[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sun Jun 8 21:12:05 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
1aae5022 by security tracker role at 2025-06-08T20:11:56+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,7 +1,31 @@
-CVE-2025-38004 [can: bcm: add locking for bcm_op runtime updates]
+CVE-2025-5847 (A vulnerability has been found in Tenda AC9 15.03.02.13 and classified ...)
+ TODO: check
+CVE-2025-27563 (in OpenHarmony v5.0.3 and prior versions allow a local attacker cause ...)
+ TODO: check
+CVE-2025-27247 (in OpenHarmony v5.0.3 and prior versions allow a local attacker cause ...)
+ TODO: check
+CVE-2025-27242 (in OpenHarmony v5.0.3 and prior versions allow a local attacker cause ...)
+ TODO: check
+CVE-2025-27131 (in OpenHarmony v5.0.3 and prior versions allow a local attacker cause ...)
+ TODO: check
+CVE-2025-26693 (in OpenHarmony v5.0.3 and prior versions allow a local attacker cause ...)
+ TODO: check
+CVE-2025-26691 (in OpenHarmony v5.0.3 and prior versions allow a local attacker cause ...)
+ TODO: check
+CVE-2025-25217 (in OpenHarmony v5.0.3 and prior versions allow a local attacker case D ...)
+ TODO: check
+CVE-2025-24493 (in OpenHarmony v5.0.3 and prior versions allow a local attacker cause ...)
+ TODO: check
+CVE-2025-23235 (in OpenHarmony v5.0.3 and prior versions allow a local attacker cause ...)
+ TODO: check
+CVE-2025-21082 (in OpenHarmony v5.0.3 and prior versions allow a local attacker cause ...)
+ TODO: check
+CVE-2025-20063 (in OpenHarmony v5.0.3 and prior versions allow a local attacker cause ...)
+ TODO: check
+CVE-2025-38004 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux 6.12.32-1
NOTE: https://git.kernel.org/linus/c2aba69d0c36a496ab4f2e81e9c2b271f2693fd7 (6.15)
-CVE-2025-38003 [can: bcm: add missing rcu read protection for procfs content]
+CVE-2025-38003 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux 6.12.32-1
NOTE: https://git.kernel.org/linus/dac5e6249159ac255dad9781793dbe5908ac9ddb (6.15)
CVE-2025-5242
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1aae5022f8ba5f057447c26ea6aa29893eca92f7
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1aae5022f8ba5f057447c26ea6aa29893eca92f7
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250608/17bc2afd/attachment.htm>
More information about the debian-security-tracker-commits
mailing list