Debian Cmake vulnerabilities
4 known vulnerabilities affecting debian/cmake.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
LOW4
Vulnerabilities
Page 1 of 1
CVE-2025-9301LOWCVSS 4.82025
CVE-2025-9301 [MEDIUM] CVE-2025-9301: cmake - A vulnerability was determined in cmake 4.1.20250725-gb5cce23. This affects the ...
A vulnerability was determined in cmake 4.1.20250725-gb5cce23. This affects the function cmForEachFunctionBlocker::ReplayItems of the file cmForEachCommand.cxx. This manipulation causes reachable assertion. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. Patch name: 37e27f71bc356d880c908040cd0cb68fa2c371b8. It is s
debian
CVE-2009-3720LOWCVSS 5.0fixed in audacity 1.3.2-1 (bookworm)2009
CVE-2009-3720 [MEDIUM] CVE-2009-3720: audacity - The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as ...
The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
Scope: local
bookwor
debian
CVE-2009-3560LOWCVSS 5.0fixed in audacity 1.3.2-1 (bookworm)2009
CVE-2009-3560 [MEDIUM] CVE-2009-3560: audacity - The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in ...
The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-20
debian
CVE-2005-4280LOWCVSS 7.22005
CVE-2005-4280 [HIGH] CVE-2005-4280: cmake - Untrusted search path vulnerability in CMake before 2.2.0-r1 on Gentoo Linux all...
Untrusted search path vulnerability in CMake before 2.2.0-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian