2.44
CVE-2025-1178 (A vulnerability was found in GNU Binutils 2.43. It has been declared a ...)
- - binutils <unfixed> (unimportant; bug #1108986)
+ - binutils 2.45-3 (unimportant; bug #1108986)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32638
NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75086e9de1707281172cc77f178e7949a4414ed0
NOTE: binutils not covered by security support
CVE-2025-1177 (A vulnerability was found in dayrui XunRuiCMS 4.6.3. It has been class ...)
NOT-FOR-US: dayrui XunRuiCMS
CVE-2025-1176 (A vulnerability was found in GNU Binutils 2.43 and classified as criti ...)
- - binutils <unfixed> (unimportant; bug #1108986)
+ - binutils 2.45-3 (unimportant; bug #1108986)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32636
NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f9978defb6fab0bd8583942d97c112b0932ac814
NOTE: binutils not covered by security support
@@ -61670,34 +61670,40 @@ CVE-2025-1155 (A vulnerability, which was classified as problematic, was found i
CVE-2025-1154 (A vulnerability, which was classified as critical, has been found in x ...)
NOT-FOR-US: xxyopen Novel
CVE-2025-1153 (A vulnerability classified as problematic was found in GNU Binutils 2. ...)
- - binutils <unfixed> (unimportant)
+ - binutils 2.45-3 (unimportant)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32603
NOTE: https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150
NOTE: binutils not covered by security support
CVE-2025-1152 (A vulnerability classified as problematic has been found in GNU Binuti ...)
- - binutils <unfixed> (unimportant)
+ - binutils 2.45-3 (unimportant)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32576
NOTE: binutils not covered by security support
+ NOTE: These were fixed in master, so 2.45 at the time
CVE-2025-1151 (A vulnerability was found in GNU Binutils 2.43. It has been rated as p ...)
- - binutils <unfixed> (unimportant)
+ - binutils 2.45-3 (unimportant)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32576
NOTE: binutils not covered by security support
+ NOTE: These were fixed in master, so 2.45 at the time
CVE-2025-1150 (A vulnerability was found in GNU Binutils 2.43. It has been declared a ...)
- - binutils <unfixed> (unimportant)
+ - binutils 2.45-3 (unimportant)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32576
NOTE: binutils not covered by security support
+ NOTE: These were fixed in master, so 2.45 at the time
CVE-2025-1149 (A vulnerability was found in GNU Binutils 2.43. It has been classified ...)
- - binutils <unfixed> (unimportant)
+ - binutils 2.45-3 (unimportant)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32576
NOTE: binutils not covered by security support
+ NOTE: These were fixed in master, so 2.45 at the time
CVE-2025-1148 (A vulnerability was found in GNU Binutils 2.43 and classified as probl ...)
- - binutils <unfixed> (unimportant)
+ - binutils 2.45-3 (unimportant)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32576
NOTE: binutils not covered by security support
+ NOTE: These were fixed in master, so 2.45 at the time
CVE-2025-1147 (A vulnerability has been found in GNU Binutils 2.43 and classified as ...)
- - binutils <unfixed> (unimportant)
+ - binutils 2.45-3 (unimportant)
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=32556
NOTE: binutils not covered by security support
+ NOTE: These were fixed in master, so 2.45 at the time
CVE-2025-1099 (This vulnerability exists in Tapo C500 Wi-Fi camera due to hard-coded ...)
NOT-FOR-US: TP-Link
CVE-2024-8685 (Path-Traversal vulnerability in Revolution Pi version 2022-07-28-revpi ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/67f4d5a58962d02858a707b5e1fb98f129b9366a
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/67f4d5a58962d02858a707b5e1fb98f129b9366a
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250819/18dc5a40/attachment.htm>
More information about the debian-security-tracker-commits
mailing list