[Git][security-tracker-team/security-tracker][master] Add new zabbix issues

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sun Oct 5 16:18:13 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
9156134b by Salvatore Bonaccorso at 2025-10-05T17:16:43+02:00
Add new zabbix issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -897,7 +897,9 @@ CVE-2025-49844 (Redis is an open source, in-memory database that persists on dis
 	NOTE: https://github.com/redis/redis/commit/d5728cb5795c966c5b5b1e0f0ac576a7e69af539 (8.2.2)
 	TODO: check redict and valkey forks
 CVE-2025-49641 (A regular Zabbix user with no permission to the Monitoring -> Problems ...)
-	TODO: check
+	- zabbix <unfixed>
+	NOTE: https://support.zabbix.com/browse/ZBX-27063
+	NOTE: Fixed in: 6.0.41, 7.0.18, 7.2.12, 7.4.2
 CVE-2025-48730 (A use of externally-controlled format string vulnerability has been re ...)
 	NOT-FOR-US: QNAP
 CVE-2025-48729 (A NULL pointer dereference vulnerability has been reported to affect s ...)
@@ -960,11 +962,16 @@ CVE-2025-33039 (An allocation of resources without limits or throttling vulnerab
 CVE-2025-33034 (A path traversal vulnerability has been reported to affect Qsync Centr ...)
 	NOT-FOR-US: QNAP
 CVE-2025-27237 (In Zabbix Agent and Agent 2 on Windows, the OpenSSL configuration file ...)
-	TODO: check
+	- zabbix <not-affected> (Only affects Zabbix Agent and Agent2 on Windows)
+	NOTE: https://support.zabbix.com/browse/ZBX-27061
 CVE-2025-27236 (A regular Zabbix user can search other users in their user group via Z ...)
-	TODO: check
+	- zabbix <unfixed>
+	NOTE: https://support.zabbix.com/browse/ZBX-27060
+	NOTE: Fixed in: 6.0.41, 7.0.17, 7.2.11, 7.4.1
 CVE-2025-27231 (The LDAP 'Bind password' value cannot be read after saving, but a Supe ...)
-	TODO: check
+	- zabbix <unfixed>
+	NOTE: https://support.zabbix.com/browse/ZBX-27062
+	NOTE: Fixed in: 6.0.41, 7.0.18, 7.2.12, 7.4.2
 CVE-2025-11234 (A flaw was found in QEMU. If the QIOChannelWebsock object is freed whi ...)
 	- qemu <unfixed> (bug #1117153)
 	NOTE: https://lists.nongnu.org/archive/html/qemu-devel/2025-09/msg06566.html



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9156134b392640724651c71ed178b845195ec94f

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9156134b392640724651c71ed178b845195ec94f
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251005/43f7da8c/attachment.htm>


More information about the debian-security-tracker-commits mailing list