[Git][security-tracker-team/security-tracker][master] bookworm triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Fri May 16 17:24:50 BST 2025



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ffc98f41 by Moritz Muehlenhoff at 2025-05-16T18:23:23+02:00
bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -663,6 +663,7 @@ CVE-2025-47285 (Vyper is the Pythonic Programming Language for the Ethereum Virt
 	NOT-FOR-US: Vyper
 CVE-2025-47279 (Undici is an HTTP/1.1 client for Node.js. Prior to versions 5.29.0, 6. ...)
 	- node-undici <unfixed> (bug #1105860)
+	[bookworm] - node-undici <no-dsa> (Minor issue)
 	NOTE: https://github.com/nodejs/undici/security/advisories/GHSA-cxrh-j4jr-qwg3
 	NOTE: https://github.com/nodejs/undici/issues/3895
 	NOTE: https://github.com/nodejs/undici/pull/4088
@@ -807,6 +808,7 @@ CVE-2024-13914 (The File Manager Advanced Shortcode WordPress plugin for WordPre
 	NOT-FOR-US: WordPress plugin
 CVE-2025-4478
 	- gnome-remote-desktop <unfixed>
+	[bookworm] - gnome-remote-desktop <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2365232
 CVE-2025-23165 [Corrupted pointer in node::fs::ReadFileUtf8(const FunctionCallbackInfo<Value>& args) when args[0] is a string]
 	- nodejs <unfixed> (bug #1105832)
@@ -2057,13 +2059,11 @@ CVE-2025-46718 (sudo-rs is a memory safe implementation of sudo and su written i
 	NOTE: https://github.com/trifectatechfoundation/sudo-rs/releases/tag/v0.2.6
 	NOTE: https://github.com/trifectatechfoundation/sudo-rs/commit/54984189d62a0763235d4a02a4b2d09d768a9986 (v0.2.6)
 	NOTE: https://github.com/trifectatechfoundation/sudo-rs/commit/848719f28067d3b5e6672d07f34da5b24f85765b (v0.2.6)
-	TODO: check details
 CVE-2025-46717 (sudo-rs is a memory safe implementation of sudo and su written in Rust ...)
 	- rust-sudo-rs 0.2.5-5
 	NOTE: https://github.com/trifectatechfoundation/sudo-rs/releases/tag/v0.2.6
 	NOTE: https://github.com/trifectatechfoundation/sudo-rs/commit/54984189d62a0763235d4a02a4b2d09d768a9986 (v0.2.6)
 	NOTE: https://github.com/trifectatechfoundation/sudo-rs/commit/848719f28067d3b5e6672d07f34da5b24f85765b (v0.2.6)
-	TODO: check details
 CVE-2025-4535 (A vulnerability, which was classified as problematic, was found in Gos ...)
 	NOT-FOR-US: Gosuncn Technology Group Audio-Visual Integrated Management Platform
 CVE-2025-4534 (A vulnerability, which was classified as problematic, has been found i ...)
@@ -2281,6 +2281,7 @@ CVE-2025-4403 (The Drag and Drop Multiple File Upload for WooCommerce plugin for
 	NOT-FOR-US: WordPress plugin
 CVE-2025-4382 (A flaw was found in systems utilizing LUKS-encrypted disks with GRUB c ...)
 	- grub2 <unfixed> (bug #1105108)
+	[bookworm] - grub2 <no-dsa> (Minor issue)
 	NOTE: Fixed by: https://git.savannah.gnu.org/gitweb/?p=grub.git;a=commit;h=c448f511e74cb7c776b314fcb7943f98d3f22b6d
 	NOTE: Additional hardening via:
 	NOTE: https://git.savannah.gnu.org/gitweb/?p=grub.git;a=commit;h=ed691c0e0e20d9d0e8d8305a120e8c61d6be3d38
@@ -3326,6 +3327,7 @@ CVE-2025-47423 (Personal Weather Station Dashboard 12_lts allows unauthenticated
 	NOT-FOR-US: Personal Weather Station Dashboard
 CVE-2025-47203 (dbclient in Dropbear SSH before 2025.88 allows command injection via a ...)
 	- dropbear 2025.88-1
+	[bookworm] - dropbear <no-dsa> (Minor issue)
 	NOTE: Fixed by: https://github.com/mkj/dropbear/commit/e5a0ef27c227f7ae69d9a9fec98a056494409b9b (DROPBEAR_2025.88)
 CVE-2025-46828 (WeGIA is a web manager for charitable institutions.  An unauthenticate ...)
 	NOT-FOR-US: WeGIA
@@ -3994,6 +3996,7 @@ CVE-2025-4316 (Improper access control in PAM feature in Devolutions Server allo
 	NOT-FOR-US: Devolutions
 CVE-2025-4287 (A vulnerability was found in PyTorch 2.6.0+cu124. It has been rated as ...)
 	- pytorch <unfixed> (bug #1104931)
+	[bookworm] - pytorch <no-dsa> (Minor issue)
 	NOTE: https://github.com/pytorch/pytorch/issues/150836
 	NOTE: https://github.com/pytorch/pytorch/pull/150923
 CVE-2025-4286 (A vulnerability was found in Intelbras InControl up to 2.21.59. It has ...)
@@ -13126,7 +13129,7 @@ CVE-2025-29480 (Buffer Overflow vulnerability in gdal 3.10.2 allows a local atta
 	- gdal <unfixed> (bug #1103839; unimportant)
 	NOTE: https://github.com/lmarch2/poc/blob/main/gdal/gdal.md
 	NOTE: https://github.com/OSGeo/gdal/issues/12188
-	TODO: check pending rejection as invalid/unreproducible issue upstream
+	NOTE: invalid/unreproducible issue upstream, possibly will be rejected
 CVE-2025-29479
 	REJECTED
 CVE-2025-29478 (An issue in fluent-bit v.3.7.2 allows a local attacker to cause a deni ...)


=====================================
data/dsa-needed.txt
=====================================
@@ -65,6 +65,8 @@ sympa
 tcpdf
   Santiago is taking a look and reporting back on progress
 --
+tomcat10
+--
 thunderbird (jmm)
 --
 webkit2gtk (berto)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ffc98f41ec717278f57da54e0cd7765491728117

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ffc98f41ec717278f57da54e0cd7765491728117
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250516/f7a86183/attachment.htm>


More information about the debian-security-tracker-commits mailing list