[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Aug 19 21:12:55 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
4289cb73 by security tracker role at 2025-08-19T20:12:47+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,214 +1,370 @@
-CVE-2025-38615 [fs/ntfs3: cancle set bad inode after removing name fails]
+CVE-2025-9165 (A flaw has been found in LibTIFF 4.7.0. This affects the function _TIF ...)
+ TODO: check
+CVE-2025-9157 (A vulnerability was determined in appneta tcpreplay up to 4.5.2-beta2. ...)
+ TODO: check
+CVE-2025-9156 (A vulnerability was found in itsourcecode Sports Management System 1.0 ...)
+ TODO: check
+CVE-2025-9155 (A vulnerability has been found in itsourcecode Online Tour and Travel ...)
+ TODO: check
+CVE-2025-9154 (A flaw has been found in itsourcecode Online Tour and Travel Managemen ...)
+ TODO: check
+CVE-2025-9153 (A vulnerability was detected in itsourcecode Online Tour and Travel Ma ...)
+ TODO: check
+CVE-2025-9151 (A security flaw has been discovered in LiuYuYang01 ThriveX-Blog up to ...)
+ TODO: check
+CVE-2025-9150 (A vulnerability was identified in Surbowl dormitory-management-php up ...)
+ TODO: check
+CVE-2025-9149 (A vulnerability was determined in Wavlink WL-NU516U1 M16U1_V240425. Th ...)
+ TODO: check
+CVE-2025-9148 (A vulnerability was found in CodePhiliaX Chat2DB up to 0.3.7. This aff ...)
+ TODO: check
+CVE-2025-9147 (A vulnerability has been found in jasonclark getsemantic up to 040c96e ...)
+ TODO: check
+CVE-2025-9146 (A flaw has been found in Linksys E5600 1.1.0.26. The affected element ...)
+ TODO: check
+CVE-2025-9145 (A security vulnerability has been detected in Scada-LTS 2.7.8.1. This ...)
+ TODO: check
+CVE-2025-9144 (A weakness has been identified in Scada-LTS 2.7.8.1. This vulnerabilit ...)
+ TODO: check
+CVE-2025-9143 (A security flaw has been discovered in Scada-LTS 2.7.8.1. This affects ...)
+ TODO: check
+CVE-2025-9140 (A vulnerability was identified in Shanghai Lingdang Information Techno ...)
+ TODO: check
+CVE-2025-9139 (A vulnerability was determined in Scada-LTS 2.7.8.1. Affected by this ...)
+ TODO: check
+CVE-2025-9138 (A vulnerability was found in Scada-LTS 2.7.8.1. Affected is an unknown ...)
+ TODO: check
+CVE-2025-9137 (A vulnerability has been found in Scada-LTS 2.7.8.1. This impacts an u ...)
+ TODO: check
+CVE-2025-9136 (A flaw has been found in libretro RetroArch 1.18.0/1.19.0/1.20.0. This ...)
+ TODO: check
+CVE-2025-9135 (A vulnerability was detected in Verkehrsauskunft \xd6sterreich SmartRi ...)
+ TODO: check
+CVE-2025-9134 (A security vulnerability has been detected in AfterShip Package Tracke ...)
+ TODO: check
+CVE-2025-8783 (The Contact Manager plugin for WordPress is vulnerable to Stored Cross ...)
+ TODO: check
+CVE-2025-8782
+ REJECTED
+CVE-2025-8567 (The Nexter Blocks plugin for WordPress is vulnerable to Stored Cross-S ...)
+ TODO: check
+CVE-2025-8450 (Improper Access Control issue in the Workflow component of Fortra's Fi ...)
+ TODO: check
+CVE-2025-55740 (nginx-defender is a high-performance, enterprise-grade Web Application ...)
+ TODO: check
+CVE-2025-55737 (flaskBlog is a blog app built with Flask. In 2.8.0 and earlier, when d ...)
+ TODO: check
+CVE-2025-55736 (flaskBlog is a blog app built with Flask. In 2.8.0 and earlier, an arb ...)
+ TODO: check
+CVE-2025-55735 (flaskBlog is a blog app built with Flask. In 2.8.0 and earlier, when c ...)
+ TODO: check
+CVE-2025-55734 (flaskBlog is a blog app built with Flask. In 2.8.0 and earlier, the co ...)
+ TODO: check
+CVE-2025-55733 (DeepChat is a smart assistant that connects powerful AI to your person ...)
+ TODO: check
+CVE-2025-55306 (GenX_FX is an advance IA trading platform that will focus on forex tra ...)
+ TODO: check
+CVE-2025-55303 (Astro is a web framework for content-driven websites. In versions of a ...)
+ TODO: check
+CVE-2025-55295 (qBit Manage is a tool that helps manage tedious tasks in qBittorrent a ...)
+ TODO: check
+CVE-2025-55294 (screenshot-desktop allows capturing a screenshot of your local machine ...)
+ TODO: check
+CVE-2025-55153
+ REJECTED
+CVE-2025-54881 (Mermaid is a JavaScript based diagramming and charting tool that uses ...)
+ TODO: check
+CVE-2025-54880 (Mermaid is a JavaScript based diagramming and charting tool that uses ...)
+ TODO: check
+CVE-2025-54411 (Discourse is an open-source discussion platform. Welcome banner user n ...)
+ TODO: check
+CVE-2025-54336 (In Plesk Obsidian 18.0.70, _isAdminPasswordValid uses an == comparison ...)
+ TODO: check
+CVE-2025-52478 (n8n is a workflow automation platform. From 1.77.0 to before 1.98.2, a ...)
+ TODO: check
+CVE-2025-52338 (An issue in the default configuration of the password reset function i ...)
+ TODO: check
+CVE-2025-52337 (An authenticated arbitrary file upload vulnerability in the Content Ex ...)
+ TODO: check
+CVE-2025-51543 (An issue was discovered in Cicool builder 3.4.4 allowing attackers to ...)
+ TODO: check
+CVE-2025-51540 (EzGED3 3.5.0 stores user passwords using an insecure hashing scheme: m ...)
+ TODO: check
+CVE-2025-51539 (EzGED3 3.5.0 contains an unauthenticated arbitrary file read vulnerabi ...)
+ TODO: check
+CVE-2025-51529 (Incorrect Access Control in the AJAX endpoint functionality in jonkast ...)
+ TODO: check
+CVE-2025-51510 (MoonShine v3.12.5 was discovered to contain a SQL injection vulnerabil ...)
+ TODO: check
+CVE-2025-51506 (In the smartLibrary component of the HRForecast Suite 0.4.3, a SQL inj ...)
+ TODO: check
+CVE-2025-51489 (An arbitrary file upload vulnerability in MoonShine v3.12.4 allows att ...)
+ TODO: check
+CVE-2025-51488 (A stored cross-site scripting (XSS) vulnerability in the Create Admin ...)
+ TODO: check
+CVE-2025-51487 (A stored cross-site scripting (XSS) vulnerability in the Create Articl ...)
+ TODO: check
+CVE-2025-50938 (Cross site scripting (XSS) vulnerability in Hustoj 2025-01-31 via the ...)
+ TODO: check
+CVE-2025-50926 (Easy Hosting Control Panel EHCP v20.04.1.b was discovered to contain a ...)
+ TODO: check
+CVE-2025-50897 (A vulnerability exists in riscv-boom SonicBOOM 1.2 (BOOMv1.2) processo ...)
+ TODO: check
+CVE-2025-50891 (Adform Site Tracking 1.1 allows attackers to inject HTML or execute ar ...)
+ TODO: check
+CVE-2025-50579 (A CORS misconfiguration in Nginx Proxy Manager v2.12.3 allows unauthor ...)
+ TODO: check
+CVE-2025-50567 (Saurus CMS Community Edition 4.7.1 contains a vulnerability in the cus ...)
+ TODO: check
+CVE-2025-50461 (A deserialization vulnerability exists in Volcengine's verl 3.0.0, spe ...)
+ TODO: check
+CVE-2025-50434 (A security issue has been identified in Appian Enterprise Business Pro ...)
+ TODO: check
+CVE-2025-4690 (A regular expression used by AngularJS' linky https://docs.angularjs.o ...)
+ TODO: check
+CVE-2025-4046 (A missing authorization vulnerability in Lexmark Cloud Services badge ...)
+ TODO: check
+CVE-2025-4044 (Improper Restriction of XML External Entity Reference in various Lexma ...)
+ TODO: check
+CVE-2025-43745 (A CSRF vulnerability in Liferay Portal 7.4.0 through 7.4.3.132, and Li ...)
+ TODO: check
+CVE-2025-43744 (A stored DOM-based Cross-Site Scripting (XSS) vulnerability in Liferay ...)
+ TODO: check
+CVE-2025-43743 (Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 thro ...)
+ TODO: check
+CVE-2025-43740 (A Stored cross-site scripting vulnerability in the Liferay Portal 7.4. ...)
+ TODO: check
+CVE-2025-43739 (Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 thro ...)
+ TODO: check
+CVE-2025-43738 (A reflected cross-site scripting (XSS) vulnerability in the Liferay Po ...)
+ TODO: check
+CVE-2025-43737 (A reflected cross-site scripting (XSS) vulnerability in the Liferay Po ...)
+ TODO: check
+CVE-2025-41689 (An unauthenticated remote attacker can grant access without password p ...)
+ TODO: check
+CVE-2025-41685 (A low-privileged remote attacker can obtain the username of another re ...)
+ TODO: check
+CVE-2025-33008 (IBM Sterling B2B Integrator 6.2.1.0 and IBM Sterling File Gateway6.2.1 ...)
+ TODO: check
+CVE-2025-31988 (HCL Digital Experience is susceptible to cross site scripting (XSS) in ...)
+ TODO: check
+CVE-2025-2988 (IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 thro ...)
+ TODO: check
+CVE-2024-45062 (A stack based buffer overflow vulnerability is present in OpenPrinting ...)
+ TODO: check
+CVE-2024-44373 (A Path Traversal vulnerability in AllSky v2023.05.01_04 allows an unau ...)
+ TODO: check
+CVE-2025-38615 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/d99208b91933fd2a58ed9ed321af07dacd06ddc3 (6.17-rc1)
-CVE-2025-38614 [eventpoll: Fix semi-unbounded recursion]
+CVE-2025-38614 (In the Linux kernel, the following vulnerability has been resolved: e ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/f2e467a48287c868818085aa35389a224d226732 (6.17-rc1)
-CVE-2025-38613 [staging: gpib: fix unset padding field copy back to userspace]
+CVE-2025-38613 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/a739d3b13bff0dfa1aec679d08c7062131a2a425 (6.17-rc1)
-CVE-2025-38612 [staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc()]
+CVE-2025-38612 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/eb2cb7dab60f9be0b435ac4a674255429a36d72c (6.17-rc1)
-CVE-2025-38611 [vmci: Prevent the dispatching of uninitialized payloads]
+CVE-2025-38611 (In the Linux kernel, the following vulnerability has been resolved: v ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/bfb4cf9fb97e4063f0aa62e9e398025fb6625031 (6.17-rc1)
-CVE-2025-38610 [powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw()]
+CVE-2025-38610 (In the Linux kernel, the following vulnerability has been resolved: p ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/46dc57406887dd02565cb264224194a6776d882b (6.17-rc1)
-CVE-2025-38609 [PM / devfreq: Check governor before using governor->name]
+CVE-2025-38609 (In the Linux kernel, the following vulnerability has been resolved: P ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/bab7834c03820eb11269bc48f07c3800192460d2 (6.17-rc1)
-CVE-2025-38608 [bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls]
+CVE-2025-38608 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/178f6a5c8cb3b6be1602de0964cd440243f493c9 (6.17-rc1)
-CVE-2025-38607 [bpf: handle jset (if a Description: b ...) as a jump in CFG computation]
+CVE-2025-38607 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/3157f7e2999616ac91f4d559a8566214f74000a5 (6.17-rc1)
-CVE-2025-38606 [wifi: ath12k: Avoid accessing uninitialized arvif->ar during beacon miss]
+CVE-2025-38606 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/36670b67de18f1e5d34900c5d2ac60a8970c293c (6.17-rc1)
-CVE-2025-38605 [wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type()]
+CVE-2025-38605 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux <unfixed>
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/05062834350f0bf7ad1abcebc2807220e90220eb (6.17-rc1)
-CVE-2025-38604 [wifi: rtl818x: Kill URBs before clearing tx status queue]
+CVE-2025-38604 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/16d8fd74dbfca0ea58645cd2fca13be10cae3cdd (6.17-rc1)
-CVE-2025-38603 [drm/amdgpu: fix slab-use-after-free in amdgpu_userq_mgr_fini+0x70c]
+CVE-2025-38603 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/5fb90421fa0fbe0a968274912101fe917bf1c47b (6.17-rc1)
-CVE-2025-38602 [iwlwifi: Add missing check for alloc_ordered_workqueue]
+CVE-2025-38602 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/90a0d9f339960448a3acc1437a46730f975efd6a (6.17-rc1)
-CVE-2025-38601 [wifi: ath11k: clear initialized flag for deinit-ed srng lists]
+CVE-2025-38601 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/a5b46aa7cf5f05c213316a018e49a8e086efd98e (6.17-rc1)
-CVE-2025-38600 [wifi: mt76: mt7925: fix off by one in mt7925_mcu_hw_scan()]
+CVE-2025-38600 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/b3a431fe2e399b2e0cc5f43f7e9d63d63d3710ee (6.17-rc1)
-CVE-2025-38599 [wifi: mt76: mt7996: Fix possible OOB access in mt7996_tx()]
+CVE-2025-38599 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/64cbf0d7ce9afe20666da90ec6ecaec6ba5ac64b (6.17-rc1)
-CVE-2025-38598 [drm/amdgpu: fix use-after-free in amdgpu_userq_suspend+0x51a/0x5a0]
+CVE-2025-38598 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/a886d26f2c8f9e3f3c1869ae368d09c75daac553 (6.17-rc1)
-CVE-2025-38597 [drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port]
+CVE-2025-38597 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/f9f68bf1d0efeadb6c427c9dbb30f307a7def19b (6.17-rc1)
-CVE-2025-38596 [drm/panthor: Fix UAF in panthor_gem_create_with_handle() debugfs code]
+CVE-2025-38596 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/fe69a391808404977b1f002a6e7447de3de7a88e (6.17-rc1)
-CVE-2025-38595 [xen: fix UAF in dmabuf_exp_from_pages()]
+CVE-2025-38595 (In the Linux kernel, the following vulnerability has been resolved: x ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/532c8b51b3a8676cbf533a291f8156774f30ea87 (6.17-rc1)
-CVE-2025-38594 [iommu/vt-d: Fix UAF on sva unbind with pending IOPFs]
+CVE-2025-38594 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/f0b9d31c6edd50a6207489cd1bd4ddac814b9cd2 (6.17-rc1)
-CVE-2025-38593 [Bluetooth: hci_sync: fix double free in 'hci_discovery_filter_clear()']
+CVE-2025-38593 (In the Linux kernel, the following vulnerability has been resolved: B ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/2935e556850e9c94d7a00adf14d3cd7fe406ac03 (6.17-rc1)
-CVE-2025-38592 [Bluetooth: hci_devcd_dump: fix out-of-bounds via dev_coredumpv]
+CVE-2025-38592 (In the Linux kernel, the following vulnerability has been resolved: B ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/7af4d7b53502286c6cf946d397ab183e76d14820 (6.17-rc1)
-CVE-2025-38591 [bpf: Reject narrower access to pointer ctx fields]
+CVE-2025-38591 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/e09299225d5ba3916c91ef70565f7d2187e4cca0 (6.17-rc1)
-CVE-2025-38590 [net/mlx5e: Remove skb secpath if xfrm state is not found]
+CVE-2025-38590 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/6d19c44b5c6dd72f9a357d0399604ec16a77de3c (6.17-rc1)
-CVE-2025-38589 [neighbour: Fix null-ptr-deref in neigh_flush_dev().]
+CVE-2025-38589 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/1bbb76a899486827394530916f01214d049931b3 (6.17-rc1)
-CVE-2025-38588 [ipv6: prevent infinite loop in rt6_nlmsg_size()]
+CVE-2025-38588 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/54e6fe9dd3b0e7c481c2228782c9494d653546da (6.17-rc1)
-CVE-2025-38587 [ipv6: fix possible infinite loop in fib6_info_uses_dev()]
+CVE-2025-38587 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/f8d8ce1b515a0a6af72b30502670a406cfb75073 (6.17-rc1)
-CVE-2025-38586 [bpf, arm64: Fix fp initialization for exception boundary]
+CVE-2025-38586 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux <unfixed>
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/b114fcee766d5101eada1aca7bb5fd0a86c89b35 (6.17-rc1)
-CVE-2025-38585 [staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int()]
+CVE-2025-38585 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/ee4cf798202d285dcbe85e4467a094c44f5ed8e6 (6.17-rc1)
-CVE-2025-38584 [padata: Fix pd UAF once and for all]
+CVE-2025-38584 (In the Linux kernel, the following vulnerability has been resolved: p ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/71203f68c7749609d7fc8ae6ad054bdedeb24f91 (6.17-rc1)
-CVE-2025-38583 [clk: xilinx: vcu: unregister pll_post only if registered correctly]
+CVE-2025-38583 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/3b0abc443ac22f7d4f61ddbbbbc5dbb06c87139d (6.17-rc1)
-CVE-2025-38582 [RDMA/hns: Fix double destruction of rsv_qp]
+CVE-2025-38582 (In the Linux kernel, the following vulnerability has been resolved: R ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/c6957b95ecc5b63c5a4bb4ecc28af326cf8f6dc8 (6.17-rc1)
-CVE-2025-38581 [crypto: ccp - Fix crash when rebind ccp device for ccp.ko]
+CVE-2025-38581 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/181698af38d3f93381229ad89c09b5bd0496661a (6.17-rc1)
-CVE-2025-38580 [ext4: fix inode use after free in ext4_end_io_rsv_work()]
+CVE-2025-38580 (In the Linux kernel, the following vulnerability has been resolved: e ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/c678bdc998754589cea2e6afab9401d7d8312ac4 (6.17-rc1)
-CVE-2025-38579 [f2fs: fix KMSAN uninit-value in extent_info usage]
+CVE-2025-38579 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/154467f4ad033473e5c903a03e7b9bca7df9a0fa (6.17-rc1)
-CVE-2025-38578 [f2fs: fix to avoid UAF in f2fs_sync_inode_meta()]
+CVE-2025-38578 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/7c30d79930132466f5be7d0b57add14d1a016bda (6.17-rc1)
-CVE-2025-38577 [f2fs: fix to avoid panic in f2fs_evict_inode]
+CVE-2025-38577 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/a509a55f8eecc8970b3980c6f06886bbff0e2f68 (6.17-rc1)
-CVE-2025-38576 [powerpc/eeh: Make EEH driver device hotplug safe]
+CVE-2025-38576 (In the Linux kernel, the following vulnerability has been resolved: p ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/1010b4c012b0d78dfb9d3132b49aa2ef024a07a7 (6.17-rc1)
-CVE-2025-38574 [pptp: ensure minimal skb length in pptp_xmit()]
+CVE-2025-38574 (In the Linux kernel, the following vulnerability has been resolved: p ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/de9c4861fb42f0cd72da844c3c34f692d5895b7b (6.17-rc1)
-CVE-2025-38573 [spi: cs42l43: Property entry should be a null-terminated array]
+CVE-2025-38573 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux <unfixed>
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/ffcfd071eec7973e58c4ffff7da4cb0e9ca7b667 (6.17-rc1)
-CVE-2025-38572 [ipv6: reject malicious packets in ipv6_gso_segment()]
+CVE-2025-38572 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/d45cf1e7d7180256e17c9ce88e32e8061a7887fe (6.17-rc1)
-CVE-2025-38571 [sunrpc: fix client side handling of tls alerts]
+CVE-2025-38571 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux <unfixed>
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/cc5d59081fa26506d02de2127ab822f40d88bc5a (6.17-rc1)
-CVE-2025-38570 [eth: fbnic: unlink NAPIs from queues on error to open]
+CVE-2025-38570 (In the Linux kernel, the following vulnerability has been resolved: e ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/4b31bcb025cb497da2b01f87173108ff32d350d2 (6.17-rc1)
-CVE-2025-38569 [benet: fix BUG when creating VFs]
+CVE-2025-38569 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/5a40f8af2ba1b9bdf46e2db10e8c9710538fbc63 (6.17-rc1)
-CVE-2025-38568 [net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing]
+CVE-2025-38568 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux <unfixed>
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/ffd2dc4c6c49ff4f1e5d34e454a6a55608104c17 (6.17-rc1)
-CVE-2025-38567 [nfsd: avoid ref leak in nfsd_open_local_fh()]
+CVE-2025-38567 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/e5a73150776f18547ee685c9f6bfafe549714899 (6.17-rc2)
-CVE-2025-38566 [sunrpc: fix handling of server side tls alerts]
+CVE-2025-38566 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux <unfixed>
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/bee47cb026e762841f3faece47b51f985e215edb (6.17-rc2)
-CVE-2025-38565 [perf/core: Exit early on perf_mmap() fail]
+CVE-2025-38565 (In the Linux kernel, the following vulnerability has been resolved: p ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/07091aade394f690e7b655578140ef84d0e8d7b0 (6.17-rc1)
-CVE-2025-38564 [perf/core: Handle buffer mapping fail correctly in perf_mmap()]
+CVE-2025-38564 (In the Linux kernel, the following vulnerability has been resolved: p ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/f74b9f4ba63ffdf597aaaa6cad7e284cb8e04820 (6.17-rc1)
-CVE-2025-38563 [perf/core: Prevent VMA split of buffer mappings]
+CVE-2025-38563 (In the Linux kernel, the following vulnerability has been resolved: p ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/b024d7b56c77191cde544f838debb7f8451cd0d6 (6.17-rc1)
-CVE-2025-38562 [ksmbd: fix null pointer dereference error in generate_encryptionkey]
+CVE-2025-38562 (In the Linux kernel, the following vulnerability has been resolved: k ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/9b493ab6f35178afd8d619800df9071992f715de (6.17-rc1)
-CVE-2025-38561 [ksmbd: fix Preauh_HashValue race condition]
+CVE-2025-38561 (In the Linux kernel, the following vulnerability has been resolved: k ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/44a3059c4c8cc635a1fb2afd692d0730ca1ba4b6 (6.17-rc1)
-CVE-2025-38560 [x86/sev: Evict cache lines during SNP memory validation]
+CVE-2025-38560 (In the Linux kernel, the following vulnerability has been resolved: x ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/7b306dfa326f70114312b320d083b21fa9481e1e (6.17-rc2)
-CVE-2025-38559 [platform/x86/intel/pmt: fix a crashlog NULL pointer access]
+CVE-2025-38559 (In the Linux kernel, the following vulnerability has been resolved: p ...)
- linux <unfixed>
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/54d5cd4719c5e87f33d271c9ac2e393147d934f8 (6.17-rc1)
-CVE-2025-38558 [usb: gadget: uvc: Initialize frame-based format color matching descriptor]
+CVE-2025-38558 (In the Linux kernel, the following vulnerability has been resolved: u ...)
- linux <unfixed>
[trixie] - linux <not-affected> (Vulnerable code not present)
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/323a80a1a5ace319a722909c006d5bdb2a35d273 (6.17-rc1)
-CVE-2025-38557 [HID: apple: validate feature-report field count to prevent NULL pointer dereference]
+CVE-2025-38557 (In the Linux kernel, the following vulnerability has been resolved: H ...)
- linux <unfixed>
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/1bb3363da862e0464ec050eea2fb5472a36ad86b (6.17-rc1)
-CVE-2025-38556 [HID: core: Harden s32ton() against conversion to 0 bits]
+CVE-2025-38556 (In the Linux kernel, the following vulnerability has been resolved: H ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd (6.17-rc1)
-CVE-2025-38555 [usb: gadget : fix use-after-free in composite_dev_cleanup()]
+CVE-2025-38555 (In the Linux kernel, the following vulnerability has been resolved: u ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/151c0aa896c47a4459e07fee7d4843f44c1bb18e (6.17-rc1)
-CVE-2025-38554 [mm: fix a UAF when vma->mm is freed after vma->vm_refcnt got dropped]
+CVE-2025-38554 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/9bbffee67ffd16360179327b57f3b1245579ef08 (6.17-rc1)
CVE-2025-XXXX [imagemagick GHSA-9ccg-6pjw-x645]
@@ -439132,7 +439288,7 @@ CVE-2020-13119 (ismartgate PRO 1.5.9 is vulnerable to clickjacking.)
NOT-FOR-US: ismartgate PRO
CVE-2020-13118 (An issue was discovered in Mikrotik-Router-Monitoring-System through 2 ...)
NOT-FOR-US: Mikrotik-Router-Monitoring-System
-CVE-2020-13117 (Wavlink WN575A4 and WN579X3 devices through 2020-05-15 allow unauthent ...)
+CVE-2020-13117 (Wavlink WN575A4, WN579X3, and WN530G3A devices through 2020-05-15 allo ...)
NOT-FOR-US: Wavlink WN575A4 and WN579X3 devices
CVE-2020-13116 (OpenText Carbonite Server Backup Portal before 8.8.7 allows XSS by an ...)
NOT-FOR-US: OpenText Carbonite Server Backup Portal
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4289cb73c43609d65f029788294778eeedf3163a
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4289cb73c43609d65f029788294778eeedf3163a
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250819/ccdf9c60/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list