[Git][security-tracker-team/security-tracker][master] 3 commits: CVE-2025-14946/libnbd: bullseye not-affected
Sylvain Beucler (@beuc)
gitlab at salsa.debian.org
Tue Dec 30 18:40:50 GMT 2025
Sylvain Beucler pushed to branch master at Debian Security Tracker / security-tracker
Commits:
89edc562 by Sylvain Beucler at 2025-12-30T19:09:35+01:00
CVE-2025-14946/libnbd: bullseye not-affected
- - - - -
af28a8e5 by Sylvain Beucler at 2025-12-30T19:13:43+01:00
CVE-2025-67746/composer: bullseye postponed
- - - - -
aeda9962 by Sylvain Beucler at 2025-12-30T19:34:32+01:00
CVE-2025-2486/edk2: bullseye also has the CVE-2023-48733-related local patch
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -2,6 +2,7 @@ CVE-2025-67746
- composer 2.9.3-1
[trixie] - composer <no-dsa> (Minor issue)
[bookworm] - composer <no-dsa> (Minor issue)
+ [bullseye] - composer <postponed> (Minor issue, terminal control characters sanitization)
NOTE: https://github.com/composer/composer/security/advisories/GHSA-59pp-r3rg-353g
NOTE: Fixed by: https://github.com/composer/composer/commit/5db1876a76fdef76d3c4f8a27995c434c7a43e71 (2.9.3)
NOTE: Fixed by: https://github.com/composer/composer/commit/1d40a95c9d39a6b7f80d404ab30336c586da9917 (2.2.26)
@@ -4338,6 +4339,7 @@ CVE-2025-14946 (A flaw was found in libnbd. A malicious actor could exploit this
- libnbd 1.22.5-1
[trixie] - libnbd <no-dsa> (Minor issue)
[bookworm] - libnbd <not-affected> (Vulnerable code introduced later)
+ [bullseye] - libnbd <not-affected> (Vulnerable code introduced later)
NOTE: https://libguestfs.org/libnbd-release-notes-1.24.1.html#Security
NOTE: https://lists.libguestfs.org/archives/list/guestfs@lists.libguestfs.org/thread/YZMBF3SJRWTRVT5L3KWSNHITFTRMQNTT/
NOTE: Fixed by: https://gitlab.com/nbdkit/libnbd/-/commit/fffd87a3ba216cf2f9c212e5db96b13b98985edf (v1.23.9)
@@ -14348,11 +14350,11 @@ CVE-2025-3747
CVE-2025-2486 (The Ubuntu edk2 UEFI firmware packages accidentally allowed the UEFI S ...)
- edk2 2023.11-7
[bookworm] - edk2 2022.11-6+deb12u1
- [bullseye] - edk2 <postponed> (Can be piggyback'd with future DLA but be careful about possible regression)
+ [bullseye] - edk2 2020.11-2+deb11u2
NOTE: https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2101797
NOTE: To address CVE-2023-48733 in Debian a local patch disabled the built-in Shell
NOTE: when SecureBoot is enabled fixing CVE-2025-2486.
- NOTE: Be cautious of possible regression when backporting patches to stable releases -
+ NOTE: Be cautious of possible regression when backporting patches to stable releases
NOTE: https://bugs.launchpad.net/ubuntu/+source/edk2/+bug/2101797/comments/9
CVE-2025-26155 (NCP Secure Enterprise Client 13.18 and NCP Secure Entry Windows Client ...)
NOT-FOR-US: NCP
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/985d841546c34f02d6b862642e1fbd91dbee3aa1...aeda99629fe72d21c4da4b5d7cad9a2971975038
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/985d841546c34f02d6b862642e1fbd91dbee3aa1...aeda99629fe72d21c4da4b5d7cad9a2971975038
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251230/b452e839/attachment.htm>
More information about the debian-security-tracker-commits
mailing list