[Git][security-tracker-team/security-tracker][master] 6 commits: mark CVE-2026-33554 as postponed for Bullseye
Thorsten Alteholz (@alteholz)
alteholz at debian.org
Fri Apr 3 11:42:45 BST 2026
Thorsten Alteholz pushed to branch master at Debian Security Tracker / security-tracker
Commits:
a39229ef by Thorsten Alteholz at 2026-04-03T12:41:52+02:00
mark CVE-2026-33554 as postponed for Bullseye
- - - - -
48d44036 by Thorsten Alteholz at 2026-04-03T12:41:54+02:00
mark CVE-2025-11143 as postponed for Bullseye
- - - - -
f1bbd4e0 by Thorsten Alteholz at 2026-04-03T12:41:56+02:00
mark CVE-2025-34297 as postponed for Bullseye
- - - - -
43322850 by Thorsten Alteholz at 2026-04-03T12:41:58+02:00
mark CVE-2026-5037 as postponed for Bullseye
- - - - -
72cc867c by Thorsten Alteholz at 2026-04-03T12:42:00+02:00
mark CVE-2026-32711 as postponed for Bullseye
- - - - -
ec613d08 by Thorsten Alteholz at 2026-04-03T12:42:03+02:00
mark CVE-2026-4538 as postponed for Bullseye
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -2285,6 +2285,7 @@ CVE-2026-5037 (A vulnerability was determined in mxml up to 4.0.4. This issue af
- mxml 4.0.4-4 (bug #1132328)
[trixie] - mxml <no-dsa> (Minor issue)
[bookworm] - mxml <no-dsa> (Minor issue)
+ [bullseye] - mxml <postponed> (Minor issue)
NOTE: https://github.com/michaelrsweet/mxml/issues/350
NOTE: Fixed by: https://github.com/michaelrsweet/mxml/commit/6e27354466092a1ac65601e01ce6708710bb9fa5
CVE-2026-5036 (A vulnerability was found in Tenda 4G06 04.06.01.29. This vulnerabilit ...)
@@ -5534,6 +5535,7 @@ CVE-2026-33554 (ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overf
- freeipmi 1.6.17-1 (bug #1132018)
[trixie] - freeipmi <no-dsa> (Minor issue)
[bookworm] - freeipmi <no-dsa> (Minor issue)
+ [bullseye] - freeipmi <postponed> (Minor issue)
NOTE: https://savannah.gnu.org/bugs/?68140
NOTE: https://savannah.gnu.org/bugs/?68141
NOTE: https://savannah.gnu.org/bugs/?68142
@@ -6924,6 +6926,7 @@ CVE-2026-4538 (A vulnerability was identified in PyTorch 2.10.0. The affected el
- pytorch <unfixed>
[trixie] - pytorch <no-dsa> (Minor issue)
[bookworm] - pytorch <no-dsa> (Minor issue)
+ [bullseye] - pytorch <postponed> (Minor issue)
NOTE: https://github.com/pytorch/pytorch/pull/176791
CVE-2026-4537 (A vulnerability was determined in Cudy TR1200 R46-2.4.15-20250721-1640 ...)
NOT-FOR-US: Cudy TR1200
@@ -8081,6 +8084,7 @@ CVE-2026-32711 (pydicom is a pure Python package for working with DICOM files. V
- pydicom <unfixed> (bug #1131492)
[trixie] - pydicom <no-dsa> (Minor issue)
[bookworm] - pydicom <no-dsa> (Minor issue)
+ [bullseye] - pydicom <postponed> (Minor issue)
NOTE: https://github.com/pydicom/pydicom/security/advisories/GHSA-v856-2rf8-9f28
NOTE: Fixed by: https://github.com/pydicom/pydicom/commit/6414f01a053dff925578799f5a7208d2ae585e82 (v3.0.2)
CVE-2026-32697 (SuiteCRM is an open-source, enterprise-ready Customer Relationship Man ...)
@@ -14691,6 +14695,7 @@ CVE-2025-11143 (The Jetty URI parser has some key differences to other common pa
- jetty9 <unfixed>
[trixie] - jetty9 <no-dsa> (Minor issue)
[bookworm] - jetty9 <no-dsa> (Minor issue)
+ [bullseye] - jetty9 <postponed> (Minor issue)
- jetty <removed>
NOTE: https://github.com/jetty/jetty.project/security/advisories/GHSA-wjpw-4j6x-6rwh
NOTE: Fixed by: https://github.com/jetty/jetty.project/commit/28d9af2a2a3346d7edd35e3b6372a68c5a3be4a5 (jetty-12.1.5)
@@ -56087,6 +56092,7 @@ CVE-2025-34297 (KissFFT versions prior to the fix commit 1b083165 contain an int
- kissfft <unfixed> (bug #1131147)
[trixie] - kissfft <no-dsa> (Minor issue)
[bookworm] - kissfft <no-dsa> (Minor issue)
+ [bullseye] - kissfft <postponed> (Minor issue)
NOTE: https://github.com/mborgerding/kissfft/issues/120
NOTE: Fixed by: https://github.com/mborgerding/kissfft/commit/1b08316582049c3716154caefc0deab8758506e3
CVE-2025-2879 (Exposure of Sensitive Information to an Unauthorized Actor vulnerabili ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/b262fe9632e5e8405126d9cb351f93de6de76468...ec613d0898fb6c5d2d8fe11f5885c9f301c8b342
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/b262fe9632e5e8405126d9cb351f93de6de76468...ec613d0898fb6c5d2d8fe11f5885c9f301c8b342
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260403/df7a79ea/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list