[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue May 13 09:12:28 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
b2181c14 by security tracker role at 2025-05-13T08:12:19+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,211 @@
+CVE-2025-4632 (Improper limitation of a pathname to a restricted directory vulnerabil ...)
+	TODO: check
+CVE-2025-4474 (The Frontend Dashboard plugin for WordPress is vulnerable to Privilege ...)
+	TODO: check
+CVE-2025-4473 (The Frontend Dashboard plugin for WordPress is vulnerable to Privilege ...)
+	TODO: check
+CVE-2025-4396 (The Relevanssi \u2013 A Better Search plugin for WordPress is vulnerab ...)
+	TODO: check
+CVE-2025-4339 (The TheGem theme for WordPress is vulnerable to unauthorized modificat ...)
+	TODO: check
+CVE-2025-4317 (The TheGem theme for WordPress is vulnerable to arbitrary file uploads ...)
+	TODO: check
+CVE-2025-47864
+	REJECTED
+CVE-2025-47863
+	REJECTED
+CVE-2025-47862
+	REJECTED
+CVE-2025-47861
+	REJECTED
+CVE-2025-47860
+	REJECTED
+CVE-2025-47859
+	REJECTED
+CVE-2025-47858
+	REJECTED
+CVE-2025-46825 (Kanboard is project management software that focuses on the Kanban met ...)
+	TODO: check
+CVE-2025-43011 (Under certain conditions, SAP Landscape Transformation's PCL Basis mod ...)
+	TODO: check
+CVE-2025-43010 (SAP S/4HANA Cloud Private Edition or on Premise (SCM Master Data Layer ...)
+	TODO: check
+CVE-2025-43009 (SAP Service Parts Management (SPM) does not perform necessary authoriz ...)
+	TODO: check
+CVE-2025-43008 (Due to missing authorization check, an unauthorized user can view the  ...)
+	TODO: check
+CVE-2025-43007 (SAP Service Parts Management (SPM) does not perform necessary authoriz ...)
+	TODO: check
+CVE-2025-43006 (SAP Supplier Relationship Management (Master Data Management Catalogue ...)
+	TODO: check
+CVE-2025-43005 (SAP GUI for Windows allows an unauthenticated attacker to exploit inse ...)
+	TODO: check
+CVE-2025-43004 (Due to a security misconfiguration vulnerability, customers can develo ...)
+	TODO: check
+CVE-2025-43003 (SAP S/4 HANA allows an authenticated attacker with user privileges to  ...)
+	TODO: check
+CVE-2025-43002 (SAP S4CORE OData meta-data property allows an authenticated attacker t ...)
+	TODO: check
+CVE-2025-43000 (Under certain conditions Promotion Management Wizard (PMW) allows an a ...)
+	TODO: check
+CVE-2025-42999 (SAP NetWeaver Visual Composer Metadata Uploader is vulnerable when a p ...)
+	TODO: check
+CVE-2025-42997 (Under certain conditions, SAP Gateway Client allows a high-privileged  ...)
+	TODO: check
+CVE-2025-3659 (Improper authentication handling was identified in a set of HTTP POST  ...)
+	TODO: check
+CVE-2025-3107 (The Newsletters plugin for WordPress is vulnerable to time-based SQL I ...)
+	TODO: check
+CVE-2025-35471 (conda-forge openssl-feedstock before 066e83c (2024-05-20), on Microsof ...)
+	TODO: check
+CVE-2025-31329 (SAP NetWeaver is vulnerable to an Information Disclosure vulnerability ...)
+	TODO: check
+CVE-2025-31260 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2025-31259 (The issue was addressed with improved input sanitization. This issue i ...)
+	TODO: check
+CVE-2025-31258 (This issue was addressed by removing the vulnerable code. This issue i ...)
+	TODO: check
+CVE-2025-31257 (This issue was addressed with improved memory handling. This issue is  ...)
+	TODO: check
+CVE-2025-31256 (The issue was addressed with improved handling of caches. This issue i ...)
+	TODO: check
+CVE-2025-31253 (This issue was addressed through improved state management. This issue ...)
+	TODO: check
+CVE-2025-31251 (The issue was addressed with improved input sanitization. This issue i ...)
+	TODO: check
+CVE-2025-31250 (An information disclosure issue was addressed with improved privacy co ...)
+	TODO: check
+CVE-2025-31249 (A logic issue was addressed with improved checks. This issue is fixed  ...)
+	TODO: check
+CVE-2025-31247 (A logic issue was addressed with improved state management. This issue ...)
+	TODO: check
+CVE-2025-31246 (The issue was addressed with improved memory handling. This issue is f ...)
+	TODO: check
+CVE-2025-31245 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2025-31244 (A file quarantine bypass was addressed with additional checks. This is ...)
+	TODO: check
+CVE-2025-31242 (A privacy issue was addressed with improved private data redaction for ...)
+	TODO: check
+CVE-2025-31241 (A double free issue was addressed with improved memory management. Thi ...)
+	TODO: check
+CVE-2025-31240 (This issue was addressed with improved checks. This issue is fixed in  ...)
+	TODO: check
+CVE-2025-31239 (A use-after-free issue was addressed with improved memory management.  ...)
+	TODO: check
+CVE-2025-31238 (The issue was addressed with improved checks. This issue is fixed in w ...)
+	TODO: check
+CVE-2025-31237 (This issue was addressed with improved checks. This issue is fixed in  ...)
+	TODO: check
+CVE-2025-31236 (An information disclosure issue was addressed with improved privacy co ...)
+	TODO: check
+CVE-2025-31235 (A double free issue was addressed with improved memory management. Thi ...)
+	TODO: check
+CVE-2025-31234 (The issue was addressed with improved input sanitization. This issue i ...)
+	TODO: check
+CVE-2025-31233 (The issue was addressed with improved input sanitization. This issue i ...)
+	TODO: check
+CVE-2025-31232 (A logic issue was addressed with improved checks. This issue is fixed  ...)
+	TODO: check
+CVE-2025-31228 (The issue was addressed with improved authentication. This issue is fi ...)
+	TODO: check
+CVE-2025-31227 (A logic issue was addressed with improved checks. This issue is fixed  ...)
+	TODO: check
+CVE-2025-31226 (A logic issue was addressed with improved checks. This issue is fixed  ...)
+	TODO: check
+CVE-2025-31225 (A privacy issue was addressed by removing sensitive data. This issue i ...)
+	TODO: check
+CVE-2025-31224 (A logic issue was addressed with improved checks. This issue is fixed  ...)
+	TODO: check
+CVE-2025-31223 (The issue was addressed with improved checks. This issue is fixed in w ...)
+	TODO: check
+CVE-2025-31222 (A correctness issue was addressed with improved checks. This issue is  ...)
+	TODO: check
+CVE-2025-31221 (An integer overflow was addressed with improved input validation. This ...)
+	TODO: check
+CVE-2025-31220 (A privacy issue was addressed by removing sensitive data. This issue i ...)
+	TODO: check
+CVE-2025-31219 (The issue was addressed with improved memory handling. This issue is f ...)
+	TODO: check
+CVE-2025-31218 (This issue was addressed by removing the vulnerable code. This issue i ...)
+	TODO: check
+CVE-2025-31217 (The issue was addressed with improved input validation. This issue is  ...)
+	TODO: check
+CVE-2025-31215 (The issue was addressed with improved checks. This issue is fixed in w ...)
+	TODO: check
+CVE-2025-31214 (This issue was addressed through improved state management. This issue ...)
+	TODO: check
+CVE-2025-31213 (A logging issue was addressed with improved data redaction. This issue ...)
+	TODO: check
+CVE-2025-31212 (This issue was addressed through improved state management. This issue ...)
+	TODO: check
+CVE-2025-31210 (The issue was addressed with improved UI. This issue is fixed in iPadO ...)
+	TODO: check
+CVE-2025-31209 (An out-of-bounds read was addressed with improved bounds checking. Thi ...)
+	TODO: check
+CVE-2025-31208 (The issue was addressed with improved checks. This issue is fixed in w ...)
+	TODO: check
+CVE-2025-31207 (A logic issue was addressed with improved checks. This issue is fixed  ...)
+	TODO: check
+CVE-2025-31206 (A type confusion issue was addressed with improved state handling. Thi ...)
+	TODO: check
+CVE-2025-31205 (The issue was addressed with improved checks. This issue is fixed in w ...)
+	TODO: check
+CVE-2025-31204 (The issue was addressed with improved memory handling. This issue is f ...)
+	TODO: check
+CVE-2025-31196 (An out-of-bounds read was addressed with improved input validation. Th ...)
+	TODO: check
+CVE-2025-31195 (The issue was addressed by adding additional logic. This issue is fixe ...)
+	TODO: check
+CVE-2025-30453 (The issue was addressed with additional permissions checks. This issue ...)
+	TODO: check
+CVE-2025-30448 (This issue was addressed with additional entitlement checks. This issu ...)
+	TODO: check
+CVE-2025-30442 (The issue was addressed with improved input sanitization. This issue i ...)
+	TODO: check
+CVE-2025-30440 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2025-30436 (This issue was addressed by restricting options offered on a locked de ...)
+	TODO: check
+CVE-2025-30018 (The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) ...)
+	TODO: check
+CVE-2025-30012 (The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) ...)
+	TODO: check
+CVE-2025-30011 (The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) ...)
+	TODO: check
+CVE-2025-30010 (The Live Auction Cockpit in SAP Supplier Relationship Management (SRM) ...)
+	TODO: check
+CVE-2025-30009 (he Live Auction Cockpit in SAP Supplier Relationship Management (SRM)  ...)
+	TODO: check
+CVE-2025-26662 (The Data Services Management Console does not sufficiently encode user ...)
+	TODO: check
+CVE-2025-24274 (An input validation issue was addressed by removing the vulnerable cod ...)
+	TODO: check
+CVE-2025-24258 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2025-24225 (An injection issue was addressed with improved input validation. This  ...)
+	TODO: check
+CVE-2025-24223 (The issue was addressed with improved memory handling. This issue is f ...)
+	TODO: check
+CVE-2025-24222 (The issue was addressed with improved memory handling. This issue is f ...)
+	TODO: check
+CVE-2025-24220 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2025-24155 (The issue was addressed with improved memory handling. This issue is f ...)
+	TODO: check
+CVE-2025-24144 (An information disclosure issue was addressed by removing the vulnerab ...)
+	TODO: check
+CVE-2025-24142 (A privacy issue was addressed with improved private data redaction for ...)
+	TODO: check
+CVE-2025-24111 (A memory corruption issue was addressed with improved state management ...)
+	TODO: check
+CVE-2025-22249 (VMware Aria automation contains a DOM based Cross-Site Scripting (XSS) ...)
+	TODO: check
+CVE-2025-22246 (Cloud Foundry UAA release versions from v77.21.0 to v7.31.0 are vulner ...)
+	TODO: check
+CVE-2023-49641 (Billing Software v1.0 is vulnerable to multiple Unauthenticated SQL In ...)
+	TODO: check
 CVE-2025-47712
 	- nbdkit <unfixed>
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2365724
@@ -22469,7 +22677,7 @@ CVE-2025-1930 (On Windows, a compromised content process could use bad StreamDat
 CVE-2025-27521 (Vulnerability of improper access permission in the process management  ...)
 	NOT-FOR-US: Huawei
 CVE-2025-27221 (In the URI gem before 1.0.3 for Ruby, the URI handling methods (URI.jo ...)
-	{DLA-4082-1}
+	{DLA-4163-1 DLA-4082-1}
 	- ruby3.3 3.3.7-2
 	- ruby3.1 <removed> (bug #1103794)
 	[bookworm] - ruby3.1 <no-dsa> (Minor issue)
@@ -46409,7 +46617,8 @@ CVE-2024-12842 (A vulnerability was found in Emlog Pro up to 2.4.1. It has been
 	NOT-FOR-US: Emlog Pro
 CVE-2024-12841 (A vulnerability was found in Emlog Pro up to 2.4.1. It has been classi ...)
 	NOT-FOR-US: Emlog Pro
-CVE-2024-12840 (A server-side request forgery exists in Satellite. When a PUT HTTP req ...)
+CVE-2024-12840
+	REJECTED
 	NOT-FOR-US: Red Hat Satellite
 CVE-2024-12677 (Delta Electronics DTM Soft deserializes objects, which could allow an  ...)
 	NOT-FOR-US: Delta Electronics
@@ -71227,7 +71436,8 @@ CVE-2024-30134 (The HCL Traveler for Microsoft Outlook executable (HTMO.exe) is
 	NOT-FOR-US: HCL
 CVE-2023-46175 (IBM Cloud Pak for Multicloud Management 2.3 through 2.3 FP8 stores use ...)
 	NOT-FOR-US: IBM
-CVE-2024-47177 (** DISPUTED ** CUPS is a standards-based, open-source printing system, ...)
+CVE-2024-47177
+	REJECTED
 	- cups-filters <unfixed> (bug #1082822)
 	[trixie] - cups-filters <ignored> (Mitigated with fixes around CVE-2024-47076, CVE-2024-47175 and CVE-2024-47176)
 	[bookworm] - cups-filters <ignored> (Mitigated with fixes around CVE-2024-47076, CVE-2024-47175 and CVE-2024-47176)
@@ -188072,7 +188282,7 @@ CVE-2023-28756 (A ReDoS issue was discovered in the Time component through 0.2.1
 	NOTE: https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/
 	NOTE: https://github.com/jruby/jruby/commit/36637a1b4e434cbb75c8f87be128b7763cedf99d (9.4.3.0)
 CVE-2023-28755 (A ReDoS issue was discovered in the URI component through 0.12.0 in Ru ...)
-	{DLA-3858-1 DLA-3447-1 DLA-3408-1}
+	{DLA-4163-1 DLA-3858-1 DLA-3447-1 DLA-3408-1}
 	- rubygems 3.4.20-1
 	[bookworm] - rubygems <no-dsa> (Minor issue)
 	- ruby3.1 <removed> (bug #1038408)
@@ -207172,6 +207382,7 @@ CVE-2023-22665 (There is insufficient checking of user queries in Apache Jena ve
 	[bookworm] - apache-jena <ignored> (Minor issue)
 	NOTE: https://lists.apache.org/thread/s0dmpsxcwqs57l4qfs415klkgmhdxq7s
 CVE-2023-22652 (A Buffer Copy without Checking Size of Input ('Classic Buffer Overflow ...)
+	{DLA-4164-1}
 	- libeconf 0.5.2+dfsg1-1 (bug #1037333)
 	[bookworm] - libeconf 0.5.1+dfsg1-1+deb12u1
 	NOTE: https://github.com/openSUSE/libeconf/issues/177
@@ -297531,6 +297742,7 @@ CVE-2021-43811 (Sockeye is an open-source sequence-to-sequence framework for Neu
 CVE-2021-43810 (Admidio is a free open source user management system for websites of o ...)
 	NOT-FOR-US: Admidio
 CVE-2021-43809 (`Bundler` is a package for managing application dependencies in Ruby.  ...)
+	{DLA-4163-1}
 	- rubygems 3.3.5-1
 	NOTE: https://github.com/rubygems/rubygems/security/advisories/GHSA-fj7f-vq84-fh43
 	NOTE: https://github.com/rubygems/rubygems/commit/90b1ed8b9f8b636aa8c913f7b5a764a2e03d179c (v3.3.0)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b2181c146c8a4fcb6dcd4b660aa142fd89d5ec97

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b2181c146c8a4fcb6dcd4b660aa142fd89d5ec97
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250513/1281b188/attachment.htm>


More information about the debian-security-tracker-commits mailing list