Daniel Leidert pushed to branch master at Debian Security Tracker / security-tracker
Commits: f15103de by Daniel Leidert at 2025-08-25T03:25:53+02:00 lts: triage CVE-2025-29366/mupen64plus-core Add links to various PRs that fix the various issues reported at <https://github.com/Giles-one/mupen64plusEscape/tree/main/> (which are more than just one; I don't know why only one of them got a CVE assigned) - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -285,6 +285,10 @@ CVE-2025-33120 (IBM QRadar SIEM 7.5 through 7.5.0 UP13 could allow an authentica CVE-2025-29366 (In mupen64plus v2.6.0 there is an array overflow vulnerability in the ...) - mupen64plus-core <unfixed> NOTE: https://github.com/Giles-one/mupen64plusEscape/tree/main/BUG1 + NOTE: https://github.com/mupen64plus/mupen64plus-core/pull/1080 + NOTE: https://github.com/mupen64plus/mupen64plus-core/pull/1119 + NOTE: https://github.com/mupen64plus/mupen64plus-core/pull/1122 + NOTE: https://github.com/mupen64plus/mupen64plus-core/pull/1123 TODO: check details CVE-2025-29365 (spimsimulator spim v9.1.24 and before is vulnerable to Buffer Overflow ...) - spim <unfixed> (unimportant) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f15103de9f46deebe677328e30ad3d5c20d10bde -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f15103de9f46deebe677328e30ad3d5c20d10bde You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list [email protected] https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
