Debian Cmake vulnerabilities

4 known vulnerabilities affecting debian/cmake.

Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
LOW4

Vulnerabilities

Page 1 of 1
CVE-2025-9301LOWCVSS 4.82025
CVE-2025-9301 [MEDIUM] CVE-2025-9301: cmake - A vulnerability was determined in cmake 4.1.20250725-gb5cce23. This affects the ... A vulnerability was determined in cmake 4.1.20250725-gb5cce23. This affects the function cmForEachFunctionBlocker::ReplayItems of the file cmForEachCommand.cxx. This manipulation causes reachable assertion. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. Patch name: 37e27f71bc356d880c908040cd0cb68fa2c371b8. It is s
debian
CVE-2009-3720LOWCVSS 5.0fixed in audacity 1.3.2-1 (bookworm)2009
CVE-2009-3720 [MEDIUM] CVE-2009-3720: audacity - The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as ... The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625. Scope: local bookwor
debian
CVE-2009-3560LOWCVSS 5.0fixed in audacity 1.3.2-1 (bookworm)2009
CVE-2009-3560 [MEDIUM] CVE-2009-3560: audacity - The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in ... The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-20
debian
CVE-2005-4280LOWCVSS 7.22005
CVE-2005-4280 [HIGH] CVE-2005-4280: cmake - Untrusted search path vulnerability in CMake before 2.2.0-r1 on Gentoo Linux all... Untrusted search path vulnerability in CMake before 2.2.0-r1 on Gentoo Linux allows local users in the portage group to gain privileges via a malicious shared object in the Portage temporary build directory, which is part of the RUNPATH. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian