[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Jan 21 20:12:52 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
802e5a38 by security tracker role at 2025-01-21T20:12:46+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,122 +1,320 @@
+CVE-2025-24461 (In JetBrains TeamCity before 2024.12.1 decryption of connection secret ...)
+	TODO: check
+CVE-2025-24460 (In JetBrains TeamCity before 2024.12.1 improper access control allowed ...)
+	TODO: check
+CVE-2025-24459 (In JetBrains TeamCity before 2024.12.1 reflected XSS was possible on t ...)
+	TODO: check
+CVE-2025-24458 (In JetBrains YouTrack before 2024.3.55417 account takeover was possibl ...)
+	TODO: check
+CVE-2025-24457 (In JetBrains YouTrack before 2024.3.55417 permanent tokens could be ex ...)
+	TODO: check
+CVE-2025-24456 (In JetBrains Hub before 2024.3.55417 privilege escalation was possible ...)
+	TODO: check
+CVE-2025-24024 (Mjolnir is a moderation tool for Matrix. Mjolnir v1.9.0 responds to ma ...)
+	TODO: check
+CVE-2025-24020 (WeGIA is a Web manager for charitable institutions. An Open Redirect v ...)
+	TODO: check
+CVE-2025-24019 (YesWiki is a wiki system written in PHP. In versions up to and includi ...)
+	TODO: check
+CVE-2025-24018 (YesWiki is a wiki system written in PHP. In versions up to and includi ...)
+	TODO: check
+CVE-2025-24017 (YesWiki is a wiki system written in PHP. Versions up to and including  ...)
+	TODO: check
+CVE-2025-24012 (Umbraco is a free and open source .NET content management system. Star ...)
+	TODO: check
+CVE-2025-24011 (Umbraco is a free and open source .NET content management system. Star ...)
+	TODO: check
+CVE-2025-24001 (Cross-Site Request Forgery (CSRF) vulnerability in PPO Vi\u1ec7t Nam ( ...)
+	TODO: check
+CVE-2025-23998 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-23997 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-23996 (Cross-Site Request Forgery (CSRF) vulnerability in anyroad.com AnyRoad ...)
+	TODO: check
+CVE-2025-23994 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-23580 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-23551 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-23489 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-23477 (Missing Authorization vulnerability in Realty Workstation Realty Works ...)
+	TODO: check
+CVE-2025-23461 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-23454 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-23369 (An improper verification of cryptographic signature vulnerability was  ...)
+	TODO: check
+CVE-2025-23184 (A potential denial of service vulnerability is present in versions of  ...)
+	TODO: check
+CVE-2025-23086 (On most desktop platforms, Brave Browser versions 1.70.x-1.73.x includ ...)
+	TODO: check
+CVE-2025-22825 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-22763 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-22735 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-22733 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-22732 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-22727 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-22723 (Unrestricted Upload of File with Dangerous Type vulnerability in UkrSo ...)
+	TODO: check
+CVE-2025-22722 (Missing Authorization vulnerability in Widget Options Team Widget Opti ...)
+	TODO: check
+CVE-2025-22721 (Missing Authorization vulnerability in Farhan Noor ApplyOnline \u2013  ...)
+	TODO: check
+CVE-2025-22719 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-22718 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-22717 (Missing Authorization vulnerability in Joe Dolson My Tickets allows Ac ...)
+	TODO: check
+CVE-2025-22716 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-22711 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-22710 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-22709 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-22706 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-22661 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-22553 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-22322 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-22318 (Missing Authorization vulnerability in Eniture Technology Standard Box ...)
+	TODO: check
+CVE-2025-22311 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2025-22276 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-22267 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-22262 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-22150 (Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to v ...)
+	TODO: check
+CVE-2025-0623
+	REJECTED
+CVE-2025-0615 (Input validation vulnerability in Qualifio's Wheel of Fortune. This vu ...)
+	TODO: check
+CVE-2025-0614 (Input validation vulnerability in Qualifio's Wheel of Fortune. This vu ...)
+	TODO: check
+CVE-2025-0450 (The Betheme plugin for WordPress is vulnerable to Stored Cross-Site Sc ...)
+	TODO: check
+CVE-2025-0377 (HashiCorp\u2019s go-slug library is vulnerable to a zip-slip style att ...)
+	TODO: check
+CVE-2025-0371 (The JetElements plugin for WordPress is vulnerable to Stored Cross-Sit ...)
+	TODO: check
+CVE-2024-6466 (NEC Corporation's WebSAM DeploymentManager v6.0 to v6.80 allows an att ...)
+	TODO: check
+CVE-2024-57036 (TOTOLINK A810R V4.1.2cu.5032_B20200407 was found to contain a command  ...)
+	TODO: check
+CVE-2024-56998 (PHPGurukul Hospital Management System 4.0 is vulnerable to Cross Site  ...)
+	TODO: check
+CVE-2024-56997 (PHPGurukul Hospital Management System 4.0 is vulnerable to Cross Site  ...)
+	TODO: check
+CVE-2024-56990 (PHPGurukul Hospital Management System 4.0 is vulnerable to Cross Site  ...)
+	TODO: check
+CVE-2024-56277 (Improper Encoding or Escaping of Output vulnerability in Poll Maker Te ...)
+	TODO: check
+CVE-2024-55504 (An issue in RAR Extractor - Unarchiver Free and Pro v.6.4.0 allows loc ...)
+	TODO: check
+CVE-2024-54795 (SpagoBI v3.5.1 contains multiple Stored Cross-Site Scripting (XSS) vul ...)
+	TODO: check
+CVE-2024-54794 (The script input feature of SpagoBI 3.5.1 allows arbitrary code execut ...)
+	TODO: check
+CVE-2024-54792 (A Cross-Site Request Forgery (CSRF) vulnerability has been found in Sp ...)
+	TODO: check
+CVE-2024-53829 (CodeChecker is an analyzer tooling, defect database and viewer extensi ...)
+	TODO: check
+CVE-2024-52973 (An allocation of resources without limits or throttling in Kibana can  ...)
+	TODO: check
+CVE-2024-51919 (Unrestricted Upload of File with Dangerous Type vulnerability in NotFo ...)
+	TODO: check
+CVE-2024-51888 (Incorrect Privilege Assignment vulnerability in NotFound Homey Login R ...)
+	TODO: check
+CVE-2024-51818 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2024-51417 (An issue in System.Linq.Dynamic.Core Latest version v.1.4.6 allows rem ...)
+	TODO: check
+CVE-2024-49700 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-49699 (Deserialization of Untrusted Data vulnerability in NotFound ARPrice al ...)
+	TODO: check
+CVE-2024-49688 (Deserialization of Untrusted Data vulnerability in NotFound ARPrice al ...)
+	TODO: check
+CVE-2024-49666 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2024-49655 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2024-49333 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2024-49303 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2024-49300 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-45687 (Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Reque ...)
+	TODO: check
+CVE-2024-45091 (IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.24, 7.1 through 7.1.2.10, ...)
+	TODO: check
+CVE-2024-43709 (An allocation of resources without limits or throttling in Elasticsear ...)
+	TODO: check
+CVE-2024-42936 (The mqlink.elf is service component in Ruijie RG-EW300N with firmware  ...)
+	TODO: check
+CVE-2024-37284 (Improper handling of alternate encoding occurs when Elastic Defend on  ...)
+	TODO: check
+CVE-2024-32555 (Incorrect Privilege Assignment vulnerability in NotFound Easy Real Est ...)
+	TODO: check
+CVE-2024-13536 (The 1003 Mortgage Application plugin for WordPress is vulnerable to Fu ...)
+	TODO: check
+CVE-2024-13454 (Weak encryption algorithm in Easy-RSA version 3.0.5 through 3.1.7 allo ...)
+	TODO: check
+CVE-2024-13444 (The wp-greet plugin for WordPress is vulnerable to Cross-Site Request  ...)
+	TODO: check
+CVE-2024-13404 (The Link Library plugin for WordPress is vulnerable to Reflected Cross ...)
+	TODO: check
+CVE-2024-13230 (The Social Share, Social Login and Social Comments Plugin \u2013 Super ...)
+	TODO: check
+CVE-2024-12104 (The Visual Website Collaboration, Feedback & Project Management \u2013 ...)
+	TODO: check
+CVE-2024-12005 (The WP-BibTeX plugin for WordPress is vulnerable to Cross-Site Request ...)
+	TODO: check
+CVE-2024-11226 (The FireCask Like & Share Button plugin for WordPress is vulnerable to ...)
+	TODO: check
+CVE-2024-10936 (The String locator plugin for WordPress is vulnerable to PHP Object In ...)
+	TODO: check
+CVE-2023-45908 (Homarr before v0.14.0 was discovered to contain a stored cross-site sc ...)
+	TODO: check
 CVE-2024-45479
 	NOT-FOR-US: Apache Ranger
 CVE-2024-45478
 	NOT-FOR-US: Apache Ranger
-CVE-2025-21664 [dm thin: make get_first_thin use rcu-safe list first function]
+CVE-2025-21664 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.12.10-1
 	NOTE: https://git.kernel.org/linus/80f130bfad1dab93b95683fc39b87235682b8f72 (6.13-rc7)
-CVE-2025-21663 [net: stmmac: dwmac-tegra: Read iommu stream id from device tree]
+CVE-2025-21663 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/426046e2d62dd19533808661e912b8e8a9eaec16 (6.13-rc7)
-CVE-2025-21662 [net/mlx5: Fix variable not being completed when function returns]
+CVE-2025-21662 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0e2909c6bec9048f49d0c8e16887c63b50b14647 (6.13-rc7)
-CVE-2025-21661 [gpio: virtuser: fix missing lookup table cleanups]
+CVE-2025-21661 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 6.12.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a619cba8c69c434258ff4101d463322cd63e1bdc (6.13-rc7)
-CVE-2025-21660 [ksmbd: fix unexpectedly changed path in ksmbd_vfs_kern_path_locked]
+CVE-2025-21660 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.12.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2ac538e40278a2c0c051cca81bcaafc547d61372 (6.13-rc7)
-CVE-2025-21659 [netdev: prevent accessing NAPI instances from another namespace]
+CVE-2025-21659 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d1cacd74776895f6435941f86a1130e58f6dd226 (6.13-rc7)
-CVE-2025-21658 [btrfs: avoid NULL pointer dereference if no valid extent tree]
+CVE-2025-21658 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.12.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6aecd91a5c5b68939cf4169e32bc49f3cd2dd329 (6.13-rc7)
-CVE-2025-21657 [sched_ext: Replace rq_lock() to raw_spin_rq_lock() in scx_ops_bypass()]
+CVE-2025-21657 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.12.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6268d5bc10354fc2ab8d44a0cd3b042d49a0417e (6.13-rc7)
-CVE-2025-21656 [hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur]
+CVE-2025-21656 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 6.12.10-1
 	NOTE: https://git.kernel.org/linus/82163d63ae7a4c36142cd252388737205bb7e4b9 (6.13-rc7)
-CVE-2024-57946 [virtio-blk: don't keep queue frozen during system suspend]
+CVE-2024-57946 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 6.12.8-1
 	[bookworm] - linux 6.1.123-1
 	NOTE: https://git.kernel.org/linus/7678abee0867e6b7fb89aa40f6e9f575f755fb37 (6.13-rc2)
-CVE-2024-57945 [riscv: mm: Fix the out of bound issue of vmemmap address]
+CVE-2024-57945 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 6.12.10-1
 	NOTE: https://git.kernel.org/linus/f754f27e98f88428aaf6be6e00f5cbce97f62d4b (6.13-rc7)
-CVE-2024-57944 [iio: adc: ti-ads1298: Add NULL check in ads1298_init]
+CVE-2024-57944 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.12.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/bcb394bb28e55312cace75362b8e489eb0e02a30 (6.13-rc7)
-CVE-2024-57943 [exfat: fix the new buffer was not zeroed before writing]
+CVE-2024-57943 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.12.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/98e2fb26d1a9eafe79f46d15d54e68e014d81d8c (6.13-rc7)
-CVE-2024-57942 [netfs: Fix ceph copy to cache on write-begin]
+CVE-2024-57942 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/38cf8e945721ffe708fa675507465da7f4f2a9f7 (6.13-rc7)
-CVE-2024-57941 [netfs: Fix the (non-)cancellation of copy when cache is temporarily disabled]
+CVE-2024-57941 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d0327c824338cdccad058723a31d038ecd553409 (6.13-rc7)
-CVE-2024-57940 [exfat: fix the infinite loop in exfat_readdir()]
+CVE-2024-57940 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.12.10-1
 	NOTE: https://git.kernel.org/linus/fee873761bd978d077d8c55334b4966ac4cb7b59 (6.13-rc7)
-CVE-2024-57939 [riscv: Fix sleeping in invalid context in die()]
+CVE-2024-57939 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 6.12.10-1
 	NOTE: https://git.kernel.org/linus/6a97f4118ac07cfdc316433f385dbdc12af5025e (6.13-rc7)
-CVE-2024-57938 [net/sctp: Prevent autoclose integer overflow in sctp_association_init()]
+CVE-2024-57938 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.9-1
 	[bookworm] - linux 6.1.124-1
 	NOTE: https://git.kernel.org/linus/4e86729d1ff329815a6e8a920cb554a1d4cb5b8d (6.13-rc6)
-CVE-2024-57937 [mm: reinstate ability to map write-sealed memfd mappings read-only]
+CVE-2024-57937 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.12.9-1
 	NOTE: https://git.kernel.org/linus/8ec396d05d1b737c87311fb7311f753b02c2a6b1 (6.13-rc6)
-CVE-2024-57936 [RDMA/bnxt_re: Fix max SGEs for the Work Request]
+CVE-2024-57936 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.12.9-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/79d330fbdffd8cee06d8bdf38d82cb62d8363a27 (6.13-rc6)
-CVE-2024-57935 [RDMA/hns: Fix accessing invalid dip_ctx during destroying QP]
+CVE-2024-57935 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.12.9-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0572eccf239ce4bd89bd531767ec5ab20e249290 (6.13-rc6)
-CVE-2024-57934 [fgraph: Add READ_ONCE() when accessing fgraph_array[]]
+CVE-2024-57934 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.12.9-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d65474033740ded0a4fe9a097fce72328655b41d (6.13-rc6)
-CVE-2024-57933 [gve: guard XSK operations on the existence of queues]
+CVE-2024-57933 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 6.12.9-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/40338d7987d810fcaa95c500b1068a52b08eec9b (6.13-rc6)
-CVE-2024-57932 [gve: guard XDP xmit NDO on existence of xdp queues]
+CVE-2024-57932 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 6.12.9-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ff7c2dea9dd1a436fc79d6273adffdcc4a7ffea3 (6.13-rc6)
-CVE-2024-57931 [selinux: ignore unknown extended permissions]
+CVE-2024-57931 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.12.9-1
 	[bookworm] - linux 6.1.124-1
 	NOTE: https://git.kernel.org/linus/900f83cf376bdaf798b6f5dcb2eae0c822e908b6 (6.13-rc4)
-CVE-2024-57930 [tracing: Have process_string() also allow arrays]
+CVE-2024-57930 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.12.9-1
 	[bookworm] - linux 6.1.124-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/afc6717628f959941d7b33728570568b4af1c4b8 (6.13-rc6)
 CVE-2022-4975
 	NOT-FOR-US: Red Hat Advanced Cluster Security
-CVE-2025-24014 [segmentation fault in win_line()]
+CVE-2025-24014 (Vim is an open source, command line text editor. A segmentation fault  ...)
 	- vim <unfixed> (unimportant)
 	NOTE: Crash in CLI tool, no security impact
 	NOTE: https://github.com/vim/vim/security/advisories/GHSA-j3g9-wg22-v955
@@ -1241,7 +1439,7 @@ CVE-2024-52602 (Matrix Media Repo (MMR) is a highly configurable multi-homeserve
 	NOT-FOR-US: Matrix Media Repo (MMR)
 CVE-2024-52594 (Gomatrixserverlib is a Go library for matrix federation. Gomatrixserve ...)
 	NOT-FOR-US: Gomatrixserverlib
-CVE-2024-50633 (A Broken Object Level Authorization (BOLA) vulnerability in Indico v3. ...)
+CVE-2024-50633 (A Broken Object Level Authorization (BOLA) vulnerability in Indico thr ...)
 	NOT-FOR-US: Indico
 CVE-2024-50563 (A weak authentication in Fortinet FortiManager Cloud, FortiAnalyzer ve ...)
 	NOT-FOR-US: FortiGuard
@@ -10088,6 +10286,7 @@ CVE-2024-10972 (Velocidex WinPmem versions 4.1 and below suffer from an Improper
 CVE-2024-10095 (In Progress Telerik UI for WPF versions prior to 2024 Q4 (2024.4.1213) ...)
 	NOT-FOR-US: Telerik
 CVE-2024-55919 [Improper input validation on generic SSO login]
+	{DLA-4027-1}
 	- sympa 6.2.74~dfsg-1 (bug #1090188)
 	NOTE: https://www.sympa.community/security/2024-001.html
 	NOTE: Patch: https://github.com/sympa-community/sympa/releases/download/6.2.74/sympa-6.2.72-sa-2024-001-r1.patch



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/802e5a3821a5a46219b59ac329ff4031ebb52178

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/802e5a3821a5a46219b59ac329ff4031ebb52178
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250121/9a6c7faa/attachment.htm>


More information about the debian-security-tracker-commits mailing list