Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 9cabda19 by security tracker role at 2025-01-08T20:12:27+00:00 automatic update - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,77 +1,169 @@ -CVE-2024-56787 [soc: imx8m: Probe the SoC driver as platform driver] +CVE-2025-22143 (WeGIA is a web manager for charitable institutions. A Reflected Cross- ...) + TODO: check +CVE-2025-22141 (WeGIA is a web manager for charitable institutions. A SQL Injection vu ...) + TODO: check +CVE-2025-22140 (WeGIA is a web manager for charitable institutions. A SQL Injection vu ...) + TODO: check +CVE-2025-22139 (WeGIA is a web manager for charitable institutions. A Reflected Cross- ...) + TODO: check +CVE-2025-22137 (Pingvin Share is a self-hosted file sharing platform and an alternativ ...) + TODO: check +CVE-2025-22136 (Tabby (formerly Terminus) is a highly configurable terminal emulator. ...) + TODO: check +CVE-2025-22130 (Soft Serve is a self-hostable Git server for the command line. Prior t ...) + TODO: check +CVE-2025-21111 (Dell VxRail, versions 8.0.000 through 8.0.311, contain(s) a Plaintext ...) + TODO: check +CVE-2025-21102 (Dell VxRail, versions 7.0.000 through 7.0.532, contain(s) a Plaintext ...) + TODO: check +CVE-2025-20168 (A vulnerability in the web-based management interface of Cisco Common ...) + TODO: check +CVE-2025-20167 (A vulnerability in the web-based management interface of Cisco Common ...) + TODO: check +CVE-2025-20166 (A vulnerability in the web-based management interface of Cisco Common ...) + TODO: check +CVE-2025-20126 (A vulnerability in certification validation routines of Cisco Thousand ...) + TODO: check +CVE-2025-20123 (Multiple vulnerabilities in the web-based management interface of Cisc ...) + TODO: check +CVE-2025-0194 (An issue was discovered in GitLab CE/EE affecting all versions startin ...) + TODO: check +CVE-2024-9939 (The WordPress File Upload plugin for WordPress is vulnerable to Path T ...) + TODO: check +CVE-2024-6350 (A malformed 802.15.4 packet causes a buffer overflow to occur leading ...) + TODO: check +CVE-2024-55656 (RedisBloom adds a set of probabilistic data structures to Redis. There ...) + TODO: check +CVE-2024-55517 (An issue was discovered in the Interllect Core Search in Polaris FT In ...) + TODO: check +CVE-2024-55459 (An issue in keras 3.7.0 allows attackers to write arbitrary files to t ...) + TODO: check +CVE-2024-54818 (SourceCodester Computer Laboratory Management System 1.0 is vulnerable ...) + TODO: check +CVE-2024-53526 (composio >=0.5.40 is vulnerable to Command Execution in composio_opena ...) + TODO: check +CVE-2024-51737 (RediSearch is a Redis module that provides querying, secondary indexin ...) + TODO: check +CVE-2024-51480 (RedisTimeSeries is a time-series database (TSDB) module for Redis, by ...) + TODO: check +CVE-2024-51442 (Command Injection in Minidlna version v1.3.3 and before allows an atta ...) + TODO: check +CVE-2024-45345 + REJECTED +CVE-2024-45344 + REJECTED +CVE-2024-45343 + REJECTED +CVE-2024-45342 + REJECTED +CVE-2024-45033 (Insufficient Session Expiration vulnerability in Apache Airflow Fab Pr ...) + TODO: check +CVE-2024-13189 (A vulnerability classified as critical has been found in ZeroWdd myblo ...) + TODO: check +CVE-2024-13188 (A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linu ...) + TODO: check +CVE-2024-13187 (A vulnerability was found in Kingsoft WPS Office 6.14.0 on macOS. It h ...) + TODO: check +CVE-2024-13186 (The MinigameCenter module has insufficient restrictions on loading UR ...) + TODO: check +CVE-2024-13185 (The MinigameCenter module has insufficient restrictions on loading UR ...) + TODO: check +CVE-2024-12855 (The AdForest theme for WordPress is vulnerable to unauthorized modific ...) + TODO: check +CVE-2024-12854 (The Garden Gnome Package plugin for WordPress is vulnerable to arbitra ...) + TODO: check +CVE-2024-12853 (The Modula Image Gallery plugin for WordPress is vulnerable to arbitra ...) + TODO: check +CVE-2024-12712 (The Shopping Cart & eCommerce Store plugin for WordPress is vulnerable ...) + TODO: check +CVE-2024-12337 (The Shipping via Planzer for WooCommerce plugin for WordPress is vulne ...) + TODO: check +CVE-2024-12328 (The MAS Elementor plugin for WordPress is vulnerable to Stored Cross-S ...) + TODO: check +CVE-2024-11939 (The Cost Calculator Builder PRO plugin for WordPress is vulnerable to ...) + TODO: check +CVE-2024-11830 (The PDF Flipbook, 3D Flipbook\u2014DearFlip plugin for WordPress is vu ...) + TODO: check +CVE-2024-11423 (The Ultimate Gift Cards for WooCommerce \u2013 Create WooCommerce Gift ...) + TODO: check +CVE-2024-11350 (The AdForest theme for WordPress is vulnerable to privilege escalation ...) + TODO: check +CVE-2023-35685 (In DevmemIntMapPages of devicemem_server.c, there is a possible physic ...) + TODO: check +CVE-2024-56787 (In the Linux kernel, the following vulnerability has been resolved: s ...) - linux 6.12.5-1 [bookworm] - linux 6.1.123-1 NOTE: https://git.kernel.org/linus/9cc832d37799dbea950c4c8a34721b02b8b5a8ff (6.13-rc1) -CVE-2024-56786 [bpf: put bpf_link's program when link is safe to be deallocated] +CVE-2024-56786 (In the Linux kernel, the following vulnerability has been resolved: b ...) - linux 6.12.5-1 NOTE: https://git.kernel.org/linus/f44ec8733a8469143fde1984b5e6931b2e2f6f3f (6.13-rc1) -CVE-2024-56785 [MIPS: Loongson64: DTS: Really fix PCIe port nodes for ls7a] +CVE-2024-56785 (In the Linux kernel, the following vulnerability has been resolved: M ...) - linux 6.12.5-1 [bookworm] - linux 6.1.123-1 NOTE: https://git.kernel.org/linus/4fbd66d8254cedfd1218393f39d83b6c07a01917 (6.13-rc1) -CVE-2024-56784 [drm/amd/display: Adding array index check to prevent memory corruption] +CVE-2024-56784 (In the Linux kernel, the following vulnerability has been resolved: d ...) - linux 6.12.5-1 NOTE: https://git.kernel.org/linus/2c437d9a0b496168e1a1defd17b531f0a526dbe9 (6.13-rc1) -CVE-2024-56783 [netfilter: nft_socket: remove WARN_ON_ONCE on maximum cgroup level] +CVE-2024-56783 (In the Linux kernel, the following vulnerability has been resolved: n ...) - linux 6.12.5-1 [bookworm] - linux 6.1.123-1 [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/b7529880cb961d515642ce63f9d7570869bbbdc3 (6.13-rc2) -CVE-2024-56782 [ACPI: x86: Add adev NULL check to acpi_quirk_skip_serdev_enumeration()] +CVE-2024-56782 (In the Linux kernel, the following vulnerability has been resolved: A ...) - linux 6.12.5-1 NOTE: https://git.kernel.org/linus/4a49194f587a62d972b602e3e1a2c3cfe6567966 (6.13-rc1) -CVE-2024-56781 [powerpc/prom_init: Fixup missing powermac #size-cells] +CVE-2024-56781 (In the Linux kernel, the following vulnerability has been resolved: p ...) - linux 6.12.5-1 [bookworm] - linux 6.1.123-1 NOTE: https://git.kernel.org/linus/cf89c9434af122f28a3552e6f9cc5158c33ce50a (6.13-rc1) -CVE-2024-56780 [quota: flush quota_release_work upon quota writeback] +CVE-2024-56780 (In the Linux kernel, the following vulnerability has been resolved: q ...) - linux 6.12.5-1 [bookworm] - linux 6.1.123-1 NOTE: https://git.kernel.org/linus/ac6f420291b3fee1113f21d612fa88b628afab5b (6.13-rc2) -CVE-2024-56779 [nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur] +CVE-2024-56779 (In the Linux kernel, the following vulnerability has been resolved: n ...) - linux 6.12.5-1 [bookworm] - linux 6.1.123-1 NOTE: https://git.kernel.org/linus/98100e88dd8865999dc6379a3356cd799795fe7b (6.13-rc1) -CVE-2024-56778 [drm/sti: avoid potential dereference of error pointers in sti_hqvdp_atomic_check] +CVE-2024-56778 (In the Linux kernel, the following vulnerability has been resolved: d ...) - linux 6.12.5-1 [bookworm] - linux 6.1.123-1 NOTE: https://git.kernel.org/linus/c1ab40a1fdfee732c7e6ff2fb8253760293e47e8 (6.13-rc1) -CVE-2024-56777 [drm/sti: avoid potential dereference of error pointers in sti_gdp_atomic_check] +CVE-2024-56777 (In the Linux kernel, the following vulnerability has been resolved: d ...) - linux 6.12.5-1 [bookworm] - linux 6.1.123-1 NOTE: https://git.kernel.org/linus/e965e771b069421c233d674c3c8cd8c7f7245f42 (6.13-rc1) -CVE-2024-56776 [drm/sti: avoid potential dereference of error pointers] +CVE-2024-56776 (In the Linux kernel, the following vulnerability has been resolved: d ...) - linux 6.12.5-1 [bookworm] - linux 6.1.123-1 NOTE: https://git.kernel.org/linus/831214f77037de02afc287eae93ce97f218d8c04 (6.13-rc1) -CVE-2024-56775 [drm/amd/display: Fix handling of plane refcount] +CVE-2024-56775 (In the Linux kernel, the following vulnerability has been resolved: d ...) - linux 6.12.5-1 NOTE: https://git.kernel.org/linus/27227a234c1487cb7a684615f0749c455218833a (6.13-rc1) -CVE-2024-56774 [btrfs: add a sanity check for btrfs root in btrfs_search_slot()] +CVE-2024-56774 (In the Linux kernel, the following vulnerability has been resolved: b ...) - linux 6.12.5-1 [bookworm] - linux 6.1.123-1 [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/3ed51857a50f530ac7a1482e069dfbd1298558d4 (6.13-rc2) -CVE-2024-56773 [kunit: Fix potential null dereference in kunit_device_driver_test()] +CVE-2024-56773 (In the Linux kernel, the following vulnerability has been resolved: k ...) - linux 6.12.5-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/435c20eed572a95709b1536ff78832836b2f91b1 (6.13-rc1) -CVE-2024-56772 [kunit: string-stream: Fix a UAF bug in kunit_init_suite()] +CVE-2024-56772 (In the Linux kernel, the following vulnerability has been resolved: k ...) - linux 6.12.5-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/39e21403c978862846fa68b7f6d06f9cca235194 (6.13-rc1) -CVE-2024-56771 [mtd: spinand: winbond: Fix 512GW, 01GW, 01JW and 02JW ECC information] +CVE-2024-56771 (In the Linux kernel, the following vulnerability has been resolved: m ...) - linux 6.12.5-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/fee9b240916df82a8b07aef0fdfe96785417a164 (6.13-rc1) -CVE-2024-56770 [net/sched: netem: account for backlog updates from child qdisc] +CVE-2024-56770 (In the Linux kernel, the following vulnerability has been resolved: n ...) - linux 6.12.6-1 [bookworm] - linux 6.1.123-1 NOTE: https://git.kernel.org/linus/f8d4bc455047cf3903cd6f85f49978987dbb3027 (6.13-rc3) -CVE-2024-54676 +CVE-2024-54676 (Vendor: The Apache Software Foundation Versions Affected: Apache Open ...) NOT-FOR-US: Apache OpenMeetings CVE-2025-22215 (VMware Aria Automation contains a server-side request forgery (SSRF) v ...) NOT-FOR-US: VMware @@ -195,7 +287,7 @@ CVE-2023-52954 (Vulnerability of improper permission control in the Gallery modu NOT-FOR-US: Huawei CVE-2023-52953 (Path traversal vulnerability in the Medialibrary module Impact: Succes ...) NOT-FOR-US: Huawei -CVE-2025-0291 +CVE-2025-0291 (Type Confusion in V8 in Google Chrome prior to 131.0.6778.264 allowed ...) - chromium <unfixed> [bullseye] - chromium <end-of-life> (see #1061268) CVE-2025-22621 (In versions 1.0.67 and lower of the Splunk App for SOAR, the Splunk do ...) @@ -648,36 +740,43 @@ CVE-2025-0247 (Memory safety bugs present in Firefox 133 and Thunderbird 133. So - firefox 134.0-1 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-01/#CVE-2025-0247 CVE-2025-0243 (Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ES ...) + {DSA-5839-1} - firefox 134.0-1 - firefox-esr 128.6.0esr-1 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-01/#CVE-2025-0243 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/#CVE-2025-0243 CVE-2025-0242 (Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ES ...) + {DSA-5839-1} - firefox 134.0-1 - firefox-esr 128.6.0esr-1 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-01/#CVE-2025-0242 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/#CVE-2025-0242 CVE-2025-0241 (When segmenting specially crafted text, segmentation would corrupt mem ...) + {DSA-5839-1} - firefox 134.0-1 - firefox-esr 128.6.0esr-1 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-01/#CVE-2025-0241 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/#CVE-2025-0241 CVE-2025-0240 (Parsing a JavaScript module as JSON could, under some circumstances, c ...) + {DSA-5839-1} - firefox 134.0-1 - firefox-esr 128.6.0esr-1 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-01/#CVE-2025-0240 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/#CVE-2025-0240 CVE-2025-0239 (When using Alt-Svc, ALPN did not properly validate certificates when t ...) + {DSA-5839-1} - firefox 134.0-1 - firefox-esr 128.6.0esr-1 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-01/#CVE-2025-0239 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/#CVE-2025-0239 CVE-2025-0238 (Assuming a controlled failed memory allocation, an attacker could have ...) + {DSA-5839-1} - firefox 134.0-1 - firefox-esr 128.6.0esr-1 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-01/#CVE-2025-0238 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/#CVE-2025-0238 CVE-2025-0237 (The WebChannel API, which is used to transport various information acr ...) + {DSA-5839-1} - firefox 134.0-1 - firefox-esr 128.6.0esr-1 NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-01/#CVE-2025-0237 @@ -4261,7 +4360,7 @@ CVE-2024-56326 (Jinja is an extensible templating engine. Prior to 3.1.5, An ove - jinja2 <unfixed> (bug #1091331) NOTE: https://github.com/pallets/jinja/security/advisories/GHSA-q2x7-8rv6-6q7h NOTE: Fixed by: https://github.com/pallets/jinja/commit/48b0687e05a5466a91cd5812d604fa37ad0943b4 (3.1.5) -CVE-2024-56201 (Jinja is an extensible templating engine. Prior to 3.1.5, a bug in the ...) +CVE-2024-56201 (Jinja is an extensible templating engine. In versions on the 3.x branc ...) - jinja2 <unfixed> (bug #1091329) NOTE: https://github.com/pallets/jinja/security/advisories/GHSA-gmj6-6f8f-6699 NOTE: https://github.com/pallets/jinja/issues/1792 @@ -9680,7 +9779,7 @@ CVE-2024-53566 (An issue in the action_listcategories() function of Sangoma Aste - asterisk <unfixed> NOTE: https://gist.github.com/hyp164D1/e7c0f44ffb38c00320aa1a6d98bee616 NOTE: Wasn't reported upstream, but they confirmed it and an advisory will be published -CVE-2024-53564 (A serious vulnerability was discovered in FreePBX 17.0.19.17. FreePBX ...) +CVE-2024-53564 (A vulnerability was discovered in FreePBX 17.0.19.17. It does not veri ...) NOT-FOR-US: FreePBX CVE-2024-53484 (Ever Traduora 0.20.0 and below is vulnerable to Privilege Escalation d ...) NOT-FOR-US: Ever Traduora View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9cabda19fb1a59fa767540e2a357ae3957850622 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9cabda19fb1a59fa767540e2a357ae3957850622 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits