[Git][security-tracker-team/security-tracker][master] 2 commits: Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Mar 4 20:31:13 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
0ccd7430 by Salvatore Bonaccorso at 2025-03-04T21:28:46+01:00
Process some NFUs
- - - - -
ac3d328c by Salvatore Bonaccorso at 2025-03-04T21:30:43+01:00
Add CVE-2025-27111/ruby-rack
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,5 +1,5 @@
CVE-2025-27507 (The open-source identity infrastructure software Zitadel allows admini ...)
- TODO: check
+ NOT-FOR-US: Zitadel
CVE-2025-27426 (Malicious websites utilizing a server-side redirect to an internal err ...)
TODO: check
CVE-2025-27425 (Scanning certain QR codes that included text with a website URL could ...)
@@ -17,7 +17,11 @@ CVE-2025-27155 (Pinecone is an experimental overlay routing protocol suite which
CVE-2025-27150 (Tuleap is an Open Source Suite to improve management of software devel ...)
NOT-FOR-US: Tuleap
CVE-2025-27111 (Rack is a modular Ruby web server interface. The Rack::Sendfile middle ...)
- TODO: check
+ - ruby-rack <unfixed>
+ NOTE: https://github.com/rack/rack/security/advisories/GHSA-8cgq-6mh2-7j6v
+ NOTE: Fixed by: https://github.com/rack/rack/commit/b13bc6bfc7506aca3478dc5ac1c2ec6fc53f82a3 (v2.2.12)
+ NOTE: Fixed by: https://github.com/rack/rack/commit/803aa221e8302719715e224f4476e438f2531a53 (v3.0.13)
+ NOTE: Fixed by: https://github.com/rack/rack/commit/aeac570bb8080ca7b53b7f2e2f67498be7ebd30b (v3.1.11)
CVE-2025-26849 (There is a Hard-coded Cryptographic Key in Docusnap 13.0.1440.24261, a ...)
TODO: check
CVE-2025-26320 (t0mer BroadlinkManager v5.9.1 was discovered to contain an OS command ...)
@@ -152,7 +156,7 @@ CVE-2025-1930 (On Windows, a compromised content process could use bad StreamDat
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-14/#CVE-2025-1930
NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-16/#CVE-2025-1930
CVE-2025-27521 (Vulnerability of improper access permission in the process management ...)
- TODO: check
+ NOT-FOR-US: Huawei
CVE-2025-27221 (In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.jo ...)
- ruby3.3 <unfixed>
- ruby3.1 <unfixed>
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/823750dbc9ac62e792d91d30ae6046b2e1620dc5...ac3d328ca404b8501fbc040e75b7ce6f3f5ba57c
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/823750dbc9ac62e792d91d30ae6046b2e1620dc5...ac3d328ca404b8501fbc040e75b7ce6f3f5ba57c
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250304/448bf6fa/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list