[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Dec 10 20:13:42 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
43838ae7 by security tracker role at 2025-12-10T20:13:24+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,363 @@
+CVE-2025-9315 (An unauthenticated device registration vulnerability, caused by Improp ...)
+	TODO: check
+CVE-2025-8110 (Improper Symbolic link handling in the PutContents API in Gogs allows  ...)
+	TODO: check
+CVE-2025-7073 (A local privilege escalation vulnerability in Bitdefender Total Securi ...)
+	TODO: check
+CVE-2025-67643 (Jenkins Redpen - Pipeline Reporter for Jira Plugin 1.054.v7b_9517b_6b_ ...)
+	TODO: check
+CVE-2025-67642 (Jenkins HashiCorp Vault Plugin 371.v884a_4dd60fb_6 and earlier does no ...)
+	TODO: check
+CVE-2025-67641 (Jenkins Coverage Plugin 2.3054.ve1ff7b_a_a_123b_ and earlier does not  ...)
+	TODO: check
+CVE-2025-67640 (Jenkins Git client Plugin 6.4.0 and earlier does not not correctly esc ...)
+	TODO: check
+CVE-2025-67639 (A cross-site request forgery (CSRF) vulnerability in Jenkins 2.540 and ...)
+	TODO: check
+CVE-2025-67638 (Jenkins 2.540 and earlier, LTS 2.528.2 and earlier does not mask build ...)
+	TODO: check
+CVE-2025-67637 (Jenkins 2.540 and earlier, LTS 2.528.2 and earlier stores build author ...)
+	TODO: check
+CVE-2025-67636 (A missing permission check in Jenkins 2.540 and earlier, LTS 2.528.2 a ...)
+	TODO: check
+CVE-2025-67635 (Jenkins 2.540 and earlier, LTS 2.528.2 and earlier does not properly c ...)
+	TODO: check
+CVE-2025-66675 (Denial of Service vulnerability in Apache Struts, file leak in multipa ...)
+	TODO: check
+CVE-2025-66004 (A Path Traversal vulnerability in usbmuxd allows local users to escala ...)
+	TODO: check
+CVE-2025-65815 (A lack of security checks in the file import process of AB TECHNOLOGY  ...)
+	TODO: check
+CVE-2025-65814 (A lack of security checks in the file import process of RHOPHI Analyti ...)
+	TODO: check
+CVE-2025-65807 (An issue in sd command v1.0.0 and before allows attackers to escalate  ...)
+	TODO: check
+CVE-2025-65803 (An integer overflow in the psdParser::ReadImageData function of FreeIm ...)
+	TODO: check
+CVE-2025-65792 (DataGear v5.5.0 is vulnerable to Arbitrary File Deletion.)
+	TODO: check
+CVE-2025-65754 (Cross Site Scripting vulnerability in Algernon v1.17.4 allows attacker ...)
+	TODO: check
+CVE-2025-65602 (A template injection vulnerability in the /vip/v1/file/save component  ...)
+	TODO: check
+CVE-2025-65199 (A command injection vulnerability exists in Windscribe for Linux Deskt ...)
+	TODO: check
+CVE-2025-64888 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64887 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64881 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64875 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64873 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64872 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64869 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64863 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64861 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64858 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64857 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64853 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64852 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64850 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64847 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64845 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64841 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64840 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64839 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64833 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64829 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64827 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64826 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64825 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64823 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64822 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64821 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64820 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64817 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64814 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64808 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64804 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64803 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64802 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64801 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64800 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64799 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64797 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64796 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64794 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64793 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64792 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64791 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64790 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64789 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64627 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64626 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64623 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64622 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64620 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64619 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64616 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64615 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64614 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64613 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64612 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64611 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64609 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64607 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64606 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64605 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64604 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64603 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64602 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64601 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64600 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64599 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64598 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64597 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64596 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64594 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64593 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64592 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64591 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64590 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64586 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64585 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64583 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64582 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64581 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64580 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64579 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64578 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64577 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64576 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64575 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64574 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64572 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64569 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64566 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64565 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64564 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64563 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64562 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64560 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64559 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64558 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64557 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64556 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64555 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64554 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64553 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64551 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64550 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64549 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64548 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64547 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64546 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64545 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64544 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64543 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64541 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64539 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64538 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-64537 (Adobe Experience Manager versions 6.5.23 and earlier are affected by a ...)
+	TODO: check
+CVE-2025-63895 (An issue in the Bluetooth firmware of JXL 9 Inch Car Android Double Di ...)
+	TODO: check
+CVE-2025-63094 (XiangShan Nanhu V2 and XiangShan Kunmighu V3 were discovered to use sp ...)
+	TODO: check
+CVE-2025-5467 (It was discovered that process_crash() in data/apport in Canonical's A ...)
+	TODO: check
+CVE-2025-56431 (Directory Traversal vulnerability in Fearless Geek Media FearlessCMS v ...)
+	TODO: check
+CVE-2025-56430 (Directory Traversal vulnerability in Fearless Geek Media FearlessCMS v ...)
+	TODO: check
+CVE-2025-56429 (Cross Site Scripting vulnerability in Fearless Geek Media FearlessCMS  ...)
+	TODO: check
+CVE-2025-52493 (PagerDuty Runbook through 2025-06-12 exposes stored secrets directly i ...)
+	TODO: check
+CVE-2025-41732 (An unauthenticated remote attacker can abuse unsafe sscanf calls withi ...)
+	TODO: check
+CVE-2025-41730 (An unauthenticated remote attacker can abuse unsafe sscanf calls withi ...)
+	TODO: check
+CVE-2025-41358 (Direct Object Reference Vulnerability (IDOR) in i2A's CronosWeb, in ve ...)
+	TODO: check
+CVE-2025-34430 (1Panel versions 1.10.33 through 2.0.15 contain a cross-site request fo ...)
+	TODO: check
+CVE-2025-34429 (1Panel versions 1.10.33 - 2.0.15 contain a cross-site request forgery  ...)
+	TODO: check
+CVE-2025-34428 (MailEnable versions prior to 10.54 contain a cleartext storage of cred ...)
+	TODO: check
+CVE-2025-34427 (MailEnable versions prior to 10.54 contain a cleartext storage of cred ...)
+	TODO: check
+CVE-2025-34424 (MailEnable versions prior to 10.54 contain an unsafe DLL loading vulne ...)
+	TODO: check
+CVE-2025-34423 (MailEnable versions prior to 10.54 contain an unsafe DLL loading vulne ...)
+	TODO: check
+CVE-2025-34422 (MailEnable versions prior to 10.54 contain an unsafe DLL loading vulne ...)
+	TODO: check
+CVE-2025-34421 (MailEnable versions prior to 10.54 contain an unsafe DLL loading vulne ...)
+	TODO: check
+CVE-2025-34420 (MailEnable versions prior to 10.54 contain an unsafe DLL loading vulne ...)
+	TODO: check
+CVE-2025-34419 (MailEnable versions prior to 10.54 contain an unsafe DLL loading vulne ...)
+	TODO: check
+CVE-2025-34418 (MailEnable versions prior to 10.54 contain an unsafe DLL loading vulne ...)
+	TODO: check
+CVE-2025-34417 (MailEnable versions prior to 10.54 contain an unsafe DLL loading vulne ...)
+	TODO: check
+CVE-2025-34416 (MailEnable versions prior to 10.54 contain an unsafe DLL loading vulne ...)
+	TODO: check
+CVE-2025-34410 (1Panel versions 1.10.33 -2.0.15 contain a cross-site request forgery ( ...)
+	TODO: check
+CVE-2025-34395 (Barracuda Service Center, as implemented in the RMM solution, in versi ...)
+	TODO: check
+CVE-2025-34394 (Barracuda Service Center, as implemented in the RMM solution, in versi ...)
+	TODO: check
+CVE-2025-34393 (Barracuda Service Center, as implemented in the RMM solution, in versi ...)
+	TODO: check
+CVE-2025-34392 (Barracuda Service Center, as implemented in the RMM solution, in versi ...)
+	TODO: check
+CVE-2025-1161 (Incorrect Use of Privileged APIs vulnerability in NomySoft Information ...)
+	TODO: check
+CVE-2025-14390 (The Video Merchant plugin for WordPress is vulnerable to Cross-Site Re ...)
+	TODO: check
+CVE-2025-14082 (A flaw was found in Keycloak Admin REST (Representational State Transf ...)
+	TODO: check
+CVE-2025-13955 (Predictable default Wi-Fi Password in Access Point functionality inEZC ...)
+	TODO: check
+CVE-2025-13954 (Hard-coded cryptographic keys in Admin UI of EZCast Pro II version 1.1 ...)
+	TODO: check
+CVE-2025-13953 (Bypass vulnerability in the authentication method in the GTT Tax Infor ...)
+	TODO: check
+CVE-2025-13607 (A malicious actor can access camera configuration information, includi ...)
+	TODO: check
+CVE-2025-13184 (Unauthenticated Telnet enablement via cstecgi.cgi (auth bypass) leadin ...)
+	TODO: check
+CVE-2025-13155 (An improper permissions vulnerability was reported in Lenovo Baiying C ...)
+	TODO: check
+CVE-2025-13152 (A potential DLL hijacking vulnerability was reported in Lenovo One Cli ...)
+	TODO: check
+CVE-2025-13127 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2025-13125 (Authorization Bypass Through User-Controlled Key vulnerability in Im P ...)
+	TODO: check
+CVE-2025-12046 (A DLL hijacking vulnerability was reported in the Lenovo App Store and ...)
+	TODO: check
+CVE-2024-2105 (An unauthorised attacker within bluetooth range may use an improper va ...)
+	TODO: check
+CVE-2024-2104 (Due to improper BLE security configurations on the device's GATT serve ...)
+	TODO: check
 CVE-2025-66003
 	- smb4k <unfixed> (bug #1122381)
 	NOTE: https://www.openwall.com/lists/oss-security/2025/12/10/6
@@ -2078,6 +2438,7 @@ CVE-2025-14223 (A vulnerability has been found in code-projects Simple Leave Man
 CVE-2025-12956 (A reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA  ...)
 	NOT-FOR-US: Dassault Systemes
 CVE-2025-59030 (An attacker can trigger the removal of cached records by sending a NOT ...)
+	{DSA-6077-1}
 	- pdns-recursor 5.3.3-1 (bug #1122197)
 	[bullseye] - pdns-recursor <end-of-life> (see DSA 6045)
 	NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-08.html
@@ -3566,7 +3927,7 @@ CVE-2025-11727 (The Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart
 CVE-2025-11379 (The WebP Express plugin for WordPress is vulnerable to information exp ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2025-66293 (LIBPNG is a reference library for use in applications that read, creat ...)
-	{DLA-4396-1}
+	{DSA-6076-1 DLA-4396-1}
 	- libpng1.6 1.6.52-1 (bug #1121877)
 	NOTE: https://github.com/pnggroup/libpng/security/advisories/GHSA-9mpm-9pxh-mg4f
 	NOTE: Fixed by: https://github.com/pnggroup/libpng/commit/788a624d7387a758ffd5c7ab010f1870dea753a1 (v1.6.52)
@@ -5081,7 +5442,7 @@ CVE-2025-13674 (BPv7 dissector crash in Wireshark 4.6.0 allows denial of service
 	NOTE: Crash in CLI tool, no security impact
 CVE-2025-13611 (GitLab has remediated an issue in GitLab CE/EE affecting all versions  ...)
 	- gitlab <unfixed>
-CVE-2025-14087
+CVE-2025-14087 (A flaw was found in GLib (Gnome Lib). This vulnerability allows a remo ...)
 	- glib2.0 2.86.3-1 (bug #1122347)
 	[trixie] - glib2.0 <no-dsa> (Minor issue)
 	[bookworm] - glib2.0 <no-dsa> (Minor issue)
@@ -5842,28 +6203,28 @@ CVE-2025-13318 (The Booking Calendar Contact Form plugin for WordPress is vulner
 CVE-2025-13136 (The GSheetConnector For Ninja Forms plugin for WordPress is vulnerable ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2025-64505 (LIBPNG is a reference library for use in applications that read, creat ...)
-	{DLA-4396-1}
+	{DSA-6076-1 DLA-4396-1}
 	- libpng1.6 1.6.51-1 (bug #1121219)
 	NOTE: https://github.com/pnggroup/libpng/security/advisories/GHSA-4952-h5wq-4m42
 	NOTE: https://github.com/pnggroup/libpng/pull/748
 	NOTE: https://github.com/pnggroup/libpng/commit/6a528eb5fd0dd7f6de1c39d30de0e41473431c37 (v1.6.51)
 	NOTE: https://www.openwall.com/lists/oss-security/2025/11/22/1
 CVE-2025-64506 (LIBPNG is a reference library for use in applications that read, creat ...)
-	{DLA-4396-1}
+	{DSA-6076-1 DLA-4396-1}
 	- libpng1.6 1.6.51-1 (bug #1121218)
 	NOTE: https://github.com/pnggroup/libpng/security/advisories/GHSA-qpr4-xm66-hww6
 	NOTE: https://github.com/pnggroup/libpng/pull/749
 	NOTE: https://github.com/pnggroup/libpng/commit/2bd84c019c300b78e811743fbcddb67c9d9bf821 (v1.6.51)
 	NOTE: https://www.openwall.com/lists/oss-security/2025/11/22/1
 CVE-2025-64720 (LIBPNG is a reference library for use in applications that read, creat ...)
-	{DLA-4396-1}
+	{DSA-6076-1 DLA-4396-1}
 	- libpng1.6 1.6.51-1 (bug #1121217)
 	NOTE: https://github.com/pnggroup/libpng/security/advisories/GHSA-hfc7-ph9c-wcww
 	NOTE: https://github.com/pnggroup/libpng/issues/686
 	NOTE: https://github.com/pnggroup/libpng/commit/08da33b4c88cfcd36e5a706558a8d7e0e4773643 (v1.6.51)
 	NOTE: https://www.openwall.com/lists/oss-security/2025/11/22/1
 CVE-2025-65018 (LIBPNG is a reference library for use in applications that read, creat ...)
-	{DLA-4396-1}
+	{DSA-6076-1 DLA-4396-1}
 	- libpng1.6 1.6.51-1 (bug #1121216)
 	NOTE: https://github.com/pnggroup/libpng/security/advisories/GHSA-7wv6-48j4-hj3g
 	NOTE: https://github.com/pnggroup/libpng/issues/755
@@ -212166,7 +212527,7 @@ CVE-2024-0482 (A vulnerability classified as critical has been found in Taokeyun
 CVE-2024-0481 (A vulnerability was found in Taokeyun up to 1.0.5. It has been rated a ...)
 	NOT-FOR-US: Taokeyun
 CVE-2024-23301 (Relax-and-Recover (aka ReaR) through 2.7 creates a world-readable init ...)
-	{DLA-3733-1}
+	{DLA-4400-1 DLA-3733-1}
 	- rear 2.7+dfsg-1.2 (bug #1060747)
 	[bookworm] - rear <no-dsa> (Minor issue)
 	NOTE: https://github.com/rear/rear/issues/3122



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/43838ae7feb85e0de9f237e2a319d9e7b7b6f9cb

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/43838ae7feb85e0de9f237e2a319d9e7b7b6f9cb
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251210/c8b4ccb7/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list