Source: request-tracker5
Version: 5.0.7+dfsg-2
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerabilities were published for request-tracker5.

These should be fixed for the trixie release before release, so making
them RC level.

CVE-2025-31500[0]:
| Cross Site Scripting via JavaScript injection in an RT permalink


CVE-2025-31501[1]:
| Cross Site Scripting via JavaScript injection in an Asset name


CVE-2025-2545[2]:
| Uses the default OpenSSL cipher, 3DES (des3), for encrypting SMIME email


CVE-2025-30087[3]:
| Cross Site Scripting via injection of malicious parameters in a search URL


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-31500
    https://www.cve.org/CVERecord?id=CVE-2025-31500
[1] https://security-tracker.debian.org/tracker/CVE-2025-31501
    https://www.cve.org/CVERecord?id=CVE-2025-31501
[2] https://security-tracker.debian.org/tracker/CVE-2025-2545
    https://www.cve.org/CVERecord?id=CVE-2025-2545
[3] https://security-tracker.debian.org/tracker/CVE-2025-30087
    https://www.cve.org/CVERecord?id=CVE-2025-30087

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to