[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Apr 3 21:12:08 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
3aac4063 by security tracker role at 2024-04-03T20:11:53+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,386 +1,584 @@
-CVE-2024-26779 [wifi: mac80211: fix race condition on enabling fast-xmit]
+CVE-2024-3259 (A vulnerability was found in SourceCodester Internship Portal Manageme ...)
+	TODO: check
+CVE-2024-3258 (A vulnerability was found in SourceCodester Internship Portal Manageme ...)
+	TODO: check
+CVE-2024-3257 (A vulnerability was found in SourceCodester Internship Portal Manageme ...)
+	TODO: check
+CVE-2024-3256 (A vulnerability has been found in SourceCodester Internship Portal Man ...)
+	TODO: check
+CVE-2024-3255 (A vulnerability, which was classified as critical, was found in Source ...)
+	TODO: check
+CVE-2024-3254 (A vulnerability, which was classified as critical, has been found in S ...)
+	TODO: check
+CVE-2024-3253 (A vulnerability classified as critical was found in SourceCodester Int ...)
+	TODO: check
+CVE-2024-3252 (A vulnerability classified as critical has been found in SourceCodeste ...)
+	TODO: check
+CVE-2024-3251 (A vulnerability was found in SourceCodester Computer Laboratory Manage ...)
+	TODO: check
+CVE-2024-3181 (Concrete CMS version 9 prior to 9.2.8 and previous versions prior to 8 ...)
+	TODO: check
+CVE-2024-3180 (Concrete CMS version 9 below 9.2.8 and previous versions below 8.5.16  ...)
+	TODO: check
+CVE-2024-3179 (Concrete CMS version 9 before 9.2.8 and previous versions before 8.5.1 ...)
+	TODO: check
+CVE-2024-3178 (Concrete CMS versions 9 below 9.2.8 and versions below8.5.16 are vulne ...)
+	TODO: check
+CVE-2024-31420 (A NULL pointer dereference flaw was found in KubeVirt. This flaw allow ...)
+	TODO: check
+CVE-2024-31419 (An information disclosure flaw was found in OpenShift Virtualization.  ...)
+	TODO: check
+CVE-2024-31393 (Dragging Javascript URLs to the address bar could cause them to be loa ...)
+	TODO: check
+CVE-2024-31392 (If an insecure element was added to a page after a delay, Firefox woul ...)
+	TODO: check
+CVE-2024-31390 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+	TODO: check
+CVE-2024-31380 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+	TODO: check
+CVE-2024-30572 (Netgear R6850 1.1.0.88 was discovered to contain a command injection v ...)
+	TODO: check
+CVE-2024-30571 (An information leak in the BRS_top.html component of Netgear R6850 v1. ...)
+	TODO: check
+CVE-2024-30570 (An information leak in debuginfo.htm of Netgear R6850 v1.1.0.88 allows ...)
+	TODO: check
+CVE-2024-30569 (An information leak in currentsetting.htm of Netgear R6850 v1.1.0.88 a ...)
+	TODO: check
+CVE-2024-30568 (Netgear R6850 1.1.0.88 was discovered to contain a command injection v ...)
+	TODO: check
+CVE-2024-30366 (Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnera ...)
+	TODO: check
+CVE-2024-30334 (Foxit PDF Reader Doc Object Use-After-Free Remote Code Execution Vulne ...)
+	TODO: check
+CVE-2024-30333 (Foxit PDF Reader Doc Object Use-After-Free Remote Code Execution Vulne ...)
+	TODO: check
+CVE-2024-30332 (Foxit PDF Reader Doc Object Use-After-Free Remote Code Execution Vulne ...)
+	TODO: check
+CVE-2024-30331 (Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnera ...)
+	TODO: check
+CVE-2024-30330 (Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnera ...)
+	TODO: check
+CVE-2024-30329 (Foxit PDF Reader Annotation Use-After-Free Information Disclosure Vuln ...)
+	TODO: check
+CVE-2024-30328 (Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnera ...)
+	TODO: check
+CVE-2024-30327 (Foxit PDF Reader template Use-After-Free Remote Code Execution Vulnera ...)
+	TODO: check
+CVE-2024-30326 (Foxit PDF Reader Doc Object Use-After-Free Remote Code Execution Vulne ...)
+	TODO: check
+CVE-2024-30325 (Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnera ...)
+	TODO: check
+CVE-2024-30324 (Foxit PDF Reader Doc Object Use-After-Free Remote Code Execution Vulne ...)
+	TODO: check
+CVE-2024-30323 (Foxit PDF Reader template Out-Of-Bounds Read Remote Code Execution Vul ...)
+	TODO: check
+CVE-2024-30322 (Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnera ...)
+	TODO: check
+CVE-2024-2758 (Tempesta FW rate limits are not enabled by default. They are either se ...)
+	TODO: check
+CVE-2024-2753 (Concrete CMS version 9 before 9.2.8 and previous versions prior to 8.5 ...)
+	TODO: check
+CVE-2024-2653 (amphp/http will collect CONTINUATION frames in an unbounded buffer and ...)
+	TODO: check
+CVE-2024-29477 (Lack of sanitization during Installation Process in Dolibarr ERP CRM u ...)
+	TODO: check
+CVE-2024-28782 (IBM QRadar Suite Software 1.10.12.0 through 1.10.18.0 and IBM Cloud Pa ...)
+	TODO: check
+CVE-2024-28275 (Puwell Cloud Tech Co, Ltd 360Eyes Pro v3.9.5.16(3090516) was discovere ...)
+	TODO: check
+CVE-2024-27972 (Improper Neutralization of Special Elements used in a Command ('Comman ...)
+	TODO: check
+CVE-2024-27951 (Unrestricted Upload of File with Dangerous Type vulnerability in Theme ...)
+	TODO: check
+CVE-2024-27674 (Macro Expert through 4.9.4 allows BUILTIN\Users:(OI)(CI)(M) access to  ...)
+	TODO: check
+CVE-2024-27673
+	REJECTED
+CVE-2024-27346 (Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2024-27345 (Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2024-27344 (Kofax Power PDF PDF File Parsing Memory Corruption Remote Code Executi ...)
+	TODO: check
+CVE-2024-27343 (Kofax Power PDF PDF File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2024-27342 (Kofax Power PDF PDF File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2024-27341 (Kofax Power PDF PDF File Parsing Heap-based Buffer Overflow Remote Cod ...)
+	TODO: check
+CVE-2024-27340 (Kofax Power PDF PDF File Parsing Heap-based Buffer Overflow Remote Cod ...)
+	TODO: check
+CVE-2024-27339 (Kofax Power PDF PDF File Parsing Out-Of-Bounds Write Remote Code Execu ...)
+	TODO: check
+CVE-2024-27338 (Kofax Power PDF app response Out-Of-Bounds Read Remote Code Execution  ...)
+	TODO: check
+CVE-2024-27337 (Kofax Power PDF TIF File Parsing Stack-based Buffer Overflow Remote Co ...)
+	TODO: check
+CVE-2024-27336 (Kofax Power PDF PNG File Parsing Out-Of-Bounds Read Information Disclo ...)
+	TODO: check
+CVE-2024-27335 (Kofax Power PDF PNG File Parsing Out-Of-Bounds Read Remote Code Execut ...)
+	TODO: check
+CVE-2024-27254 (IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 10.5 ...)
+	TODO: check
+CVE-2024-27201 (An improper input validation vulnerability exists in the OAS Engine Us ...)
+	TODO: check
+CVE-2024-27191 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+	TODO: check
+CVE-2024-26701
+	REJECTED
+CVE-2024-25918 (Unrestricted Upload of File with Dangerous Type vulnerability in Insta ...)
+	TODO: check
+CVE-2024-25096 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+	TODO: check
+CVE-2024-25046 (IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1 ...)
+	TODO: check
+CVE-2024-25030 (IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1 ...)
+	TODO: check
+CVE-2024-24976 (A denial of service vulnerability exists in the OAS Engine File Data S ...)
+	TODO: check
+CVE-2024-24707 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+	TODO: check
+CVE-2024-23540 (The HCL BigFix Inventory server is vulnerable to path traversal which  ...)
+	TODO: check
+CVE-2024-22360 (IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 ...)
+	TODO: check
+CVE-2024-22178 (A file write vulnerability exists in the OAS Engine Save Security Conf ...)
+	TODO: check
+CVE-2024-21870 (A file write vulnerability exists in the OAS Engine Tags Configuration ...)
+	TODO: check
+CVE-2024-20368 (A vulnerability in the web-based management interface of Cisco Identit ...)
+	TODO: check
+CVE-2024-20367 (A vulnerability in the web UI of Cisco Enterprise Chat and Email (ECE) ...)
+	TODO: check
+CVE-2024-20362 (A vulnerability in the web-based management interface of Cisco Small B ...)
+	TODO: check
+CVE-2024-20352 (A vulnerability in Cisco Emergency Responder could allow an authentica ...)
+	TODO: check
+CVE-2024-20348 (A vulnerability in the Out-of-Band (OOB) Plug and Play (PnP) feature o ...)
+	TODO: check
+CVE-2024-20347 (A vulnerability in Cisco Emergency Responder could allow an unauthenti ...)
+	TODO: check
+CVE-2024-20334 (A vulnerability in the web-based management interface of Cisco TelePre ...)
+	TODO: check
+CVE-2024-20332 (A vulnerability in the web-based management interface of Cisco Identit ...)
+	TODO: check
+CVE-2024-20310 (A vulnerability in the web-based interface of Cisco Unified Communicat ...)
+	TODO: check
+CVE-2024-20302 (A vulnerability in the tenant security implementation of Cisco Nexus D ...)
+	TODO: check
+CVE-2024-20283 (A vulnerability in Cisco Nexus Dashboard could allow an authenticated, ...)
+	TODO: check
+CVE-2024-20282 (A vulnerability in Cisco Nexus Dashboard could allow an authenticated, ...)
+	TODO: check
+CVE-2024-20281 (A vulnerability in the web-based management interface of Cisco Nexus D ...)
+	TODO: check
+CVE-2024-1180 (TP-Link Omada ER605 Access Control Command Injection Remote Code Execu ...)
+	TODO: check
+CVE-2024-0394 (Rapid7 Minerva Armor versions below 4.5.5 suffer from a privilege esca ...)
+	TODO: check
+CVE-2024-0335 (ABB has internally identified a vulnerability in the ABB VPNI feature  ...)
+	TODO: check
+CVE-2024-0172 (Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an imp ...)
+	TODO: check
+CVE-2023-5755
+	REJECTED
+CVE-2023-52296 (IBM DB2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 ...)
+	TODO: check
+CVE-2023-45552 (In VeridiumID before 3.5.0, a stored cross-site scripting (XSS) vulner ...)
+	TODO: check
+CVE-2023-44040 (In VeridiumID before 3.5.0, the identity provider page is susceptible  ...)
+	TODO: check
+CVE-2023-44039 (In VeridiumID before 3.5.0, the WebAuthn API allows an internal unauth ...)
+	TODO: check
+CVE-2023-44038 (In VeridiumID before 3.5.0, the identity provider page allows an unaut ...)
+	TODO: check
+CVE-2023-38729 (IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server)10.5, ...)
+	TODO: check
+CVE-2023-35812 (An issue was discovered in the Amazon Linux packages of OpenSSH 7.4 fo ...)
+	TODO: check
+CVE-2024-26779 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f (6.8-rc2)
-CVE-2024-26778 [fbdev: savage: Error out if pixclock equals zero]
+CVE-2024-26778 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/04e5eac8f3ab2ff52fa191c187a46d4fdbc1e288 (6.8-rc2)
-CVE-2024-26777 [fbdev: sis: Error out if pixclock equals zero]
+CVE-2024-26777 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/e421946be7d9bf545147bea8419ef8239cb7ca52 (6.8-rc2)
-CVE-2024-26776 [spi: hisi-sfc-v3xx: Return IRQ_NONE if no interrupts were detected]
+CVE-2024-26776 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/de8b6e1c231a95abf95ad097b993d34b31458ec9 (6.8-rc2)
-CVE-2024-26775 [aoe: avoid potential deadlock at set_capacity]
+CVE-2024-26775 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/e169bd4fb2b36c4b2bee63c35c740c85daeb2e86 (6.8-rc2)
-CVE-2024-26774 [ext4: avoid dividing by 0 in mb_update_avg_fragment_size() when block bitmap corrupt]
+CVE-2024-26774 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/993bf0f4c393b3667830918f9247438a8f6fdb5b (6.8-rc3)
-CVE-2024-26773 [ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found()]
+CVE-2024-26773 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/4530b3660d396a646aad91a787b6ab37cf604b53 (6.8-rc3)
-CVE-2024-26772 [ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal()]
+CVE-2024-26772 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/832698373a25950942c04a512daa652c18a9b513 (6.8-rc3)
-CVE-2024-26771 [dmaengine: ti: edma: Add some null pointer checks to the edma_probe]
+CVE-2024-26771 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/6e2276203ac9ff10fc76917ec9813c660f627369 (6.8-rc3)
-CVE-2024-26770 [HID: nvidia-shield: Add missing null pointer checks to LED initialization]
+CVE-2024-26770 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/b6eda11c44dc89a681e1c105f0f4660e69b1e183 (6.8-rc3)
-CVE-2024-26769 [nvmet-fc: avoid deadlock on delete association path]
+CVE-2024-26769 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/710c69dbaccdac312e32931abcb8499c1525d397 (6.8-rc3)
-CVE-2024-26768 [LoongArch: Change acpi_core_pic[NR_CPUS] to acpi_core_pic[MAX_CORE_PIC]]
+CVE-2024-26768 (In the Linux kernel, the following vulnerability has been resolved:  L ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/4551b30525cf3d2f026b92401ffe241eb04dfebe (6.8-rc4)
-CVE-2024-26767 [drm/amd/display: fixed integer types and null check locations]
+CVE-2024-26767 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/0484e05d048b66d01d1f3c1d2306010bb57d8738 (6.8-rc5)
-CVE-2024-26766 [IB/hfi1: Fix sdma.h tx->num_descs off-by-one error]
+CVE-2024-26766 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/e6f57c6881916df39db7d95981a8ad2b9c3458d6 (6.8-rc6)
-CVE-2024-26765 [LoongArch: Disable IRQ before init_fn() for nonboot CPUs]
+CVE-2024-26765 (In the Linux kernel, the following vulnerability has been resolved:  L ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/1001db6c42e4012b55e5ee19405490f23e033b5a (6.8-rc6)
-CVE-2024-26764 [fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio]
+CVE-2024-26764 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/b820de741ae48ccf50dd95e297889c286ff4f760 (6.8-rc6)
-CVE-2024-26763 [dm-crypt: don't modify the data when using authenticated encryption]
+CVE-2024-26763 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/50c70240097ce41fe6bce6478b80478281e4d0f7 (6.8-rc6)
-CVE-2024-26762 [cxl/pci: Skip to handle RAS errors if CXL.mem device is detached]
+CVE-2024-26762 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/eef5c7b28dbecd6b141987a96db6c54e49828102 (6.8-rc6)
-CVE-2024-26761 [cxl/pci: Fix disabling memory if DVSEC CXL Range does not match a CFMWS window]
+CVE-2024-26761 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.7.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0cab687205986491302cd2e440ef1d253031c221 (6.8-rc6)
-CVE-2024-26760 [scsi: target: pscsi: Fix bio_put() for error case]
+CVE-2024-26760 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.7.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/de959094eb2197636f7c803af0943cb9d3b35804 (6.8-rc6)
-CVE-2024-26759 [mm/swap: fix race when skipping swapcache]
+CVE-2024-26759 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/13ddaf26be324a7f951891ecd9ccd04466d27458 (6.8-rc6)
-CVE-2024-26758 [md: Don't ignore suspended array in md_check_recovery()]
+CVE-2024-26758 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/1baae052cccd08daf9a9d64c3f959d8cdb689757 (6.8-rc6)
-CVE-2024-26757 [md: Don't ignore read-only array in md_check_recovery()]
+CVE-2024-26757 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/55a48ad2db64737f7ffc0407634218cc6e4c513b (6.8-rc6)
-CVE-2024-26756 [md: Don't register sync_thread for reshape directly]
+CVE-2024-26756 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/ad39c08186f8a0f221337985036ba86731d6aafe (6.8-rc6)
-CVE-2024-26755 [md: Don't suspend the array for interrupted reshape]
+CVE-2024-26755 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9e46c70e829bddc24e04f963471e9983a11598b7 (6.8-rc6)
-CVE-2024-26754 [gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp()]
+CVE-2024-26754 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/136cfaca22567a03bbb3bf53a43d8cb5748b80ec (6.8-rc6)
-CVE-2024-26753 [crypto: virtio/akcipher - Fix stack overflow on memcpy]
+CVE-2024-26753 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.7.7-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c0ec2a712daf133d9996a8a1b7ee2d4996080363 (6.8-rc6)
-CVE-2024-26752 [l2tp: pass correct message length to ip6_append_data]
+CVE-2024-26752 (In the Linux kernel, the following vulnerability has been resolved:  l ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/359e54a93ab43d32ee1bff3c2f9f10cb9f6b6e79 (6.8-rc6)
-CVE-2024-26751 [ARM: ep93xx: Add terminator to gpiod_lookup_table]
+CVE-2024-26751 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/fdf87a0dc26d0550c60edc911cda42f9afec3557 (6.8-rc6)
-CVE-2024-26749 [usb: cdns3: fixed memory use after free at cdns3_gadget_ep_disable()]
+CVE-2024-26749 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.7.7-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/cd45f99034b0c8c9cb346dd0d6407a95ca3d36f6 (6.8-rc6)
-CVE-2024-26748 [usb: cdns3: fix memory double free when handle zero packet]
+CVE-2024-26748 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.7.7-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5fd9e45f1ebcd57181358af28506e8a661a260b3 (6.8-rc6)
-CVE-2024-26747 [usb: roles: fix NULL pointer issue when put module's reference]
+CVE-2024-26747 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/1c9be13846c0b2abc2480602f8ef421360e1ad9e (6.8-rc6)
-CVE-2024-26744 [RDMA/srpt: Support specifying the srpt_service_guid parameter]
+CVE-2024-26744 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/fdfa083549de5d50ebf7f6811f33757781e838c0 (6.8-rc6)
-CVE-2024-26743 [RDMA/qedr: Fix qedr_create_user_qp error flow]
+CVE-2024-26743 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/5ba4e6d5863c53e937f49932dee0ecb004c65928 (6.8-rc6)
-CVE-2024-26742 [scsi: smartpqi: Fix disable_managed_interrupts]
+CVE-2024-26742 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.7.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5761eb9761d2d5fe8248a9b719efc4d8baf1f24a (6.8-rc6)
-CVE-2024-26741 [dccp/tcp: Unhash sk from ehash for tb2 alloc failure after check_estalblished().]
+CVE-2024-26741 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.7.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/66b60b0c8c4a163b022a9f0ad6769b0fd3dc662f (6.8-rc6)
-CVE-2024-26740 [net/sched: act_mirred: use the backlog for mirred ingress]
+CVE-2024-26740 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/52f671db18823089a02f07efc04efdb2272ddc17 (6.8-rc6)
-CVE-2024-26739 [net/sched: act_mirred: don't override retval if we already lost the skb]
+CVE-2024-26739 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/166c2c8a6a4dc2e4ceba9e10cfe81c3e469e3210 (6.8-rc6)
-CVE-2024-26738 [powerpc/pseries/iommu: DLPAR add doesn't completely initialize pci_controller]
+CVE-2024-26738 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a5c57fd2e9bd1c8ea8613a8f94fd0be5eccbf321 (6.8-rc6)
-CVE-2024-26737 [bpf: Fix racing between bpf_timer_cancel_and_free and bpf_timer_cancel]
+CVE-2024-26737 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.7.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0281b919e175bb9c3128bd3872ac2903e9436e3f (6.8-rc6)
-CVE-2024-26736 [afs: Increase buffer size in afs_update_volume_status()]
+CVE-2024-26736 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/6ea38e2aeb72349cad50e38899b0ba6fbcb2af3d (6.8-rc6)
-CVE-2024-26735 [ipv6: sr: fix possible use-after-free and null-ptr-deref]
+CVE-2024-26735 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/5559cea2d5aa3018a5f00dd2aca3427ba09b386b (6.8-rc6)
-CVE-2024-26734 [devlink: fix possible use-after-free and memory leaks in devlink_init()]
+CVE-2024-26734 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/def689fc26b9a9622d2e2cb0c4933dd3b1c8071c (6.8-rc6)
-CVE-2024-26733 [arp: Prevent overflow in arp_req_get().]
+CVE-2024-26733 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/a7d6027790acea24446ddd6632d394096c0f4667 (6.8-rc6)
-CVE-2024-26732 [net: implement lockless setsockopt(SO_PEEK_OFF)]
+CVE-2024-26732 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/56667da7399eb19af857e30f41bea89aa6fa812c (6.8-rc6)
-CVE-2024-26731 [bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready()]
+CVE-2024-26731 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.7.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/4cd12c6065dfcdeba10f49949bffcf383b3952d8 (6.8-rc6)
-CVE-2024-26730 [hwmon: (nct6775) Fix access to temperature configuration registers]
+CVE-2024-26730 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d56e460e19ea8382f813eb489730248ec8d7eb73 (6.8-rc6)
-CVE-2024-26729 [drm/amd/display: Fix potential null pointer dereference in dc_dmub_srv]
+CVE-2024-26729 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d2b48f340d9e4a8fbeb1cdc84cd8da6ad143a907 (6.8-rc6)
-CVE-2024-26728 [drm/amd/display: fix null-pointer dereference on edid reading]
+CVE-2024-26728 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9671761792156f2339627918bafcd713a8a6f777 (6.8-rc6)
-CVE-2024-26727 [btrfs: do not ASSERT() if the newly created subvolume already got read]
+CVE-2024-26727 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.7.7-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e03ee2fe873eb68c1f9ba5112fee70303ebf9dfb (6.8-rc4)
-CVE-2024-26726 [btrfs: don't drop extent_map for free space inode on write error]
+CVE-2024-26726 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/5571e41ec6e56e35f34ae9f5b3a335ef510e0ade (6.8-rc5)
-CVE-2024-26725 [dpll: fix possible deadlock during netlink dump operation]
+CVE-2024-26725 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/53c0441dd2c44ee93fddb5473885fd41e4bc2361 (6.8-rc5)
-CVE-2024-26724 [net/mlx5: DPLL, Fix possible use after free after delayed work timer triggers]
+CVE-2024-26724 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/aa1eec2f546f2afa8c98ec41e5d8ee488165d685 (6.8-rc5)
-CVE-2024-26723 [lan966x: Fix crash when adding interface under a lag]
+CVE-2024-26723 (In the Linux kernel, the following vulnerability has been resolved:  l ...)
 	- linux 6.7.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/15faa1f67ab405d47789d4702f587ec7df7ef03e (6.8-rc5)
-CVE-2024-26722 [ASoC: rt5645: Fix deadlock in rt5645_jack_detect_work()]
+CVE-2024-26722 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/6ef5d5b92f7117b324efaac72b3db27ae8bb3082 (6.8-rc5)
-CVE-2024-26721 [drm/i915/dsc: Fix the macro that calculates DSCC_/DSCA_ PPS reg address]
+CVE-2024-26721 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/962ac2dce56bb3aad1f82a4bbe3ada57a020287c (6.8-rc5)
-CVE-2024-26720 [mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again]
+CVE-2024-26720 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/9319b647902cbd5cc884ac08a8a6d54ce111fc78 (6.8-rc3)
-CVE-2024-26719 [nouveau: offload fence uevents work to workqueue]
+CVE-2024-26719 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/39126abc5e20611579602f03b66627d7cd1422f0 (6.8-rc3)
-CVE-2024-26718 [dm-crypt, dm-verity: disable tasklets]
+CVE-2024-26718 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.7.7-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0a9bab391e336489169b95cb0d4553d921302189 (6.8-rc3)
-CVE-2024-26717 [HID: i2c-hid-of: fix NULL-deref on failed power up]
+CVE-2024-26717 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
 	- linux 6.7.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/00aab7dcb2267f2aef59447602f34501efe1a07f (6.8-rc3)
-CVE-2024-26716 [usb: core: Prevent null pointer dereference in update_port_device_state]
+CVE-2024-26716 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/12783c0b9e2c7915a50d5ec829630ff2da50472c (6.8-rc3)
-CVE-2024-26715 [usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend]
+CVE-2024-26715 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/61a348857e869432e6a920ad8ea9132e8d44c316 (6.8-rc3)
-CVE-2024-26714 [interconnect: qcom: sc8180x: Mark CO0 BCM keepalive]
+CVE-2024-26714 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.7.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/85e985a4f46e462a37f1875cb74ed380e7c0c2e0 (6.8-rc5)
-CVE-2024-26713 [powerpc/pseries/iommu: Fix iommu initialisation during DLPAR add]
+CVE-2024-26713 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ed8b94f6e0acd652ce69bd69d678a0c769172df8 (6.8-rc5)
-CVE-2024-26712 [powerpc/kasan: Fix addr error caused by page alignment]
+CVE-2024-26712 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.7.7-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0 (6.8-rc5)
-CVE-2024-26711 [iio: adc: ad4130: zero-initialize clock init data]
+CVE-2024-26711 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a22b0a2be69a36511cb5b37d948b651ddf7debf3 (6.8-rc5)
-CVE-2024-26710 [powerpc/kasan: Limit KASAN thread size increase to 32KB]
+CVE-2024-26710 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.7.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f1acb109505d983779bbb7e20a1ee6244d2b5736 (6.8-rc5)
-CVE-2024-26709 [powerpc/iommu: Fix the missing iommu_group_put() during platform domain attach]
+CVE-2024-26709 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0846dd77c8349ec92ca0079c9c71d130f34cb192 (6.8-rc5)
-CVE-2024-26708 [mptcp: really cope with fastopen race]
+CVE-2024-26708 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/337cebbd850f94147cee05252778f8f78b8c337f (6.8-rc5)
-CVE-2024-26707 [net: hsr: remove WARN_ONCE() in send_hsr_supervision_frame()]
+CVE-2024-26707 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.7.7-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/37e8c97e539015637cb920d3e6f1e404f707a06e (6.8-rc3)
-CVE-2024-26706 [parisc: Fix random data corruption from exception handler]
+CVE-2024-26706 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/8b1d72395635af45410b66cc4c4ab37a12c4a831 (6.8-rc3)
-CVE-2024-26705 [parisc: BTLB: Fix crash when setting up BTLB at CPU bringup]
+CVE-2024-26705 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/913b9d443a0180cf0de3548f1ab3149378998486 (6.8-rc3)
-CVE-2024-26704 [ext4: fix double-free of blocks due to wrong extents moved_len]
+CVE-2024-26704 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/55583e899a5357308274601364741a83e78d6ac4 (6.8-rc3)
-CVE-2024-26703 [tracing/timerlat: Move hrtimer_init to timerlat_fd open()]
+CVE-2024-26703 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1389358bb008e7625942846e9f03554319b7fecc (6.8-rc3)
-CVE-2024-26702 [iio: magnetometer: rm3100: add boundary check for the value read from RM3100_REG_TMRC]
+CVE-2024-26702 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.7.7-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/792595bab4925aa06532a14dd256db523eb4fa5e (6.8-rc5)
-CVE-2024-26700 [drm/amd/display: Fix MST Null Ptr for RV]
+CVE-2024-26700 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/e6a7df96facdcf5b1f71eb3ec26f2f9f6ad61e57 (6.8-rc4)
-CVE-2024-26699 [drm/amd/display: Fix array-index-out-of-bounds in dcn35_clkmgr]
+CVE-2024-26699 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/46806e59a87790760870d216f54951a5b4d545bc (6.8-rc5)
-CVE-2024-26698 [hv_netvsc: Fix race condition between netvsc_probe and netvsc_remove]
+CVE-2024-26698 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 6.7.7-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e0526ec5360a48ad3ab2e26e802b0532302a7e11 (6.8-rc3)
-CVE-2024-26697 [nilfs2: fix data corruption in dsync block recovery for small block sizes]
+CVE-2024-26697 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/67b8bcbaed4777871bb0dcc888fb02a614a98ab1 (6.8-rc4)
-CVE-2024-26696 [nilfs2: fix hang in nilfs_lookup_dirty_data_buffers()]
+CVE-2024-26696 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/38296afe3c6ee07319e01bb249aa4bb47c07b534 (6.8-rc4)
-CVE-2024-26695 [crypto: ccp - Fix null pointer dereference in __sev_platform_shutdown_locked]
+CVE-2024-26695 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.7.7-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ccb88e9549e7cfd8bcd511c538f437e20026e983 (6.8-rc4)
-CVE-2024-26694 [wifi: iwlwifi: fix double-free bug]
+CVE-2024-26694 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/353d321f63f7dbfc9ef58498cc732c9fe886a596 (6.8-rc4)
-CVE-2024-26693 [wifi: iwlwifi: mvm: fix a crash when we run out of stations]
+CVE-2024-26693 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b7198383ef2debe748118996f627452281cf27d7 (6.8-rc5)
-CVE-2024-26692 [smb: Fix regression in writes when non-standard maximum write size negotiated]
+CVE-2024-26692 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/4860abb91f3d7fbaf8147d54782149bb1fc45892 (6.8-rc5)
-CVE-2024-26691 [KVM: arm64: Fix circular locking dependency]
+CVE-2024-26691 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/10c02aad111df02088d1a81792a709f6a7eca6cc (6.8-rc5)
-CVE-2024-26690 [net: stmmac: protect updates of 64-bit statistics counters]
+CVE-2024-26690 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.7.7-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/38cc3c6dcc09dc3a1800b5ec22aef643ca11eab8 (6.8-rc4)
-CVE-2024-26689 [ceph: prevent use-after-free in encode_cap_msg()]
+CVE-2024-26689 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/cda4672da1c26835dcbd7aec2bfed954eda9b5ef (6.8-rc4)
-CVE-2024-26688 [fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super]
+CVE-2024-26688 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.7.7-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/79d72c68c58784a3e1cd2378669d51bfd0cb7498 (6.8-rc4)
-CVE-2024-26687 [xen/events: close evtchn after mapping cleanup]
+CVE-2024-26687 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/fa765c4b4aed2d64266b694520ecb025c862c5a9 (6.8-rc5)
-CVE-2024-26686 [fs/proc: do_task_stat: use sig->stats_lock to gather the threads/children stats]
+CVE-2024-26686 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/7601df8031fd67310af891897ef6cc0df4209305 (6.8-rc4)
-CVE-2024-26685 [nilfs2: fix potential bug in end_buffer_async_write]
+CVE-2024-26685 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/5bc09b397cbf1221f8a8aacb1152650c9195b02b (6.8-rc4)
-CVE-2023-52641 [fs/ntfs3: Add NULL ptr dereference checking at the end of attr_allocate_frame()]
+CVE-2023-52641 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/aaab47f204aaf47838241d57bf8662c8840de60a (6.8-rc4)
-CVE-2023-52640 [fs/ntfs3: Fix oob in ntfs_listxattr]
+CVE-2023-52640 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/731ab1f9828800df871c5a7ab9ffe965317d3f15 (6.8-rc4)
-CVE-2023-52639 [KVM: s390: vsie: fix race during shadow creation]
+CVE-2023-52639 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/fe752331d4b361d43cfd0b89534b4b2176057c32 (6.8-rc4)
-CVE-2023-52638 [can: j1939: prevent deadlock by changing j1939_socks_lock to rwlock]
+CVE-2023-52638 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/6cdedc18ba7b9dacc36466e27e3267d201948c8d (6.8-rc5)
-CVE-2023-52637 [can: j1939: Fix UAF in j1939_sk_match_filter during setsockopt(SO_J1939_FILTER)]
+CVE-2023-52637 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.7.7-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/efe7cf828039aedb297c1f9920b638fffee6aabc (6.8-rc5)
@@ -570,14 +768,17 @@ CVE-2023-35764 (Insufficient verification of data authenticity issue in Survey M
 CVE-2023-34423 (Survey Maker prior to 3.6.4 contains a stored cross-site scripting vul ...)
 	TODO: check
 CVE-2024-3159
+	{DSA-5654-1}
 	- chromium 123.0.6312.105-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2024-3158
+	{DSA-5654-1}
 	- chromium 123.0.6312.105-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2024-3156
+	{DSA-5654-1}
 	- chromium 123.0.6312.105-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 	[buster] - chromium <end-of-life> (see DSA 5046)
@@ -685,9 +886,9 @@ CVE-2024-3144 (A vulnerability was found in DedeCMS 5.7. It has been declared as
 	NOT-FOR-US: DedeCMS
 CVE-2024-3143 (A vulnerability was found in DedeCMS 5.7. It has been classified as pr ...)
 	NOT-FOR-US: DedeCMS
-CVE-2024-3142 (A vulnerability was found in Clavister E10 and E80 up to 20240323 and  ...)
+CVE-2024-3142 (A vulnerability was found in Clavister E10 and E80 up to 14.00.10 and  ...)
 	NOT-FOR-US: Clavister
-CVE-2024-3141 (A vulnerability has been found in Clavister E10 and E80 up to 20240323 ...)
+CVE-2024-3141 (A vulnerability has been found in Clavister E10 and E80 up to 14.00.10 ...)
 	NOT-FOR-US: Clavister
 CVE-2024-3140 (A vulnerability, which was classified as problematic, was found in Sou ...)
 	NOT-FOR-US: SourceCodester
@@ -20975,249 +21176,331 @@ CVE-2023-47211 (A directory traversal vulnerability exists in the uploadMib func
 CVE-2023-41710 (User-defined script code could be stored for a upsell related shop URL ...)
 	NOT-FOR-US: Open-Xchange
 CVE-2023-39444 (Multiple out-of-bounds write vulnerabilities exist in the LXT2 parsing ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1826
 CVE-2023-39443 (Multiple out-of-bounds write vulnerabilities exist in the LXT2 parsing ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1826
 CVE-2023-39414 (Multiple integer underflow vulnerabilities exist in the LXT2 lxt2_rd_i ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1824
 CVE-2023-39413 (Multiple integer underflow vulnerabilities exist in the LXT2 lxt2_rd_i ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1824
 CVE-2023-39317 (Multiple integer overflow vulnerabilities exist in the LXT2 num_dict_e ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1820
 CVE-2023-39316 (Multiple integer overflow vulnerabilities exist in the LXT2 num_dict_e ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1820
 CVE-2023-39275 (Multiple integer overflow vulnerabilities exist in the LXT2 facgeometr ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1818
 CVE-2023-39274 (Multiple integer overflow vulnerabilities exist in the LXT2 facgeometr ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1818
 CVE-2023-39273 (Multiple integer overflow vulnerabilities exist in the LXT2 facgeometr ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1818
 CVE-2023-39272 (Multiple integer overflow vulnerabilities exist in the LXT2 facgeometr ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1818
 CVE-2023-39271 (Multiple integer overflow vulnerabilities exist in the LXT2 facgeometr ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1818
 CVE-2023-39270 (Multiple integer overflow vulnerabilities exist in the LXT2 facgeometr ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1818
 CVE-2023-39235 (Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_p ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1817
 CVE-2023-39234 (Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_p ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1817
 CVE-2023-38657 (An out-of-bounds write vulnerability exists in the LXT2 zlib block dec ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1823
 CVE-2023-38653 (Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_bloc ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1815
 CVE-2023-38652 (Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_bloc ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1815
 CVE-2023-38651 (Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_bloc ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1814
 CVE-2023-38650 (Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_bloc ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1814
 CVE-2023-38649 (Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_g ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1813
 CVE-2023-38648 (Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_g ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1813
 CVE-2023-38623 (Multiple integer overflow vulnerabilities exist in the VZT facgeometry ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812
 CVE-2023-38622 (Multiple integer overflow vulnerabilities exist in the VZT facgeometry ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812
 CVE-2023-38621 (Multiple integer overflow vulnerabilities exist in the VZT facgeometry ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812
 CVE-2023-38620 (Multiple integer overflow vulnerabilities exist in the VZT facgeometry ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812
 CVE-2023-38619 (Multiple integer overflow vulnerabilities exist in the VZT facgeometry ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812
 CVE-2023-38618 (Multiple integer overflow vulnerabilities exist in the VZT facgeometry ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1812
 CVE-2023-38583 (A stack-based buffer overflow vulnerability exists in the LXT2 lxt2_rd ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1827
 CVE-2023-37923 (Multiple arbitrary write vulnerabilities exist in the VCD sorted bsear ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1807
 CVE-2023-37922 (Multiple arbitrary write vulnerabilities exist in the VCD sorted bsear ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1807
 CVE-2023-37921 (Multiple arbitrary write vulnerabilities exist in the VCD sorted bsear ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1807
 CVE-2023-37578 (Multiple use-after-free vulnerabilities exist in the VCD get_vartoken  ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1806
 CVE-2023-37577 (Multiple use-after-free vulnerabilities exist in the VCD get_vartoken  ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1806
 CVE-2023-37576 (Multiple use-after-free vulnerabilities exist in the VCD get_vartoken  ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1806
 CVE-2023-37575 (Multiple use-after-free vulnerabilities exist in the VCD get_vartoken  ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1806
 CVE-2023-37574 (Multiple use-after-free vulnerabilities exist in the VCD get_vartoken  ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1806
 CVE-2023-37573 (Multiple use-after-free vulnerabilities exist in the VCD get_vartoken  ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1806
 CVE-2023-37447 (Multiple out-of-bounds read vulnerabilities exist in the VCD var defin ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1805
 CVE-2023-37446 (Multiple out-of-bounds read vulnerabilities exist in the VCD var defin ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1805
 CVE-2023-37445 (Multiple out-of-bounds read vulnerabilities exist in the VCD var defin ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1805
 CVE-2023-37444 (Multiple out-of-bounds read vulnerabilities exist in the VCD var defin ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1805
 CVE-2023-37443 (Multiple out-of-bounds read vulnerabilities exist in the VCD var defin ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1805
 CVE-2023-37442 (Multiple out-of-bounds read vulnerabilities exist in the VCD var defin ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1805
 CVE-2023-37420 (Multiple out-of-bounds write vulnerabilities exist in the VCD parse_va ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1804
 CVE-2023-37419 (Multiple out-of-bounds write vulnerabilities exist in the VCD parse_va ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1804
 CVE-2023-37418 (Multiple out-of-bounds write vulnerabilities exist in the VCD parse_va ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1804
 CVE-2023-37417 (Multiple out-of-bounds write vulnerabilities exist in the VCD parse_va ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1804
 CVE-2023-37416 (Multiple out-of-bounds write vulnerabilities exist in the VCD parse_va ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1804
 CVE-2023-37282 (An out-of-bounds write vulnerability exists in the VZT LZMA_Read dmem  ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1810
 CVE-2023-36916 (Multiple integer overflow vulnerabilities exist in the FST fstReaderIt ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1798
 CVE-2023-36915 (Multiple integer overflow vulnerabilities exist in the FST fstReaderIt ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1798
 CVE-2023-36864 (An integer overflow vulnerability exists in the fstReaderIterBlocks2 t ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1797
 CVE-2023-36861 (An out-of-bounds write vulnerability exists in the VZT LZMA_read_varin ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1811
 CVE-2023-36747 (Multiple heap-based buffer overflow vulnerabilities exist in the fstRe ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1793
 CVE-2023-36746 (Multiple heap-based buffer overflow vulnerabilities exist in the fstRe ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1793
 CVE-2023-35997 (Multiple improper array index validation vulnerabilities exist in the  ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791
 CVE-2023-35996 (Multiple improper array index validation vulnerabilities exist in the  ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791
 CVE-2023-35995 (Multiple improper array index validation vulnerabilities exist in the  ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791
 CVE-2023-35994 (Multiple improper array index validation vulnerabilities exist in the  ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1791
 CVE-2023-35992 (An integer overflow vulnerability exists in the FST fstReaderIterBlock ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1790
 CVE-2023-35989 (An integer overflow vulnerability exists in the LXT2 zlib block alloca ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1822
 CVE-2023-35970 (Multiple heap-based buffer overflow vulnerabilities exist in the fstRe ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1789
 CVE-2023-35969 (Multiple heap-based buffer overflow vulnerabilities exist in the fstRe ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1789
 CVE-2023-35964 (Multiple OS command injection vulnerabilities exist in the decompressi ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786
 CVE-2023-35963 (Multiple OS command injection vulnerabilities exist in the decompressi ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786
 CVE-2023-35962 (Multiple OS command injection vulnerabilities exist in the decompressi ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786
 CVE-2023-35961 (Multiple OS command injection vulnerabilities exist in the decompressi ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786
 CVE-2023-35960 (Multiple OS command injection vulnerabilities exist in the decompressi ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786
 CVE-2023-35959 (Multiple OS command injection vulnerabilities exist in the decompressi ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1786
 CVE-2023-35958 (Multiple heap-based buffer overflow vulnerabilities exist in the fstRe ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785
 CVE-2023-35957 (Multiple heap-based buffer overflow vulnerabilities exist in the fstRe ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785
 CVE-2023-35956 (Multiple heap-based buffer overflow vulnerabilities exist in the fstRe ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785
 CVE-2023-35955 (Multiple heap-based buffer overflow vulnerabilities exist in the fstRe ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1785
 CVE-2023-35704 (Multiple stack-based buffer overflow vulnerabilities exist in the FST  ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783
 CVE-2023-35703 (Multiple stack-based buffer overflow vulnerabilities exist in the FST  ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783
 CVE-2023-35702 (Multiple stack-based buffer overflow vulnerabilities exist in the FST  ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1783
 CVE-2023-35128 (An integer overflow vulnerability exists in the fstReaderIterBlocks2 t ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1792
 CVE-2023-35057 (An integer overflow vulnerability exists in the LXT2 lxt2_rd_trace val ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1821
 CVE-2023-35004 (An integer overflow vulnerability exists in the VZT longest_len value  ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1816
 CVE-2023-34436 (An out-of-bounds write vulnerability exists in the LXT2 num_time_table ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1819
 CVE-2023-34087 (An improper array index validation vulnerability exists in the EVCD va ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1803
 CVE-2023-32650 (An integer overflow vulnerability exists in the FST_BL_GEOM parsing ma ...)
+	{DSA-5653-1}
 	- gtkwave 3.3.118-0.1 (bug #1060407)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2023-1777
 CVE-2018-25095 (The Duplicator WordPress plugin before 1.3.0 does not properly escape  ...)
@@ -74583,8 +74866,8 @@ CVE-2023-25701
 	RESERVED
 CVE-2023-25700 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
 	NOT-FOR-US: WordPress plugin
-CVE-2023-25699
-	RESERVED
+CVE-2023-25699 (Improper Neutralization of Special Elements used in an OS Command ('OS ...)
+	TODO: check
 CVE-2023-25698 (Cross-Site Request Forgery (CSRF) vulnerability in Studio Wombat Shopp ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2023-25697



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3aac4063b6d17e1e674b1c1bb00848865a99103b

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3aac4063b6d17e1e674b1c1bb00848865a99103b
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240403/3f90d0ba/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list