[Git][security-tracker-team/security-tracker][master] 2 commits: Track fixed version for CVE-2024-41147/miniaudio

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sun Mar 9 14:30:10 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
12c7b934 by Salvatore Bonaccorso at 2025-03-09T15:28:02+01:00
Track fixed version for CVE-2024-41147/miniaudio

- - - - -
9c57f3ad by Salvatore Bonaccorso at 2025-03-09T15:29:26+01:00
Revert "CVE-2025-22870"

This reverts commit 1d5f791d005926a07e6546d299235274558e7b88.

No need to duplicate this information which is plaintext from the
advisory from go.

Instread add a tempoary description until the CVE feed get an update.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1050,7 +1050,7 @@ CVE-2024-0141 (NVIDIA Hopper HGX for 8-GPU contains a vulnerability in the GPU v
 	NOT-FOR-US: NVIDIA
 CVE-2024-0114 (NVIDIA Hopper HGX for 8-GPU contains a vulnerability in the HGX Manage ...)
 	NOT-FOR-US: NVIDIA
-CVE-2025-22870
+CVE-2025-22870 [Matching of hosts against proxy patterns could improperly treat an IPv6 zone ID as a hostname component]
 	- golang-1.24 1.24.1-1
 	- golang-1.23 1.23.7-1
 	- golang-1.19 <removed>
@@ -1059,8 +1059,6 @@ CVE-2025-22870
 	NOTE: https://github.com/golang/go/issues/71984
 	NOTE: Fixed by: https://github.com/golang/go/commit/334de7982f8ec959c74470dd709ceedfd6dbd50a (go1.24.1)
 	NOTE: Fixed by: https://github.com/golang/go/commit/25177ecde0922c50753c043579d17828b7ee88e7 (go1.23.7)
-	NOTE: Matching of hosts against proxy patterns could improperly treat an IPv6 zone ID as a hostname component.
-	NOTE: For example, when the NO_PROXY environment variable was set to "*.example.com", a request to "[::1%25.example.com]:80` would incorrectly match and not be proxied.
 CVE-2025-1923 (Inappropriate implementation in Permission Prompts in Google Chrome pr ...)
 	{DSA-5875-1}
 	- chromium 134.0.6998.35-1
@@ -1189,7 +1187,7 @@ CVE-2024-50705 (Unauthenticated reflected cross-site scripting (XSS) vulnerabili
 CVE-2024-50704 (Unauthenticated remote code execution vulnerability in Uniguest Triple ...)
 	NOT-FOR-US: Uniguest Tripleplay
 CVE-2024-41147 (An out-of-bounds write vulnerability exists in the ma_dr_flac__decode_ ...)
-	- miniaudio <unfixed> (bug #1099609)
+	- miniaudio 0.11.22+dfsg-1 (bug #1099609)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2024-2063
 	NOTE: https://github.com/mackron/miniaudio/issues/961
 	NOTE: Fixed by: https://github.com/mackron/miniaudio/commit/ee506b17ea25c6bcb58d79700cf0c015a2ad1b3e (0.11.22)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/1d5f791d005926a07e6546d299235274558e7b88...9c57f3ad24735acf394f6d1631084ad175938654

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/1d5f791d005926a07e6546d299235274558e7b88...9c57f3ad24735acf394f6d1631084ad175938654
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250309/447a4810/attachment.htm>


More information about the debian-security-tracker-commits mailing list