diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index 1a7462c511a2..04e831329343 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,1285 +1,1320 @@ + + OpenSSL -- Man-in-the-Middle vulnerability + + + openssl32 + 3.2.4 + + + openssl33 + 3.3.2 + + + openssl34 + 3.4.1 + + + + +

The OpenSSL project reports:

+
+

RFC7250 handshakes with unauthenticated servers don't abort as expected (High). + Clients using RFC7250 Raw Public Keys (RPKs) to authenticate a server may fail to notice that the server was not authenticated, because handshakes don't abort as expected when the SSL_VERIFY_PEER verification mode is set.

+
+ +
+ + CVE-2024-12797 + https://openssl-library.org/news/secadv/20250211.txt + + + 2025-02-11 + 2025-02-11 + +
+ mozilla -- multiple vulnerabilities firefox 135.0.0,2 firefox-esr 128.7,1 thunderbird 128.7 129135

security@mozilla.org reports:

A bug in WebAssembly code generation could have lead to a crash. It may have been possible for an attacker to leverage this to achieve code execution.

A race condition could have led to private browsing tabs being opened in normal browsing windows. This could have resulted in a potential privacy leak.

Certificate length was not properly checked when added to a certificate store. In practice only trusted data was processed.

Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CVE-2025-1011 https://nvd.nist.gov/vuln/detail/CVE-2025-1011 CVE-2025-1013 https://nvd.nist.gov/vuln/detail/CVE-2025-1013 CVE-2025-1014 https://nvd.nist.gov/vuln/detail/CVE-2025-1014 CVE-2025-1017 https://nvd.nist.gov/vuln/detail/CVE-2025-1017 2025-02-04 2025-02-07
mozilla -- multiple vulnerabilities mozilla 135.0.0,2

security@mozilla.org reports:

Memory safety bugs present in Firefox 134 and Thunderbird 134. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

The fullscreen notification is prematurely hidden when fullscreen is re-requested quickly by the user. This could have been leveraged to perform a potential spoofing attack.

CVE-2025-1018 https://nvd.nist.gov/vuln/detail/CVE-2025-1018 CVE-2025-1019 https://nvd.nist.gov/vuln/detail/CVE-2025-1019 CVE-2025-1020 https://nvd.nist.gov/vuln/detail/CVE-2025-1020 2025-02-04 2025-02-07
mozilla -- multiple vulnerabilities firefox 135.0.0,2 firefox-esr 115.20,1 116.0,1128.6,1 thunderbird 128.7 129135

security@mozilla.org reports:

An attacker could have caused a use-after-free via crafted XSLT data, leading to a potentially exploitable crash.

An attacker could have caused a use-after-free via the Custom Highlight API, leading to a potentially exploitable crash.

A race during concurrent delazification could have led to a use-after-free.

Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CVE-2025-1009 https://nvd.nist.gov/vuln/detail/CVE-2025-1009 CVE-2025-1010 https://nvd.nist.gov/vuln/detail/CVE-2025-1010 CVE-2025-1012 https://nvd.nist.gov/vuln/detail/CVE-2025-1012 CVE-2025-1016 https://nvd.nist.gov/vuln/detail/CVE-2025-1016 2025-02-04 2025-02-07
Thundirbird -- unprivileged JavaScript code execution mozilla 128.7,1

security@mozilla.org reports:

The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the Other field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript.

CVE-2025-1015 https://nvd.nist.gov/vuln/detail/CVE-2025-1015 2025-02-04 2025-02-07
MariaDB -- DoS vulnerability in InnoDB mariadb105-server 10.5.28 mariadb106-server 10.6.21 mariadb1011-server 10.11.11 mariadb114-server 11.4.5

MariaDB reports:

Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.

CVE-2025-21490 http://mariadb.com/kb/en/security/ 2025-02-04 2025-02-07
libcaca -- Multiple vulnerabilities libcaca 0.99.b20

Sam Hocevar reports:

Multiple memory leaks and invalid memory accesses:

  • CVE-2018-20545: Illegal WRITE memory access at common-image.c
  • CVE-2018-20546: Illegal READ memory access at caca/dither.c
  • CVE-2018-20547: Illegal READ memory access at caca/dither.c
  • CVE-2018-20548: Illegal WRITE memory access at common-image.c
  • CVE-2018-20549: Illegal WRITE memory access at caca/file.c
  • CVE-2021-3410: Buffer overflow in libcaca/caca/canvas.c in function caca_resize
  • CVE-2021-30498: Heap buffer overflow in export.c in function export_tga
  • CVE-2021-30499: Buffer overflow in export.c in function export_troff
CVE-2018-20545 CVE-2018-20546 CVE-2018-20547 CVE-2018-20548 CVE-2018-20549 CVE-2021-3410 CVE-2021-30498 CVE-2021-30499 https://github.com/cacalabs/libcaca/releases/tag/v0.99.beta20 2021-10-19 2025-02-07
cacti -- Multiple vulnerabilities cacti 1.2.29

Cacti repo reports:

  • security #GHSA-c5j8-jxj3-hh36: Authenticated RCE via multi-line SNMP responses
  • security #GHSA-f9c7-7rc3-574c: SQL Injection vulnerability when using tree rules through Automation API
  • security #GHSA-fh3x-69rr-qqpp: SQL Injection vulnerability when request automation devices
  • security #GHSA-fxrq-fr7h-9rqq: Arbitrary File Creation leading to RCE
  • security #GHSA-pv2c-97pp-vxwg: Local File Inclusion (LFI) Vulnerability via Poller Standard Error Log Path
  • security #GHSA-vj9g-p7f2-4wqj: SQL Injection vulnerability when view host template
CVE-2025-22604 CVE-2025-24368 CVE-2024-54145 CVE-2025-24367 CVE-2024-45598 CVE-2024-54146 2025-02-02 2025-02-05
nginx-devel -- SSL session reuse vulnerability nginx-devel 1.27.4 nginx 1.26.3

The nginx development team reports:

This update fixes the SSL session reuse vulnerability.

CVE-2025-23419 2025-02-05 2025-02-05
qt6-webengine -- Multiple vulnerabilities qt6-webengine 6.8.2

Qt qtwebengine-chromium repo reports:

Backports for 9 security bugs in Chromium:

  • CVE-2024-12693: Out of bounds memory access in V8
  • CVE-2024-12694: Use after free in Compositing
  • CVE-2025-0436: Integer overflow in Skia
  • CVE-2025-0437: Out of bounds read in Metrics
  • CVE-2025-0438: Stack buffer overflow in Tracing
  • CVE-2025-0441: Inappropriate implementation in Fenced Frames
  • CVE-2025-0443: Insufficient data validation in Extensions
  • CVE-2025-0447: Inappropriate implementation in Navigation
  • CVE-2025-0611: Object corruption in V8
CVE-2024-12693 CVE-2024-12694 CVE-2025-0436 CVE-2025-0437 CVE-2025-0438 CVE-2025-0441 CVE-2025-0443 CVE-2025-0447 CVE-2025-0611 https://code.qt.io/cgit/qt/qtwebengine-chromium.git/log/?h=122-based 2025-01-09 2025-02-02
chromium -- multiple security fixes chromium 132.0.6834.159 ungoogled-chromium 132.0.6834.159

Chrome Releases reports:

This update includes 2 security fixes:

  • [384844003] Medium CVE-2025-0762: Use after free in DevTools. Reported by Sakana.S on 2024-12-18
CVE-2025-0762 https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_28.html 2025-01-18 2025-01-31
dendrite -- Server-side request forgery vulnerability dendrite 0.14.1

Dendrite team reports:

This is a security release, gomatrixserverlib was vulnerable to server-side request forgery, serving content from a private network it can access, under certain conditions.

CVE-2024-52594 https://github.com/matrix-org/gomatrixserverlib/security/advisories/GHSA-4ff6-858j-r822 2025-01-16 2025-01-30
FreeBSD -- Uninitialized kernel memory disclosure via ktrace(2) FreeBSD-kernel 14.214.2_1

Problem Description:

In some cases, the ktrace facility will log the contents of kernel structures to userspace. In one such case, ktrace dumps a variable-sized sockaddr to userspace. There, the full sockaddr is copied, even when it is shorter than the full size. This can result in up to 14 uninitialized bytes of kernel memory being copied out to userspace.

Impact:

It is possible for an unprivileged userspace program to leak 14 bytes of a kernel heap allocation to userspace.

CVE-2025-0662 SA-25:04.ktrace 2025-01-29 2025-01-30
FreeBSD -- Unprivileged access to system files FreeBSD 14.214.2_1 14.114.1_7 13.413.4_3

Problem Description:

When etcupdate encounters conflicts while merging files, it saves a version containing conflict markers in /var/db/etcupdate/conflicts. This version does not preserve the mode of the input file, and is world-readable. This applies to files that would normally have restricted visibility, such as /etc/master.passwd.

Impact:

An unprivileged local user may be able to read encrypted root and user passwords from the temporary master.passwd file created in /var/db/etcupdate/conflicts. This is possible only when conflicts within the password file arise during an update, and the unprotected file is deleted when conflicts are resolved.

CVE-2025-0374 SA-25:03.etcupdate 2025-01-29 2025-01-30
FreeBSD -- Buffer overflow in some filesystems via NFS FreeBSD-kernel 14.214.2_1 14.114.1_7 13.413.4_3

Problem Description:

In order to export a file system via NFS, the file system must define a file system identifier (FID) for all exported files. Each FreeBSD file system implements operations to translate between FIDs and vnodes, the kernel's in-memory representation of files. These operations are VOP_VPTOFH(9) and VFS_FHTOVP(9).

On 64-bit systems, the implementation of VOP_VPTOFH() in the cd9660, tarfs and ext2fs filesystems overflows the destination FID buffer by 4 bytes, a stack buffer overflow.

Impact:

A NFS server that exports a cd9660, tarfs, or ext2fs file system can be made to panic by mounting and accessing the export with an NFS client. Further exploitation (e.g., bypassing file permission checking or remote kernel code execution) is potentially possible, though this has not been demonstrated. In particular, release kernels are compiled with stack protection enabled, and some instances of the overflow are caught by this mechanism, causing a panic.

CVE-2025-0373 SA-25:02.fs 2025-01-29 2025-01-30
FreeBSD -- OpenSSH Keystroke Obfuscation Bypass FreeBSD 14.114.1_7

Problem Description:

A logic error in the ssh(1) ObscureKeystrokeTiming feature (on by default) rendered this feature ineffective.

Impact:

A passive observer could detect which network packets contain real keystrokes, and infer the specific characters being transmitted from packet timing.

CVE-2024-39894 SA-25:01.openssh 2025-01-29 2025-01-30
oauth2-proxy -- Non-linear parsing of case-insensitive content oauth2-proxy 7.8.0

Golang reports:

This update include security fixes:

  • CVE-2024-45338: Non-linear parsing of case-insensitive content
CVE-2024-45338 2025-01-14 2025-01-30
Vaultwarden -- Multiple vulnerabilities vaultwarden 1.33.0

The Vaultwarden project reports:

RCE in the admin panel.

Getting access to the Admin Panel via CSRF.

Escalation of privilege via variable confusion in OrgHeaders trait.

CVE-2025-24364 https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-j4h8-vch3-f797 CVE-2025-24365 https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-h6cc-rc6q-23j4 2025-01-25 2025-01-25
chromium -- multiple security fixes chromium 132.0.6834.110 ungoogled-chromium 132.0.6834.110

Chrome Releases reports:

This update includes 3 security fixes:

  • [386143468] High CVE-2025-0611: Object corruption in V8. Reported by 303f06e3 on 2024-12-26
  • [385155406] High CVE-2025-0612: Out of bounds memory access in V8. Reported by Alan Goodman on 2024-12-20
CVE-2025-0611 CVE-2025-0612 https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_22.html 2025-01-22 2025-01-25
chromium -- multiple security fixes chromium 132.0.6834.83 ungoogled-chromium 132.0.6834.83

Chrome Releases reports:

This update includes 16 security fixes:

  • [374627491] High CVE-2025-0434: Out of bounds memory access in V8. Reported by ddme on 2024-10-21
  • [379652406] High CVE-2025-0435: Inappropriate implementation in Navigation. Reported by Alesandro Ortiz on 2024-11-18
  • [382786791] High CVE-2025-0436: Integer overflow in Skia. Reported by Han Zheng (HexHive) on 2024-12-08
  • [378623799] High CVE-2025-0437: Out of bounds read in Metrics. Reported by Xiantong Hou of Wuheng Lab and Pisanbao on 2024-11-12
  • [384186539] High CVE-2025-0438: Stack buffer overflow in Tracing. Reported by Han Zheng (HexHive) on 2024-12-15
  • [371247941] Medium CVE-2025-0439: Race in Frames. Reported by Hafiizh on 2024-10-03
  • [40067914] Medium CVE-2025-0440: Inappropriate implementation in Fullscreen. Reported by Umar Farooq on 2023-07-22
  • [368628042] Medium CVE-2025-0441: Inappropriate implementation in Fenced Frames. Reported by someoneverycurious on 2024-09-21
  • [40940854] Medium CVE-2025-0442: Inappropriate implementation in Payments. Reported by Ahmed ElMasry on 2023-11-08
  • [376625003] Medium CVE-2025-0443: Insufficient data validation in Extensions. Reported by Anonymous on 2024-10-31
  • [359949844] Low CVE-2025-0446: Inappropriate implementation in Extensions. Reported by Hafiizh on 2024-08-15
  • [375550814] Low CVE-2025-0447: Inappropriate implementation in Navigation. Reported by Khiem Tran (@duckhiem) on 2024-10-25
  • [377948403] Low CVE-2025-0448: Inappropriate implementation in Compositing. Reported by Dahyeon Park on 2024-11-08
CVE-2025-0434 CVE-2025-0435 CVE-2025-0436 CVE-2025-0437 CVE-2025-0438 CVE-2025-0439 CVE-2025-0440 CVE-2025-0441 CVE-2025-0442 CVE-2025-0443 CVE-2025-0446 CVE-2025-0447 CVE-2025-0448 https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html 2025-01-14 2025-01-25
electron32 -- multiple vulnerabilities electron32 32.3.0

Electron developers report:

This update fixes the following vulnerabilities:

  • Security: backported fix for CVE-2024-12693.
  • Security: backported fix for CVE-2024-12694.
  • Security: backported fix for CVE-2024-12695.
  • Security: backported fix for CVE-2025-0434.
  • Security: backported fix for CVE-2025-0436.
  • Security: backported fix for CVE-2025-0437.
CVE-2024-12693 https://github.com/advisories/GHSA-m84q-p89f-6cc5 CVE-2024-12694 https://github.com/advisories/GHSA-cgc6-4xgf-5q5x CVE-2024-12695 https://github.com/advisories/GHSA-6895-2frg-pq5j CVE-2025-0434 https://github.com/advisories/GHSA-fpmx-pfpg-92xg CVE-2025-0436 https://github.com/advisories/GHSA-ww3g-8h77-wr7v CVE-2025-0437 https://github.com/advisories/GHSA-4353-vp82-4qq4 2025-01-23 2025-01-25
electron33 -- multiple vulnerabilities electron33 33.3.2

Electron developers report:

This update fixes the following vulnerabilities:

  • Security: backported fix for CVE-2025-0434.
  • Security: backported fix for CVE-2025-0436.
  • Security: backported fix for CVE-2025-0437.
CVE-2025-0434 https://github.com/advisories/GHSA-fpmx-pfpg-92xg CVE-2025-0436 https://github.com/advisories/GHSA-ww3g-8h77-wr7v CVE-2025-0437 https://github.com/advisories/GHSA-4353-vp82-4qq4 2025-01-22 2025-01-23
Gitlab -- Vulnerabilities gitlab-ce gitlab-ee 17.8.017.8.1 17.7.017.7.3 15.7.017.6.4

Gitlab reports:

Stored XSS via Asciidoctor render

Developer could exfiltrate protected CI/CD variables via CI lint

Cyclic reference of epics leads resource exhaustion

CVE-2025-0314 CVE-2024-11931 CVE-2024-6324 https://about.gitlab.com/releases/2025/01/22/patch-release-gitlab-17-8-1-released/ 2025-01-22 2025-01-23
clamav -- Possbile denial-of-service vulnerability clamav 1.0.0,11.4.2,1 clamav-lts 1.0.0,11.0.8,1

The ClamAV project reports:

A possible buffer overflow read bug is found in the OLE2 file parser that could cause a denial-of-service (DoS) condition.

CVE-2025-20128 https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html 2025-01-22 2025-01-23
electron32 -- Type Confusion in V8 electron32 32.2.8

Electron developers report:

This update fixes the following vulnerability:

  • Security: backported fix for CVE-2024-12053.
CVE-2024-12053 https://github.com/advisories/GHSA-wvx7-72hc-rp32 2025-01-06 2025-01-22
go -- multiple vulnerabilities go122 1.22.11 go123 1.23.5

The Go project reports:

crypto/x509: usage of IPv6 zone IDs can bypass URI name constraints

A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain.

net/http: sensitive headers incorrectly sent after cross-domain redirect

The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com.

CVE-2024-45341 CVE-2024-45336 https://go.dev/issue/71156 https://go.dev/issue/70530 2025-01-07 2025-01-21
electron31 -- multiple vulnerabilities electron31 31.7.7

Electron developers report:

This update fixes the following vulnerabilities:

  • Security: backported fix for CVE-2024-12053.
  • Security: backported fix for CVE-2024-12693.
  • Security: backported fix for CVE-2024-12694.
CVE-2024-12053 https://github.com/advisories/GHSA-wvx7-72hc-rp32 CVE-2024-12693 https://github.com/advisories/GHSA-m84q-p89f-6cc5 CVE-2024-12694 https://github.com/advisories/GHSA-cgc6-4xgf-5q5x 2025-01-14 2025-01-20
age -- age vulnerable to malicious plugin names, recipients, or identities causing arbitrary binary execution age 1.2.1

Filippo Valsorda reports:

A plugin name containing a path separator may allow an attacker to execute an arbitrary binary.

Such a plugin name can be provided to the age CLI through an attacker-controlled recipient or identity string, or to the plugin.NewIdentity, plugin.NewIdentityWithoutData, or plugin.NewRecipient APIs.

https://github.com/advisories/GHSA-32gq-x56h-299c 2024-12-18 2025-01-18
openvpn -- too long a username or password from a client can confuse openvpn servers openvpn 2.6.13

Frank Lichtenheld reports:

[OpenVPN v2.6.13 ...] improve server-side handling of clients sending usernames or passwords longer than USER_PASS_LEN - this would not result in a crash, buffer overflow or other security issues, but the server would then misparse incoming IV variables and produce misleading error messages.

https://github.com/OpenVPN/openvpn/releases/tag/v2.6.13 2024-10-28 2025-01-17
rsync -- Multiple security fixes rsync 3.4.0

rsync reports:

This update includes multiple security fixes:

  • CVE-2024-12084: Heap Buffer Overflow in Checksum Parsing
  • CVE-2024-12085: Info Leak via uninitialized Stack contents defeats ASLR
  • CVE-2024-12086: Server leaks arbitrary client files
  • CVE-2024-12087: Server can make client write files outside of destination directory using symbolic links
  • CVE-2024-12088: --safe-links Bypass
  • CVE-2024-12747: symlink race condition
CVE-2024-12084 CVE-2024-12085 CVE-2024-12086 CVE-2024-12087 CVE-2024-12088 CVE-2024-12747 2025-01-14 2025-01-14
git -- multiple vulnerabilities git git-cvs git-gui git-p4 git-svn 2.48.1

Git development team reports:

CVE-2024-50349: Printing unsanitized URLs when asking for credentials made the user susceptible to crafted URLs (e.g. in recursive clones) that mislead the user into typing in passwords for trusted sites that would then be sent to untrusted sites instead.

CVE-2024-52006: Git may pass on Carriage Returns via the credential protocol to credential helpers which use line-reading functions that interpret said Carriage Returns as line endings, even though Git did not intend that.

CVE-2024-50349 https://github.com/git/git/security/advisories/GHSA-hmg8-h7qf-7cxr CVE-2024-52006 https://github.com/git/git/security/advisories/GHSA-r5ph-xg7q-xfrp 2024-10-29 2025-01-14
keycloak -- Multiple security fixes keycloak 26.0.8

Keycloak reports:

This update includes 2 security fixes:

  • CVE-2024-11734: Unrestricted admin use of system and environment variables
  • CVE-2024-11736: Denial of Service in Keycloak Server via Security Headers
CVE-2024-11734 CVE-2024-11736 2025-01-13 2025-01-13
asterisk - path traversal asterisk18 18.26.20 asterisk20 20.11.0

cve@mitre.org reports:

An issue in the action_listcategories() function of Sangoma Asterisk v22/22.0.0/22.0.0-rc1/22.0.0-rc2/22.0.0-pre1 allows attackers to execute a path traversal.

CVE-2024-53566 https://nvd.nist.gov/vuln/detail/CVE-2024-53566 2024-12-02 2025-01-12
redis,valkey -- Denial-of-service valnerability due to malformed ACL selectors redis 7.0.07.4.2 redis72 7.2.7 redis-devel 7.4.2.20250201 valkey 8.0.2

Redis core team reports:

An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service.The problem exists in Redis 7.0.0 or newer.

CVE-2024-51741 https://github.com/redis/redis/security/advisories/GHSA-prpq-rh5h-46g9 2025-01-06 2025-01-10
redis,valkey -- Remote code execution valnerability redis 7.4.2 redis72 7.2.7 redis62 6.2.17 redis-devel 7.4.2.20250201 valkey 8.0.2

Redis core team reports:

An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting.

CVE-2024-46981 https://github.com/redis/redis/security/advisories/GHSA-39h2-x6c4-6w4c 2025-01-06 2025-01-10
Gitlab -- Vulnerabilities gitlab-ce gitlab-ee 17.7.017.7.1 17.6.017.6.3 11.0.017.5.5

Gitlab reports:

Possible access token exposure in GitLab logs

Cyclic reference of epics leads resource exhaustion

Unauthorized user can manipulate status of issues in public projects

Instance SAML does not respect external_provider configuration

CVE-2025-0194 CVE-2024-6324 CVE-2024-12431 CVE-2024-13041 https://about.gitlab.com/releases/2025/01/08/patch-release-gitlab-17-7-1-released/ 2025-01-08 2025-01-08