Daniel Leidert pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
f15103de by Daniel Leidert at 2025-08-25T03:25:53+02:00
lts: triage CVE-2025-29366/mupen64plus-core

Add links to various PRs that fix the various issues reported at
<https://github.com/Giles-one/mupen64plusEscape/tree/main/> (which are more
than just one; I don't know why only one of them got a CVE assigned)

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -285,6 +285,10 @@ CVE-2025-33120 (IBM QRadar SIEM 7.5 through 7.5.0 UP13 
could allow an authentica
 CVE-2025-29366 (In mupen64plus v2.6.0 there is an array overflow vulnerability 
in the  ...)
        - mupen64plus-core <unfixed>
        NOTE: https://github.com/Giles-one/mupen64plusEscape/tree/main/BUG1
+       NOTE: https://github.com/mupen64plus/mupen64plus-core/pull/1080
+       NOTE: https://github.com/mupen64plus/mupen64plus-core/pull/1119
+       NOTE: https://github.com/mupen64plus/mupen64plus-core/pull/1122
+       NOTE: https://github.com/mupen64plus/mupen64plus-core/pull/1123
        TODO: check details
 CVE-2025-29365 (spimsimulator spim v9.1.24 and before is vulnerable to Buffer 
Overflow ...)
        - spim <unfixed> (unimportant)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f15103de9f46deebe677328e30ad3d5c20d10bde

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f15103de9f46deebe677328e30ad3d5c20d10bde
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to