[Git][security-tracker-team/security-tracker][master] bookworm triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Wed May 7 11:42:21 BST 2025
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
22384455 by Moritz Muehlenhoff at 2025-05-07T12:41:47+02:00
bookworm triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -153,6 +153,7 @@ CVE-2025-47417 (Exposure of Sensitive Information to an Unauthorized Actor vulne
NOT-FOR-US: Crestron Automate VX
CVE-2025-47256 (Libxmp through 4.6.2 has a stack-based buffer overflow in depack_pha i ...)
- libxmp <unfixed>
+ [bookworm] - libxmp <no-dsa> (Minor issue)
NOTE: https://github.com/libxmp/libxmp/issues/847
NOTE: https://github.com/libxmp/libxmp/pull/848
NOTE: Fixed by: https://github.com/libxmp/libxmp/commit/004a102c5a75ad809fc309ff73ce8d0f9ab3e456
@@ -631,11 +632,10 @@ CVE-2024-42212 (HCL BigFix Compliance is affected by an improper or missing Same
CVE-2024-11615 (The Envolve Plugin plugin for WordPress is vulnerable to arbitrary fil ...)
NOT-FOR-US: WordPress plugin
CVE-2025-47268 (ping in iputils through 20240905 allows a denial of service (applicati ...)
- - iputils <unfixed> (bug #1104746)
- [bookworm] - iputils <no-dsa> (Minor issue)
- [bullseye] - iputils <postponed> (Minor issue, DoS)
+ - iputils <unfixed> (unimportant; bug #1104746)
NOTE: https://github.com/iputils/iputils/issues/584
NOTE: https://github.com/Zephkek/ping-rtt-overflow/
+ NOTE: Negligible security impact
CVE-2025-43926 [ZSA-2025-07]
[experimental] - znuny 6.5.15-1
- znuny <unfixed> (bug #1104739)
@@ -2662,7 +2662,7 @@ CVE-2025-47153 (Certain build processes for libuv and Node.js for 32-bit systems
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=892601
NOTE: https://github.com/nodejs/node-v0.x-archive/issues/4549
CVE-2025-4056
- - glib2.0 <not-affected> (Only affcts Glib on Windows)
+ - glib2.0 <not-affected> (Only affects Glib on Windows)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2362826
NOTE: https://gitlab.gnome.org/GNOME/glib/-/issues/3668
NOTE: https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4570
@@ -4520,6 +4520,7 @@ CVE-2023-43958 (An arbitrary file upload vulnerability in the component /jquery-
NOT-FOR-US: Hospital Management System
CVE-2023-43378 (A cross-site scripting (XSS) vulnerability in Hoteldruid v3.0.5 allows ...)
- hoteldruid <unfixed> (bug #1104020)
+ [bookworm] - hoteldruid <no-dsa> (Minor issue)
[bullseye] - hoteldruid <postponed> (minor bug; XSS)
NOTE: https://flashy-lemonade-192.notion.site/Cross-site-scripting-in-hoteldruid-version-3-0-5-via-commento1_1-post-parameter-44ff18cb61cd4a80bbba75d5e4360ee4
CVE-2025-3856 (A vulnerability was found in xxyopen Novel-Plus 5.1.0. It has been cla ...)
@@ -4664,10 +4665,12 @@ CVE-2025-43970 (An issue was discovered in GoBGP before 3.35.0. pkg/packet/mrt/m
NOTE: Fixed by: https://github.com/osrg/gobgp/commit/5153bafbe8dbe1a2f02a70bbf0365e98b80e47b0 (v3.35.0)
CVE-2025-43967 (libheif before 1.19.6 has a NULL pointer dereference in ImageItem_Grid ...)
- libheif 1.19.7-1
+ [bookworm] - libheif <no-dsa> (Minor issue)
NOTE: https://github.com/strukturag/libheif/issues/1455
NOTE: Fixed by: https://github.com/strukturag/libheif/commit/6e35af7b0ff9fb6cc952a1539590d160db32f671 (v1.19.6)
CVE-2025-43966 (libheif before 1.19.6 has a NULL pointer dereference in ImageItem_iden ...)
- libheif 1.19.7-1
+ [bookworm] - libheif <no-dsa> (Minor issue)
NOTE: Fixed by: https://github.com/strukturag/libheif/commit/b38555387e4b5dcf036fe45b0c440aca19b7b69c (v1.19.6)
CVE-2025-43964 (In LibRaw before 0.21.4, tag 0x412 processing in phase_one_correct in ...)
{DLA-4142-1}
@@ -7305,6 +7308,7 @@ CVE-2025-24948 (In JotUrl 2.0, passwords are sent via HTTP GET-type requests, po
CVE-2025-24358 (gorilla/csrf provides Cross Site Request Forgery (CSRF) prevention mid ...)
{DLA-4151-1}
- golang-github-gorilla-csrf 1.7.2+ds1-2 (bug #1103584)
+ [bookworm] - golang-github-gorilla-csrf <no-dsa> (Minor issue)
NOTE: https://github.com/gorilla/csrf/security/advisories/GHSA-rq77-p4h8-4crw
NOTE: https://github.com/gorilla/csrf/commit/9dd6af1f6d30fc79fb0d972394deebdabad6b5eb (v1.7.3)
CVE-2025-22903 (TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a sta ...)
@@ -7365,6 +7369,7 @@ CVE-2025-3588 (A vulnerability, which was classified as problematic, has been fo
NOT-FOR-US: joelittlejohn jsonschema2pojo
CVE-2025-3576 (A vulnerability in the MIT Kerberos implementation allows GSSAPI-prote ...)
- krb5 1.21.2-1 (bug #1103525)
+ [bookworm] - krb5 <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2359465
NOTE: CVE relates to issues covered in:
NOTE: https://i.blackhat.com/EU-22/Thursday-Briefings/EU-22-Tervoort-Breaking-Kerberos-RC4-Cipher-and-Spoofing-Windows-PACs-wp.pdf
=====================================
data/dsa-needed.txt
=====================================
@@ -26,6 +26,8 @@ gimp
--
jpeg-xl
--
+libapache2-mod-auth-openidc
+--
libreswan
Waiting on feedback from maintainer
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/22384455d06b916bf10f977645fb4b831bdd1281
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/22384455d06b916bf10f977645fb4b831bdd1281
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250507/ef95a51d/attachment.htm>
More information about the debian-security-tracker-commits
mailing list