[Git][security-tracker-team/security-tracker][master] weechat/bullseye
Bastien Roucariès (@rouca)
rouca at debian.org
Mon Jun 9 15:11:31 BST 2025
Bastien Roucariès pushed to branch master at Debian Security Tracker / security-tracker
Commits:
307cd0e3 by Bastien Roucariès at 2025-06-09T16:10:57+02:00
weechat/bullseye
Follow bookworm and mark postponed
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -5934,11 +5934,13 @@ CVE-2025-37890 (In the Linux kernel, the following vulnerability has been resolv
CVE-2025-XXXX [Buffer overflow in range of chars in evaluated expressions]
- weechat 4.6.3-1 (bug #1104554)
[bookworm] - weechat <no-dsa> (Minor issue)
+ [bullseye] - weechat <postponed> (Minor issue)
NOTE: https://weechat.org/doc/weechat/security/WSA-2025-7/
NOTE: Fixed by: https://github.com/weechat/weechat/commit/3db2f71112ea85fa88b57f2c91be66a91ad7c078 (v4.6.3)
CVE-2025-XXXX [Buffer overflow in base 32 encoding in evaluated expressions]
- weechat 4.6.3-1 (bug #1104554)
[bookworm] - weechat <no-dsa> (Minor issue)
+ [bullseye] - weechat <postponed> (Minor issue)
NOTE: https://weechat.org/doc/weechat/security/WSA-2025-6/
NOTE: Fixed by: https://github.com/weechat/weechat/commit/09917a807bcd71adf25e51f24200e7b7a5b8ff6f (v4.6.3)
CVE-2025-XXXX [Buffer overflow in syntax highlighting of evaluated expressions]
@@ -5951,22 +5953,26 @@ CVE-2025-XXXX [Buffer overflow in syntax highlighting of evaluated expressions]
CVE-2025-XXXX [Buffer overflow in parsing of date/time]
- weechat 4.6.3-1 (bug #1104554)
[bookworm] - weechat <no-dsa> (Minor issue)
+ [bullseye] - weechat <postponed> (Minor issue)
NOTE: https://weechat.org/doc/weechat/security/WSA-2025-4/
NOTE: Introduced with: https://github.com/weechat/weechat/commit/f6ba789c3d33bdc1bcc6c00e9660ffbd9f2ba514 (v4.2.0)
NOTE: Fixed by: https://github.com/weechat/weechat/commit/2e146456913b6bc21b65dc89c69bce17b83e6264 (v4.6.3)
CVE-2025-XXXX [Integer overflow in conversion of version to an integer]
- weechat 4.6.3-1 (bug #1104554)
[bookworm] - weechat <no-dsa> (Minor issue)
+ [bullseye] - weechat <postponed> (Minor issue)
NOTE: https://weechat.org/doc/weechat/security/WSA-2025-3/
NOTE: Fixed by: https://github.com/weechat/weechat/commit/5839df90e7d4f5680186c2d2993d5701115d8c78 (v4.6.3)
CVE-2025-XXXX [Integer overflow in base32 decode/encode functions]
- weechat 4.6.3-1 (bug #1104554)
[bookworm] - weechat <no-dsa> (Minor issue)
+ [bullseye] - weechat <postponed> (Minor issue)
NOTE: https://weechat.org/doc/weechat/security/WSA-2025-2/
NOTE: Fixed by: https://github.com/weechat/weechat/commit/60824530026d2461220fa7c7c99c0278665e2150 (v4.6.3)
CVE-2025-XXXX [Integer overflow with decimal numbers in calculation of expression]
- weechat 4.6.3-1 (bug #1104554)
[bookworm] - weechat <no-dsa> (Minor issue)
+ [bullseye] - weechat <postponed> (Minor issue)
NOTE: https://weechat.org/doc/weechat/security/WSA-2025-1/
NOTE: Fixed by: https://github.com/weechat/weechat/commit/d0568dce79c350a4c11609c66587bc3e4cc00eba (v4.6.3)
CVE-2025-4759 (Versions of the package lockfile-lint-api before 5.9.2 are vulnerable ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/307cd0e391adbbc033c9d7183dc7bad3003ea304
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/307cd0e391adbbc033c9d7183dc7bad3003ea304
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250609/637ff6be/attachment.htm>
More information about the debian-security-tracker-commits
mailing list