[Git][security-tracker-team/security-tracker][master] bookworm/trixie triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Tue Nov 11 15:22:07 GMT 2025
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
23ef4cdb by Moritz Muehlenhoff at 2025-11-11T16:21:39+01:00
bookworm/trixie triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -28478,10 +28478,7 @@ CVE-2025-52352 (Aikaan IoT management platform v3.25.0325-5-g2e9c59796 provides
CVE-2025-52351 (Aikaan IoT management platform v3.25.0325-5-g2e9c59796 sends a newly g ...)
NOT-FOR-US: Aikaan IoT management platform
CVE-2025-52194 (A buffer overflow vulnerability exists in libsndfile version 1.2.2 and ...)
- - libsndfile <unfixed> (bug #1111876)
- [trixie] - libsndfile <no-dsa> (Minor issue)
- [bookworm] - libsndfile <no-dsa> (Minor issue)
- [bullseye] - libsndfile <postponed> (Minor issue, possibly not-affected)
+ NOTE: Not reproducible report against libsndfile, was also filed as bug #1111876
NOTE: https://github.com/libsndfile/libsndfile/issues/1082
CVE-2025-51989 (HTML injection vulnerability in the registration interface in Evolutio ...)
NOT-FOR-US: HRmaster
@@ -37963,7 +37960,7 @@ CVE-2025-30477 (Dell PowerScale OneFS, versions prior to 9.11.0.0, contains a us
CVE-2025-30192 (An attacker spoofing answers to ECS enabled requests sent out by the R ...)
[experimental] - pdns-recursor 5.2.4-1
- pdns-recursor 5.2.4-2 (bug #1109808)
- [bookworm] - pdns-recursor <no-dsa> (Minor issue; can be fixed via point release update)
+ [bookworm] - pdns-recursor <end-of-life> (see DSA 6045)
[bullseye] - pdns-recursor <end-of-life> (No longer supported with security updates in Bullseye)
NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2025-04.html
CVE-2025-2301 (Authorization Bypass Through User-Controlled Key vulnerability in Akbi ...)
@@ -38166,8 +38163,8 @@ CVE-2025-53770 (Deserialization of untrusted data in on-premises Microsoft Share
NOT-FOR-US: Microsoft
CVE-2025-XXXX [exposes .zip passwords while (un)archiving]
- krusader <unfixed> (bug #1108942)
- [trixie] - krusader <no-dsa> (Minor issue, revisit when fixed upstream)
- [bookworm] - krusader <no-dsa> (Minor issue, revisit when fixed upstream)
+ [trixie] - krusader <postponed> (Minor issue, revisit when fixed upstream)
+ [bookworm] - krusader <postponed> (Minor issue, revisit when fixed upstream)
[bullseye] - krusader <postponed> (Minor issue)
CVE-2025-7853 (A vulnerability was found in Tenda FH451 1.0.0.9. It has been rated as ...)
NOT-FOR-US: Tenda
@@ -315636,11 +315633,7 @@ CVE-2022-33065 (Multiple signed integers overflow in function au_read_header in
NOTE: https://github.com/libsndfile/libsndfile/issues/789
NOTE: https://github.com/libsndfile/libsndfile/commit/0754562e13d2e63a248a1c82f90b30bc0ffe307c
CVE-2022-33064 (An off-by-one error in function wav_read_header in src/wav.c in Libsnd ...)
- - libsndfile <unfixed> (bug #1051890)
- [trixie] - libsndfile <postponed> (Minor issue, revisit when fixed upstream)
- [bookworm] - libsndfile <postponed> (Minor issue, revisit when fixed upstream)
- [bullseye] - libsndfile <no-dsa> (Minor issue)
- [buster] - libsndfile <no-dsa> (Minor issue)
+ NOTE: Non issue in libsndfile, was also filed as bug #1051890
NOTE: https://github.com/libsndfile/libsndfile/issues/832
NOTE: Upstream disputes issue as possible false-positive:
NOTE: https://github.com/libsndfile/libsndfile/issues/832#issuecomment-1702253852 ff
@@ -382568,7 +382561,7 @@ CVE-2021-3618 (ALPACA is an application layer protocol content confusion attack,
[bullseye] - nginx 1.18.0-6.1+deb11u2
[stretch] - nginx <no-dsa> (Minor issue)
- vsftpd 3.0.5-0.1 (bug #991329)
- [bookworm] - vsftpd <no-dsa> (Minor issue)
+ [bookworm] - vsftpd <ignored> (Minor issue)
[bullseye] - vsftpd <no-dsa> (Minor issue)
[buster] - vsftpd <no-dsa> (Minor issue)
[stretch] - vsftpd <no-dsa> (Minor issue)
@@ -426361,7 +426354,7 @@ CVE-2020-29583 (Firmware version 4.60 of Zyxel USG devices contains an undocumen
NOT-FOR-US: Zyxel
CVE-2020-29582 (In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for ...)
- kotlin 1.3.31+ds1-3 (bug #1001037)
- [bookworm] - kotlin <no-dsa> (Minor issue)
+ [bookworm] - kotlin <ignored> (Minor issue)
NOTE: https://youtrack.jetbrains.com/issue/KT-42181 (not public)
CVE-2020-29581 (The official spiped docker images before 1.5-alpine contain a blank pa ...)
NOT-FOR-US: spiped Docker images
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/23ef4cdb67f8a48e16e7f6ed06642ba61a6ee2fd
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/23ef4cdb67f8a48e16e7f6ed06642ba61a6ee2fd
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251111/7efa18ef/attachment.htm>
More information about the debian-security-tracker-commits
mailing list