[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Jul 4 21:12:22 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
7b4ed100 by security tracker role at 2025-07-04T20:12:16+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,215 +1,401 @@
+CVE-2025-7067 (A vulnerability classified as problematic was found in HDF5 1.14.6. Th ...)
+	TODO: check
+CVE-2025-7066 (Jirafeau normally prevents browser preview for text files due to the p ...)
+	TODO: check
+CVE-2025-7061 (A vulnerability was found in Intelbras InControl up to 2.21.60.9. It h ...)
+	TODO: check
+CVE-2025-7060 (A vulnerability was found in Monitorr up to 1.7.6m. It has been classi ...)
+	TODO: check
+CVE-2025-6740 (The Contact Form 7 Database Addon plugin for WordPress is vulnerable t ...)
+	TODO: check
+CVE-2025-6056 (Timing difference in password reset in Ergon Informatik AG's Airlock I ...)
+	TODO: check
+CVE-2025-5920 (The Sharable Password Protected Posts before version 1.1.1 allows acce ...)
+	TODO: check
+CVE-2025-53569 (Cross-Site Request Forgery (CSRF) vulnerability in Trust Payments Trus ...)
+	TODO: check
+CVE-2025-53568 (Cross-Site Request Forgery (CSRF) vulnerability in Tony Zeoli Radio St ...)
+	TODO: check
+CVE-2025-53566 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-53485 (SetTranslationHandler.php does not validate that the user is an electi ...)
+	TODO: check
+CVE-2025-53484 (User-controlled inputs are improperly escaped in:       *   VotePage.p ...)
+	TODO: check
+CVE-2025-53483 (ArchivePage.php, UnarchivePage.php, and VoterEligibilityPage#executeCl ...)
+	TODO: check
+CVE-2025-53482 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2025-53481 (Uncontrolled Resource Consumption vulnerability in Wikimedia Foundatio ...)
+	TODO: check
+CVE-2025-52833 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-52832 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-52831 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-52830 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-52828 (Deserialization of Untrusted Data vulnerability in designthemes Red Ar ...)
+	TODO: check
+CVE-2025-52813 (Missing Authorization vulnerability in pietro MobiLoud allows Exploiti ...)
+	TODO: check
+CVE-2025-52807 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2025-52805 (Path Traversal vulnerability in VaultDweller Leyka allows PHP Local Fi ...)
+	TODO: check
+CVE-2025-52798 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-52796 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-52776 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-52718 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+	TODO: check
+CVE-2025-52497 (Mbed TLS before 3.6.4 has a PEM parsing one-byte heap-based buffer und ...)
+	TODO: check
+CVE-2025-52496 (Mbed TLS before 3.6.4 has a race condition in AESNI detection if certa ...)
+	TODO: check
+CVE-2025-50039 (Missing Authorization vulnerability in vgwort VG WORT METIS allows Exp ...)
+	TODO: check
+CVE-2025-50032 (Missing Authorization vulnerability in Paytiko - Payment Orchestration ...)
+	TODO: check
+CVE-2025-4414 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2025-49870 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-49867 (Incorrect Privilege Assignment vulnerability in InspiryThemes RealHome ...)
+	TODO: check
+CVE-2025-49866 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-49809 (mtr through 0.95, in certain privileged contexts, mishandles execution ...)
+	TODO: check
+CVE-2025-49601 (In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not  ...)
+	TODO: check
+CVE-2025-49600 (In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_verify may accept invalid s ...)
+	TODO: check
+CVE-2025-49431 (Missing Authorization vulnerability in Gnuget MF Plus WPML allows Expl ...)
+	TODO: check
+CVE-2025-49418 (Server-Side Request Forgery (SSRF) vulnerability in TeconceTheme Allma ...)
+	TODO: check
+CVE-2025-49417 (Deserialization of Untrusted Data vulnerability in BestWpDeveloper Woo ...)
+	TODO: check
+CVE-2025-49414 (Unrestricted Upload of File with Dangerous Type vulnerability in Fastw ...)
+	TODO: check
+CVE-2025-49303 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+	TODO: check
+CVE-2025-49302 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+	TODO: check
+CVE-2025-49274 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-49247 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-49245 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-49070 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2025-48231 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-48172 (CHMLib through 2bef8d0, as used in SumatraPDF and other products, has  ...)
+	TODO: check
+CVE-2025-47634 (Missing Authorization vulnerability in Keylor Mendoza WC Pickup Store  ...)
+	TODO: check
+CVE-2025-47627 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2025-47565 (Missing Authorization vulnerability in ashanjay EventON allows Exploit ...)
+	TODO: check
+CVE-2025-47479 (Weak Authentication vulnerability in AresIT WP Compress allows Authent ...)
+	TODO: check
+CVE-2025-46733 (OP-TEE is a Trusted Execution Environment (TEE) designed as companion  ...)
+	TODO: check
+CVE-2025-39487 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-32918 (Improper neutralization of Livestatus command delimiters in autocomple ...)
+	TODO: check
+CVE-2025-32311 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-32297 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-31037 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30983 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30979 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-30969 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-30947 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-30943 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30933 (Unrestricted Upload of File with Dangerous Type vulnerability in Liqui ...)
+	TODO: check
+CVE-2025-30929 (Missing Authorization vulnerability in amazewp fluXtore allows Exploit ...)
+	TODO: check
+CVE-2025-29012 (Missing Authorization vulnerability in kamleshyadav CF7 7 Mailchimp Ad ...)
+	TODO: check
+CVE-2025-29007 (Missing Authorization vulnerability in LMSACE LMSACE Connect allows Ex ...)
+	TODO: check
+CVE-2025-29001 (Missing Authorization vulnerability in ZoomIt WooCommerce Shop Page Bu ...)
+	TODO: check
+CVE-2025-28983 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-28980 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+	TODO: check
+CVE-2025-28978 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-28976 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-28971 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-28969 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-28968 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-28967 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-28963 (Server-Side Request Forgery (SSRF) vulnerability in Md Yeasin Ul Haide ...)
+	TODO: check
+CVE-2025-28957 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-28951 (Unrestricted Upload of File with Dangerous Type vulnerability in Creed ...)
+	TODO: check
+CVE-2025-27358 (Improper Neutralization of Script-Related HTML Tags in a Web Page (Bas ...)
+	TODO: check
+CVE-2025-27326 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-26591 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-24780 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-24771 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-24764 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-24757 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-24748 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-24735 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-23972 (Cross-Site Request Forgery (CSRF) vulnerability in Brian S. Reed Conta ...)
+	TODO: check
+CVE-2025-23970 (Incorrect Privilege Assignment vulnerability in aonetheme Service Find ...)
+	TODO: check
+CVE-2024-9453 (A vulnerability was found in Red Hat OpenShift Jenkins. The bearer tok ...)
+	TODO: check
 CVE-2025-27465 [x86: Incorrect stubs exception handling for flags recovery]
 	- xen <unfixed>
 	[bullseye] - xen <end-of-life> (EOLed in Bullseye)
 	NOTE: https://xenbits.xen.org/xsa/advisory-470.html
-CVE-2025-38234 [sched/rt: Fix race in push_rt_task]
+CVE-2025-38234 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/690e47d1403e90b7f2366f03b52ed3304194c793 (6.16-rc1)
-CVE-2025-38233 [powerpc64/ftrace: fix clobbered r15 during livepatching]
+CVE-2025-38233 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/cb5b691f8273432297611863ac142e17119279e0 (6.16-rc1)
-CVE-2025-38232 [NFSD: fix race between nfsd registration and exports_proc]
+CVE-2025-38232 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/f7fb730cac9aafda8b9813b55d04e28a9664d17c (6.16-rc1)
-CVE-2025-38231 [nfsd: Initialize ssc before laundromat_work to prevent NULL dereference]
+CVE-2025-38231 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/b31da62889e6d610114d81dc7a6edbcaa503fcf8 (6.16-rc1)
-CVE-2025-38230 [jfs: validate AG parameters in dbMount() to prevent crashes]
+CVE-2025-38230 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/37bfb464ddca87f203071b5bd562cd91ddc0b40a (6.16-rc1)
-CVE-2025-38229 [media: cxusb: no longer judge rbuf when the write fails]
+CVE-2025-38229 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/73fb3b92da84637e3817580fa205d48065924e15 (6.16-rc1)
-CVE-2025-38228 [media: imagination: fix a potential memory leak in e5010_probe()]
+CVE-2025-38228 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.12.35-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/609ba05b9484856b08869f827a6edee51d51b5f3 (6.16-rc1)
-CVE-2025-38227 [media: vidtv: Terminating the subsequent process of initialization failure]
+CVE-2025-38227 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/1d5f88f053480326873115092bc116b7d14916ba (6.16-rc1)
-CVE-2025-38226 [media: vivid: Change the siize of the composing]
+CVE-2025-38226 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/f83ac8d30c43fd902af7c84c480f216157b60ef0 (6.16-rc1)
-CVE-2025-38225 [media: imx-jpeg: Cleanup after an allocation error]
+CVE-2025-38225 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.12.35-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7500bb9cf164edbb2c8117d57620227b1a4a8369 (6.16-rc1)
-CVE-2025-38224 [can: kvaser_pciefd: refine error prone echo_skb_max handling logic]
+CVE-2025-38224 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.12.35-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/54ec8b08216f3be2cc98b33633d3c8ea79749895 (6.16-rc1)
-CVE-2025-38223 [ceph: avoid kernel BUG for encrypted inode with unaligned file size]
+CVE-2025-38223 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.12.35-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/060909278cc0a91373a20726bd3d8ce085f480a9 (6.16-rc1)
-CVE-2025-38222 [ext4: inline: fix len overflow in ext4_prepare_inline_data]
+CVE-2025-38222 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/227cb4ca5a6502164f850d22aec3104d7888b270 (6.16-rc1)
-CVE-2025-38221 [ext4: fix out of bounds punch offset]
+CVE-2025-38221 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b5e58bcd79625423487fa3ecba8e8411b5396327 (6.16-rc1)
-CVE-2025-38220 [ext4: only dirty folios when data journaling regular files]
+CVE-2025-38220 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.12.35-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e26268ff1dcae5662c1b96c35f18cfa6ab73d9de (6.16-rc1)
-CVE-2025-38219 [f2fs: prevent kernel warning due to negative i_nlink from corrupted image]
+CVE-2025-38219 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/42cb74a92adaf88061039601ddf7c874f58b554e (6.16-rc1)
-CVE-2025-38218 [f2fs: fix to do sanity check on sit_bitmap_size]
+CVE-2025-38218 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/5db0d252c64e91ba1929c70112352e85dc5751e7 (6.16-rc1)
-CVE-2025-38217 [hwmon: (ftsteutates) Fix TOCTOU race in fts_read()]
+CVE-2025-38217 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 6.12.35-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/14c9ede9ca4cd078ad76a6ab9617b81074eb58bf (6.16-rc3)
-CVE-2025-38216 [iommu/vt-d: Restore context entry setup order for aliased devices]
+CVE-2025-38216 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.12.35-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/320302baed05c6456164652541f23d2a96522c06 (6.16-rc1)
-CVE-2025-38215 [fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var]
+CVE-2025-38215 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/17186f1f90d34fa701e4f14e6818305151637b9e (6.16-rc1)
-CVE-2025-38214 [fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var]
+CVE-2025-38214 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/05f6e183879d9785a3cdf2f08a498bc31b7a20aa (6.16-rc1)
-CVE-2025-38213 [vgacon: Add check for vc_origin address range in vgacon_scroll()]
+CVE-2025-38213 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/864f9963ec6b4b76d104d595ba28110b87158003 (6.16-rc1)
-CVE-2025-38212 [ipc: fix to protect IPCS lookups using RCU]
+CVE-2025-38212 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/d66adabe91803ef34a8b90613c81267b5ded1472 (6.16-rc1)
-CVE-2025-38211 [RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction]
+CVE-2025-38211 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/6883b680e703c6b2efddb4e7a8d891ce1803d06b (6.16-rc1)
-CVE-2025-38210 [configfs-tsm-report: Fix NULL dereference of tsm_ops]
+CVE-2025-38210 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.12.35-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fba4ceaa242d2bdf4c04b77bda41d32d02d3925d (6.16-rc1)
-CVE-2025-38209 [nvme-tcp: remove tag set when second admin queue config fails]
+CVE-2025-38209 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e7143706702a209c814ed2c3fc6486c2a7decf6c (6.16-rc1)
-CVE-2025-38208 [smb: client: add NULL check in automount_fullpath]
+CVE-2025-38208 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/f1e7a277a1736e12cc4bd6d93b8a5c439b8ca20c (6.16-rc1)
-CVE-2025-38207 [mm: fix uprobe pte be overwritten when expanding vma]
+CVE-2025-38207 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/2b12d06c37fd3a394376f42f026a7478d826ed63 (6.16-rc1)
-CVE-2025-38206 [exfat: fix double free in delayed_free]
+CVE-2025-38206 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 5.16.7-1
 	NOTE: https://git.kernel.org/linus/1f3d9724e16d62c7d42c67d6613b8512f2887c22 (6.16-rc1)
-CVE-2025-38205 [drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1]
+CVE-2025-38205 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/7e40f64896e8e3dca471e287672db5ace12ea0be (6.16-rc1)
-CVE-2025-38204 [jfs: fix array-index-out-of-bounds read in add_missing_indices]
+CVE-2025-38204 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
 	- linux 5.16.7-1
 	NOTE: https://git.kernel.org/linus/5dff41a86377563f7a2b968aae00d25b4ceb37c9 (6.16-rc1)
-CVE-2025-38203 [jfs: Fix null-ptr-deref in jfs_ioc_trim]
+CVE-2025-38203 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
 	- linux 5.16.7-1
 	NOTE: https://git.kernel.org/linus/a4685408ff6c3e2af366ad9a7274f45ff3f394ee (6.16-rc1)
-CVE-2025-38202 [bpf: Check rcu_read_lock_trace_held() in bpf_map_lookup_percpu_elem()]
+CVE-2025-38202 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/d4965578267e2e81f67c86e2608481e77e9c8569 (6.16-rc1)
-CVE-2025-38201 [netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX]
+CVE-2025-38201 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/b85e3367a5716ed3662a4fe266525190d2af76df (6.16-rc1)
-CVE-2025-38200 [i40e: fix MMIO write access to an invalid page in i40e_clear_hw]
+CVE-2025-38200 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/015bac5daca978448f2671478c553ce1f300c21e (6.16-rc1)
-CVE-2025-38199 [wifi: ath12k: Fix memory leak due to multiple rx_stats allocation]
+CVE-2025-38199 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/c426497fa2055c8005196922e7d29c41d7e0948a (6.16-rc1)
-CVE-2025-38198 [fbcon: Make sure modelist not set on unregistered console]
+CVE-2025-38198 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/cedc1b63394a866bf8663a3e40f4546f1d28c8d8 (6.16-rc1)
-CVE-2025-38197 [platform/x86: dell_rbu: Fix list usage]
+CVE-2025-38197 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/61ce04601e0d8265ec6d2ffa6df5a7e1bce64854 (6.16-rc3)
-CVE-2025-38196 [io_uring/rsrc: validate buffer count with offset for cloning]
+CVE-2025-38196 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1d27f11bf02b38c431e49a17dee5c10a2b4c2e28 (6.16-rc3)
-CVE-2025-38195 [LoongArch: Fix panic caused by NULL-PMD in huge_pte_offset()]
+CVE-2025-38195 (In the Linux kernel, the following vulnerability has been resolved:  L ...)
 	- linux 6.12.35-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ee084fa96123ede8b0563a1b5a9b23adc43cd50d (6.16-rc1)
-CVE-2025-38194 [jffs2: check that raw node were preallocated before writing summary]
+CVE-2025-38194 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/ec9e6f22bce433b260ea226de127ec68042849b0 (6.16-rc1)
-CVE-2025-38193 [net_sched: sch_sfq: reject invalid perturb period]
+CVE-2025-38193 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/7ca52541c05c832d32b112274f81a985101f9ba8 (6.16-rc2)
-CVE-2025-38192 [net: clear the dst when changing skb protocol]
+CVE-2025-38192 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/ba9db6f907ac02215e30128770f85fbd7db2fcf9 (6.16-rc2)
-CVE-2025-38191 [ksmbd: fix null pointer dereference in destroy_previous_session]
+CVE-2025-38191 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/7ac5b66acafcc9292fb935d7e03790f2b8b2dc0e (6.16-rc3)
-CVE-2025-38190 [atm: Revert atm_account_tx() if copy_from_iter_full() fails.]
+CVE-2025-38190 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/7851263998d4269125fd6cb3fdbfc7c6db853859 (6.16-rc3)
-CVE-2025-38189 [drm/v3d: Avoid NULL pointer dereference in `v3d_job_update_stats()`]
+CVE-2025-38189 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/e1bc3a13bd775791cca0bb144d977b00f3598042 (6.16-rc3)
-CVE-2025-38188 [drm/msm/a7xx: Call CP_RESET_CONTEXT_STATE]
+CVE-2025-38188 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.12.35-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2b520c6104f34e3a548525173c38ebca4402cac3 (6.16-rc3)
-CVE-2025-38187 [drm/nouveau: fix a use-after-free in r535_gsp_rpc_push()]
+CVE-2025-38187 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux <unfixed>
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9802f0a63b641f4cddb2139c814c2e95cb825099 (6.16-rc3)
-CVE-2025-38186 [bnxt_en: Fix double invocation of bnxt_ulp_stop()/bnxt_ulp_start()]
+CVE-2025-38186 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.12.35-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1e9ac33fa271be0d2480fd732f9642d81542500b (6.16-rc3)
-CVE-2025-38185 [atm: atmtcp: Free invalid length skb in atmtcp_c_send().]
+CVE-2025-38185 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/2f370ae1fb6317985f3497b1bb80d457508ca2f7 (6.16-rc3)
-CVE-2025-38184 [tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer]
+CVE-2025-38184 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/f82727adcf2992822e12198792af450a76ebd5ef (6.16-rc3)
-CVE-2025-38183 [net: lan743x: fix potential out-of-bounds write in lan743x_ptp_io_event_clock_get()]
+CVE-2025-38183 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.35-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e353b0854d3a1a31cb061df8d022fbfea53a0f24 (6.16-rc3)
-CVE-2025-38182 [ublk: santizize the arguments from userspace when adding a device]
+CVE-2025-38182 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.12.35-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8c8472855884355caf3d8e0c50adf825f83454b2 (6.16-rc3)
-CVE-2025-38181 [calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().]
+CVE-2025-38181 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/10876da918fa1aec0227fb4c67647513447f53a9 (6.16-rc3)
-CVE-2025-38180 [net: atm: fix /proc/net/atm/lec handling]
+CVE-2025-38180 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/d03b79f459c7935cff830d98373474f440bd03ae (6.16-rc3)
-CVE-2025-38179 [smb: client: fix max_sge overflow in smb_extract_folioq_to_rdma()]
+CVE-2025-38179 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.12.35-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a379a8a2a0032e12e7ef397197c9c2ad011588d6 (6.16-rc3)
-CVE-2025-38178 [EDAC/igen6: Fix NULL pointer dereference]
+CVE-2025-38178 (In the Linux kernel, the following vulnerability has been resolved:  E ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/88efa0de3285be66969b71ec137d9dab1ee19e52 (6.16-rc3)
-CVE-2025-38177 [sch_hfsc: make hfsc_qlen_notify() idempotent]
+CVE-2025-38177 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.12.29-1
 	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/51eb3b65544c9efd6a1026889ee5fb5aa62da3bb (6.15-rc2)
-CVE-2025-38176 [binder: fix use-after-free in binderfs_evict_inode()]
+CVE-2025-38176 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8c0a559825281764061a127632e5ad273f0466ad (6.16-rc1)
-CVE-2025-38175 [binder: fix yet another UAF in binder_devices]
+CVE-2025-38175 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9857af0fcff385c75433f2162c30c62eb912ef6d (6.16-rc1)
-CVE-2025-38174 [thunderbolt: Do not double dequeue a configuration request]
+CVE-2025-38174 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.12.33-1
 	NOTE: https://git.kernel.org/linus/0f73628e9da1ee39daf5f188190cdbaee5e0c98c (6.16-rc1)
 CVE-2025-7053 (A vulnerability was found in Cockpit up to 2.11.3. It has been rated a ...)
@@ -2620,7 +2806,7 @@ CVE-2025-5372 (A flaw was found in libssh versions built with OpenSSL versions o
 	[bookworm] - libssh <no-dsa> (Minor issue)
 	NOTE: https://www.libssh.org/security/advisories/CVE-2025-5372.txt
 	NOTE: Fixed by: https://git.libssh.org/projects/libssh.git/commit/?id=a9d8a3d44829cf9182b252bc951f35fb0d573972 (libssh-0.11.2)
-CVE-2025-5351
+CVE-2025-5351 (A flaw was found in the key export functionality of libssh. The issue  ...)
 	- libssh 0.11.2-1 (bug #1108407)
 	[bookworm] - libssh <no-dsa> (Minor issue)
 	NOTE: https://www.libssh.org/security/advisories/CVE-2025-5351.txt



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7b4ed1000a3049f236360dc2678fd2f30763c7c8

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7b4ed1000a3049f236360dc2678fd2f30763c7c8
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250704/3b79b202/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list