[Git][security-tracker-team/security-tracker][master] 6 commits: lts: add ghostscript
Emilio Pozuelo Monfort (@pochu)
pochu at debian.org
Fri Mar 21 18:00:25 GMT 2025
Emilio Pozuelo Monfort pushed to branch master at Debian Security Tracker / security-tracker
Commits:
c1bfe84b by Emilio Pozuelo Monfort at 2025-03-21T18:15:12+01:00
lts: add ghostscript
- - - - -
61b624ba by Emilio Pozuelo Monfort at 2025-03-21T18:15:54+01:00
lts: add webkit2gtk
- - - - -
6cffa9ed by Emilio Pozuelo Monfort at 2025-03-21T18:19:53+01:00
lts: add ruby-rack
- - - - -
5591ab5d by Emilio Pozuelo Monfort at 2025-03-21T18:21:27+01:00
lts: postpone CVE-2025-29786/golang-github-antonmedv-expr
- - - - -
c9ffe5f5 by Emilio Pozuelo Monfort at 2025-03-21T18:31:20+01:00
lts: CVE-2024-8176/expat ignored
- - - - -
52a08129 by Emilio Pozuelo Monfort at 2025-03-21T18:33:50+01:00
lts: CVE-2025-2581/xmedcon postponed
- - - - -
2 changed files:
- data/CVE/list
- data/dla-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -37,6 +37,7 @@ CVE-2025-2582 (A vulnerability was found in SimpleMachines SMF 2.1.4 and classif
CVE-2025-2581 (A vulnerability has been found in xmedcon 0.25.0 and classified as pro ...)
- xmedcon <unfixed> (bug #1100986)
[bookworm] - xmedcon <no-dsa> (Minor issue)
+ [bullseye] - xmedcon <postponed> (Minor issue)
NOTE: https://xmedcon.sourceforge.io/Main/New
NOTE: https://sourceforge.net/p/xmedcon/code/ci/e7a88836fc2277f8ab777f3ef24f917d08415559/
CVE-2025-2574 (Out-of-bounds array write in Xpdf 4.05 and earlier, due to incorrect i ...)
@@ -1387,6 +1388,7 @@ CVE-2025-29787 (`zip` is a zip library for rust which supports reading and writi
CVE-2025-29786 (Expr is an expression language and expression evaluation for Go. Prior ...)
- golang-github-antonmedv-expr <unfixed>
[bookworm] - golang-github-antonmedv-expr <no-dsa> (Minor issue)
+ [bullseye] - golang-github-antonmedv-expr <postponed> (Minor issue)
NOTE: https://github.com/advisories/GHSA-93mq-9ffx-83m2
NOTE: https://github.com/expr-lang/expr/pull/762
NOTE: Fixed by: https://github.com/expr-lang/expr/commit/0d19441454426d2f58edb22c31f3ba5f99c7a26e (v1.17.0)
@@ -1872,7 +1874,8 @@ CVE-2025-XXXX [Parameter manipulation allows the forging of signed SAML messages
NOTE: https://git.shibboleth.net/view/?p=cpp-opensaml.git;a=commit;h=22a610b322e2178abd03e97cdbc8fb50b45efaee (3.3.1)
CVE-2024-8176 (A stack overflow vulnerability exists in the libexpat library due to t ...)
- expat 2.7.0-1
- [bookworm] - expat <ignored> (Minor issue and too intrusive to impact)
+ [bookworm] - expat <ignored> (Minor issue and too intrusive to backport)
+ [bullseye] - expat <ignored> (Minor issue and too intrusive to backport)
NOTE: https://blog.hartwork.org/posts/expat-2-7-0-released/
NOTE: https://github.com/libexpat/libexpat/issues/893
NOTE: https://github.com/libexpat/libexpat/pull/973
=====================================
data/dla-needed.txt
=====================================
@@ -104,6 +104,9 @@ freetype (Adrian Bunk)
fwupd
NOTE: 20250217: Added by Front-Desk (Beuc)
--
+ghostscript
+ NOTE: 20250321: Added by Front-Desk (pochu)
+--
glewlwyd
NOTE: 20250312: Added by Front-Desk; CVE-2024-25715 to be fixed (lamby)
--
@@ -246,6 +249,10 @@ rails
NOTE: 20250105: Added by Front-Desk (apo)
NOTE: 20250305: Utkarsh uploaded the CVE fixes to unstable via rails/7.2.2.1. (utkarsh)
--
+ruby-rack
+ NOTE: 20250321: Added by Front-Desk (pochu)
+ NOTE: 20250321: also look at postponed issues (pochu)
+--
ruby-saml
NOTE: 20250314: Added by Front-Desk (lamby)
--
@@ -313,6 +320,9 @@ vim (Sean Whitton)
NOTE: 20250228: week because there was a bad arbitrary code execution CVE to
NOTE: 20250228: fix. (spwhitton)
--
+webkit2gtk (Emilio)
+ NOTE: 20250321: Added by Front-Desk (pochu)
+--
xrdp
NOTE: 20250207: Added by Front-Desk (apo)
NOTE: 20250227: https://people.debian.org/~abhijith/upload/xrdp_patches/ (abhijith)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/4ef24a2da97072943db2e70b9ce7ff6860d86d8f...52a0812963506e9c4c463f8ee90c238c37fd3e11
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/4ef24a2da97072943db2e70b9ce7ff6860d86d8f...52a0812963506e9c4c463f8ee90c238c37fd3e11
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250321/f095d653/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list