[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Apr 23 12:46:34 BST 2026



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
5fb03265 by Salvatore Bonaccorso at 2026-04-23T13:45:37+02:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -119,11 +119,11 @@ CVE-2026-41168 (pypdf is a free and open-source pure-python PDF library. An atta
 	NOTE: https://github.com/py-pdf/pypdf/pull/3733
 	NOTE: Fixed by: https://github.com/py-pdf/pypdf/commit/62338e9d36419cf193ccec7331784f45df1d70b3 (6.10.1)
 CVE-2026-41167 (Jellystat is a free and open source Statistics App for Jellyfin. Prior ...)
-	TODO: check
+	NOT-FOR-US: Jellystat
 CVE-2026-41166 (OpenRemote is an open-source internet-of-things platform. Prior to ver ...)
 	NOT-FOR-US: OpenRemote
 CVE-2026-41134 (Kiota is an OpenAPI based HTTP Client code generator. Versions prior t ...)
-	TODO: check
+	NOT-FOR-US: Kiota
 CVE-2026-41040 (GROWI provided by GROWI, Inc. is vulnerable to a regular expression de ...)
 	NOT-FOR-US: GROWI
 CVE-2026-40937 (RustFS is a distributed object storage system built in Rust. Prior to  ...)
@@ -139,9 +139,9 @@ CVE-2026-40062 (A path Traversal vulnerability exists in Ziostation2 v2.9.8.7 an
 CVE-2026-3844 (The Breeze Cache plugin for WordPress is vulnerable to arbitrary file  ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2026-3837 (An authenticated attacker can persist crafted values in multiple field ...)
-	TODO: check
+	NOT-FOR-US: Frappe
 CVE-2026-3673 (An authenticated attacker can store a crafted tag value in _user_tags  ...)
-	TODO: check
+	NOT-FOR-US: Frappe
 CVE-2026-3621 (IBM WebSphere Application Server - Liberty 17.0.0.3 through 26.0.0.4 I ...)
 	NOT-FOR-US: IBM
 CVE-2026-3361 (The WP Store Locator plugin for WordPress is vulnerable to Stored Cros ...)
@@ -149,7 +149,7 @@ CVE-2026-3361 (The WP Store Locator plugin for WordPress is vulnerable to Stored
 CVE-2026-3007 (Successful exploitation of the stored cross-site scripting (XSS) vulne ...)
 	TODO: check
 CVE-2026-34488 (IP Setting Software contains an issue with the DLL search path, which  ...)
-	TODO: check
+	NOT-FOR-US: IP Setting Software
 CVE-2026-34068 (nimiq-transaction provides the transaction primitive to be used in Nim ...)
 	TODO: check
 CVE-2026-34067 (nimiq-transaction provides the transaction primitive to be used in Nim ...)
@@ -165,13 +165,13 @@ CVE-2026-34063 (Nimiq's network-libp2p is a Nimiq network implementation based o
 CVE-2026-34062 (nimiq-libp2p is a Nimiq network implementation based on libp2p. Prior  ...)
 	TODO: check
 CVE-2026-33733 (EspoCRM is an open source customer relationship management application ...)
-	TODO: check
+	NOT-FOR-US: EspoCRM
 CVE-2026-33656 (EspoCRM is an open source customer relationship management application ...)
-	TODO: check
+	NOT-FOR-US: EspoCRM
 CVE-2026-33471 (nimiq-block contains block primitives to be used in Nimiq's Rust imple ...)
 	TODO: check
 CVE-2026-32679 (The installers of LiveOn Meet Client for Windows (Downloader5Installer ...)
-	TODO: check
+	NOT-FOR-US: LiveOn Meet Client for Windows
 CVE-2026-2951 (The Gutentor \u2013 Gutenberg Blocks \u2013 Page Builder for Gutenberg ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2026-29198 (In Rocket.Chat <8.3.0, <8.2.1, <8.1.2, <8.0.3, <7.13.5, <7.12.6, <7.11 ...)
@@ -576,7 +576,7 @@ CVE-2026-33256 (An attacker can send a web request that causes unlimited memory
 	[bullseye] - pdns-recursor <end-of-life> (see DSA 6045)
 	NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2026-03.html#cve-2026-33256-unbounded-memory-allocation-by-internal-web-server
 CVE-2026-32885 (DDEV is an open-source tool for running local web development environm ...)
-	TODO: check
+	NOT-FOR-US: DDEV
 CVE-2026-31530 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.19.11-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5fb03265124c8fc8e0ff58be2434a4021454c033

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5fb03265124c8fc8e0ff58be2434a4021454c033
You're receiving this email because of your account on salsa.debian.org. Manage all notifications: https://salsa.debian.org/-/profile/notifications | Help: https://salsa.debian.org/help


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260423/0d2006e7/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list