[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Feb 28 20:12:32 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
422a0f27 by security tracker role at 2024-02-28T20:12:19+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,337 +1,489 @@
-CVE-2024-25065
+CVE-2024-27948 (Cross-Site Request Forgery (CSRF) vulnerability in bytesforall Atahual ...)
+	TODO: check
+CVE-2024-27517 (Webasyst 2.9.9 has a Cross-Site Scripting (XSS) vulnerability, Attacke ...)
+	TODO: check
+CVE-2024-27516 (livehelperchat 4.28v is vulnerable to Server-Side Template Injection ( ...)
+	TODO: check
+CVE-2024-27515 (Osclass 5.1.2 is vulnerable to SQL Injection.)
+	TODO: check
+CVE-2024-27285 (YARD is a Ruby Documentation tool. The "frames.html" file within the Y ...)
+	TODO: check
+CVE-2024-27284 (cassandra-rs is a Cassandra (CQL) driver for Rust. Code that attempts  ...)
+	TODO: check
+CVE-2024-27103 (Querybook is a Big Data Querying UI. When a user searches for their qu ...)
+	TODO: check
+CVE-2024-27083 (Flask-AppBuilder is an application development framework, built on top ...)
+	TODO: check
+CVE-2024-26342 (A Null pointer dereference in usr/sbin/httpd in ASUS AC68U 3.0.0.4.384 ...)
+	TODO: check
+CVE-2024-25932 (Cross-Site Request Forgery (CSRF) vulnerability in Manish Kumar Agarwa ...)
+	TODO: check
+CVE-2024-25931 (Cross-Site Request Forgery (CSRF) vulnerability in Heureka Group Heure ...)
+	TODO: check
+CVE-2024-25930 (Cross-Site Request Forgery (CSRF) vulnerability in Nuggethon Custom Or ...)
+	TODO: check
+CVE-2024-25927 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2024-25910 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2024-25902 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2024-25859 (A path traversal vulnerability in the /path/to/uploads/ directory of B ...)
+	TODO: check
+CVE-2024-25833 (F-logic DataCube3 v1.0 is vulnerable to unauthenticated SQL injection, ...)
+	TODO: check
+CVE-2024-25832 (F-logic DataCube3 v1.0 is vulnerable to unrestricted file upload, whic ...)
+	TODO: check
+CVE-2024-25831 (F-logic DataCube3 Version 1.0 is affected by a reflected cross-site sc ...)
+	TODO: check
+CVE-2024-25830 (F-logic DataCube3 v1.0 is vulnerable to Incorrect Access Control due t ...)
+	TODO: check
+CVE-2024-25435 (A cross-site scripting (XSS) vulnerability in Md1health Md1patient v2. ...)
+	TODO: check
+CVE-2024-25202 (Cross Site Scripting vulnerability in Phpgurukul User Registration & L ...)
+	TODO: check
+CVE-2024-25170 (An issue in Mezzanine v6.0.0 allows attackers to bypass access control ...)
+	TODO: check
+CVE-2024-25169 (An issue in Mezzanine v6.0.0 allows attackers to bypass access control ...)
+	TODO: check
+CVE-2024-25128 (Flask-AppBuilder is an application development framework, built on top ...)
+	TODO: check
+CVE-2024-24868 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2024-24708 (Cross-Site Request Forgery (CSRF) vulnerability in W3speedster W3SPEED ...)
+	TODO: check
+CVE-2024-24705 (Cross-Site Request Forgery (CSRF) vulnerability in Octa Code Accessibi ...)
+	TODO: check
+CVE-2024-24702 (Cross-Site Request Forgery (CSRF) vulnerability in Matt Martz & Andy S ...)
+	TODO: check
+CVE-2024-24701 (Cross-Site Request Forgery (CSRF) vulnerability in Native Grid LLC A n ...)
+	TODO: check
+CVE-2024-24148 (A memory leak issue discovered in parseSWF_FREECHARACTER in libming v0 ...)
+	TODO: check
+CVE-2024-23519 (Cross-Site Request Forgery (CSRF) vulnerability in M&S Consulting Emai ...)
+	TODO: check
+CVE-2024-22459 (Dell ECS, versions 3.6 through 3.6.2.5, and 3.7 through 3.7.0.6, and 3 ...)
+	TODO: check
+CVE-2024-21749 (Cross-Site Request Forgery (CSRF) vulnerability in Atakan Au 1 click d ...)
+	TODO: check
+CVE-2024-20344 (A vulnerability in system resource management in Cisco UCS 6400 and 65 ...)
+	TODO: check
+CVE-2024-20321 (A vulnerability in the External Border Gateway Protocol (eBGP) impleme ...)
+	TODO: check
+CVE-2024-20294 (A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of ...)
+	TODO: check
+CVE-2024-20291 (A vulnerability in the access control list (ACL) programming for port  ...)
+	TODO: check
+CVE-2024-20267 (A vulnerability with the handling of MPLS traffic for Cisco NX-OS Soft ...)
+	TODO: check
+CVE-2024-1965 (Server-Side Request Forgery vulnerability in Haivision's Aviwest Manag ...)
+	TODO: check
+CVE-2024-1954 (The Oliver POS \u2013 A WooCommerce Point of Sale (POS) plugin for Wor ...)
+	TODO: check
+CVE-2024-1861 (The Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enum ...)
+	TODO: check
+CVE-2024-1860 (The Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enum ...)
+	TODO: check
+CVE-2024-1847 (Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out ...)
+	TODO: check
+CVE-2024-1808 (The WP Shortcodes Plugin \u2014 Shortcodes Ultimate plugin for WordPre ...)
+	TODO: check
+CVE-2024-1791 (The CodeMirror Blocks plugin for WordPress is vulnerable to Stored Cro ...)
+	TODO: check
+CVE-2024-1719 (The Easy PayPal & Stripe Buy Now Button plugin for WordPress is vulner ...)
+	TODO: check
+CVE-2024-1636 (Potential Cross-Site Scripting (XSS) in the page editing area.)
+	TODO: check
+CVE-2024-1632 (Low-privileged users with access to the Sitefinity backend may obtain  ...)
+	TODO: check
+CVE-2024-1566 (The Redirects plugin for WordPress is vulnerable to unauthorized modif ...)
+	TODO: check
+CVE-2024-1516 (The WP eCommerce plugin for WordPress is vulnerable to unauthorized ar ...)
+	TODO: check
+CVE-2024-1514 (The WP eCommerce plugin for WordPress is vulnerable to time-based blin ...)
+	TODO: check
+CVE-2024-1476 (The Under Construction / Maintenance Mode from Acurax plugin for WordP ...)
+	TODO: check
+CVE-2024-1368 (The Page Duplicator plugin for WordPress is vulnerable to unauthorized ...)
+	TODO: check
+CVE-2024-1136 (The Coming Soon Page & Maintenance Mode plugin for WordPress is vulner ...)
+	TODO: check
+CVE-2024-0975 (The WordPress Access Control plugin for WordPress is vulnerable to Sen ...)
+	TODO: check
+CVE-2024-0786 (The Conversios \u2013 Google Analytics 4 (GA4), Meta Pixel & more Via  ...)
+	TODO: check
+CVE-2024-0768 (The Envo's Elementor Templates & Widgets for WooCommerce plugin for Wo ...)
+	TODO: check
+CVE-2024-0767 (The Envo's Elementor Templates & Widgets for WooCommerce plugin for Wo ...)
+	TODO: check
+CVE-2024-0766 (The Envo's Elementor Templates & Widgets for WooCommerce plugin for Wo ...)
+	TODO: check
+CVE-2024-0682 (The Page Restrict plugin for WordPress is vulnerable to information di ...)
+	TODO: check
+CVE-2024-0680 (The WP Private Content Plus plugin for WordPress is vulnerable to info ...)
+	TODO: check
+CVE-2024-0560 (A vulnerability was found in 3Scale, when used with Keycloak 15 (or RH ...)
+	TODO: check
+CVE-2024-0433 (The Gestpay for WooCommerce plugin for WordPress is vulnerable to Cros ...)
+	TODO: check
+CVE-2024-0432 (The Gestpay for WooCommerce plugin for WordPress is vulnerable to Cros ...)
+	TODO: check
+CVE-2024-0431 (The Gestpay for WooCommerce plugin for WordPress is vulnerable to Cros ...)
+	TODO: check
+CVE-2023-6922 (The Under Construction / Maintenance Mode from Acurax plugin for WordP ...)
+	TODO: check
+CVE-2023-6917 (A vulnerability has been identified in the Performance Co-Pilot (PCP)  ...)
+	TODO: check
+CVE-2023-52226 (Cross-Site Request Forgery (CSRF) vulnerability in Advanced Flamingo.T ...)
+	TODO: check
+CVE-2023-52223 (Cross-Site Request Forgery (CSRF) vulnerability in MailerLite MailerLi ...)
+	TODO: check
+CVE-2023-52048 (RuoYi v4.7.8 was discovered to contain a cross-site scripting (XSS) vu ...)
+	TODO: check
+CVE-2023-52047 (Dedecms v5.7.112 was discovered to contain a Cross-Site Request Forger ...)
+	TODO: check
+CVE-2023-51692 (Missing Authorization vulnerability in CusRev Customer Reviews for Woo ...)
+	TODO: check
+CVE-2023-51683 (Cross-Site Request Forgery (CSRF) vulnerability in Scott Paterson Easy ...)
+	TODO: check
+CVE-2023-51681 (Cross-Site Request Forgery (CSRF) vulnerability in Duplicator Duplicat ...)
+	TODO: check
+CVE-2023-51533 (Cross-Site Request Forgery (CSRF) vulnerability in Ecwid Ecommerce Ecw ...)
+	TODO: check
+CVE-2024-25065 (Possible path traversal in Apache OFBiz allowing authentication bypass ...)
 	NOT-FOR-US: Apache OFBiz
-CVE-2024-23946
+CVE-2024-23946 (Possible path traversal in Apache OFBiz allowing file inclusion. Users ...)
 	NOT-FOR-US: Apache OFBiz
 CVE-2024-22857
 	NOT-FOR-US: zlog
-CVE-2024-26016
+CVE-2024-26016 (A low privilege authenticated user could import an existing dashboard  ...)
 	NOT-FOR-US: Apache Superset
-CVE-2024-24779
+CVE-2024-24779 (Apache Superset with custom roles that include `can write on dataset`  ...)
 	NOT-FOR-US: Apache Superset
-CVE-2024-24772
+CVE-2024-24772 (A guest user could exploit a chart data REST API and send arbitrary SQ ...)
 	NOT-FOR-US: Apache Superset
-CVE-2024-24773
+CVE-2024-24773 (Improper parsing of nested SQL statements on SQLLab would allow authen ...)
 	NOT-FOR-US: Apache Superset
-CVE-2024-27315
+CVE-2024-27315 (An authenticated user with privileges to create Alerts on Alerts & Rep ...)
 	NOT-FOR-US: Apache Superset
-CVE-2021-47053 [crypto: sun8i-ss - Fix memory leak of pad]
+CVE-2021-47053 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/50274b01ac1689b1a3f6bc4b5b3dbf361a55dd3a (5.13-rc1)
-CVE-2021-47052 [crypto: sa2ul - Fix memory leak of rxd]
+CVE-2021-47052 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/854b7737199848a91f6adfa0a03cf6f0c46c86e8 (5.13-rc1)
-CVE-2021-47051 [spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()]
+CVE-2021-47051 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a03675497970a93fcf25d81d9d92a59c2d7377a7 (5.13-rc1)
-CVE-2021-47050 [memory: renesas-rpc-if: fix possible NULL pointer dereference of resource]
+CVE-2021-47050 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/59e27d7c94aa02da039b000d33c304c179395801 (5.13-rc1)
-CVE-2021-47049 [Drivers: hv: vmbus: Use after free in __vmbus_open()]
+CVE-2021-47049 (In the Linux kernel, the following vulnerability has been resolved:  D ...)
 	- linux 5.10.38-1
 	NOTE: https://git.kernel.org/linus/3e9bf43f7f7a46f21ec071cb47be92d0874c48da (5.13-rc1)
-CVE-2021-47048 [spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op]
+CVE-2021-47048 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a2c5bedb2d55dd27c642c7b9fb6886d7ad7bdb58 (5.13-rc1)
-CVE-2021-47047 [spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails]
+CVE-2021-47047 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/126bdb606fd2802454e6048caef1be3e25dd121e (5.13-rc1)
-CVE-2021-47046 [drm/amd/display: Fix off by one in hdmi_14_process_transaction()]
+CVE-2021-47046 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8e6fafd5a22e7a2eb216f5510db7aab54cc545c1 (5.13-rc1)
-CVE-2021-47045 [scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb()]
+CVE-2021-47045 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8dd1c125f7f838abad009b64bff5f0a11afe3cb6 (5.13-rc1)
-CVE-2021-47044 [sched/fair: Fix shift-out-of-bounds in load_balance()]
+CVE-2021-47044 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/39a2a6eb5c9b66ea7c8055026303b3aa681b49a5 (5.13-rc1)
-CVE-2021-47043 [media: venus: core: Fix some resource leaks in the error path of 'venus_probe()']
+CVE-2021-47043 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5a465c5391a856a0c1e9554964d660676c35d1b2 (5.13-rc1)
-CVE-2021-47042 [drm/amd/display: Free local data after use]
+CVE-2021-47042 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/616cf23b6cf40ad6f03ffbddfa1b6c4eb68d8ae1 (5.13-rc1)
-CVE-2021-47041 [nvmet-tcp: fix incorrect locking in state_change sk callback]
+CVE-2021-47041 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b5332a9f3f3d884a1b646ce155e664cc558c1722 (5.13-rc1)
-CVE-2021-47040 [io_uring: fix overflows checks in provide buffers]
+CVE-2021-47040 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/38134ada0ceea3e848fe993263c0ff6207fd46e7 (5.13-rc1)
-CVE-2021-47039 [ataflop: potential out of bounds in do_format()]
+CVE-2021-47039 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1ffec389a6431782a8a28805830b6fae9bf00af1 (5.13-rc1)
-CVE-2021-47038 [Bluetooth: avoid deadlock between hci_dev->lock and socket lock]
+CVE-2021-47038 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/17486960d79b900c45e0bb8fbcac0262848582ba (5.13-rc1)
-CVE-2021-47037 [ASoC: q6afe-clocks: fix reprobing of the driver]
+CVE-2021-47037 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 5.14.6-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/96fadf7e8ff49fdb74754801228942b67c3eeebd (5.13-rc4)
-CVE-2021-47036 [udp: skip L4 aggregation for UDP tunnel packets]
+CVE-2021-47036 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.14.6-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/18f25dc399901426dff61e676ba603ff52c666f7 (5.13-rc1)
-CVE-2021-47035 [iommu/vt-d: Remove WO permissions on second-level paging entries]
+CVE-2021-47035 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/eea53c5816889ee8b64544fa2e9311a81184ff9c (5.13-rc1)
-CVE-2021-47034 [powerpc/64s: Fix pte update for kernel memory on radix]
+CVE-2021-47034 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 5.10.38-1
 	[buster] - linux 4.19.194-1
 	NOTE: https://git.kernel.org/linus/b8b2f37cf632434456182e9002d63cbc4cccc50c (5.13-rc1)
-CVE-2021-47033 [mt76: mt7615: fix tx skb dma unmap]
+CVE-2021-47033 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ebee7885bb12a8fe2c2f9bac87dbd87a05b645f9 (5.13-rc1)
-CVE-2021-47032 [mt76: mt7915: fix tx skb dma unmap]
+CVE-2021-47032 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7dcf3c04f0aca746517a77433b33d40868ca4749 (5.13-rc1)
-CVE-2021-47031 [mt76: mt7921: fix memory leak in mt7921_coredump_work]
+CVE-2021-47031 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/782b3e86ea970e899f8e723db9f64708a15ca30e (5.13-rc1)
-CVE-2021-47030 [mt76: mt7615: fix memory leak in mt7615_coredump_work]
+CVE-2021-47030 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/49cc85059a2cb656f96ff3693f891e8fe8f669a9 (5.13-rc1)
-CVE-2021-47029 [mt76: connac: fix kernel warning adding monitor interface]
+CVE-2021-47029 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c996f0346e40e3b1ac2ebaf0681df898fb157f60 (5.13-rc1)
-CVE-2021-47028 [mt76: mt7915: fix txrate reporting]
+CVE-2021-47028 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.14.6-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f43b941fd61003659a3f0e039595e5e525917aa8 (5.13-rc1)
-CVE-2021-47027 [mt76: mt7921: fix kernel crash when the firmware fails to download]
+CVE-2021-47027 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e230f0c44f011f3270680a506b19b7e84c5e8923 (5.13-rc1)
-CVE-2021-47026 [RDMA/rtrs-clt: destroy sysfs after removing session from active list]
+CVE-2021-47026 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7f4a8592ff29f19c5a2ca549d0973821319afaad (5.13-rc1)
-CVE-2021-47025 [iommu/mediatek: Always enable the clk on resume]
+CVE-2021-47025 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b34ea31fe013569d42b7e8681ef3f717f77c5b72 (5.13-rc1)
-CVE-2021-47024 [vsock/virtio: free queued packets when closing socket]
+CVE-2021-47024 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 5.10.38-1
 	NOTE: https://git.kernel.org/linus/8432b8114957235f42e070a16118a7f750de9d39 (5.13-rc1)
-CVE-2021-47023 [net: marvell: prestera: fix port event handling on init]
+CVE-2021-47023 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/333980481b99edb24ebd5d1a53af70a15d9146de (5.13-rc1)
-CVE-2021-47022 [mt76: mt7615: fix memleak when mt7615_unregister_device()]
+CVE-2021-47022 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8ab31da7b89f71c4c2defcca989fab7b42f87d71 (5.13-rc1)
-CVE-2021-47021 [mt76: mt7915: fix memleak when mt7915_unregister_device()]
+CVE-2021-47021 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e9d32af478cfc3744a45245c0b126738af4b3ac4 (5.13-rc1)
-CVE-2021-47019 [mt76: mt7921: fix possible invalid register access]
+CVE-2021-47019 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fe3fccde8870764ba3e60610774bd7bc9f8faeff (5.13-rc1)
-CVE-2021-47018 [powerpc/64: Fix the definition of the fixmap area]
+CVE-2021-47018 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9ccba66d4d2aff9a3909aa77d57ea8b7cc166f3c (5.13-rc1)
-CVE-2021-47017 [ath10k: Fix a use after free in ath10k_htc_send_bundle]
+CVE-2021-47017 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8392df5d7e0b6a7d21440da1fc259f9938f4dec3 (5.13-rc1)
-CVE-2021-47015 [bnxt_en: Fix RX consumer index logic in the error path.]
+CVE-2021-47015 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.10.38-1
 	NOTE: https://git.kernel.org/linus/bbd6f0a948139970f4a615dff189d9a503681a39 (5.13-rc1)
-CVE-2021-47014 [net/sched: act_ct: fix wild memory access when clearing fragments]
+CVE-2021-47014 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.6-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f77bd544a6bbe69aa50d9ed09f13494cf36ff806 (5.13-rc1)
-CVE-2021-47013 [net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send]
+CVE-2021-47013 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.38-1
 	[buster] - linux 4.19.194-1
 	NOTE: https://git.kernel.org/linus/6d72e7c767acbbdd44ebc7d89c6690b405b32b57 (5.13-rc1)
-CVE-2021-47012 [RDMA/siw: Fix a use after free in siw_alloc_mr]
+CVE-2021-47012 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3093ee182f01689b89e9f8797b321603e5de4f63 (5.13-rc1)
-CVE-2021-47011 [mm: memcontrol: slab: fix obtain a reference to a freeing memcg]
+CVE-2021-47011 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9f38f03ae8d5f57371b71aa6b4275765b65454fd (5.13-rc1)
-CVE-2021-47010 [net: Only allow init netns to set default tcp cong to a restricted algo]
+CVE-2021-47010 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.38-1
 	[buster] - linux 4.19.194-1
 	NOTE: https://git.kernel.org/linus/8d432592f30fcc34ef5a10aac4887b4897884493 (5.13-rc1)
-CVE-2021-47009 [KEYS: trusted: Fix memory leak on object td]
+CVE-2021-47009 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/83a775d5f9bfda95b1c295f95a3a041a40c7f321 (5.13-rc2)
-CVE-2021-47008 [KVM: SVM: Make sure GHCB is mapped before updating]
+CVE-2021-47008 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a3ba26ecfb569f4aa3f867e80c02aa65f20aadad (5.13-rc1)
-CVE-2021-47007 [f2fs: fix panic during f2fs_resize_fs()]
+CVE-2021-47007 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3ab0598e6d860ef49d029943ba80f627c15c15d6 (5.13-rc1)
-CVE-2021-47006 [ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook]
+CVE-2021-47006 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 5.10.38-1
 	[buster] - linux 4.19.194-1
 	NOTE: https://git.kernel.org/linus/a506bd5756290821a4314f502b4bafc2afcf5260 (5.13-rc1)
-CVE-2021-47005 [PCI: endpoint: Fix NULL pointer dereference for ->get_features()]
+CVE-2021-47005 (In the Linux kernel, the following vulnerability has been resolved:  P ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6613bc2301ba291a1c5a90e1dc24cf3edf223c03 (5.13-rc1)
-CVE-2021-47004 [f2fs: fix to avoid touching checkpointed data in get_victim()]
+CVE-2021-47004 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/61461fc921b756ae16e64243f72af2bfc2e620db (5.13-rc1)
-CVE-2021-47003 [dmaengine: idxd: Fix potential null dereference on pointer status]
+CVE-2021-47003 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/28ac8e03c43dfc6a703aa420d18222540b801120 (5.13-rc1)
-CVE-2021-47002 [SUNRPC: Fix null pointer dereference in svc_rqst_free()]
+CVE-2021-47002 (In the Linux kernel, the following vulnerability has been resolved:  S ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b9f83ffaa0c096b4c832a43964fe6bff3acffe10 (5.13-rc1)
-CVE-2021-47001 [xprtrdma: Fix cwnd update ordering]
+CVE-2021-47001 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/35d8b10a25884050bb3b0149b62c3818ec59f77c (5.13-rc1)
-CVE-2021-47000 [ceph: fix inode leak on getattr error in __fh_to_dentry]
+CVE-2021-47000 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1775c7ddacfcea29051c67409087578f8f4d751b (5.13-rc1)
-CVE-2021-46999 [sctp: do asoc update earlier in sctp_sf_do_dupcook_a]
+CVE-2021-46999 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.10.38-1
 	[buster] - linux 4.19.194-1
 	NOTE: https://git.kernel.org/linus/35b4f24415c854cd718ccdf38dbea6297f010aae (5.13-rc1)
-CVE-2021-46998 [ethernet:enic: Fix a use after free bug in enic_hard_start_xmit]
+CVE-2021-46998 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 5.10.38-1
 	[buster] - linux 4.19.194-1
 	NOTE: https://git.kernel.org/linus/643001b47adc844ae33510c4bb93c236667008a3 (5.13-rc1)
-CVE-2021-46997 [arm64: entry: always set GIC_PRIO_PSR_I_SET during entry]
+CVE-2021-46997 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/4d6a38da8e79e94cbd1344aa90876f0f805db705 (5.13-rc1)
-CVE-2021-46996 [netfilter: nftables: Fix a memleak from userdata error path in new objects]
+CVE-2021-46996 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/85dfd816fabfc16e71786eda0a33a7046688b5b0 (5.13-rc1)
-CVE-2021-46995 [can: mcp251xfd: mcp251xfd_probe(): fix an error pointer dereference in probe]
+CVE-2021-46995 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/4cc7faa406975b460aa674606291dea197c1210c (5.13-rc1)
-CVE-2021-46994 [can: mcp251x: fix resume from sleep before interface was brought up]
+CVE-2021-46994 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/03c427147b2d3e503af258711af4fc792b89b0af (5.13-rc1)
-CVE-2021-46993 [sched: Fix out-of-bound access in uclamp]
+CVE-2021-46993 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6d2f8909a5fabb73fe2a63918117943986c39b6c (5.13-rc1)
-CVE-2021-46992 [netfilter: nftables: avoid overflows in nft_hash_buckets()]
+CVE-2021-46992 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.38-1
 	[buster] - linux 4.19.194-1
 	NOTE: https://git.kernel.org/linus/a54754ec9891830ba548e2010c889e3c8146e449 (5.13-rc1)
-CVE-2021-46991 [i40e: Fix use-after-free in i40e_client_subtask()]
+CVE-2021-46991 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.10.38-1
 	[buster] - linux 4.19.194-1
 	NOTE: https://git.kernel.org/linus/38318f23a7ef86a8b1862e5e8078c4de121960c3 (5.13-rc1)
-CVE-2021-46990 [powerpc/64s: Fix crashes when toggling entry flush barrier]
+CVE-2021-46990 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 5.10.38-1
 	[buster] - linux 4.19.194-1
 	NOTE: https://git.kernel.org/linus/aec86b052df6541cc97c5fca44e5934cbea4963b (5.13-rc2)
-CVE-2021-46989 [hfsplus: prevent corruption in shrinking truncate]
+CVE-2021-46989 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c3187cf32216313fb316084efac4dab3a8459b1d (5.13-rc2)
-CVE-2021-46988 [userfaultfd: release page in error path to avoid BUG_ON]
+CVE-2021-46988 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.10.38-1
 	[buster] - linux 4.19.194-1
 	NOTE: https://git.kernel.org/linus/7ed9d238c7dbb1fdb63ad96a6184985151b0171c (5.13-rc2)
-CVE-2021-46987 [btrfs: fix deadlock when cloning inline extents and using qgroups]
+CVE-2021-46987 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.14.6-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f9baa501b4fd6962257853d46ddffbc21f27e344 (5.13-rc2)
-CVE-2021-46986 [usb: dwc3: gadget: Free gadget structure only after freeing endpoints]
+CVE-2021-46986 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/bb9c74a5bd1462499fe5ccb1e3c5ac40dcfa9139 (5.13-rc2)
-CVE-2021-46985 [ACPI: scan: Fix a memory leak in an error handling path]
+CVE-2021-46985 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 5.10.38-1
 	[buster] - linux 4.19.194-1
 	NOTE: https://git.kernel.org/linus/0c8bd174f0fc131bc9dfab35cd8784f59045da87 (5.13-rc2)
-CVE-2021-46984 [kyber: fix out of bounds access when preempted]
+CVE-2021-46984 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 5.10.38-1
 	NOTE: https://git.kernel.org/linus/efed9a3337e341bd0989161b97453b52567bc59d (5.13-rc2)
-CVE-2021-46983 [nvmet-rdma: Fix NULL deref when SEND is completed with error]
+CVE-2021-46983 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8cc365f9559b86802afc0208389f5c8d46b4ad61 (5.13-rc2)
-CVE-2021-46982 [f2fs: compress: fix race condition of overwrite vs truncate]
+CVE-2021-46982 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a949dc5f2c5cfe0c910b664650f45371254c0744 (5.13-rc2)
-CVE-2021-46981 [nbd: Fix NULL pointer in flush_workqueue]
+CVE-2021-46981 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.38-1
 	NOTE: https://git.kernel.org/linus/79ebe9110fa458d58f1fceb078e2068d7ad37390 (5.13-rc2)
-CVE-2021-46980 [usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4]
+CVE-2021-46980 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1f4642b72be79757f050924a9b9673b6a02034bc (5.13-rc2)
-CVE-2021-46979 [iio: core: fix ioctl handlers removal]
+CVE-2021-46979 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/901f84de0e16bde10a72d7eb2f2eb73fcde8fa1a (5.13-rc2)
-CVE-2021-46978 [KVM: nVMX: Always make an attempt to map eVMCS after migration]
+CVE-2021-46978 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f5c7e8425f18fdb9bdb7d13340651d7876890329 (5.13-rc2)
-CVE-2021-46977 [KVM: VMX: Disable preemption when probing user return MSRs]
+CVE-2021-46977 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5104d7ffcf24749939bea7fdb5378d186473f890 (5.13-rc2)
-CVE-2021-46976 [drm/i915: Fix crash in auto_retire]
+CVE-2021-46976 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/402be8a101190969fc7ff122d07e262df86e132b (5.13-rc2)
-CVE-2020-36787 [media: aspeed: fix clock handling logic]
+CVE-2020-36787 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3536169f8531c2c5b153921dc7d1ac9fd570cda7 (5.13-rc1)
-CVE-2020-36786 [media: [next] staging: media: atomisp: fix memory leak of object flash]
+CVE-2020-36786 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6045b01dd0e3cd3759eafe7f290ed04c957500b1 (5.13-rc1)
-CVE-2020-36785 [media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs()]
+CVE-2020-36785 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ba11bbf303fafb33989e95473e409f6ab412b18d (5.13-rc1)
-CVE-2020-36784 [i2c: cadence: fix reference leak when pm_runtime_get_sync fails]
+CVE-2020-36784 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.10.38-1
 	NOTE: https://git.kernel.org/linus/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6 (5.13-rc1)
-CVE-2020-36783 [i2c: img-scb: fix reference leak when pm_runtime_get_sync fails]
+CVE-2020-36783 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.10.38-1
 	NOTE: https://git.kernel.org/linus/223125e37af8a641ea4a09747a6a52172fc4b903 (5.13-rc1)
-CVE-2020-36782 [i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails]
+CVE-2020-36782 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.10.38-1
 	NOTE: https://git.kernel.org/linus/278e5bbdb9a94fa063c0f9bcde2479d0b8042462 (5.13-rc1)
-CVE-2020-36781 [i2c: imx: fix reference leak when pm_runtime_get_sync fails]
+CVE-2020-36781 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/47ff617217ca6a13194fcb35c6c3a0c57c080693 (5.13-rc1)
-CVE-2020-36780 [i2c: sprd: fix reference leak when pm_runtime_get_sync fails]
+CVE-2020-36780 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.10.38-1
 	NOTE: https://git.kernel.org/linus/3a4f326463117cee3adcb72999ca34a9aaafda93 (5.13-rc1)
-CVE-2020-36779 [i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails]
+CVE-2020-36779 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2c662660ce2bd3b09dae21a9a9ac9395e1e6c00b (5.13-rc1)
-CVE-2020-36778 [i2c: xiic: fix reference leak when pm_runtime_get_sync fails]
+CVE-2020-36778 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.10.38-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a85c5c7a3aa8041777ff691400b4046e56149fd3 (5.13-rc1)
@@ -561,7 +713,8 @@ CVE-2024-26471 (A reflected cross-site scripting (XSS) vulnerability in zhimengz
 	NOT-FOR-US: zhimengzhe iBarn
 CVE-2024-26470 (A host header injection vulnerability in the forgot password function  ...)
 	NOT-FOR-US: FullStackHero's WebAPI Boilerplate
-CVE-2024-26464 (net-snmp 5.9.4 contains a memory leak vulnerability in /net-snmp/apps/ ...)
+CVE-2024-26464
+	REJECTED
 	- net-snmp <unfixed> (bug #1064968)
 	NOTE: https://github.com/LuMingYinDetect/net-snmp_defects/blob/main/net-snmp_detect_1.md
 CVE-2024-26143 (Rails is a web-application framework. There is a possible XSS vulnerab ...)
@@ -1445,7 +1598,7 @@ CVE-2024-22025
 CVE-2024-26593 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/c1c9d0f6f7f1dbf29db996bd8e166242843a5f21 (6.8-rc5)
-CVE-2024-23807
+CVE-2024-23807 (The Apache Xerces C++ XML parser on versions 3.0.0 before 3.2.5 contai ...)
 	NOTE: No change CVE assignment to clarify affected versions for CVE-2018-1311
 	NOTE: Debian was already correct
 CVE-2024-26445 (flusity-CMS v2.33 was discovered to contain a Cross-Site Request Forge ...)
@@ -2053,10 +2206,12 @@ CVE-2023-42496 (Reflected cross-site scripting (XSS) vulnerability on the add as
 CVE-2023-40191 (Reflected cross-site scripting (XSS) vulnerability in the instance set ...)
 	NOT-FOR-US: Liferay
 CVE-2024-1939
+	{DSA-5634-1}
 	- chromium 122.0.6261.94-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2024-1938
+	{DSA-5634-1}
 	- chromium 122.0.6261.94-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 	[buster] - chromium <end-of-life> (see DSA 5046)
@@ -9280,7 +9435,7 @@ CVE-2024-0409 (A flaw was found in the X.Org server. The cursor code in both Xep
 	[bookworm] - xwayland <no-dsa> (Minor issue; Xwayland shouldn't be running as root)
 	NOTE: https://lists.x.org/archives/xorg/2024-January/061525.html
 	NOTE: https://gitlab.freedesktop.org/xorg/xserver/-/commit/2ef0f1116c65d5cb06d7b6d83f8a1aea702c94f7
-CVE-2024-21886 [Heap buffer overflow in DisableDevice]
+CVE-2024-21886 (A heap buffer overflow flaw was found in the DisableDevice function in ...)
 	{DSA-5603-1 DLA-3721-1}
 	- xorg-server 2:21.1.11-1
 	- xwayland 2:23.2.4-1
@@ -9289,7 +9444,7 @@ CVE-2024-21886 [Heap buffer overflow in DisableDevice]
 	NOTE: https://gitlab.freedesktop.org/xorg/xserver/-/commit/bc1fdbe46559dd947674375946bbef54dd0ce36b
 	NOTE: https://gitlab.freedesktop.org/xorg/xserver/-/commit/26769aa71fcbe0a8403b7fb13b7c9010cc07c3a8
 	NOTE: Regression: https://gitlab.freedesktop.org/xorg/xserver/-/issues/1623
-CVE-2024-21885 [Heap buffer overflow in XISendDeviceHierarchyEvent]
+CVE-2024-21885 (A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent fu ...)
 	{DSA-5603-1 DLA-3721-1}
 	- xorg-server 2:21.1.11-1
 	- xwayland 2:23.2.4-1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/422a0f27ac90bf8384dde1bcd3364036f0c44cc7

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/422a0f27ac90bf8384dde1bcd3364036f0c44cc7
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240228/4fcdbab8/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list