[Git][security-tracker-team/security-tracker][master] trixie/bookworm triage
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Thu Oct 23 11:03:46 BST 2025
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f1422c1d by Moritz Muehlenhoff at 2025-10-23T12:03:17+02:00
trixie/bookworm triage
- - - - -
2 changed files:
- data/CVE/list
- data/dsa-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -1830,30 +1830,37 @@ CVE-2025-62586 (OPEXUS FOIAXpress allows a remote, unauthenticated attacker to r
NOT-FOR-US: OPEXUS FOIAXpress
CVE-2025-62496 (A vulnerability exists in the QuickJS engine's BigInt string parsing l ...)
- quickjs <unfixed> (bug #1118231)
+ [trixie] - quickjs <no-dsa> (Minor issue)
NOTE: https://issuetracker.google.com/434193016
NOTE: Fixed in the 2025-09-13 release (https://bellard.org/quickjs/Changelog)
CVE-2025-62495 (An integer overflow vulnerability exists in the QuickJS regular expres ...)
- quickjs <unfixed> (bug #1118231)
+ [trixie] - quickjs <no-dsa> (Minor issue)
NOTE: https://issuetracker.google.com/434196926
NOTE: Fixed with 2025-09-13 release (https://bellard.org/quickjs/Changelog)
CVE-2025-62494 (A type confusion vulnerability exists in the handling of the string ad ...)
- quickjs <unfixed> (bug #1118231)
+ [trixie] - quickjs <no-dsa> (Minor issue)
NOTE: https://issuetracker.google.com/434193023
NOTE: Fixed in the 2025-09-13 release (https://bellard.org/quickjs/Changelog)
CVE-2025-62493 (A vulnerability exists in the QuickJS engine's BigInt string conversio ...)
- quickjs <unfixed> (bug #1118231)
+ [trixie] - quickjs <no-dsa> (Minor issue)
NOTE: https://issuetracker.google.com/434193024
NOTE: Fixed in the 2025-09-13 release (https://bellard.org/quickjs/Changelog)
CVE-2025-62492 (A vulnerability stemming from floating-point arithmetic precision erro ...)
- quickjs <unfixed> (bug #1118231)
+ [trixie] - quickjs <no-dsa> (Minor issue)
NOTE: https://issuetracker.google.com/434194797
NOTE: Fixed in the 2025-09-13 release (https://bellard.org/quickjs/Changelog)
CVE-2025-62491 (A Use-After-Free (UAF) vulnerability exists in the QuickJS engine's st ...)
- quickjs <unfixed> (bug #1118231)
+ [trixie] - quickjs <no-dsa> (Minor issue)
NOTE: https://issuetracker.google.com/434195203
NOTE: Fixed n the 2025-09-13 release (https://bellard.org/quickjs/Changelog)
CVE-2025-62490 (In quickjs, in js_print_object, when printing an array, the function f ...)
- quickjs <unfixed> (bug #1118231)
+ [trixie] - quickjs <no-dsa> (Minor issue)
NOTE: https://issuetracker.google.com/434196651
NOTE: Fixed in the 2025-09-13 release (https://bellard.org/quickjs/Changelog)
CVE-2025-62428 (Drawing-Captcha APP provides interactive, engaging verification for We ...)
@@ -2290,6 +2297,8 @@ CVE-2025-11619 (Improper certificate validation when connecting to gateways in D
NOT-FOR-US: Devolutions
CVE-2025-11568 (A data corruption vulnerability has been identified in the luksmeta ut ...)
- luksmeta <unfixed> (bug #1118280)
+ [trixie] - luksmeta <no-dsa> (Minor issue)
+ [bookworm] - luksmeta <no-dsa> (Minor issue)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2404244
NOTE: https://github.com/latchset/luksmeta/pull/16
CVE-2025-11365 (The WP Google Map Plugin plugin for WordPress is vulnerable to blind S ...)
=====================================
data/dsa-needed.txt
=====================================
@@ -15,6 +15,8 @@ If needed, specify the release by adding a slash after the name of the source pa
amd64-microcode (carnil)
Coordinating with maintainer DSA/bookworm-pu and sync with mitgations in src:linux
--
+bind9 (jmm)
+--
chromium (dilinger)
--
cpp-httplib
@@ -47,6 +49,9 @@ openjdk-17/oldstable (jmm)
--
openjdk-21/stable (jmm)
--
+openjdk-25/stable (jmm)
+ first GA release, so from now on security-supported along with -21
+--
opennds/oldstable
pinged maintainer, but no reply yet. should most probably be bumped to 10.x
--
@@ -69,6 +74,8 @@ samba (carnil)
--
sogo/oldstable
--
+squid
+--
sympa/oldstable
--
thunderbird (jmm)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f1422c1dbb7b128be302d0d042292bf05d3ed92e
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f1422c1dbb7b128be302d0d042292bf05d3ed92e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251023/c83ff2d7/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list