Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
3c0acad2 by Moritz Muehlenhoff at 2025-08-15T15:46:50+02:00
trixie triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -18072,6 +18072,7 @@ CVE-2025-6069 (The html.parser.HTMLParser class had 
worse-case quadratic complex
        - pypy3 <unfixed>
        [bullseye] - pypy3 <postponed> (Minor issue; DoS)
        - jython <unfixed> (bug #1109376)
+       [trixie] - jython <no-dsa> (Minor issue)
        [bookworm] - jython <no-dsa> (Minor issue)
        [bullseye] - jython <end-of-life> (EOL in bullseye LTS)
        NOTE: 
https://mail.python.org/archives/list/[email protected]/thread/K5PIYLR6EP3WR7ZOKKYQUWEDNQVUXOYM/
@@ -22695,6 +22696,7 @@ CVE-2025-49113 (Roundcube Webmail before 1.5.10 and 
1.6.x before 1.6.11 allows r
 CVE-2025-49112 (setDeferredReply in networking.c in Valkey through 8.1.1 has 
an intege ...)
        - redict 7.3.5+ds-1 (bug #1107212)
        - redis <unfixed> (bug #1107211)
+       [trixie] - redis <postponed> (Minor issue; can be fixed along with next 
DSA)
        [bookworm] - redis <postponed> (Minor issue; can be fixed along with 
next DSA)
        [bullseye] - redis <postponed> (Minor issue; can be fixed along with 
next DLA)
        - valkey 8.1.1+dfsg1-2 (bug #1107210)
@@ -25073,6 +25075,7 @@ CVE-2025-4969 (A vulnerability was found in the libsoup 
package. This flaw stems
        - libsoup3 3.6.5-2 (bug #1106248)
        [bookworm] - libsoup3 <no-dsa> (Minor issue)
        - libsoup2.4 <unfixed> (bug #1106325)
+       [trixie] - libsoup2.4 <no-dsa> (Minor issue)
        [bookworm] - libsoup2.4 <no-dsa> (Minor issue)
        NOTE: https://gitlab.gnome.org/GNOME/libsoup/-/issues/447
        NOTE: https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/467
@@ -25712,6 +25715,7 @@ CVE-2025-4948 (A flaw was found in the 
soup_multipart_new_from_message() functio
        - libsoup3 3.6.5-2 (bug #1106204)
        [bookworm] - libsoup3 <no-dsa> (Minor issue)
        - libsoup2.4 <unfixed> (bug #1106337)
+       [trixie] - libsoup2.4 <no-dsa> (Minor issue)
        [bookworm] - libsoup2.4 <no-dsa> (Minor issue)
        NOTE: https://gitlab.gnome.org/GNOME/libsoup/-/issues/449
        NOTE: https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/463
@@ -25719,6 +25723,7 @@ CVE-2025-4945 (A flaw was found in the cookie parsing 
logic of the libsoup HTTP
        - libsoup3 3.6.5-2 (bug #1106205)
        [bookworm] - libsoup3 <no-dsa> (Minor issue)
        - libsoup2.4 <unfixed> (bug #1106375)
+       [trixie] - libsoup2.4 <no-dsa> (Minor issue)
        [bookworm] - libsoup2.4 <no-dsa> (Minor issue)
        NOTE: https://gitlab.gnome.org/GNOME/libsoup/-/issues/448
 CVE-2025-4941 (A vulnerability, which was classified as critical, was found in 
PHPGur ...)
@@ -27296,6 +27301,7 @@ CVE-2025-4476 (A denial-of-service vulnerability has 
been identified in the libs
        - libsoup3 3.6.5-2 (bug #1105887)
        [bookworm] - libsoup3 <no-dsa> (Minor issue)
        - libsoup2.4 <unfixed> (bug #1107757)
+       [trixie] - libsoup2.4 <no-dsa> (Minor issue)
        [bookworm] - libsoup2.4 <no-dsa> (Minor issue)
        NOTE: https://gitlab.gnome.org/GNOME/libsoup/-/issues/440
        NOTE: https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/457
@@ -33623,8 +33629,10 @@ CVE-2024-10635 (Enterprise Protection contains an 
improper input validation vuln
        NOT-FOR-US: Proofpoint
 CVE-2025-4035 (A flaw was found in libsoup. When handling cookies, libsoup 
clients mi ...)
        - libsoup3 <unfixed> (bug #1104414)
+       [trixie] - libsoup3 <no-dsa> (Minor issue)
        [bookworm] - libsoup3 <no-dsa> (Minor issue)
        - libsoup2.4 <unfixed> (bug #1104415)
+       [trixie] - libsoup2.4 <no-dsa> (Minor issue)
        [bookworm] - libsoup2.4 <no-dsa> (Minor issue)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2362651
        NOTE: https://gitlab.gnome.org/GNOME/libsoup/-/issues/443
@@ -34372,6 +34380,7 @@ CVE-2025-46421 (A flaw was found in libsoup. When 
libsoup clients encounter an H
        - libsoup3 3.6.5-1
        [bookworm] - libsoup3 <no-dsa> (Minor issue)
        - libsoup2.4 <unfixed> (bug #1104054)
+       [trixie] - libsoup2.4 <no-dsa> (Minor issue)
        [bookworm] - libsoup2.4 <no-dsa> (Minor issue)
        NOTE: https://gitlab.gnome.org/GNOME/libsoup/-/issues/439
        NOTE: https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/436
@@ -38063,6 +38072,7 @@ CVE-2025-32907 (A flaw was found in libsoup. The 
implementation of HTTP range re
        - libsoup3 3.6.5-2 (bug #1103264)
        [bookworm] - libsoup3 <no-dsa> (Minor issue)
        - libsoup2.4 <unfixed> (bug #1103518)
+       [trixie] - libsoup2.4 <no-dsa> (Minor issue)
        [bookworm] - libsoup2.4 <no-dsa> (Minor issue)
        NOTE: https://gitlab.gnome.org/GNOME/libsoup/-/issues/428
        NOTE: See also 
https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/452
@@ -41118,8 +41128,10 @@ CVE-2025-32050 (A flaw was found in libsoup. The 
libsoup append_param_quoted() f
        NOTE: Fixed by: 
https://gitlab.gnome.org/GNOME/libsoup/-/commit/9bb0a55de55c6940ced811a64fbca82fe93a9323
 (3.6.1)
 CVE-2025-32049 (A flaw was found in libsoup. The SoupWebsocketConnection may 
accept a  ...)
        - libsoup3 <unfixed> (bug #1102067)
+       [trixie] - libsoup3 <no-dsa> (Minor issue)
        [bookworm] - libsoup3 <no-dsa> (Minor issue)
        - libsoup2.4 <unfixed> (bug #1102211)
+       [trixie] - libsoup2.4 <no-dsa> (Minor issue)
        [bookworm] - libsoup2.4 <no-dsa> (Minor issue)
        NOTE: https://gitlab.gnome.org/GNOME/libsoup/-/issues/390
        NOTE: https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/408
@@ -46618,6 +46630,7 @@ CVE-2024-44199 (An out-of-bounds read was addressed 
with improved input validati
        NOT-FOR-US: Apple
 CVE-2024-13903 (A vulnerability was found in quickjs-ng QuickJS up to 0.8.0. 
It has be ...)
        - quickjs <unfixed> (bug #1100987)
+       [trixie] - quickjs <no-dsa> (Minor issue)
        NOTE: https://github.com/quickjs-ng/quickjs/issues/775
        NOTE: 
https://github.com/quickjs-ng/quickjs/commit/99c02eb45170775a9a679c32b45dd4000ea67aff
 (v0.9.0)
 CVE-2025-30160 (Redlib is an alternative private front-end to Reddit. A 
vulnerability  ...)
@@ -78789,6 +78802,7 @@ CVE-2024-55634 (A vulnerability in Drupal Core allows 
Privilege Escalation.This
        - drupal7 <not-affected> (Only affects Drupal 8 and later)
 CVE-2024-55601 (Hugo is a static site generator. Starting in version 0.123.0 
and prior ...)
        - hugo <unfixed> (bug #1089683)
+       [trixie] - hugo <no-dsa> (Minor issue)
        [bookworm] - hugo <not-affected> (Vulnerable code introduced later)
        [bullseye] - hugo <not-affected> (Vulnerable code introduced later)
        NOTE: 
https://github.com/gohugoio/hugo/security/advisories/GHSA-c2xf-9v2r-r2rx
@@ -96037,6 +96051,7 @@ CVE-2024-45271 (An unauthenticated local attacker can 
gain admin privileges by d
        NOT-FOR-US: MB connect line GmbH
 CVE-2024-44337 (The package `github.com/gomarkdown/markdown` is a Go library 
for parsi ...)
        - golang-github-gomarkdown-markdown <unfixed> (bug #1085377)
+       [trixie] - golang-github-gomarkdown-markdown <no-dsa> (Minor issue)
        [bookworm] - golang-github-gomarkdown-markdown <no-dsa> (Minor issue)
        NOTE: https://github.com/Brinmon/CVE-2024-44337
        NOTE: 
https://github.com/gomarkdown/markdown/commit/a2a9c4f76ef5a5c32108e36f7c47f8d310322252
@@ -106978,7 +106993,8 @@ CVE-2024-42852 (Cross Site Scripting vulnerability in 
AcuToWeb server v.10.5.0.7
        NOT-FOR-US: AcuToWeb server
 CVE-2024-42845 (An eval Injection vulnerability in the component 
invesalius/reader/dic ...)
        - invesalius <unfixed> (bug #1082875)
-       [bookworm] - invesalius <postponed> (Minor issue, revisit when fixed 
upstream)
+       [trixie] - invesalius <no-dsa> (Minor issue)
+       [bookworm] - invesalius <no-dsa> (Minor issue)
        [bullseye] - invesalius <postponed> (Minor issue)
        NOTE: 
https://github.com/partywavesec/invesalius3_vulnerabilities/tree/main/CVE-2024-42845
        NOTE: 
https://github.com/invesalius/invesalius3/commit/020cd6056c30105a870cfea99939282b6ec5640b
@@ -159369,6 +159385,7 @@ CVE-2024-1979 (A vulnerability was found in Quarkus. 
In certain conditions relat
        NOT-FOR-US: Quarkus
 CVE-2023-5685 (A flaw was found in XNIO. The XNIO NotifierState that can cause 
a Stac ...)
        - jboss-xnio <unfixed> (bug #1065847)
+       [trixie] - jboss-xnio <ignored> (Minor issue)
        [bookworm] - jboss-xnio <ignored> (Minor issue)
        [bullseye] - jboss-xnio <no-dsa> (Minor issue)
        [buster] - jboss-xnio <no-dsa> (Minor issue)
@@ -174239,6 +174256,7 @@ CVE-2023-50837 (Improper Neutralization of Special 
Elements used in an SQL Comma
        NOT-FOR-US: WordPress plugin
 CVE-2023-50572 (An issue in the component GroovyEngine.execute of jline-groovy 
v3.24.1 ...)
        - jline3 <unfixed> (bug #1059726)
+       [trixie] - jline3 <ignored> (Minor issue)
        [bookworm] - jline3 <ignored> (Minor issue)
        [bullseye] - jline3 <no-dsa> (Minor issue)
        - jline2 <not-affected> (Only affects 3.x)
@@ -188114,6 +188132,7 @@ CVE-2023-5072 (Denial of Service  in JSON-Java 
versions up to and including 2023
        [bullseye] - libjson-java <no-dsa> (Minor issue)
        [buster] - libjson-java <no-dsa> (Minor issue)
        - jenkins-json <unfixed> (bug #1053883)
+       [trixie] - jenkins-json <postponed> (Minor issue, revisit when fixed 
upstream)
        [bookworm] - jenkins-json <postponed> (Minor issue, revisit when fixed 
upstream)
        [bullseye] - jenkins-json <no-dsa> (Minor issue)
        [buster] - jenkins-json <no-dsa> (Minor issue)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3c0acad29d97d5a76449d7978f992be7e1015a92

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3c0acad29d97d5a76449d7978f992be7e1015a92
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to