Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b0dacc39 by security tracker role at 2025-04-11T08:12:41+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,73 @@
+CVE-2025-3512 (There is a Heap-based Buffer Overflow vulnerability in 
QTextMarkdownIm ...)
+       TODO: check
+CVE-2025-32816 (CodeLit CourseLit before 0.57.5 allows Parameter Tampering via 
a payme ...)
+       TODO: check
+CVE-2025-32809 (W. W. Norton InQuizitive through 2025-04-08 allows students to 
conduct ...)
+       TODO: check
+CVE-2025-32808 (W. W. Norton InQuizitive through 2025-04-08 allows students to 
insert  ...)
+       TODO: check
+CVE-2025-32807 (A path traversal vulnerability in FusionDirectory before 1.5 
allows re ...)
+       TODO: check
+CVE-2025-32775
+       REJECTED
+CVE-2025-32774
+       REJECTED
+CVE-2025-32773
+       REJECTED
+CVE-2025-32772
+       REJECTED
+CVE-2025-32771
+       REJECTED
+CVE-2025-32770
+       REJECTED
+CVE-2025-32769
+       REJECTED
+CVE-2025-32768
+       REJECTED
+CVE-2025-32767
+       REJECTED
+CVE-2025-32765
+       REJECTED
+CVE-2025-32764
+       REJECTED
+CVE-2025-32763
+       REJECTED
+CVE-2025-32762
+       REJECTED
+CVE-2025-32761
+       REJECTED
+CVE-2025-32760
+       REJECTED
+CVE-2025-32759
+       REJECTED
+CVE-2025-32758
+       REJECTED
+CVE-2025-32757
+       REJECTED
+CVE-2025-2636 (The InstaWP Connect \u2013 1-click WP Staging & Migration 
plugin for W ...)
+       TODO: check
+CVE-2025-26335 (Dell PowerProtect Cyber Recovery, versions prior to 19.18.0.2, 
contain ...)
+       TODO: check
+CVE-2025-1386 (When using the ch-go library, under a specific condition when 
the quer ...)
+       TODO: check
+CVE-2025-0128 (A denial-of-service (DoS) vulnerability in the Simple 
Certificate Enro ...)
+       TODO: check
+CVE-2025-0127 (A command injection vulnerability in Palo Alto Networks 
PAN-OS\xae sof ...)
+       TODO: check
+CVE-2025-0126 (When configured using SAML, a session fixation vulnerability in 
the Gl ...)
+       TODO: check
+CVE-2025-0125 (An improper input neutralization vulnerability in the 
management web i ...)
+       TODO: check
+CVE-2025-0124 (An authenticated file deletion vulnerability in the Palo Alto 
Networks ...)
+       TODO: check
+CVE-2025-0122 (A denial-of-service (DoS) vulnerability in Palo Alto Networks 
Prisma\x ...)
+       TODO: check
+CVE-2025-0121 (A null pointer dereference vulnerability in the Palo Alto 
Networks Cor ...)
+       TODO: check
+CVE-2025-0120 (A vulnerability with a privilege management mechanism in the 
Palo Alto ...)
+       TODO: check
+CVE-2024-51461 (IBM QRadar WinCollect Agent 10.0 through 10.1.13 could allow a 
remote  ...)
+       TODO: check
 CVE-2025-32755 (In jenkins/ssh-slave Docker images based on Debian, SSH host 
keys are  ...)
        NOT-FOR-US: Jenkins (core or plugin)
 CVE-2025-32754 (In jenkins/ssh-agent Docker images 6.11.1 and earlier, SSH 
host keys a ...)
@@ -4256,6 +4326,7 @@ CVE-2025-30429 (A path handling issue was addressed with 
improved validation. Th
 CVE-2025-30428 (This issue was addressed through improved state management. 
This issue ...)
        NOT-FOR-US: Apple
 CVE-2025-30427 (A use-after-free issue was addressed with improved memory 
management.  ...)
+       {DSA-5899-1}
        - webkit2gtk 2.48.1-1
        - wpewebkit 2.48.1-1
        [bookworm] - wpewebkit <ignored> (wpewebkit not covered by security 
support in Bookworm)
@@ -4306,6 +4377,7 @@ CVE-2025-24266 (A buffer overflow was addressed with 
improved bounds checking. T
 CVE-2025-24265 (An out-of-bounds read was addressed with improved bounds 
checking. Thi ...)
        NOT-FOR-US: Apple
 CVE-2025-24264 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       {DSA-5899-1}
        - webkit2gtk 2.48.1-1
        - wpewebkit 2.48.1-1
        [bookworm] - wpewebkit <ignored> (wpewebkit not covered by security 
support in Bookworm)
@@ -4386,6 +4458,7 @@ CVE-2025-24218 (A privacy issue was addressed with 
improved private data redacti
 CVE-2025-24217 (This issue was addressed with improved redaction of sensitive 
informat ...)
        NOT-FOR-US: Apple
 CVE-2025-24216 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       {DSA-5899-1}
        - webkit2gtk 2.48.1-1
        - wpewebkit 2.48.1-1
        [bookworm] - wpewebkit <ignored> (wpewebkit not covered by security 
support in Bookworm)
@@ -4396,6 +4469,7 @@ CVE-2025-24215 (The issue was addressed with improved 
checks. This issue is fixe
 CVE-2025-24214 (A privacy issue was addressed by not logging contents of text 
fields.  ...)
        NOT-FOR-US: Apple
 CVE-2025-24213 (This issue was addressed with improved handling of floats. 
This issue  ...)
+       {DSA-5899-1}
        - webkit2gtk 2.48.1-1
        - wpewebkit 2.48.1-1
        [bookworm] - wpewebkit <ignored> (wpewebkit not covered by security 
support in Bookworm)
@@ -4408,12 +4482,14 @@ CVE-2025-24211 (This issue was addressed with improved 
memory handling. This iss
 CVE-2025-24210 (A logic error was addressed with improved error handling. This 
issue i ...)
        NOT-FOR-US: Apple
 CVE-2025-24209 (A buffer overflow issue was addressed with improved memory 
handling. T ...)
+       {DSA-5899-1}
        - webkit2gtk 2.48.1-1
        - wpewebkit 2.48.1-1
        [bookworm] - wpewebkit <ignored> (wpewebkit not covered by security 
support in Bookworm)
        [bullseye] - wpewebkit <ignored> (wpewebkit >= 2.40 can no longer be 
sensibly backported)
        NOTE: https://webkitgtk.org/security/WSA-2025-0003.html
 CVE-2025-24208 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       {DSA-5899-1}
        - webkit2gtk 2.48.1-1
        - wpewebkit 2.48.1-1
        [bookworm] - wpewebkit <ignored> (wpewebkit not covered by security 
support in Bookworm)
@@ -7793,6 +7869,7 @@ CVE-2025-25758 (An issue in KukuFM Android v1.12.7 
(11207) allows attackers to a
 CVE-2024-54564 (This issue was addressed through improved state management. 
This issue ...)
        NOT-FOR-US: Apple
 CVE-2024-54551 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       {DSA-5899-1}
        - webkit2gtk 2.48.1-1
        - wpewebkit 2.48.1-1
        [bookworm] - wpewebkit <ignored> (wpewebkit not covered by security 
support in Bookworm)
@@ -8801,13 +8878,13 @@ CVE-2024-10442 (Off-by-one error vulnerability in the 
transmission component in
        NOT-FOR-US: Synology
 CVE-2024-10441 (Improper encoding or escaping of output vulnerability in the 
system pl ...)
        NOT-FOR-US: Synology
-CVE-2025-29918 [detect: infinite loop with negated pcre and indefinite 
recursion limit setting]
+CVE-2025-29918 (Suricata is a network Intrusion Detection System, Intrusion 
Prevention ...)
        {DLA-4103-1}
        - suricata 1:7.0.9-1
        [bookworm] - suricata <no-dsa> (Minor issue)
        NOTE: Fixed by: 
https://github.com/OISF/suricata/commit/b14c67cbdf25fa6c7ffe0d04ddf3ebe67b12b50b
 (master)
        NOTE: Fixed by: 
https://github.com/OISF/suricata/commit/f6c9490e1f7b0b375c286d5313ebf3bc81a95eb6
 (suricata-7.0.9)
-CVE-2025-29917 [decode_base64: signature can do large memory allocation]
+CVE-2025-29917 (Suricata is a network Intrusion Detection System, Intrusion 
Prevention ...)
        - suricata 1:7.0.9-1
        [bookworm] - suricata <no-dsa> (Minor issue)
        NOTE: Fixed by: 
https://github.com/OISF/suricata/commit/32d0bd2bbb4d486623dec85a94952fde2515f2f0
 (master)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b0dacc39e4087f0bce44551e0ad606f7a6d4a5ce

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b0dacc39e4087f0bce44551e0ad606f7a6d4a5ce
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to