diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index 5455c89cedde..caaa12fbe26c 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,4587 +1,4637 @@ + + redis,valkey -- DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client + + + redis + 7.4.3 + + + redis72 + 7.2,8 + + + redis62 + 6.2.18 + + + valkey + 8.1.1 + + + + +

Axel Mierczuk reports:

+
+

+ By default, the Redis configuration does not limit the + output buffer of normal clients (see + client-output-buffer-limit). Therefore, the output buffer + can grow unlimitedly over time. As a result, the service + is exhausted and the memory is unavailable. +

+

+ When password authentication is enabled on the Redis + server, but no password is provided, the client can still + cause the output buffer to grow from "NOAUTH" responses + until the system will run out of memory. +

+
+ +
+ + CVE-2025-21605 + https://github.com/redis/redis/security/advisories/GHSA-r67f-p999-2gff + + + 2025-04-23 + 2025-04-24 + +
+ Gitlab -- Vulnerabilities gitlab-ce gitlab-ee 17.11.017.11.1 17.10.017.10.5 16.6.017.9.7

Gitlab reports:

Cross Site Scripting (XSS) in Maven Dependency Proxy through CSP directives

Cross Site Scripting (XSS) in Maven dependency proxy through cache headers

Network Error Logging (NEL) Header Injection in Maven Dependency Proxy Allows Browser Activity Monitoring

Denial of service (DOS) via issue preview

Unauthorized access to branch names when Repository assets are disabled in the project

CVE-2025-1763 CVE-2025-2443 CVE-2025-1908 CVE-2025-0639 CVE-2024-12244 https://about.gitlab.com/releases/2025/04/23/patch-release-gitlab-17-11-1-released/ 2025-04-23 2025-04-24
chromium -- multiple security fixes chromium 135.0.7049.114 ungoogled-chromium 135.0.7049.114

Chrome Releases reports:

This update includes 1 security fix.

https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_22.html 2025-04-22 2025-04-23
Navidrome -- Authentication bypass in Subsonic API navidrome 0.54.5 0.52.0

Deluan reports:

In certain Subsonic API endpoints, authentication can be bypassed by using a non-existent username combined with an empty (salted) password hash. This allows read-only access to the server’s resources, though attempts at write operations fail with a “permission denied” error.

CVE-2025-27112 https://nvd.nist.gov/vuln/detail/CVE-2025-27112 2025-02-25 2025-04-22
Erlang -- Erlang/OTP SSH Vulnerable to Pre-Authentication RCE erlang 26.2.5.11 erlang-runtime21 25.3.2.20 erlang-runtime22 25.3.2.20 erlang-runtime23 25.3.2.20 erlang-runtime24 25.3.2.20 erlang-runtime25 25.3.2.20 erlang-runtime26 26.2.5.11 erlang-runtime27 27.3.3

security-advisories@github.com reports:

Erlang/OTP is a set of libraries for the Erlang programming language. Prior to versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20, a SSH server may allow an attacker to perform unauthenticated remote code execution (RCE). By exploiting a flaw in SSH protocol message handling, a malicious actor could gain unauthorized access to affected systems and execute arbitrary commands without valid credentials. This issue is patched in versions OTP-27.3.3, OTP-26.2.5.11, and OTP-25.3.2.20. A temporary workaround involves disabling the SSH server or to prevent access via firewall rules.

CVE-2025-32433 https://nvd.nist.gov/vuln/detail/CVE-2025-32433 2025-04-16 2025-04-20
ejabberd -- mod_muc_occupantid: Fix handling multiple occupant-id ejabberd 25.04

ejabberd team reports:

Fixed issue with handling of user provided occupant-id in messages and presences sent to muc room. Server was replacing just first instance of occupant-id with its own version, leaving other ones untouched. That would mean that depending on order in which clients send occupant-id, they could see value provided by sender, and that could be used to spoof as different sender.

https://www.process-one.net/blog/ejabberd-25-04/#occupantid 2025-04-16 2025-04-19
chromium -- multiple security fixes chromium 135.0.7049.95 ungoogled-chromium 135.0.7049.95

Chrome Releases reports:

This update includes 2 security fixes:

  • [409619251] Critical CVE-2025-3619: Heap buffer overflow in Codecs. Reported by Elias Hohl on 2025-04-09
  • [405292639] High CVE-2025-3620: Use after free in USB. Reported by @retsew0x01 on 2025-03-21
CVE-2025-3619 CVE-2025-3620 https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_15.html 2025-04-15 2025-04-16
chromium -- multiple security fixes chromium 135.0.7049.84 ungoogled-chromium 135.0.7049.84

Chrome Releases reports:

This update includes 2 security fixes:

  • [405140652] High CVE-2025-3066: Use after free in Site Isolation. Reported by Sven Dysthe (@svn-dys) on 2025-03-21
CVE-2025-3066 https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_8.html 2025-04-08 2025-04-15
py-matrix-synapse -- federation denial of service via malformed events py38-matrix-synapse py39-matrix-synapse py310-matrix-synapse py311-matrix-synapse 1.127.1

element-hq/synapse developers report:

A malicious server can craft events which, when received, prevent Synapse version up to 1.127.0 from federating with other servers. The vulnerability has been exploited in the wild.

CVE-2025-30355 https://github.com/element-hq/synapse/security/advisories/GHSA-v56r-hwv5-mxg6 2025-03-26 2025-03-26
jenkins -- multiple vulnerabilities jenkins 2.504 jenkins-lts 2.492.3

Jenkins Security Advisory:

Description

(Medium) SECURITY-3512 / CVE-2025-31720

Missing permission check allows retrieving agent configurations

Description

(Medium) SECURITY-3513 / CVE-2025-31721

Missing permission check allows retrieving secrets from agent configurations

CVE-2025-31720 CVE-2025-31721 https://www.jenkins.io/security/advisory/2025-04-02/ 2025-04-02 2025-04-11
Gitlab -- Vulnerabilities gitlab-ce gitlab-ee 17.10.017.10.4 17.9.017.9.6 7.7.017.8.7

Gitlab reports:

Denial of service via CI pipelines

Unintentionally authorizing sensitive actions on users behalf

IP Restriction Bypass through GraphQL Subscription

Unauthorized users can list the number of confidential issues

Debugging Information Disclosed

CVE-2025-1677 CVE-2025-0362 CVE-2025-2408 CVE-2024-11129 CVE-2025-2469 https://about.gitlab.com/releases/2025/04/09/patch-release-gitlab-17-10-4-released/ 2025-04-09 2025-04-10
expat: improper restriction of xml entity expansion depth expat 2.7.0

secalert@redhat.com reports:

A stack overflow vulnerability exists in the libexpat library due to the way it handles recursive entity expansion in XML documents. When parsing an XML document with deeply nested entity references, libexpat can be forced to recurse indefinitely, exhausting the stack space and causing a crash. This issue could lead to denial of service (DoS) or, in some cases, exploitable memory corruption, depending on the environment and library usage.

CVE-2024-8176 https://nvd.nist.gov/vuln/detail/CVE-2024-8176 2025-03-14 2025-04-09
Mozilla -- memory corruption firefox 137.0,2 librewolf 137.0 thunderbird 137.0

security@mozilla.org reports:

Memory safety bugs present in Firefox 136 and Thunderbird 136. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CVE-2025-3034 https://nvd.nist.gov/vuln/detail/CVE-2025-3034 2025-04-01 2025-04-07
Mozilla -- privilege escalation attack firefox 137.0,2 librewolf 137.0 thunderbird 137.0

security@mozilla.org reports:

Leaking of file descriptors from the fork server to web content processes could allow for privilege escalation attacks.

CVE-2025-3032 https://nvd.nist.gov/vuln/detail/CVE-2025-3032 2025-04-01 2025-04-07
Mozilla -- stack memory read firefox 137.0,2 librewolf 137.0 thunderbird 137.0

security@mozilla.org reports:

An attacker could read 32 bits of values spilled onto the stack in a JIT compiled function.

CVE-2025-3031 https://nvd.nist.gov/vuln/detail/CVE-2025-3031 2025-04-01 2025-04-07
Mozilla -- Memory corruption firefox 137.0 firefox-esr 128.9.0 firefox 137.0

security@mozilla.org reports:

Memory safety bugs present in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CVE-2025-3030 https://nvd.nist.gov/vuln/detail/CVE-2025-3030 2025-04-01 2025-04-07
Mozilla -- URL spoofing attack firefox 137.0,2 firefox-esr 128.9 librewolf 137.0 thunderbird 137.0

security@mozilla.org reports:

A crafted URL containing specific Unicode characters could have hidden the true origin of the page, resulting in a potential spoofing attack.

CVE-2025-3029 https://nvd.nist.gov/vuln/detail/CVE-2025-3029 2025-04-01 2025-04-07
Mozilla -- use-after-free error firefox 137.0,2 firefox-esr 115.22 librewolf 137.0 thunderbird 137.0

security@mozilla.org reports:

JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free.

CVE-2025-3028 https://nvd.nist.gov/vuln/detail/CVE-2025-3028 2025-04-01 2025-04-07
chromium -- multiple security fixes chromium 135.0.7049.52 ungoogled-chromium 135.0.7049.52

Chrome Releases reports:

This update includes 13 security fixes:

  • [376491759] Medium CVE-2025-3067: Inappropriate implementation in Custom Tabs. Reported by Philipp Beer (TU Wien) on 2024-10-31
  • [401823929] Medium CVE-2025-3068: Inappropriate implementation in Intents. Reported by Simon Rawet on 2025-03-09
  • [40060076] Medium CVE-2025-3069: Inappropriate implementation in Extensions. Reported by NDevTK on 2022-06-26
  • [40086360] Medium CVE-2025-3070: Insufficient validation of untrusted input in Extensions. Reported by Anonymous on 2017-01-01
  • [40051596] Low CVE-2025-3071: Inappropriate implementation in Navigations. Reported by David Erceg on 2020-02-23
  • [362545037] Low CVE-2025-3072: Inappropriate implementation in Custom Tabs. Reported by Om Apip on 2024-08-27
  • [388680893] Low CVE-2025-3073: Inappropriate implementation in Autofill. Reported by Hafiizh on 2025-01-09
  • [392818696] Low CVE-2025-3074: Inappropriate implementation in Downloads. Reported by Farras Givari on 2025-01-28
CVE-2025-3067 CVE-2025-3068 CVE-2025-3069 CVE-2025-3070 CVE-2025-3071 CVE-2025-3072 CVE-2025-3073 CVE-2025-3074 https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop.html 2025-04-01 2025-04-05
Mozilla -- Memory corruption bug firefox 134.0,2 librewolf 134.0 firefox-esr 128.6.0 thunderbird 134.0

security@mozilla.org reports:

Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CVE-2025-0243 https://nvd.nist.gov/vuln/detail/CVE-2025-0243 2025-01-07 2025-04-04
Mozilla -- Memory safety bugs firefox 134.0,2 librewolf 134.0 thunderbird 134.0

security@mozilla.org reports:

Memory safety bugs present in Firefox 133 and Thunderbird 133. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CVE-2025-0247 https://nvd.nist.gov/vuln/detail/CVE-2025-0247 2025-01-07 2025-04-04
firefox -- authentication bypass firefox 134.0,2 librewolf 134.0,2

security@mozilla.org reports:

Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed.

CVE-2025-0245 https://nvd.nist.gov/vuln/detail/CVE-2025-0245 2025-01-07 2025-04-04
Mozilla -- Memory safety bugs firefox 134.0,2 librewolf 134.0 firefox-esr 115.19 thunderbird 134.0

security@mozilla.org reports:

Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CVE-2025-0242 https://nvd.nist.gov/vuln/detail/CVE-2025-0242 2025-01-07 2025-04-04
Mozilla -- DoS via segmentation fault firefox 134.0,2 librewolf 134.0 firefox-esr 128.6.0 thunderbird 134.0

security@mozilla.org reports:

When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash.

CVE-2025-0241 https://nvd.nist.gov/vuln/detail/CVE-2025-0241 2025-01-07 2025-04-04
Mozilla -- use-after-free while parsing JSON firefox 134.0,2 librewolf 134.0 firefox-esr 128.6.0 thunderbird 134.0

security@mozilla.org reports:

Parsing a JavaScript module as JSON could, under some circumstances, cause cross-compartment access, which may result in a use-after-free.

CVE-2025-0240 https://nvd.nist.gov/vuln/detail/CVE-2025-0240 2025-01-07 2025-04-04
Mozilla -- redirection to insecure site firefox 134.0,2 librewolf 134.0 firefox-esr 128.6.0 thunderbird 134.0

security@mozilla.org reports:

When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site.

CVE-2025-0239 https://nvd.nist.gov/vuln/detail/CVE-2025-0239 2025-01-07 2025-04-04
Mozilla -- use-after-free after failed memory allocation firefox 134.0,2 librewolf 134.0 firefox-esr 128.6.0 thunderbird 128.6

security@mozilla.org reports:

Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash.

CVE-2025-0238 https://nvd.nist.gov/vuln/detail/CVE-2025-0238 2025-01-07 2025-04-04
Mozilla -- privilege escalation attack firefox 134.0,2 librewolf 134.0 firefox-esr 128.6.0 thunderbird 128.6

security@mozilla.org reports:

The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks.

CVE-2025-0237 https://nvd.nist.gov/vuln/detail/CVE-2025-0237 2025-01-07 2025-04-04
mozilla -- memory corruption firefox 136.0,2 librewolf 136.0,2 thunderbird 136.0

security@mozilla.org reports:

Memory safety bugs present in Firefox 135 and Thunderbird 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CVE-2025-1943 https://nvd.nist.gov/vuln/detail/CVE-2025-1943 2025-03-04 2025-04-03
mozilla -- memory corruption firefox 136.0,2 librewolf 136.0,2 firefox-esr 128.8,1 thunderbird 136.0

security@mozilla.org reports:

CVE-2025-1938: Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CVE-2025-1935: A web page could trick a user into setting that site as the default handler for a custom URL protocol.

CVE-2025-1934: It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it.

CVE-2025-1938 https://nvd.nist.gov/vuln/detail/CVE-2025-1938 CVE-2025-1935 https://nvd.nist.gov/vuln/detail/CVE-2025-1935 CVE-2025-1934 https://nvd.nist.gov/vuln/detail/CVE-2025-1934 2025-03-04 2025-04-03
mozilla -- Memory safety bugs firefox 136.0,2 librewolf 136.0,2 firefox-esr 115.21,1 thunderbird 136.0

security@mozilla.org reports:

Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CVE-2025-1937 https://nvd.nist.gov/vuln/detail/CVE-2025-1937 2025-03-04 2025-04-03
mozilla -- use-after-free in WebTransport connection firefox 136.0,2 librewolf 136.0,2 firefox-esr 115.21,1 thunderbird 136.0

security@mozilla.org reports:

It was possible to cause a use-after-free in the content process side of a WebTransport connection, leading to a potentially exploitable crash.

CVE-2025-1931 https://nvd.nist.gov/vuln/detail/CVE-2025-1931 2025-03-04 2025-04-03
mozilla -- 64 bit JIT WASM read on left over memory firefox 136.0,2 firefox-esr 115.21,1 librewolf 136.0,2 thunderbird 136.0

security@mozilla.org reports:

On 64-bit CPUs, when the JIT compiles WASM i32 return values they can pick up bits from left over memory. This can potentially cause them to be treated as a different type.

CVE-2025-1933 https://nvd.nist.gov/vuln/detail/CVE-2025-1933 2025-03-04 2025-04-03
MongoDB -- crash due to improper validation of explain command mongodb50 5.0.31 mongodb60 6.0.20 mongodb70 7.0.16 mongodb80 8.0.4

cna@mongodb.com reports:

When run on commands with certain arguments set, explain may fail to validate these arguments before using them. This can lead to crashes in router servers. This affects MongoDB Server v5.0 prior to 5.0.31, MongoDB Server v6.0 prior to 6.0.20, MongoDB Server v7.0 prior to 7.0.16 and MongoDB Server v8.0 prior to 8.0.4

CVE-2025-3084 https://nvd.nist.gov/vuln/detail/CVE-2025-3084 2025-04-01 2025-04-03
MongoDB -- Malformed wire protocol messages may cause mongos to crash mongodb50 5.0.31 mongodb60 6.0.20 mongodb70 7.0.16

cna@mongodb.com reports:

Specifically crafted MongoDB wire protocol messages can cause mongos to crash during command validation. This can occur without using an authenticated connection. This issue affects MongoDB v5.0 versions prior to 5.0.31, MongoDB v6.0 versions prior to6.0.20 and MongoDB v7.0 versions prior to 7.0.16

CVE-2025-3083 https://nvd.nist.gov/vuln/detail/CVE-2025-3083 2025-04-01 2025-04-03
MongoDB -- Unauthorized access to underlying data mongodb50 5.0.31 mongodb60 6.0.20 mongodb70 7.0.16

cna@mongodb.com reports:

A user authorized to access a view may be able to alter the intended collation, allowing them to access to a different or unintended view of underlying data. This issue affects MongoDB Server v5.0 version prior to 5.0.31, MongoDB Server v6.0 version prior to 6.0.20, MongoDB Server v7.0 version prior to 7.0.14 and MongoDB Server v7.3 versions prior to 7.3.4.

CVE-2025-3082 https://nvd.nist.gov/vuln/detail/CVE-2025-3082 2025-04-01 2025-04-03
openvpn -- server-side denial-of-service vulnerability with tls-crypt-v2 openvpn 2.6.12.6.14 openvpn-devel g20250402,1

Gert Doering reports:

OpenVPN servers between 2.6.1 and 2.6.13 using --tls-crypt-v2 can be made to abort with an ASSERT() message by sending a particular combination of authenticated and malformed packets.

To trigger the bug, a valid tls-crypt-v2 client key is needed, or network observation of a handshake with a valid tls-crypt-v2 client key

No crypto integrity is violated, no data is leaked, and no remote code execution is possible.

This bug does not affect OpenVPN clients.

CVE-2025-2704 https://github.com/OpenVPN/openvpn/blob/v2.6.14/Changes.rst#overview-of-changes-in-2614 2025-03-26 2025-04-02
gitea -- Multiple vulnerabilities gitea 1.23.6

security@golang.org reports:

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

go-redis is the official Redis client library for the Go programming language. Prior to 9.5.5, 9.6.3, and 9.7.3, go-redis potentially responds out of order when `CLIENT SETINFO` times out during connection establishment. This can happen when the client is configured to transmit its identity, there are network connectivity issues, or the client was configured with aggressive timeouts. The problem occurs for multiple use cases. For sticky connections, you receive persistent out-of-order responses for the lifetime of the connection. All commands in the pipeline receive incorrect responses. When used with the default ConnPool once a connection is returned after use with ConnPool#Put the read buffer will be checked and the connection will be marked as bad due to the unread data. This means that at most one out-of-order response before the connection is discarded. This issue is fixed in 9.5.5, 9.6.3, and 9.7.3. You can prevent the vulnerability by setting the flag DisableIndentity to true when constructing the client instance.

golang-jwt is a Go implementation of JSON Web Tokens. Prior to 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2.

CVE-2025-22870 https://nvd.nist.gov/vuln/detail/CVE-2025-22870 CVE-2025-29923 https://nvd.nist.gov/vuln/detail/CVE-2025-29923 CVE-2025-30204 https://nvd.nist.gov/vuln/detail/CVE-2025-30204 2025-03-12 2025-03-31
mozilla -- multiple vulnerabilities firefox 136.0,2 firefox-esr 128.8,1 thunderbird 136.0 thunderbird 128.8 librewolf 136.0

security@mozilla.org reports:

An inconsistent comparator in xslt/txNodeSorter could have resulted in potentially exploitable out-of-bounds access. Only affected version 122 and later. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.

Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed (distinct from CVE-2025-0245). This vulnerability affects Firefox < 136.

When String.toUpperCase() caused a string to get longer it was possible for uninitialized memory to be incorporated into the result string This vulnerability affects Firefox < 136 and Thunderbird < 136.

Websites redirecting to a non-HTTP scheme URL could allow a website address to be spoofed for a malicious page This vulnerability affects Firefox for iOS < 136.

CVE-2025-1932 https://nvd.nist.gov/vuln/detail/CVE-2025-1932 CVE-2025-1941 https://nvd.nist.gov/vuln/detail/CVE-2025-1941 CVE-2025-1942 https://nvd.nist.gov/vuln/detail/CVE-2025-1942 CVE-2025-27424 https://nvd.nist.gov/vuln/detail/CVE-2025-27424 2025-03-04 2025-03-30
suricata -- Multiple vulnerabilities suricata 7.0.9

Suricate team reports:

Multiple vulnerabilities

CVE-2025-29915 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29915 CVE-2025-29916 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29916 CVE-2025-29917 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29917 CVE-2025-29918 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-29918 2025-03-12 2025-03-30
qt6-webengine -- Multiple vulnerabilities qt6-pdf qt6-webengine 6.8.3

Qt qtwebengine-chromium repo reports:

Backports for 11 security bugs in Chromium:

  • CVE-2024-11477: 7-Zip Zstd decompression integer underflow
  • CVE-2025-0762: Use after free in DevTools
  • CVE-2025-0996: Inappropriate implementation in Browser UI
  • CVE-2025-0998: Out of bounds memory access in V8
  • CVE-2025-0999: Heap buffer overflow in V8
  • CVE-2025-1006: Use after free in Network
  • CVE-2025-1426: Heap buffer overflow in GPU
  • CVE-2025-1918: Out of bounds read in Pdfium
  • CVE-2025-1919: Out of bounds read in Media
  • CVE-2025-1921: Inappropriate implementation in Media
  • CVE-2025-2036: Use after free in Inspector
CVE-2024-11477 CVE-2025-0762 CVE-2025-0996 CVE-2025-0998 CVE-2025-0999 CVE-2025-1006 CVE-2025-1426 CVE-2025-1918 CVE-2025-1919 CVE-2025-1921 CVE-2025-2036 https://code.qt.io/cgit/qt/qtwebengine-chromium.git/log/?h=122-based 2025-02-20 2025-03-29
electron{33,34} -- Incorrect handle provided in unspecified circumstances in Mojo electron33 33.4.8 electron34 34.4.1

Electron developers report:

This update fixes the following vulnerability:

  • Security: backported fix for CVE-2025-2783.
CVE-2025-2783 https://github.com/advisories/GHSA-hfqm-jfc6-rh2f 2025-03-27 2025-03-28
Gitlab -- Vulnerabilities gitlab-ce gitlab-ee 17.10.017.10.1 17.9.017.9.3 12.10.017.8.6

Gitlab reports:

Cross-site Scripting (XSS) through merge-request error messages

Cross-site Scripting (XSS) through improper rendering of certain file types

Admin Privileges Persists After Role is Revoked

External user can access internal projects

Prompt injection in Amazon Q integration may allow unauthorized actions

Uncontrolled Resource Consumption via a maliciously crafted terraform file in merge request

Maintainer can inject shell code in Harbor project name configuration when using helper scripts

CVE-2025-2255 CVE-2025-0811 CVE-2025-2242 CVE-2024-12619 CVE-2024-10307 CVE-2024-9773 https://about.gitlab.com/releases/2025/03/26/patch-release-gitlab-17-10-1-released/ 2025-03-26 2025-03-26
electron{33,34} -- Type Confusion in V8 electron33 33.4.6 electron34 34.3.4

Electron developers report:

This update fixes the following vulnerability:

  • Security: backported fix for CVE-2025-1920.
CVE-2025-1920 https://github.com/advisories/GHSA-fhwv-7gx3-h767 2025-03-20 2025-03-25
qt5-webengine -- Use after free in Compositing qt5-webengine 5.15.18p7

Qt qtwebengine-chromium repo reports:

Backports for 1 security bug in Chromium:

  • CVE-2024-12694: Use after free in Compositing
CVE-2024-12694 https://code.qt.io/cgit/qt/qtwebengine-chromium.git/log/?h=87-based 2025-02-14 2025-03-23
www/varnish7 -- client-side desync vulnerability varnish7 7.6.2

The Varnish Development Team reports:

A client-side desync vulnerability can be triggered in Varnish Cache and Varnish Enterprise. This vulnerability can be triggered under specific circumstances involving malformed HTTP/1 requests.

CVE-2025-30346 https://varnish-cache.org/security/VSV00015.html#vsv00015 2024-12-17 2025-03-22
chromium -- multiple security fixes chromium 134.0.6998.117 ungoogled-chromium 134.0.6998.117

Chrome Releases reports:

This update includes 2 security fixes:

  • [401029609] Critical CVE-2025-2476: Use after free in Lens. Reported by SungKwon Lee of Enki Whitehat on 2025-03-05
CVE-2025-2476 https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_19.html 2025-03-19 2025-03-20
php -- Multiple vulnerabilities php81 8.1.32 php82 8.2.28 php83 8.3.19 php84 8.4.5

php.net reports:

  • CVE-2024-11235: Core: Fixed GHSA-rwp7-7vc6-8477 (Reference counting in php_request_shutdown causes Use-After-Free).
  • CVE-2025-1219: LibXML: Fixed GHSA-p3x9-6h7p-cgfc (libxml streams use wrong `content-type` header when requesting a redirected resource).
  • CVE-2025-1736: Streams: Fixed GHSA-hgf5-96fm-v528 (Stream HTTP wrapper header check might omit basic auth header).
  • CVE-2025-1861: Streams: Fixed GHSA-52jp-hrpf-2jff (Stream HTTP wrapper truncate redirect location to 1024 bytes).
  • CVE-2025-1734: Streams: Fixed GHSA-pcmh-g36c-qc44 (Streams HTTP wrapper does not fail for headers without colon).
  • CVE-2025-1217: Streams: Fixed GHSA-v8xr-gpvj-cx9g (Header parser of `http` stream wrapper does not handle folded headers).
CVE-2024-11235 CVE-2025-1219 CVE-2025-1736 CVE-2025-1861 CVE-2025-1734 CVE-2025-1217 https://www.php.net/ChangeLog-8.php 2025-03-13 2025-03-13
shibboleth-sp -- Parameter manipulation allows the forging of signed SAML messages opensaml 3.3.1

The Shibboleth Project reports:

An updated version of the OpenSAML C++ library is available which corrects a parameter manipulation vulnerability when using SAML bindings that rely on non-XML signatures. The Shibboleth Service Provider is impacted by this issue, and it manifests as a critical security issue in that context.

Parameter manipulation allows the forging of signed SAML messages

A number of vulnerabilities in the OpenSAML library used by the Shibboleth Service Provider allowed for creative manipulation of parameters combined with reuse of the contents of older requests to fool the library's signature verification of non-XML based signed messages.

Most uses of that feature involve very low or low impact use cases without critical security implications; however, there are two scenarios that are much more critical, one affecting the SP and one affecting some implementers who have implemented their own code on top of our OpenSAML library and done so improperly.

The SP's support for the HTTP-POST-SimpleSign SAML binding for Single Sign-On responses is its critical vulnerability, and it is enabled by default (regardless of what one's published SAML metadata may advertise).

The other critical case involves a mistake that does *not* impact the Shibboleth SP, allowing SSO to occur over the HTTP-Redirect binding contrary to the plain language of the SAML Browser SSO profile. The SP does not support this, but other implementers may have done so.

Prior to updating, it is possible to mitigate the POST-SimpleSign vulnerability by editing the protocols.xml configuration file and removing this line: <Binding id="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST-SimpleSign" path="/SAML2/POST-SimpleSign" />

https://shibboleth.net/community/advisories/secadv_20250313.txt 2025-03-13 2025-03-13
Gitlab -- Vulnerabilities gitlab-ce gitlab-ee 17.9.017.9.2 17.8.017.8.5 11.517.7.7

Gitlab reports:

CVE-2025-25291 and CVE-2025-25292 (third party gem ruby-saml)

CVE-2025-27407 (third party gem graphql)

Denial of Service Due to Inefficient Processing of Untrusted Input

Credentials disclosed when repository mirroring fails

Denial of Service Vulnerability in GitLab Approval Rules due to Unbounded Field

Internal Notes in Merge Requests Are Emailed to Non-Members Upon Review Submission

Maintainer can inject shell code in Google integrations

Guest with custom Admin group member permissions can approve the users invitation despite user caps

CVE-2025-25291 CVE-2025-25292 CVE-2025-27407 CVE-2024-13054 CVE-2024-12380 CVE-2025-1257 CVE-2025-0652 CVE-2024-8402 CVE-2024-7296 https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released/ 2025-03-12 2025-03-13
vim -- potential data loss with zip.vim and specially crafted zip files vim 9.1.1198

Vim reports:

See https://github.com/vim/vim/security/advisories/GHSA-693p-m996-3rmf

CVE-2025-29768 https://github.com/vim/vim/security/advisories/GHSA-693p-m996-3rmf 2025-03-12 2025-03-12
chromium -- multiple security fixes chromium 134.0.6998.88 ungoogled-chromium 134.0.6998.88

Chrome Releases reports:

This update includes 5 security fixes:

  • [398065918] High CVE-2025-1920: Type Confusion in V8. Reported by Excello s.r.o. on 2025-02-21
  • [400052777] High CVE-2025-2135: Type Confusion in V8. Reported by Zhenghang Xiao (@Kipreyyy) on 2025-03-02
  • [401059730] High CVE-TBD: Out of bounds write in GPU. Reported on 2025-03-05
  • [395032416] Medium CVE-2025-2136: Use after free in Inspector. Reported by Sakana.S on 2025-02-10
  • [398999390] Medium CVE-2025-2137: Out of bounds read in V8. Reported by zeroxiaobai@ on 2025-02-25
CVE-2025-1920 CVE-2025-2135 CVE-2025-2136 CVE-2025-2137 https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html 2025-03-10 2025-03-11
libreoffice -- Macro URL arbitrary script execution libreoffice 24.824.8.5 25.225.2.1

security@documentfoundation.org reports:

LibreOffice supports Office URI Schemes to enable browser integration of LibreOffice with MS SharePoint server. An additional scheme 'vnd.libreoffice.command' specific to LibreOffice was added. In the affected versions of LibreOffice a link in a browser using that scheme could be constructed with an embedded inner URL that when passed to LibreOffice could call internal macros with arbitrary arguments. This issue affects LibreOffice: from 24.8 before < 24.8.5, from 25.2 before < 25.2.1.

CVE-2025-1080 https://nvd.nist.gov/vuln/detail/CVE-2025-1080 2025-03-04 2025-03-10
vim -- Improper Input Validation in Vim vim 9.1.1164 vim-gtk2 9.1.1164 vim-gtk3 9.1.1164 vim-motif 9.1.1164 vim-tiny 9.1.1164 vim-x11 9.1.1164

security-advisories@github.com reports:

Vim is distributed with the tar.vim plugin, that allows easy editing and viewing of (compressed or uncompressed) tar files. Starting with 9.1.0858, the tar.vim plugin uses the ":read" ex command line to append below the cursor position, however the is not sanitized and is taken literally from the tar archive. This allows to execute shellcommands via special crafted tar archives. Whether this really happens, depends on the shell being used ('shell' option, which is set using $SHELL).

CVE-2025-27423 https://nvd.nist.gov/vuln/detail/CVE-2025-27423 2025-03-03 2025-03-10
electron33 -- multiple vulnerabilities electron33 33.4.3

Electron develpers report:

This update fixes the following vulnerabilities:

  • Security: backported fix for CVE-2025-0445.
  • Security: backported fix for CVE-2025-0995.
  • Security: backported fix for CVE-2025-0998.
CVE-2025-0445 https://github.com/advisories/GHSA-q4fq-38gr-ccp3 CVE-2025-0995 https://github.com/advisories/GHSA-377p-4737-hx6m CVE-2025-0998 https://github.com/advisories/GHSA-4v9x-qxmv-4h58 2025-03-06 2025-03-08
electron32 -- multiple vulnerabilities electron32 32.3.3

Electron developers report:

This update fixes the following vulnerabilities:

  • Security: backported fix for CVE-2025-0445.
  • Security: backported fix for CVE-2025-0998.
CVE-2025-0445 https://github.com/advisories/GHSA-q4fq-38gr-ccp3 CVE-2025-0998 https://github.com/advisories/GHSA-4v9x-qxmv-4h58 2025-03-03 2025-03-07
Jinja2 -- Sandbox breakout through attr filter selecting format method py38-Jinja2 py39-Jinja2 py310-Jinja2 py311-Jinja2 3.1.6

security-advisories@github.com reports:

Jinja is an extensible templating engine. Prior to 3.1.6, an oversight in how the Jinja sandboxed environment interacts with the |attr filter allows an attacker that controls the content of a template to execute arbitrary Python code. To exploit the vulnerability, an attacker needs to control the content of a template. Whether that is the case depends on the type of application using Jinja. This vulnerability impacts users of applications which execute untrusted templates. Jinja's sandbox does catch calls to str.format and ensures they don't escape the sandbox. However, it's possible to use the |attr filter to get a reference to a string's plain format method, bypassing the sandbox. After the fix, the |attr filter no longer bypasses the environment's attribute lookup. This vulnerability is fixed in 3.1.6.

CVE-2025-27516 https://nvd.nist.gov/vuln/detail/CVE-2025-27516 2025-03-05 2025-03-06
xorg server -- Multiple vulnerabilities xorg-server xephyr xorg-vfbserver 21.1.16,1 xorg-nextserver 21.1.16,2 xwayland 24.1.6

The X.Org project reports:

  • CVE-2025-26594: Use-after-free of the root cursor

    The root cursor is referenced in the xserver as a global variable. If a client manages to free the root cursor, the internal reference points to freed memory and causes a use-after-free.

  • CVE-2025-26595: Buffer overflow in XkbVModMaskText()

    The code in XkbVModMaskText() allocates a fixed sized buffer on the stack and copies the names of the virtual modifiers to that buffer. The code however fails to check the bounds of the buffer correctly and would copy the data regardless of the size, which may lead to a buffer overflow.

  • CVE-2025-26596: Heap overflow in XkbWriteKeySyms()

    The computation of the length in XkbSizeKeySyms() differs from what is actually written in XkbWriteKeySyms(), which may lead to a heap based buffer overflow.

  • CVE-2025-26597: Buffer overflow in XkbChangeTypesOfKey()

    If XkbChangeTypesOfKey() is called with 0 group, it will resize the key symbols table to 0 but leave the key actions unchanged. If later, the same function is called with a non-zero value of groups, this will cause a buffer overflow because the key actions are of the wrong size.

  • CVE-2025-26598: Out-of-bounds write in CreatePointerBarrierClient()

    The function GetBarrierDevice() searches for the pointer device based on its device id and returns the matching value, or supposedly NULL if no match was found. However the code will return the last element of the list if no matching device id was found which can lead to out of bounds memory access.

  • CVE-2025-26599: Use of uninitialized pointer in compRedirectWindow()

    The function compCheckRedirect() may fail if it cannot allocate the backing pixmap. In that case, compRedirectWindow() will return a BadAlloc error without the validation of the window tree marked just before, which leaves the validate data partly initialized, and the use of an uninitialized pointer later.

  • CVE-2025-26600: Use-after-free in PlayReleasedEvents()

    When a device is removed while still frozen, the events queued for that device remain while the device itself is freed and replaying the events will cause a use after free.

  • CVE-2025-26601: Use-after-free in SyncInitTrigger()

    When changing an alarm, the values of the change mask are evaluated one after the other, changing the trigger values as requested and eventually, SyncInitTrigger() is called. If one of the changes triggers an error, the function will return early, not adding the new sync object. This can be used to cause a use after free when the alarm eventually triggers.

CVE-2025-26594 CVE-2025-26595 CVE-2025-26596 CVE-2025-26597 CVE-2025-26598 CVE-2025-26599 CVE-2025-26600 CVE-2025-26601 https://lists.x.org/archives/xorg-announce/2025-February/003584.html 2025-02-25 2025-03-06
caldera -- Remote Code Execution caldera 5.2.0 caldera4 4.2.0

MITRE Caldera contributor report:

In MITRE Caldera through 4.2.0 and 5.0.0 before 35bc06e, a Remote Code Execution (RCE) vulnerability was found in the dynamic agent (implant) compilation functionality of the server. This allows remote attackers to execute arbitrary code on the server that Caldera is running on via a crafted web request to the Caldera server API used for compiling and downloading of Caldera's Sandcat or Manx agent (implants). This web request can use the gcc -extldflags linker flag with sub-commands.

CVE-2025-27364 https://nvd.nist.gov/vuln/detail/CVE-2025-27364 2025-02-16 2025-03-06
jenkins -- multiple vulnerabilities jenkins 2.500 jenkins-lts 2.492.2

Jenkins Security Advisory:

Description

(Medium) SECURITY-3495 / CVE-2025-27622

Encrypted values of secrets stored in agent configuration revealed to users with Agent/Extended Read permission

Description

(Medium) SECURITY-3496 / CVE-2025-27623

Encrypted values of secrets stored in view configuration revealed to users with View/Read permission

Description

(Medium) SECURITY-3498 / CVE-2025-27624

CSRF vulnerability

Description

(Medium) SECURITY-3501 / CVE-2025-27625

Open redirect vulnerability

CVE-2025-27622 CVE-2025-27623 CVE-2025-27624 CVE-2025-27625 https://www.jenkins.io/security/advisory/2025-03-05/ 2025-03-05 2025-03-05
Spotipy -- Spotipy's cache file, containing spotify auth token, is created with overly broad permissions py38-spotipy py39-spotipy py310-spotipy py311-spotipy 2.25.1

security-advisories@github.com reports:

Spotipy is a lightweight Python library for the Spotify Web API. The `CacheHandler` class creates a cache file to store the auth token. Prior to version 2.25.1, the file created has `rw-r--r--` (644) permissions by default, when it could be locked down to `rw-------` (600) permissions. This leads to overly broad exposure of the spotify auth token. If this token can be read by an attacker (another user on the machine, or a process running as another user), it can be used to perform administrative actions on the Spotify account, depending on the scope granted to the token. Version 2.25.1 tightens the cache file permissions.

CVE-2025-27154 https://nvd.nist.gov/vuln/detail/CVE-2025-27154 2025-02-27 2025-03-05
chromium -- multiple security fixes chromium 134.0.6998.35 ungoogled-chromium 134.0.6998.35

Chrome Releases reports:

This update includes 14 security fixes:

  • [397731718] High CVE-2025-1914: Out of bounds read in V8. Reported by Zhenghang Xiao (@Kipreyyy) and Nan Wang (@eternalsakura13) on 2025-02-20
  • [391114799] Medium CVE-2025-1915: Improper Limitation of a Pathname to a Restricted Directory in DevTools. Reported by Topi Lassila on 2025-01-20
  • [376493203] Medium CVE-2025-1916: Use after free in Profiles. Reported by parkminchan, SSD Labs Korea on 2024-10-31
  • [329476341] Medium CVE-2025-1917: Inappropriate Implementation in Browser UI. Reported by Khalil Zhani on 2024-03-14
  • [388557904] Medium CVE-2025-1918: Out of bounds read in PDFium. Reported by asnine on 2025-01-09
  • [392375312] Medium CVE-2025-1919: Out of bounds read in Media. Reported by @Bl1nnnk and @Pisanbao on 2025-01-26
  • [387583503] Medium CVE-2025-1921: Inappropriate Implementation in Media Stream. Reported by Kaiido on 2025-01-04
  • [384033062] Low CVE-2025-1922: Inappropriate Implementation in Selection. Reported by Alesandro Ortiz on 2024-12-14
  • [382540635] Low CVE-2025-1923: Inappropriate Implementation in Permission Prompts. Reported by Khalil Zhani on 2024-12-06
CVE-2025-1914 CVE-2025-1915 CVE-2025-1916 CVE-2025-1917 CVE-2025-1918 CVE-2025-1919 CVE-2025-1921 CVE-2025-1922 CVE-2025-1923 https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html 2025-03-04 2025-03-05
electron{32,33} -- multiple vulnerabilities electron32 32.3.2 electron33 33.4.2

Electron developers report:

This update fixes the following vulnerabilities:

  • Security: backported fix for CVE-2025-0611.
  • Security: backported fix for CVE-2025-0612.
  • Security: backported fix for CVE-2025-0999.
CVE-2025-0611 https://github.com/advisories/GHSA-83vc-v46q-mv3w CVE-2025-0612 https://github.com/advisories/GHSA-c6xg-jh94-mf2w CVE-2025-0999 https://github.com/advisories/GHSA-f2jv-hxph-r5wm 2025-02-27 2025-03-04
unit -- potential security issue unit unit-java 1.11.01.34.2

SO-AND-SO reports:

Unit 1.34.2 fixes two issues in the Java language module websocket code.

  1. It addresses a potential security issue where we could get a negative payload length that could cause the Java language module process(es) to enter an infinite loop and consume excess CPU. This was a bug carried over from the initial Java websocket code import. It has been re-issued a CVE number (CVE-2025-1695).
  2. It addresses an issue whereby decoded payload lengths would be limited to 32 bits.
CVE-2025-1695 https://mailman.nginx.org/pipermail/unit/2025-March/QVYLJKLBIDWOJ7OLYGT27VUWH7RGBRQM.html 2025-03-03 2025-03-03
vim -- Potential code execution vim vim-gtk2 vim-gtk3 vim-motif vim-x11 vim-tiny 9.1.1164

vim reports:

Summary

Potential code execution with tar.vim and special crafted tar files

Description

Vim is distributed with the tar.vim plugin, that allows easy editing and viewing of (compressed or uncompressed) tar files.

Since commit 129a844 (Nov 11, 2024 runtime(tar): Update tar.vim to support permissions), the tar.vim plugin uses the ":read " ex command line to append below the cursor position, however the is not sanitized and is taken literaly from the tar archive. This allows to execute shell commands via special crafted tar archives. Whether this really happens, depends on the shell being used ('shell' option, which is set using $SHELL).

Impact

Impact is high but a user must be convinced to edit such a file using Vim which will reveal the filename, so a careful user may suspect some strange things going on.

https://github.com/vim/vim/security/advisories/GHSA-wfmf-8626-q3r3 2025-03-02 2025-03-02
Gitlab -- Vulnerabilities gitlab-ce gitlab-ee 17.9.017.9.1 17.8.017.8.4 15.10.017.7.6

Gitlab reports:

XSS in k8s proxy endpoint

XSS Maven Dependency Proxy

HTML injection leads to XSS on self hosted instances

Improper Authorisation Check Allows Guest User to Read Security Policy

Planner role can read code review analytics in private projects

CVE-2025-0475 CVE-2025-0555 CVE-2024-8186 CVE-2024-10925 CVE-2025-0307 https://about.gitlab.com/releases/2025/02/26/patch-release-gitlab-17-9-1-released/ 2025-02-26 2025-02-28
chromium -- multiple security fixes chromium 133.0.6943.141 ungoogled-chromium 133.0.6943.141

Chrome Releases reports:

This update includes 1 security fix.

https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_25.html 2025-02-25 2025-02-27
exiv2 -- Use after free in TiffSubIfd exiv2 0.28.00.28.5

Kevin Backhouse reports:

A heap buffer overflow was found in Exiv2 versions v0.28.0 to v0.28.4. Versions prior to v0.28.0, such as v0.27.7, are not affected. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file.

Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as fixiso.

CVE-2025-26623 https://github.com/Exiv2/exiv2/security/advisories/GHSA-38h4-fx85-qcx7 2025-02-18 2025-02-25
Emacs -- Arbitrary code execution vulnerability emacs emacs-canna emacs-nox emacs-wayland 30.1,3 emacs-devel emacs-devel-nox 30.0.50.20240115,3

Problem Description

A shell injection vulnerability exists in GNU Emacs due to improper handling of custom man URI schemes.

Impact

Initially considered low severity, as it required user interaction with local files, it was later discovered that an attacker could exploit this vulnerability by tricking a user into visiting a specially crafted website or an HTTP URL with a redirect, leading to arbitrary shell command execution without further user action.

CVE-2025-1244 https://nvd.nist.gov/vuln/detail/CVE-2025-1244 2025-02-11 2025-02-24 2025-02-25
Emacs -- Shell injection vulnerability emacs emacs-canna emacs-nox emacs-wayland 30.1,3 emacs-devel emacs-devel-nox 31.0.50.20250101,3

Problem Description:

An Emacs user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.

CVE-2024-53920 https://nvd.nist.gov/vuln/detail/CVE-2024-53920 2024-11-27 2025-02-24
exim -- SQL injection exim 4.98.1

cve@mitre.org reports:

Exim 4.98 before 4.98.1, when SQLite hints and ETRN serialization are used, allows remote SQL injection.

CVE-2025-26794 https://nvd.nist.gov/vuln/detail/CVE-2025-26794 2025-02-21 2025-02-24
FreeBSD -- Multiple vulnerabilities in OpenSSH FreeBSD 14.214.2_2 14.114.1_8 13.413.4_4 openssh-portable 9.9.p2_1,1 openssh-portable-hpn 9.9.p2_1,1 openssh-portable-gssapi 9.9.p2_1,1

Problem Description:

OpenSSH client host verification error (CVE-2025-26465)

ssh(1) contains a logic error that allows an on-path attacker to impersonate any server during certain conditions when the VerifyHostKeyDNS option is enabled.

OpenSSH server denial of service (CVE-2025-26466)

The OpenSSH client and server are both vulnerable to a memory/CPU denial of service while handling SSH2_MSG_PING packets.

Impact:

OpenSSH client host verification error (CVE-2025-26465)

Under specific circumstances, a machine-in-the-middle may impersonate any server when the client has the VerifyHostKeyDNS option enabled.

OpenSSH server denial of service (CVE-2025-26466)

During the processing of SSH2_MSG_PING packets, a server may be subject to a memory/CPU denial of service.

CVE-2025-26465 CVE-2025-26466 SA-25:05.openssh https://nvd.nist.gov/vuln/detail/CVE-2025-26465 https://nvd.nist.gov/vuln/detail/CVE-2025-26466 2025-02-21 2025-02-24 2025-03-08
chromium -- multiple security fixes chromium 133.0.6943.126 ungoogled-chromium 133.0.6943.126

Chrome Releases reports:

This update includes 3 security fixes:

  • [394350433] High CVE-2025-0999: Heap buffer overflow in V8. Reported by Seunghyun Lee (@0x10n) on 2025-02-04
  • [383465163] High CVE-2025-1426: Heap buffer overflow in GPU. Reported by un3xploitable and GF on 2024-12-11
  • [390590778] Medium CVE-2025-1006: Use after free in Network. Reported by Tal Keren, Sam Agranat, Eran Rom, Edouard Bochin, Adam Hatsir of Palo Alto Networks on 2025-01-18
CVE-2025-0999 CVE-2025-1426 CVE-2025-1006 https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_18.html 2025-02-18 2025-02-20
chromium -- multiple security fixes chromium 133.0.6943.98 ungoogled-chromium 133.0.6943.98

Chrome Releases reports:

This update includes 4 security fixes:

  • [391907159] High CVE-2025-0995: Use after free in V8. Reported by Popax21 on 2025-01-24
  • [391788835] High CVE-2025-0996: Inappropriate implementation in Browser UI. Reported by yuki yamaoto on 2025-01-23
  • [391666328] High CVE-2025-0997: Use after free in Navigation. Reported by asnine on 2025-01-23
  • [386857213] High CVE-2025-0998: Out of bounds memory access in V8. Reported by Alan Goodman on 2024-12-31
CVE-2025-0995 CVE-2025-0996 CVE-2025-0997 CVE-2025-0998 https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html 2025-02-12 2025-02-20
chromium -- multiple security fixes chromium 133.0.6943.53 ungoogled-chromium 133.0.6943.53

Chrome Releases reports:

This update includes 12 security fixes:

  • [390889644] High CVE-2025-0444: Use after free in Skia. Reported by Francisco Alonso (@revskills) on 2025-01-19
  • [392521083] High CVE-2025-0445: Use after free in V8. Reported by 303f06e3 on 2025-01-27
  • [40061026] Medium CVE-2025-0451: Inappropriate implementation in Extensions API. Reported by Vitor Torres and Alesandro Ortiz on 2022-09-18
CVE-2025-0444 CVE-2025-0445 CVE-2025-0451 https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop.html 2025-02-04 2025-02-20
vscode -- multiple vulnerabilities vscode 1.97.1

VSCode developers report:

The update addresses these issues, including a fix for a security vulnerability.

  • Scope node_module binary resolution in js-debug
  • Elevation of Privilege Vulnerability with VS Code server for web UI
CVE-2025-24042 https://github.com/microsoft/vscode/security/advisories/GHSA-f85p-3684-2g3j CVE-2025-24039 https://github.com/microsoft/vscode/security/advisories/GHSA-532g-4pv9-25f2 2025-02-11 2025-02-13
security/openvpn-auth-ldap -- Fix buffer overflow in challenge/response openvpn-auth-ldap 2.0.4_3

Graham Northup reports:

A buffer overflow in extract_openvpn_cr allows attackers with a valid LDAP username and who can control the challenge/response password field to pass a string with more than 14 colons into this field and cause a buffer overflow.

CVE-2024-28820 https://nvd.nist.gov/vuln/detail/CVE-2024-28820 2024-06-27 2025-02-13
PostgreSQL -- PostgreSQL quoting APIs miss neutralizing quoting syntax in text that fails encoding validation postgresql17-client 17.3 postgresql16-client 16.7 postgresql15-client 15.11 postgresql14-client 14.16 postgresql13-client 13.19

The PostgreSQL Project reports:

Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns. Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal. Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL. Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected.

CVE-2025-1094 https://www.postgresql.org/support/security/CVE-2025-1094/ 2025-02-13 2025-02-13
Gitlab -- Vulnerabilities gitlab-ce gitlab-ee 17.8.017.8.2 17.7.017.7.4 8.3.017.6.5

Gitlab reports:

A CSP-bypass XSS in merge-request page

Denial of Service due to Unbounded Symbol Creation

Exfiltrate content from private issues using Prompt Injection

A custom permission may allow overriding Repository settings

Internal HTTP header leak via route confusion in workhorse

SSRF via workspaces

Unauthorized Incident Closure and Deletion by Planner Role in GitLab

ActionCable does not invalidate tokens after revocation

CVE-2025-0376 CVE-2024-12379 CVE-2024-3303 CVE-2025-1042 CVE-2025-1212 CVE-2024-9870 CVE-2025-0516 CVE-2025-1198 https://about.gitlab.com/releases/2025/02/12/patch-release-gitlab-17-8-2-released/ 2025-02-12 2025-02-13
Intel CPUs -- multiple vulnerabilities cpu-microcode-intel 20250211

Intel reports:

A potential security vulnerability in some Intel Processors may allow denial of service. Intel released microcode updates to mitigate this potential vulnerability.

A potential security vulnerability in some Intel Software Guard Extensions (Intel SGX) Platforms may allow denial of service. Intel is released microcode updates to mitigate this potential vulnerability.

Potential security vulnerabilities in the UEFI firmware for some Intel Processors may allow escalation of privilege, denial of service, or information disclosure. Intel released UEFI firmware and CPU microcode updates to mitigate these potential vulnerabilities.

A potential security vulnerability in some 13th and 14th Generation Intel Core™ Processors may allow denial of service. Intel released microcode and UEFI reference code updates to mitigate this potential vulnerability.

A potential security vulnerability in the Intel Data Streaming Accelerator (Intel DSA) for some Intel Xeon Processors may allow denial of service. Intel released software updates to mitigate this potential vulnerability.

CVE-2024-31068 CVE-2024-36293 CVE-2023-43758 CVE-2024-39355 CVE-2024-37020 https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211 2025-02-11 2025-02-12
OpenSSL -- Man-in-the-Middle vulnerability openssl32 3.2.4 openssl33 3.3.2 openssl34 3.4.1

The OpenSSL project reports:

RFC7250 handshakes with unauthenticated servers don't abort as expected (High). Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a server may fail to notice that the server was not authenticated, because handshakes don't abort as expected when the SSL_VERIFY_PEER verification mode is set.

CVE-2024-12797 https://openssl-library.org/news/secadv/20250211.txt 2025-02-11 2025-02-11
mozilla -- multiple vulnerabilities firefox 135.0.0,2 firefox-esr 128.7,1 thunderbird 128.7 129135

security@mozilla.org reports:

A bug in WebAssembly code generation could have lead to a crash. It may have been possible for an attacker to leverage this to achieve code execution.

A race condition could have led to private browsing tabs being opened in normal browsing windows. This could have resulted in a potential privacy leak.

Certificate length was not properly checked when added to a certificate store. In practice only trusted data was processed.

Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CVE-2025-1011 https://nvd.nist.gov/vuln/detail/CVE-2025-1011 CVE-2025-1013 https://nvd.nist.gov/vuln/detail/CVE-2025-1013 CVE-2025-1014 https://nvd.nist.gov/vuln/detail/CVE-2025-1014 CVE-2025-1017 https://nvd.nist.gov/vuln/detail/CVE-2025-1017 2025-02-04 2025-02-07
mozilla -- multiple vulnerabilities mozilla 135.0.0,2

security@mozilla.org reports:

Memory safety bugs present in Firefox 134 and Thunderbird 134. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

The fullscreen notification is prematurely hidden when fullscreen is re-requested quickly by the user. This could have been leveraged to perform a potential spoofing attack.

CVE-2025-1018 https://nvd.nist.gov/vuln/detail/CVE-2025-1018 CVE-2025-1019 https://nvd.nist.gov/vuln/detail/CVE-2025-1019 CVE-2025-1020 https://nvd.nist.gov/vuln/detail/CVE-2025-1020 2025-02-04 2025-02-07
mozilla -- multiple vulnerabilities firefox 135.0.0,2 firefox-esr 115.20,1 116.0,1128.6,1 thunderbird 128.7 129135

security@mozilla.org reports:

An attacker could have caused a use-after-free via crafted XSLT data, leading to a potentially exploitable crash.

An attacker could have caused a use-after-free via the Custom Highlight API, leading to a potentially exploitable crash.

A race during concurrent delazification could have led to a use-after-free.

Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CVE-2025-1009 https://nvd.nist.gov/vuln/detail/CVE-2025-1009 CVE-2025-1010 https://nvd.nist.gov/vuln/detail/CVE-2025-1010 CVE-2025-1012 https://nvd.nist.gov/vuln/detail/CVE-2025-1012 CVE-2025-1016 https://nvd.nist.gov/vuln/detail/CVE-2025-1016 2025-02-04 2025-02-07
Thundirbird -- unprivileged JavaScript code execution mozilla 128.7,1

security@mozilla.org reports:

The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the Other field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript.

CVE-2025-1015 https://nvd.nist.gov/vuln/detail/CVE-2025-1015 2025-02-04 2025-02-07
MariaDB -- DoS vulnerability in InnoDB mariadb105-server 10.5.28 mariadb106-server 10.6.21 mariadb1011-server 10.11.11 mariadb114-server 11.4.5

MariaDB reports:

Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.

CVE-2025-21490 http://mariadb.com/kb/en/security/ 2025-02-04 2025-02-07
libcaca -- Multiple vulnerabilities libcaca 0.99.b20

Sam Hocevar reports:

Multiple memory leaks and invalid memory accesses:

  • CVE-2018-20545: Illegal WRITE memory access at common-image.c
  • CVE-2018-20546: Illegal READ memory access at caca/dither.c
  • CVE-2018-20547: Illegal READ memory access at caca/dither.c
  • CVE-2018-20548: Illegal WRITE memory access at common-image.c
  • CVE-2018-20549: Illegal WRITE memory access at caca/file.c
  • CVE-2021-3410: Buffer overflow in libcaca/caca/canvas.c in function caca_resize
  • CVE-2021-30498: Heap buffer overflow in export.c in function export_tga
  • CVE-2021-30499: Buffer overflow in export.c in function export_troff
CVE-2018-20545 CVE-2018-20546 CVE-2018-20547 CVE-2018-20548 CVE-2018-20549 CVE-2021-3410 CVE-2021-30498 CVE-2021-30499 https://github.com/cacalabs/libcaca/releases/tag/v0.99.beta20 2021-10-19 2025-02-07
cacti -- Multiple vulnerabilities cacti 1.2.29

Cacti repo reports:

  • security #GHSA-c5j8-jxj3-hh36: Authenticated RCE via multi-line SNMP responses
  • security #GHSA-f9c7-7rc3-574c: SQL Injection vulnerability when using tree rules through Automation API
  • security #GHSA-fh3x-69rr-qqpp: SQL Injection vulnerability when request automation devices
  • security #GHSA-fxrq-fr7h-9rqq: Arbitrary File Creation leading to RCE
  • security #GHSA-pv2c-97pp-vxwg: Local File Inclusion (LFI) Vulnerability via Poller Standard Error Log Path
  • security #GHSA-vj9g-p7f2-4wqj: SQL Injection vulnerability when view host template
CVE-2025-22604 CVE-2025-24368 CVE-2024-54145 CVE-2025-24367 CVE-2024-45598 CVE-2024-54146 2025-02-02 2025-02-05
nginx-devel -- SSL session reuse vulnerability nginx-devel 1.27.4 nginx 1.26.3

The nginx development team reports:

This update fixes the SSL session reuse vulnerability.

CVE-2025-23419 2025-02-05 2025-02-05
qt6-webengine -- Multiple vulnerabilities qt6-webengine 6.8.2

Qt qtwebengine-chromium repo reports:

Backports for 9 security bugs in Chromium:

  • CVE-2024-12693: Out of bounds memory access in V8
  • CVE-2024-12694: Use after free in Compositing
  • CVE-2025-0436: Integer overflow in Skia
  • CVE-2025-0437: Out of bounds read in Metrics
  • CVE-2025-0438: Stack buffer overflow in Tracing
  • CVE-2025-0441: Inappropriate implementation in Fenced Frames
  • CVE-2025-0443: Insufficient data validation in Extensions
  • CVE-2025-0447: Inappropriate implementation in Navigation
  • CVE-2025-0611: Object corruption in V8
CVE-2024-12693 CVE-2024-12694 CVE-2025-0436 CVE-2025-0437 CVE-2025-0438 CVE-2025-0441 CVE-2025-0443 CVE-2025-0447 CVE-2025-0611 https://code.qt.io/cgit/qt/qtwebengine-chromium.git/log/?h=122-based 2025-01-09 2025-02-02
chromium -- multiple security fixes chromium 132.0.6834.159 ungoogled-chromium 132.0.6834.159

Chrome Releases reports:

This update includes 2 security fixes:

  • [384844003] Medium CVE-2025-0762: Use after free in DevTools. Reported by Sakana.S on 2024-12-18
CVE-2025-0762 https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_28.html 2025-01-18 2025-01-31
dendrite -- Server-side request forgery vulnerability dendrite 0.14.1

Dendrite team reports:

This is a security release, gomatrixserverlib was vulnerable to server-side request forgery, serving content from a private network it can access, under certain conditions.

CVE-2024-52594 https://github.com/matrix-org/gomatrixserverlib/security/advisories/GHSA-4ff6-858j-r822 2025-01-16 2025-01-30
FreeBSD -- Uninitialized kernel memory disclosure via ktrace(2) FreeBSD-kernel 14.214.2_1

Problem Description:

In some cases, the ktrace facility will log the contents of kernel structures to userspace. In one such case, ktrace dumps a variable-sized sockaddr to userspace. There, the full sockaddr is copied, even when it is shorter than the full size. This can result in up to 14 uninitialized bytes of kernel memory being copied out to userspace.

Impact:

It is possible for an unprivileged userspace program to leak 14 bytes of a kernel heap allocation to userspace.

CVE-2025-0662 SA-25:04.ktrace 2025-01-29 2025-01-30
FreeBSD -- Unprivileged access to system files FreeBSD 14.214.2_1 14.114.1_7 13.413.4_3

Problem Description:

When etcupdate encounters conflicts while merging files, it saves a version containing conflict markers in /var/db/etcupdate/conflicts. This version does not preserve the mode of the input file, and is world-readable. This applies to files that would normally have restricted visibility, such as /etc/master.passwd.

Impact:

An unprivileged local user may be able to read encrypted root and user passwords from the temporary master.passwd file created in /var/db/etcupdate/conflicts. This is possible only when conflicts within the password file arise during an update, and the unprotected file is deleted when conflicts are resolved.

CVE-2025-0374 SA-25:03.etcupdate 2025-01-29 2025-01-30
FreeBSD -- Buffer overflow in some filesystems via NFS FreeBSD-kernel 14.214.2_1 14.114.1_7 13.413.4_3

Problem Description:

In order to export a file system via NFS, the file system must define a file system identifier (FID) for all exported files. Each FreeBSD file system implements operations to translate between FIDs and vnodes, the kernel's in-memory representation of files. These operations are VOP_VPTOFH(9) and VFS_FHTOVP(9).

On 64-bit systems, the implementation of VOP_VPTOFH() in the cd9660, tarfs and ext2fs filesystems overflows the destination FID buffer by 4 bytes, a stack buffer overflow.

Impact:

A NFS server that exports a cd9660, tarfs, or ext2fs file system can be made to panic by mounting and accessing the export with an NFS client. Further exploitation (e.g., bypassing file permission checking or remote kernel code execution) is potentially possible, though this has not been demonstrated. In particular, release kernels are compiled with stack protection enabled, and some instances of the overflow are caught by this mechanism, causing a panic.

CVE-2025-0373 SA-25:02.fs 2025-01-29 2025-01-30
FreeBSD -- OpenSSH Keystroke Obfuscation Bypass FreeBSD 14.114.1_7

Problem Description:

A logic error in the ssh(1) ObscureKeystrokeTiming feature (on by default) rendered this feature ineffective.

Impact:

A passive observer could detect which network packets contain real keystrokes, and infer the specific characters being transmitted from packet timing.

CVE-2024-39894 SA-25:01.openssh 2025-01-29 2025-01-30
oauth2-proxy -- Non-linear parsing of case-insensitive content oauth2-proxy 7.8.0

Golang reports:

This update include security fixes:

  • CVE-2024-45338: Non-linear parsing of case-insensitive content
CVE-2024-45338 2025-01-14 2025-01-30
Vaultwarden -- Multiple vulnerabilities vaultwarden 1.33.0

The Vaultwarden project reports:

RCE in the admin panel.

Getting access to the Admin Panel via CSRF.

Escalation of privilege via variable confusion in OrgHeaders trait.

CVE-2025-24364 https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-j4h8-vch3-f797 CVE-2025-24365 https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-h6cc-rc6q-23j4 2025-01-25 2025-01-25
chromium -- multiple security fixes chromium 132.0.6834.110 ungoogled-chromium 132.0.6834.110

Chrome Releases reports:

This update includes 3 security fixes:

  • [386143468] High CVE-2025-0611: Object corruption in V8. Reported by 303f06e3 on 2024-12-26
  • [385155406] High CVE-2025-0612: Out of bounds memory access in V8. Reported by Alan Goodman on 2024-12-20
CVE-2025-0611 CVE-2025-0612 https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_22.html 2025-01-22 2025-01-25
chromium -- multiple security fixes chromium 132.0.6834.83 ungoogled-chromium 132.0.6834.83

Chrome Releases reports:

This update includes 16 security fixes:

  • [374627491] High CVE-2025-0434: Out of bounds memory access in V8. Reported by ddme on 2024-10-21
  • [379652406] High CVE-2025-0435: Inappropriate implementation in Navigation. Reported by Alesandro Ortiz on 2024-11-18
  • [382786791] High CVE-2025-0436: Integer overflow in Skia. Reported by Han Zheng (HexHive) on 2024-12-08
  • [378623799] High CVE-2025-0437: Out of bounds read in Metrics. Reported by Xiantong Hou of Wuheng Lab and Pisanbao on 2024-11-12
  • [384186539] High CVE-2025-0438: Stack buffer overflow in Tracing. Reported by Han Zheng (HexHive) on 2024-12-15
  • [371247941] Medium CVE-2025-0439: Race in Frames. Reported by Hafiizh on 2024-10-03
  • [40067914] Medium CVE-2025-0440: Inappropriate implementation in Fullscreen. Reported by Umar Farooq on 2023-07-22
  • [368628042] Medium CVE-2025-0441: Inappropriate implementation in Fenced Frames. Reported by someoneverycurious on 2024-09-21
  • [40940854] Medium CVE-2025-0442: Inappropriate implementation in Payments. Reported by Ahmed ElMasry on 2023-11-08
  • [376625003] Medium CVE-2025-0443: Insufficient data validation in Extensions. Reported by Anonymous on 2024-10-31
  • [359949844] Low CVE-2025-0446: Inappropriate implementation in Extensions. Reported by Hafiizh on 2024-08-15
  • [375550814] Low CVE-2025-0447: Inappropriate implementation in Navigation. Reported by Khiem Tran (@duckhiem) on 2024-10-25
  • [377948403] Low CVE-2025-0448: Inappropriate implementation in Compositing. Reported by Dahyeon Park on 2024-11-08
CVE-2025-0434 CVE-2025-0435 CVE-2025-0436 CVE-2025-0437 CVE-2025-0438 CVE-2025-0439 CVE-2025-0440 CVE-2025-0441 CVE-2025-0442 CVE-2025-0443 CVE-2025-0446 CVE-2025-0447 CVE-2025-0448 https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html 2025-01-14 2025-01-25
electron32 -- multiple vulnerabilities electron32 32.3.0

Electron developers report:

This update fixes the following vulnerabilities:

  • Security: backported fix for CVE-2024-12693.
  • Security: backported fix for CVE-2024-12694.
  • Security: backported fix for CVE-2024-12695.
  • Security: backported fix for CVE-2025-0434.
  • Security: backported fix for CVE-2025-0436.
  • Security: backported fix for CVE-2025-0437.
CVE-2024-12693 https://github.com/advisories/GHSA-m84q-p89f-6cc5 CVE-2024-12694 https://github.com/advisories/GHSA-cgc6-4xgf-5q5x CVE-2024-12695 https://github.com/advisories/GHSA-6895-2frg-pq5j CVE-2025-0434 https://github.com/advisories/GHSA-fpmx-pfpg-92xg CVE-2025-0436 https://github.com/advisories/GHSA-ww3g-8h77-wr7v CVE-2025-0437 https://github.com/advisories/GHSA-4353-vp82-4qq4 2025-01-23 2025-01-25
electron33 -- multiple vulnerabilities electron33 33.3.2

Electron developers report:

This update fixes the following vulnerabilities:

  • Security: backported fix for CVE-2025-0434.
  • Security: backported fix for CVE-2025-0436.
  • Security: backported fix for CVE-2025-0437.
CVE-2025-0434 https://github.com/advisories/GHSA-fpmx-pfpg-92xg CVE-2025-0436 https://github.com/advisories/GHSA-ww3g-8h77-wr7v CVE-2025-0437 https://github.com/advisories/GHSA-4353-vp82-4qq4 2025-01-22 2025-01-23
Gitlab -- Vulnerabilities gitlab-ce gitlab-ee 17.8.017.8.1 17.7.017.7.3 15.7.017.6.4

Gitlab reports:

Stored XSS via Asciidoctor render

Developer could exfiltrate protected CI/CD variables via CI lint

Cyclic reference of epics leads resource exhaustion

CVE-2025-0314 CVE-2024-11931 CVE-2024-6324 https://about.gitlab.com/releases/2025/01/22/patch-release-gitlab-17-8-1-released/ 2025-01-22 2025-01-23
clamav -- Possbile denial-of-service vulnerability clamav 1.0.0,11.4.2,1 clamav-lts 1.0.0,11.0.8,1

The ClamAV project reports:

A possible buffer overflow read bug is found in the OLE2 file parser that could cause a denial-of-service (DoS) condition.

CVE-2025-20128 https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html 2025-01-22 2025-01-23
electron32 -- Type Confusion in V8 electron32 32.2.8

Electron developers report:

This update fixes the following vulnerability:

  • Security: backported fix for CVE-2024-12053.
CVE-2024-12053 https://github.com/advisories/GHSA-wvx7-72hc-rp32 2025-01-06 2025-01-22
go -- multiple vulnerabilities go122 1.22.11 go123 1.23.5

The Go project reports:

crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints

A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain.

net/http: sensitive headers incorrectly sent after cross-domain redirect

The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com.

CVE-2024-45341 CVE-2024-45336 https://go.dev/issue/71156 https://go.dev/issue/70530 2025-01-07 2025-01-21
electron31 -- multiple vulnerabilities electron31 31.7.7

Electron developers report:

This update fixes the following vulnerabilities:

  • Security: backported fix for CVE-2024-12053.
  • Security: backported fix for CVE-2024-12693.
  • Security: backported fix for CVE-2024-12694.
CVE-2024-12053 https://github.com/advisories/GHSA-wvx7-72hc-rp32 CVE-2024-12693 https://github.com/advisories/GHSA-m84q-p89f-6cc5 CVE-2024-12694 https://github.com/advisories/GHSA-cgc6-4xgf-5q5x 2025-01-14 2025-01-20
age -- age vulnerable to malicious plugin names, recipients, or identities causing arbitrary binary execution age 1.2.1

Filippo Valsorda reports:

A plugin name containing a path separator may allow an attacker to execute an arbitrary binary.

Such a plugin name can be provided to the age CLI through an attacker-controlled recipient or identity string, or to the plugin.NewIdentity, plugin.NewIdentityWithoutData, or plugin.NewRecipient APIs.

https://github.com/advisories/GHSA-32gq-x56h-299c 2024-12-18 2025-01-18
openvpn -- too long a username or password from a client can confuse openvpn servers openvpn 2.6.13

Frank Lichtenheld reports:

[OpenVPN v2.6.13 ...] improve server-side handling of clients sending usernames or passwords longer than USER_PASS_LEN - this would not result in a crash, buffer overflow or other security issues, but the server would then misparse incoming IV variables and produce misleading error messages.

https://github.com/OpenVPN/openvpn/releases/tag/v2.6.13 2024-10-28 2025-01-17
rsync -- Multiple security fixes rsync 3.4.0

rsync reports:

This update includes multiple security fixes:

  • CVE-2024-12084: Heap Buffer Overflow in Checksum Parsing
  • CVE-2024-12085: Info Leak via uninitialized Stack contents defeats ASLR
  • CVE-2024-12086: Server leaks arbitrary client files
  • CVE-2024-12087: Server can make client write files outside of destination directory using symbolic links
  • CVE-2024-12088: --safe-links Bypass
  • CVE-2024-12747: symlink race condition
CVE-2024-12084 CVE-2024-12085 CVE-2024-12086 CVE-2024-12087 CVE-2024-12088 CVE-2024-12747 2025-01-14 2025-01-14
git -- multiple vulnerabilities git git-cvs git-gui git-p4 git-svn 2.48.1

Git development team reports:

CVE-2024-50349: Printing unsanitized URLs when asking for credentials made the user susceptible to crafted URLs (e.g. in recursive clones) that mislead the user into typing in passwords for trusted sites that would then be sent to untrusted sites instead.

CVE-2024-52006: Git may pass on Carriage Returns via the credential protocol to credential helpers which use line-reading functions that interpret said Carriage Returns as line endings, even though Git did not intend that.

CVE-2024-50349 https://github.com/git/git/security/advisories/GHSA-hmg8-h7qf-7cxr CVE-2024-52006 https://github.com/git/git/security/advisories/GHSA-r5ph-xg7q-xfrp 2024-10-29 2025-01-14
keycloak -- Multiple security fixes keycloak 26.0.8

Keycloak reports:

This update includes 2 security fixes:

  • CVE-2024-11734: Unrestricted admin use of system and environment variables
  • CVE-2024-11736: Denial of Service in Keycloak Server via Security Headers
CVE-2024-11734 CVE-2024-11736 2025-01-13 2025-01-13
asterisk - path traversal asterisk18 18.26.20 asterisk20 20.11.0

cve@mitre.org reports:

An issue in the action_listcategories() function of Sangoma Asterisk v22/22.0.0/22.0.0-rc1/22.0.0-rc2/22.0.0-pre1 allows attackers to execute a path traversal.

CVE-2024-53566 https://nvd.nist.gov/vuln/detail/CVE-2024-53566 2024-12-02 2025-01-12
redis,valkey -- Denial-of-service valnerability due to malformed ACL selectors redis 7.0.07.4.2 redis72 7.2.7 redis-devel 7.4.2.20250201 valkey 8.0.2

Redis core team reports:

An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service.The problem exists in Redis 7.0.0 or newer.

CVE-2024-51741 https://github.com/redis/redis/security/advisories/GHSA-prpq-rh5h-46g9 2025-01-06 2025-01-10
redis,valkey -- Remote code execution valnerability redis 7.4.2 redis72 7.2.7 redis62 6.2.17 redis-devel 7.4.2.20250201 valkey 8.0.2

Redis core team reports:

An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting.

CVE-2024-46981 https://github.com/redis/redis/security/advisories/GHSA-39h2-x6c4-6w4c 2025-01-06 2025-01-10
Gitlab -- Vulnerabilities gitlab-ce gitlab-ee 17.7.017.7.1 17.6.017.6.3 11.0.017.5.5

Gitlab reports:

Possible access token exposure in GitLab logs

Cyclic reference of epics leads resource exhaustion

Unauthorized user can manipulate status of issues in public projects

Instance SAML does not respect external_provider configuration

CVE-2025-0194 CVE-2024-6324 CVE-2024-12431 CVE-2024-13041 https://about.gitlab.com/releases/2025/01/08/patch-release-gitlab-17-7-1-released/ 2025-01-08 2025-01-08