[Git][security-tracker-team/security-tracker][master] phpmyadmin CVEfied

Moritz Muehlenhoff (@jmm) jmm at debian.org
Thu Jan 23 08:16:07 GMT 2025



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
e1badc6e by Moritz Muehlenhoff at 2025-01-23T09:15:46+01:00
phpmyadmin CVEfied

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,7 +1,11 @@
 CVE-2025-24530 (An issue was discovered in phpMyAdmin 5.x before 5.2.2. An XSS vulnera ...)
-	TODO: check
+	- phpmyadmin 4:5.2.2-really5.2.2+20250121+dfsg-1
+	NOTE: https://www.phpmyadmin.net/security/PMASA-2025-1/
+	NOTE: Fixed by: https://github.com/phpmyadmin/phpmyadmin/commit/23c13a81709728089ff031e5b1c29b5e91baa6a7 (RELEASE_5_2_2)
 CVE-2025-24529 (An issue was discovered in phpMyAdmin 5.x before 5.2.2. An XSS vulnera ...)
-	TODO: check
+	- phpmyadmin 4:5.2.2-really5.2.2+20250121+dfsg-1
+	NOTE: https://www.phpmyadmin.net/security/PMASA-2025-2/
+	NOTE: Fixed by: https://github.com/phpmyadmin/phpmyadmin/commit/7355ddff8d1da9453cf43c09a45666157b16103d (RELEASE_5_2_2)
 CVE-2025-24030 (Envoy Gateway is an open source project for managing Envoy Proxy as a  ...)
 	TODO: check
 CVE-2024-57724 (lunasvg v3.0.0 was discovered to contain a segmentation violation via  ...)
@@ -733,14 +737,6 @@ CVE-2025-0411 [7-Zip Mark-of-the-Web Bypass Vulnerability]
 	NOTE: Since p7zip/16.02+transitional.1 src:p7zip is only a empty source package
 	NOTE: depending on 7zip. Mark this version as fixed version.
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-25-045/
-CVE-2025-XXXX [PMASA-2025-2: XSS on Insert page]
-	- phpmyadmin 4:5.2.2-really5.2.2+20250121+dfsg-1
-	NOTE: https://www.phpmyadmin.net/security/PMASA-2025-2/
-	NOTE: Fixed by: https://github.com/phpmyadmin/phpmyadmin/commit/7355ddff8d1da9453cf43c09a45666157b16103d (RELEASE_5_2_2)
-CVE-2025-XXXX [PMASA-2025-1: XSS when checking tables]
-	- phpmyadmin 4:5.2.2-really5.2.2+20250121+dfsg-1
-	NOTE: https://www.phpmyadmin.net/security/PMASA-2025-1/
-	NOTE: Fixed by: https://github.com/phpmyadmin/phpmyadmin/commit/23c13a81709728089ff031e5b1c29b5e91baa6a7 (RELEASE_5_2_2)
 CVE-2025-23085 [GOAWAY HTTP/2 frames cause memory leak outside heap]
 	- nodejs <unfixed>
 	NOTE: https://nodejs.org/en/blog/vulnerability/january-2025-security-releases#goaway-http2-frames-cause-memory-leak-outside-heap-cve-2025-23085---medium



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e1badc6e12ad30b48b89f2d368dff6f4d274beaf

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/e1badc6e12ad30b48b89f2d368dff6f4d274beaf
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250123/28d7dd14/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list