[Git][security-tracker-team/security-tracker][master] trixie/bookworm triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Sat Jan 3 18:18:06 GMT 2026



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
18b4152f by Moritz Muehlenhoff at 2026-01-03T19:17:51+01:00
trixie/bookworm triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -96,10 +96,14 @@ CVE-2025-69284 (Plane is an an open-source project management tool. In plane.io,
 	NOT-FOR-US: Plane
 CVE-2025-67269 (An integer underflow vulnerability exists in the `nextstate()` functio ...)
 	- gpsd 3.27-1.1
+	[trixie] - gpsd <no-dsa> (Minor issue)
+	[bookworm] - gpsd <no-dsa> (Minor issue)
 	NOTE: https://github.com/Jaenact/gspd_cve/blob/main/CVE-2025-67269/README.md
 	NOTE: Fixed by: https://gitlab.com/gpsd/gpsd/-/commit/ffa1d6f40bca0b035fc7f5e563160ebb67199da7 (release-3.27.1)
 CVE-2025-67268 (gpsd before commit dc966aa contains a heap-based out-of-bounds write v ...)
 	- gpsd 3.27-1.1
+	[trixie] - gpsd <no-dsa> (Minor issue)
+	[bookworm] - gpsd <no-dsa> (Minor issue)
 	NOTE: https://github.com/Jaenact/gspd_cve/blob/main/CVE-2025-67268/README.md
 	NOTE: Fixed by: https://gitlab.com/gpsd/gpsd/-/commit/dc966aa74c075d0a6535811d98628625cbfbe3f4 (release-3.27.1)
 CVE-2025-67160 (An issue in Vatilon v1.12.37-20240124 allows attackers to access sensi ...)
@@ -2167,6 +2171,8 @@ CVE-2025-69195
 	NOTE: Fixed by: https://gitlab.com/gnuwget/wget2/-/commit/fc7fcbc00e0a2c8606d44ab216195afb3f08cc98 (v2.2.1)
 CVE-2025-69194
 	- wget2 <unfixed> (bug #1124378)
+	[trixie] - wget2 <no-dsa> (Minor issue)
+	[bookworm] - wget2 <no-dsa> (Minor issue)
 	NOTE: Fixed by: https://gitlab.com/gnuwget/wget2/-/commit/684be4785280fbe6b8666080bbdd87e7e5299ac5 (v2.2.1)
 CVE-2025-69261 (WasmEdge is a WebAssembly runtime. Prior to version 0.16.0-alpha.3, a  ...)
 	- wasmedge 0.16.0+dfsg-1 (bug #1124376)
@@ -9791,7 +9797,10 @@ CVE-2025-65742 (An unauthenticated Broken Function Level Authorization (BFLA) vu
 	NOT-FOR-US: Newgen OmniDocs
 CVE-2025-65431 (An issue was discovered in allauth-django before 65.13.0. Both Okta an ...)
 	- django-allauth <unfixed> (bug #1123085)
+	[trixie] - django-allauth <no-dsa> (Minor issue)
+	[bookworm] - django-allauth <no-dsa> (Minor issue)
 	NOTE: https://allauth.org/news/2025/10/django-allauth-65.13.0-released/
+	NOTE: https://github.com/pennersr/django-allauth/commit/8feef46e0e07b25fc5594c8f268afa247ebc3412
 CVE-2025-65430 (An issue was discovered in allauth-django before 65.13.0. IdP: marking ...)
 	- django-allauth <unfixed> (bug #1123085)
 	NOTE: https://allauth.org/news/2025/10/django-allauth-65.13.0-released/



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/18b4152fdb0288c82db4e0ce7d525f307f4b9a57

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/18b4152fdb0288c82db4e0ce7d525f307f4b9a57
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260103/4745ca8f/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list