[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Jul 16 21:12:01 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
668e0550 by security tracker role at 2024-07-16T20:11:42+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,381 +1,465 @@
-CVE-2023-52886 [USB: core: Fix race by not overwriting udev->descriptor in hub_port_init()]
+CVE-2024-6621 (The RSS Aggregator \u2013 RSS Import, News Feeds, Feed to Post, and Au ...)
+	TODO: check
+CVE-2024-6579 (The Web and WooCommerce Addons for WPBakery Builder plugin for WordPre ...)
+	TODO: check
+CVE-2024-6570 (The Glossary plugin for WordPress is vulnerable to Full Path Disclosur ...)
+	TODO: check
+CVE-2024-6565 (The AForms \u2014 Form Builder for Price Calculator & Cost Estimation  ...)
+	TODO: check
+CVE-2024-6492 (Exposure of Sensitive Information in edge browser session proxy featur ...)
+	TODO: check
+CVE-2024-6457 (The HUSKY \u2013 Products Filter Professional for WooCommerce plugin f ...)
+	TODO: check
+CVE-2024-6435 (A privilege escalation vulnerability exists in the affected products w ...)
+	TODO: check
+CVE-2024-6326 (An exposure of sensitive information vulnerability exists in the Rockw ...)
+	TODO: check
+CVE-2024-6325 (The v6.40 release of Rockwell Automation FactoryTalk\xae Policy Manage ...)
+	TODO: check
+CVE-2024-6089 (An input validation vulnerability exists in the Rockwell Automation501 ...)
+	TODO: check
+CVE-2024-5852 (The WordPress File Upload plugin for WordPress is vulnerable to Direct ...)
+	TODO: check
+CVE-2024-40626 (Outline is an open source, collaborative document editor. A type confu ...)
+	TODO: check
+CVE-2024-40516 (An issue in H3C Technologies Co., Limited H3C Magic RC3000 RC3000V100R ...)
+	TODO: check
+CVE-2024-40515 (An issue in SHENZHEN TENDA TECHNOLOGY CO.,LTD Tenda AX2pro V16.03.29.4 ...)
+	TODO: check
+CVE-2024-40505 (**UNSUPPORTED WHEN ASSIGNED** Directory Traversal vulnerability in D-L ...)
+	TODO: check
+CVE-2024-40503 (An issue in Tenda AX12 v.16.03.49.18_cn+ allows a remote attacker to c ...)
+	TODO: check
+CVE-2024-40456 (ThinkSAAS v3.7.0 was discovered to contain a SQL injection vulnerabili ...)
+	TODO: check
+CVE-2024-40455 (An arbitrary file deletion vulnerability in ThinkSAAS v3.7 allows atta ...)
+	TODO: check
+CVE-2024-40425 (File Upload vulnerability in Nanjin Xingyuantu Technology Co Sparkshop ...)
+	TODO: check
+CVE-2024-40394 (Simple Library Management System Project Using PHP/MySQL v1.0 was disc ...)
+	TODO: check
+CVE-2024-40393 (Online Clinic Management System In PHP With Free Source code v1.0 was  ...)
+	TODO: check
+CVE-2024-40392 (SourceCodester Pharmacy/Medical Store Point of Sale System Using PHP/M ...)
+	TODO: check
+CVE-2024-40322 (An issue was discovered in JFinalCMS v.5.0.0. There is a SQL injection ...)
+	TODO: check
+CVE-2024-40130 (open5gs v2.6.4 is vulnerable to Buffer Overflow. via /lib/core/abts.c.)
+	TODO: check
+CVE-2024-40129 (Open5GS v2.6.4 is vulnerable to Buffer Overflow. via /lib/pfcp/context ...)
+	TODO: check
+CVE-2024-3779 (Denial of service vulnerability present shortly after product installa ...)
+	TODO: check
+CVE-2024-3587 (The Premium Portfolio Features for Phlox theme plugin for WordPress is ...)
+	TODO: check
+CVE-2024-3232 (A formula injection vulnerability exists in Tenable Identity Exposure  ...)
+	TODO: check
+CVE-2024-39908 (REXML is an XML toolkit for Ruby. The REXML gem before 3.3.1 has some  ...)
+	TODO: check
+CVE-2024-39887 (An SQL Injection vulnerability in Apache Superset exists due to improp ...)
+	TODO: check
+CVE-2024-39700 (JupyterLab extension template is a  `copier` template for JupyterLab e ...)
+	TODO: check
+CVE-2024-39036 (SeaCMS v12.9 is vulnerable to Arbitrary File Read via admin_safe.php.)
+	TODO: check
+CVE-2024-35338 (Tenda i29V1.0 V1.0.0.5 was discovered to contain a hardcoded password  ...)
+	TODO: check
+CVE-2024-33182 (Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buff ...)
+	TODO: check
+CVE-2024-33181 (Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buff ...)
+	TODO: check
+CVE-2024-33180 (Tenda AC18 V15.03.3.10_EN was discovered to contain a stack-based buff ...)
+	TODO: check
+CVE-2024-32861 (Under certain circumstances the Software House C\u25cfCURE 9000 Site S ...)
+	TODO: check
+CVE-2024-2691 (The WP Event Manager \u2013 Events Calendar, Registrations, Sell Ticke ...)
+	TODO: check
+CVE-2024-22442 (The vulnerability could be remotely exploited to bypass authentication ...)
+	TODO: check
+CVE-2024-21686 (This High severity Stored XSS vulnerability was introduced in versions ...)
+	TODO: check
+CVE-2024-1937 (The Brizy \u2013 Page Builder plugin for WordPress is vulnerable to un ...)
+	TODO: check
+CVE-2023-31456 (There is an SSRF vulnerability in the Fluid Topics platform that affec ...)
+	TODO: check
+CVE-2023-52886 (In the Linux kernel, the following vulnerability has been resolved:  U ...)
 	- linux 6.5.3-1
 	[bookworm] - linux 6.1.55-1
 	[bullseye] - linux 5.10.197-1
 	NOTE: https://git.kernel.org/linus/ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b (6.6-rc1)
-CVE-2022-48866 [HID: hid-thrustmaster: fix OOB read in thrustmaster_interrupts]
+CVE-2022-48866 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
 	- linux 5.16.18-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fc3ef2e3297b3c0e2006b5d7b3d66965e3392036 (5.17-rc8)
-CVE-2022-48865 [tipc: fix kernel panic when enabling bearer]
+CVE-2022-48865 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 5.16.18-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/be4977b847f5d5cedb64d50eaaf2218c3a55a3a3 (5.17-rc8)
-CVE-2022-48864 [vdpa/mlx5: add validation for VIRTIO_NET_CTRL_MQ_VQ_PAIRS_SET command]
+CVE-2022-48864 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 5.16.18-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ed0f849fc3a63ed2ddf5e72cdb1de3bdbbb0f8eb (5.17-rc8)
-CVE-2022-48863 [mISDN: Fix memory leak in dsp_pipeline_build()]
+CVE-2022-48863 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.16.18-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/c6a502c2299941c8326d029cfc8a3bc8a4607ad5 (5.17-rc8)
-CVE-2022-48862 [vhost: fix hung thread due to erroneous iotlb entries]
+CVE-2022-48862 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 5.16.18-1
 	NOTE: https://git.kernel.org/linus/e2ae38cf3d91837a493cb2093c87700ff3cbe667 (5.17-rc8)
-CVE-2022-48861 [vdpa: fix use-after-free on vp_vdpa_remove]
+CVE-2022-48861 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 5.16.18-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/eb057b44dbe35ae14527830236a92f51de8f9184 (5.17-rc8)
-CVE-2022-48860 [ethernet: Fix error handling in xemaclite_of_probe]
+CVE-2022-48860 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 5.16.18-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/b19ab4b38b06aae12442b2de95ccf58b5dc53584 (5.17-rc8)
-CVE-2022-48859 [net: marvell: prestera: Add missing of_node_put() in prestera_switch_set_base_mac_addr]
+CVE-2022-48859 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.18-1
 	NOTE: https://git.kernel.org/linus/c9ffa3e2bc451816ce0295e40063514fabf2bd36 (5.17-rc8)
-CVE-2022-48858 [net/mlx5: Fix a race on command flush flow]
+CVE-2022-48858 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.18-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/063bd355595428750803d8736a9bb7c8db67d42d (5.17-rc8)
-CVE-2022-48857 [NFC: port100: fix use-after-free in port100_send_complete]
+CVE-2022-48857 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
 	- linux 5.16.18-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/f80cfe2f26581f188429c12bd937eb905ad3ac7b (5.17-rc8)
-CVE-2022-48856 [gianfar: ethtool: Fix refcount leak in gfar_get_ts_info]
+CVE-2022-48856 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 5.16.18-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/2ac5b58e645c66932438bb021cb5b52097ce70b0 (5.17-rc8)
-CVE-2022-48855 [sctp: fix kernel-infoleak for SCTP sockets]
+CVE-2022-48855 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.16.18-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/633593a808980f82d251d0ca89730d8bb8b0220c (5.17-rc8)
-CVE-2022-48854 [net: arc_emac: Fix use after free in arc_mdio_probe()]
+CVE-2022-48854 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.18-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/bc0e610a6eb0d46e4123fafdbe5e6141d9fff3be (5.17-rc8)
-CVE-2022-48853 [swiotlb: fix info leak with DMA_FROM_DEVICE]
+CVE-2022-48853 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.16.18-1
 	[bullseye] - linux 5.10.113-1
 	NOTE: https://git.kernel.org/linus/ddbd89deb7d32b1fbb879f48d68fda1a8ac58e8e (5.17-rc6)
-CVE-2022-48852 [drm/vc4: hdmi: Unregister codec device on unbind]
+CVE-2022-48852 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.16.18-1
 	NOTE: https://git.kernel.org/linus/e40945ab7c7f966d0c37b7bd7b0596497dfe228d (5.17-rc6)
-CVE-2022-48851 [staging: gdm724x: fix use after free in gdm_lte_rx()]
+CVE-2022-48851 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.16.18-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/fc7f750dc9d102c1ed7bbe4591f991e770c99033 (5.17-rc8)
-CVE-2022-48850 [net-sysfs: add check for netdevice being present to speed_show]
+CVE-2022-48850 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.18-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/4224cfd7fb6523f7a9d1c8bb91bb5df1e38eb624 (5.17-rc6)
-CVE-2022-48849 [drm/amdgpu: bypass tiling flag check in virtual display case (v2)]
+CVE-2022-48849 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.16.18-1
 	NOTE: https://git.kernel.org/linus/e2b993302f40c4eb714ecf896dd9e1c5be7d4cd7 (5.17-rc6)
-CVE-2022-48848 [tracing/osnoise: Do not unregister events twice]
+CVE-2022-48848 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 5.16.18-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f0cfe17bcc1dd2f0872966b554a148e888833ee9 (5.17-rc8)
-CVE-2022-48847 [watch_queue: Fix filter limit check]
+CVE-2022-48847 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 5.16.18-1
 	[bullseye] - linux 5.10.106-1
 	NOTE: https://git.kernel.org/linus/c993ee0f9f81caf5767a50d1faeba39a0dc82af2 (5.17-rc8)
-CVE-2022-48846 [block: release rq qos structures for queue without disk]
+CVE-2022-48846 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.17.3-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/daaca3522a8e67c46e39ef09c1d542e866f85f3b (5.17)
-CVE-2022-48845 [MIPS: smp: fill in sibling and core maps earlier]
+CVE-2022-48845 (In the Linux kernel, the following vulnerability has been resolved:  M ...)
 	- linux 5.16.18-1
 	[bullseye] - linux 5.10.113-1
 	NOTE: https://git.kernel.org/linus/f2703def339c793674010cc9f01bfe4980231808 (5.17-rc7)
-CVE-2022-48844 [Bluetooth: hci_core: Fix leaking sent_cmd skb]
+CVE-2022-48844 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
 	- linux 5.16.18-1
 	NOTE: https://git.kernel.org/linus/dd3b1dc3dd050f1f47cd13e300732852414270f8 (5.17-rc7)
-CVE-2022-48843 [drm/vrr: Set VRR capable prop only if it is attached to connector]
+CVE-2022-48843 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.16.18-1
 	[bullseye] - linux 5.10.113-1
 	NOTE: https://git.kernel.org/linus/62929726ef0ec72cbbe9440c5d125d4278b99894 (5.17-rc7)
-CVE-2022-48842 [ice: Fix race condition during interface enslave]
+CVE-2022-48842 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.18-1
 	NOTE: https://git.kernel.org/linus/5cb1ebdbc4342b1c2ce89516e19808d64417bdbc (5.17-rc8)
-CVE-2022-48841 [ice: fix NULL pointer dereference in ice_update_vsi_tx_ring_stats()]
+CVE-2022-48841 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.17.3-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f153546913bada41a811722f2c6d17c3243a0333 (5.17)
-CVE-2022-48840 [iavf: Fix hang during reboot/shutdown]
+CVE-2022-48840 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.17.3-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b04683ff8f0823b869c219c78ba0d974bddea0b5 (5.17)
-CVE-2022-48839 [net/packet: fix slab-out-of-bounds access in packet_recvmsg()]
+CVE-2022-48839 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.17.3-1
 	[bullseye] - linux 5.10.113-1
 	NOTE: https://git.kernel.org/linus/c700525fcc06b05adfea78039de02628af79e07a (5.17)
-CVE-2022-48838 [usb: gadget: Fix use-after-free bug by not setting udc->dev.driver]
+CVE-2022-48838 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.17.3-1
 	[bullseye] - linux 5.10.113-1
 	NOTE: https://git.kernel.org/linus/16b1941eac2bd499f065a6739a40ce0011a3d740 (5.17)
-CVE-2022-48837 [usb: gadget: rndis: prevent integer overflow in rndis_set_response()]
+CVE-2022-48837 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.17.3-1
 	[bullseye] - linux 5.10.113-1
 	NOTE: https://git.kernel.org/linus/65f3324f4b6fed78b8761c3b74615ecf0ffa81fa (5.17)
-CVE-2022-48836 [Input: aiptek - properly check endpoint type]
+CVE-2022-48836 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
 	- linux 5.17.3-1
 	[bullseye] - linux 5.10.113-1
 	NOTE: https://git.kernel.org/linus/5600f6986628dde8881734090588474f54a540a8 (5.17)
-CVE-2022-48835 [scsi: mpt3sas: Page fault in reply q processing]
+CVE-2022-48835 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.17.3-1
 	[bullseye] - linux 5.10.113-1
 	NOTE: https://git.kernel.org/linus/69ad4ef868c1fc7609daa235dfa46d28ba7a3ba3 (5.17)
-CVE-2022-48834 [usb: usbtmc: Fix bug in pipe direction for control transfers]
+CVE-2022-48834 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.17.3-1
 	[bullseye] - linux 5.10.113-1
 	NOTE: https://git.kernel.org/linus/e9b667a82cdcfe21d590344447d65daed52b353b (5.17)
-CVE-2022-48833 [btrfs: skip reserved bytes warning on unmount after log cleanup failure]
+CVE-2022-48833 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.16.18-1
 	NOTE: https://git.kernel.org/linus/40cdc509877bacb438213b83c7541c5e24a1d9ec (5.17-rc3)
-CVE-2022-48832 [audit: don't deref the syscall args when checking the openat2 open_how::flags]
+CVE-2022-48832 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 5.16.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7a82f89de92aac5a244d3735b2bd162c1147620c (5.17-rc4)
-CVE-2022-48831 [ima: fix reference leak in asymmetric_verify()]
+CVE-2022-48831 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/926fd9f23b27ca6587492c3f58f4c7f4cd01dad5 (5.17-rc4)
-CVE-2022-48830 [can: isotp: fix potential CAN frame reception race in isotp_rcv()]
+CVE-2022-48830 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/7c759040c1dd03954f650f147ae7175476d51314 (5.17-rc4)
-CVE-2022-48829 [NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes]
+CVE-2022-48829 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/a648fdeb7c0e17177a2280344d015dba3fbe3314 (5.17-rc4)
-CVE-2022-48828 [NFSD: Fix ia_size underflow]
+CVE-2022-48828 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/e6faac3f58c7c4176b66f63def17a34232a17b0e (5.17-rc4)
-CVE-2022-48827 [NFSD: Fix the behavior of READ near OFFSET_MAX]
+CVE-2022-48827 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/0cb4d23ae08c48f6bf3c29a8e5c4a74b8388b960 (5.17-rc4)
-CVE-2022-48826 [drm/vc4: Fix deadlock on DSI device attach error]
+CVE-2022-48826 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.16.10-1
 	NOTE: https://git.kernel.org/linus/0a3d12ab5097b1d045e693412e6b366b7e82031b (5.17-rc2)
-CVE-2022-48825 [scsi: qedf: Add stag_work to all the vports]
+CVE-2022-48825 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/b70a99fd13282d7885f69bf1372e28b7506a1613 (5.17-rc2)
-CVE-2022-48824 [scsi: myrs: Fix crash in error case]
+CVE-2022-48824 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/4db09593af0b0b4d7d4805ebb3273df51d7cc30d (5.17-rc2)
-CVE-2022-48823 [scsi: qedf: Fix refcount issue when LOGO is received during TMF]
+CVE-2022-48823 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/5239ab63f17cee643bd4bf6addfedebaa7d4f41e (5.17-rc2)
-CVE-2022-48822 [usb: f_fs: Fix use-after-free for epfile]
+CVE-2022-48822 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/ebe2b1add1055b903e2acd86b290a85297edc0b3 (5.17-rc4)
-CVE-2022-48821 [misc: fastrpc: avoid double fput() on failed usercopy]
+CVE-2022-48821 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/46963e2e0629cb31c96b1d47ddd89dc3d8990b34 (5.17-rc4)
-CVE-2022-48820 [phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable()]
+CVE-2022-48820 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 5.16.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/cfc826c88a79e22ba5d8001556eb2c7efd8a01b6 (5.17-rc4)
-CVE-2022-48819 [tcp: take care of mixed splice()/sendmsg(MSG_ZEROCOPY) case]
+CVE-2022-48819 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 5.16.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f8d9d938514f46c4892aff6bfe32f425e84d81cc (5.17-rc4)
-CVE-2022-48818 [net: dsa: mv88e6xxx: don't use devres for mdiobus]
+CVE-2022-48818 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/f53a2ce893b2c7884ef94471f170839170a4eba0 (5.17-rc4)
-CVE-2022-48817 [net: dsa: ar9331: register the mdiobus under devres]
+CVE-2022-48817 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/50facd86e9fbc4b93fe02e5fe05776047f45dbfb (5.17-rc4)
-CVE-2022-48816 [SUNRPC: lock against ->sock changing during sysfs read]
+CVE-2022-48816 (In the Linux kernel, the following vulnerability has been resolved:  S ...)
 	- linux 5.16.10-1
 	NOTE: https://git.kernel.org/linus/b49ea673e119f59c71645e2f65b3ccad857c90ee (5.17-rc4)
-CVE-2022-48815 [net: dsa: bcm_sf2: don't use devres for mdiobus]
+CVE-2022-48815 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/08f1a20822349004bb9cc1b153ecb516e9f2889d (5.17-rc4)
-CVE-2022-48814 [net: dsa: seville: register the mdiobus under devres]
+CVE-2022-48814 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.10-1
 	NOTE: https://git.kernel.org/linus/bd488afc3b39e045ba71aab472233f2a78726e7b (5.17-rc4)
-CVE-2022-48813 [net: dsa: felix: don't use devres for mdiobus]
+CVE-2022-48813 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/209bdb7ec6a28c7cdf580a0a98afbc9fc3b98932 (5.17-rc4)
-CVE-2022-48812 [net: dsa: lantiq_gswip: don't use devres for mdiobus]
+CVE-2022-48812 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/0d120dfb5d67edc5bcd1804e167dba2b30809afd (5.17-rc4)
-CVE-2022-48811 [ibmvnic: don't release napi in __ibmvnic_open()]
+CVE-2022-48811 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.10-1
 	NOTE: https://git.kernel.org/linus/61772b0908c640d0309c40f7d41d062ca4e979fa (5.17-rc4)
-CVE-2022-48810 [ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path]
+CVE-2022-48810 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/5611a00697c8ecc5aad04392bea629e9d6a20463 (5.17-rc4)
-CVE-2022-48809 [net: fix a memleak when uncloning an skb dst and its metadata]
+CVE-2022-48809 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/9eeabdf17fa0ab75381045c867c370f4cc75a613 (5.17-rc4)
-CVE-2022-48808 [net: dsa: fix panic when DSA master device unbinds on shutdown]
+CVE-2022-48808 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ee534378f00561207656663d93907583958339ae (5.17-rc4)
-CVE-2022-48807 [ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler]
+CVE-2022-48807 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/bea1898f65b9b7096cb4e73e97c83b94718f1fa1 (5.17-rc4)
-CVE-2022-48806 [eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX]
+CVE-2022-48806 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/c0689e46be23160d925dca95dfc411f1a0462708 (5.17-rc4)
-CVE-2022-48805 [net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup]
+CVE-2022-48805 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/57bc3d3ae8c14df3ceb4e17d26ddf9eeab304581 (5.17-rc4)
-CVE-2022-48804 [vt_ioctl: fix array_index_nospec in vt_setactivate]
+CVE-2022-48804 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/61cc70d9e8ef5b042d4ed87994d20100ec8896d9 (5.17-rc4)
-CVE-2022-48803 [phy: ti: Fix missing sentinel for clk_div_table]
+CVE-2022-48803 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/6d1e6bcb31663ee83aaea1f171f3dbfe95dd4a69 (5.17-rc4)
-CVE-2022-48802 [fs/proc: task_mmu.c: don't read mapcount for migration entry]
+CVE-2022-48802 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/24d7275ce2791829953ed4e72f68277ceb2571c6 (5.17-rc4)
-CVE-2022-48801 [iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL]
+CVE-2022-48801 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c72ea20503610a4a7ba26c769357d31602769c01 (5.17-rc4)
-CVE-2022-48800 [mm: vmscan: remove deadlock due to throttling failing to make progress]
+CVE-2022-48800 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.16.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b485c6f1f9f54b81443efda5f3d8a5036ba2cd91 (5.17-rc4)
-CVE-2022-48799 [perf: Fix list corruption in perf_cgroup_switch()]
+CVE-2022-48799 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/5f4e5ce638e6a490b976ade4a40017b40abb2da0 (5.17-rc4)
-CVE-2022-48798 [s390/cio: verify the driver availability for path_event call]
+CVE-2022-48798 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.16.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/dd9cb842fa9d90653a9b48aba52f89c069f3bc50 (5.17-rc4)
-CVE-2022-48797 [mm: don't try to NUMA-migrate COW pages that have other uses]
+CVE-2022-48797 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.16.11-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/80d47f5de5e311cbc0d01ebb6ee684e8f4c196c6 (5.17-rc5)
-CVE-2022-48796 [iommu: Fix potential use-after-free during probe]
+CVE-2022-48796 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/b54240ad494300ff0994c4539a531727874381f4 (5.17-rc3)
-CVE-2022-48795 [parisc: Fix data TLB miss in sba_unmap_sg]
+CVE-2022-48795 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 5.16.11-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/b7d6f44a0fa716a82969725516dc0b16bc7cd514 (5.17-rc5)
-CVE-2022-48794 [net: ieee802154: at86rf230: Stop leaking skb's]
+CVE-2022-48794 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.11-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/e5ce576d45bf72fd0e3dc37eff897bfcc488f6a9 (5.17-rc3)
-CVE-2022-48793 [KVM: x86: nSVM: fix potential NULL derefernce on nested migration]
+CVE-2022-48793 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 5.16.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e1779c2714c3023e4629825762bcbc43a3b943df (5.17-rc5)
-CVE-2022-48792 [scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task]
+CVE-2022-48792 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.16.11-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/df7abcaa1246e2537ab4016077b5443bb3c09378 (5.17-rc3)
-CVE-2022-48791 [scsi: pm8001: Fix use-after-free for aborted TMF sas_task]
+CVE-2022-48791 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.16.11-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/61f162aa4381845acbdc7f2be4dfb694d027c018 (5.17-rc3)
-CVE-2022-48790 [nvme: fix a possible use-after-free in controller reset during load]
+CVE-2022-48790 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.11-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/0fa0f99fc84e41057cbdd2efbfe91c6b2f47dd9d (5.17-rc3)
-CVE-2022-48789 [nvme-tcp: fix possible use-after-free in transport error_recovery work]
+CVE-2022-48789 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.11-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/ff9fc7ebf5c06de1ef72a69f9b1ab40af8b07f9e (5.17-rc3)
-CVE-2022-48788 [nvme-rdma: fix possible use-after-free in transport error_recovery work]
+CVE-2022-48788 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.11-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/b6bb1722f34bbdbabed27acdceaf585d300c5fd2 (5.17-rc3)
-CVE-2022-48787 [iwlwifi: fix use-after-free]
+CVE-2022-48787 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.11-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/bea2662e7818e15d7607d17d57912ac984275d94 (5.17-rc5)
-CVE-2022-48786 [vsock: remove vsock from connected table when connect is interrupted by a signal]
+CVE-2022-48786 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 5.16.11-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/b9208492fcaecff8f43915529ae34b3bcb03877c (5.17-rc5)
-CVE-2022-48785 [ipv6: mcast: use rcu-safe version of ipv6_get_lladdr()]
+CVE-2022-48785 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.16.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/26394fc118d6115390bd5b3a0fb17096271da227 (5.17-rc5)
-CVE-2022-48784 [cfg80211: fix race in netlink owner interface destruction]
+CVE-2022-48784 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.16.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f0a6fd1527067da537e9c48390237488719948ed (5.17-rc5)
-CVE-2022-48783 [net: dsa: lantiq_gswip: fix use after free in gswip_remove()]
+CVE-2022-48783 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.11-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/8c6ae46150a453f8ae9a6cd49b45f354f478587d (5.17-rc5)
-CVE-2022-48782 [mctp: fix use after free]
+CVE-2022-48782 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.16.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7e5b6a5c8c44310784c88c1c198dde79f6402f7b (5.17-rc5)
-CVE-2022-48781 [crypto: af_alg - get rid of alg_memory_allocated]
+CVE-2022-48781 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.16.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/25206111512de994dfc914f5b2972a22aa904ef3 (5.17-rc5)
-CVE-2022-48780 [net/smc: Avoid overwriting the copies of clcsock callback functions]
+CVE-2022-48780 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1de9770d121ee9294794cca0e0be8fbfa0134ee8 (5.17-rc5)
-CVE-2022-48779 [net: mscc: ocelot: fix use-after-free in ocelot_vlan_del()]
+CVE-2022-48779 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ef57640575406f57f5b3393cf57f457b0ace837e (5.17-rc5)
-CVE-2022-48778 [mtd: rawnand: gpmi: don't leak PM reference in error path]
+CVE-2022-48778 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.16.11-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/9161f365c91614e5a3f5c6dcc44c3b1b33bc59c0 (5.17-rc5)
-CVE-2022-48777 [mtd: parsers: qcom: Fix kernel panic on skipped partition]
+CVE-2022-48777 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.16.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/65d003cca335cabc0160d3cd7daa689eaa9dd3cd (5.17-rc5)
-CVE-2022-48776 [mtd: parsers: qcom: Fix missing free for pparts in cleanup]
+CVE-2022-48776 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.16.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3dd8ba961b9356c4113b96541c752c73d98fef70 (5.17-rc5)
-CVE-2022-48775 [Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj]
+CVE-2022-48775 (In the Linux kernel, the following vulnerability has been resolved:  D ...)
 	- linux 5.16.11-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/8bc69f86328e87a0ffa79438430cc82f3aa6a194 (5.17-rc5)
-CVE-2022-48774 [dmaengine: ptdma: Fix the error handling path in pt_core_init()]
+CVE-2022-48774 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.16.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3c62fd3406e0b2277c76a6984d3979c7f3f1d129 (5.17-rc5)
-CVE-2022-48773 [xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create]
+CVE-2022-48773 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 5.16.11-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/a9c10b5b3b67b3750a10c8b089b2e05f5e176e33 (5.17-rc4)
-CVE-2021-47624 [net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change]
+CVE-2021-47624 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.16.10-1
 	NOTE: https://git.kernel.org/linus/776d794f28c95051bc70405a7b1fa40115658a18 (5.17-rc2)
-CVE-2021-47623 [powerpc/fixmap: Fix VM debug warning on unmap]
+CVE-2021-47623 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 5.16.10-1
 	[bullseye] - linux 5.10.103-1
 	NOTE: https://git.kernel.org/linus/aec982603aa8cc0a21143681feb5f60ecc69d718 (5.17-rc2)
-CVE-2021-47622 [scsi: ufs: Fix a deadlock in the error handler]
+CVE-2021-47622 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.16.11-1
 	NOTE: https://git.kernel.org/linus/945c3cca05d78351bba29fa65d93834cb7934c7b (5.17-rc1)
 CVE-2024-6780 (Improper permission control in the mobile application (com.android.ser ...)
@@ -821,15 +905,15 @@ CVE-2024-35773 (Cross-Site Request Forgery (CSRF) vulnerability in WPJohnny, zer
 CVE-2023-41093 (Use After Free vulnerability in Silicon Labs Bluetooth SDK on 32 bit,  ...)
 	NOT-FOR-US: Silicon Labs Bluetooth SDK
 CVE-2024-41006 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/0b9130247f3b6a1122478471ff0e014ea96bb735 (6.10-rc5)
 CVE-2024-41005 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/c2e6a872bde9912f1a7579639c5ca3adf1003916 (6.10-rc1)
 CVE-2024-41004 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/3572bd5689b0812b161b40279e39ca5b66d73e88 (6.10-rc5)
 CVE-2024-41003 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
@@ -838,13 +922,15 @@ CVE-2024-41003 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/92424801261d1564a0bb759da3cf3ccd69fdf5a2 (6.10-rc5)
 CVE-2024-41002 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/bba4250757b4ae1680fea435a358d8093f254094 (6.10-rc1)
 CVE-2024-41001 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/c4ce0ab27646f4206a9eb502d6fe45cb080e1cae (6.10-rc1)
 CVE-2024-41000 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/ccb326b5f9e623eb7f130fbbf2505ec0e2dcaff9 (6.10-rc1)
 CVE-2024-40999 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
@@ -857,19 +943,21 @@ CVE-2024-40997 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/cea04f3d9aeebda9d9c063c0dfa71e739c322c81 (6.10-rc1)
 CVE-2024-40996 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2bbe3e5a2f4ef69d13be54f1cf895b4658287080 (6.10-rc5)
 CVE-2024-40995 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/d864319871b05fadd153e0aede4811ca7008f5d6 (6.10-rc5)
 CVE-2024-40994 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/81d23d2a24012e448f651e007fac2cfd20a45ce0 (6.10-rc5)
 CVE-2024-40993 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/8ecd06277a7664f4ef018abae3abd3451d64e7a6 (6.10-rc5)
 CVE-2024-40992 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
@@ -883,19 +971,20 @@ CVE-2024-40991 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ba27e9d2207784da748b19170a2e56bd7770bd81 (6.10-rc5)
 CVE-2024-40990 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/36ab7ada64caf08f10ee5a114d39964d1f91e81d (6.10-rc5)
 CVE-2024-40989 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0d92e4a7ffd5c42b9fa864692f82476c0bf8bcc8 (6.10-rc5)
 CVE-2024-40988 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/a498df5421fd737d11bfd152428ba6b1c8538321 (6.10-rc5)
 CVE-2024-40987 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/f0d576f840153392d04b2d52cf3adab8f62e8cb6 (6.10-rc5)
 CVE-2024-40986 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
@@ -909,43 +998,44 @@ CVE-2024-40985 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f9ae848904289ddb16c7c9e4553ed4c64300de49 (6.10-rc5)
 CVE-2024-40984 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/a83e1385b780d41307433ddbc86e3c528db031f0 (6.10-rc5)
 CVE-2024-40983 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/2ebe8f840c7450ecbfca9d18ac92e9ce9155e269 (6.10-rc5)
 CVE-2024-40982 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/789c17185fb0f39560496c2beab9b57ce1d0cbe7 (6.10-rc1)
 CVE-2024-40981 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/40dc8ab605894acae1473e434944924a22cfaaa0 (6.10-rc1)
 CVE-2024-40980 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/f1e197a665c2148ebc25fe09c53689e60afea195 (6.10-rc1)
 CVE-2024-40979 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/303c017821d88ebad887814114d4e5966d320b28 (6.10-rc1)
 CVE-2024-40978 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/28027ec8e32ecbadcd67623edb290dad61e735b5 (6.10-rc1)
 CVE-2024-40977 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/ecf0b2b8a37c8464186620bef37812a117ff6366 (6.10-rc1)
 CVE-2024-40976 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/a421cc7a6a001b70415aa4f66024fa6178885a14 (6.10-rc1)
 CVE-2024-40975 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/3de0f2627ef849735f155c1818247f58404dddfe (6.10-rc1)
 CVE-2024-40974 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/ff2e185cf73df480ec69675936c4ee75a445c3e4 (6.10-rc1)
 CVE-2024-40973 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
@@ -955,23 +1045,26 @@ CVE-2024-40972 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/0a46ef234756dca04623b7591e8ebb3440622f0b (6.10-rc1)
 CVE-2024-40971 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/ac5eecf481c29942eb9a862e758c0c8b68090c33 (6.10-rc1)
 CVE-2024-40970 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/333e11bf47fa8d477db90e2900b1ed3c9ae9b697 (6.10-rc1)
 CVE-2024-40969 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/3bdb7f161697e2d5123b89fe1778ef17a44858e7 (6.10-rc1)
 CVE-2024-40968 (In the Linux kernel, the following vulnerability has been resolved:  M ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/29b83a64df3b42c88c0338696feb6fdcd7f1f3b7 (6.10-rc1)
 CVE-2024-40967 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/e533e4c62e9993e62e947ae9bbec34e4c7ae81c2 (6.10-rc1)
 CVE-2024-40966 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/6bd23e0c2bb6c65d4f5754d1456bc9a4427fc59b (6.10-rc1)
 CVE-2024-40965 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
@@ -983,7 +1076,7 @@ CVE-2024-40964 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6386682cdc8b41319c92fbbe421953e33a28840c (6.10-rc5)
 CVE-2024-40963 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/ce5cdd3b05216b704a704f466fb4c2dff3778caf (6.10-rc5)
 CVE-2024-40962 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
@@ -992,26 +1085,28 @@ CVE-2024-40962 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/cebae292e0c32a228e8f2219c270a7237be24a6a (6.10-rc5)
 CVE-2024-40961 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/2eab4543a2204092c3a7af81d7d6c506e59a03a6 (6.10-rc5)
 CVE-2024-40960 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/b86762dbe19a62e785c189f313cda5b989931f37 (6.10-rc5)
 CVE-2024-40959 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/d46401052c2d5614da8efea5788532f0401cb164 (6.10-rc5)
 CVE-2024-40958 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/ff960f9d3edbe08a736b5a224d91a305ccc946b0 (6.10-rc5)
 CVE-2024-40957 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9a3bc8d16e0aacd65c31aaf23a2bced3288a7779 (6.10-rc5)
 CVE-2024-40956 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e3215deca4520773cd2b155bed164c12365149a7 (6.10-rc5)
@@ -1021,10 +1116,12 @@ CVE-2024-40955 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/13df4d44a3aaabe61cd01d277b6ee23ead2a5206 (6.10-rc1)
 CVE-2024-40954 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6cd4a78d962bebbaf8beb7d2ead3f34120e3f7b2 (6.10-rc5)
 CVE-2024-40953 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/49f683b41f28918df3e51ddc0d928cb2e934ccdb (6.10-rc5)
 CVE-2024-40952 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
@@ -1048,10 +1145,12 @@ CVE-2024-40949 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9094b4a1c76cfe84b906cc152bab34d4ba26fa5c (6.10-rc5)
 CVE-2024-40948 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8bb592c2eca8fd2bc06db7d80b38da18da4a2f43 (6.10-rc5)
 CVE-2024-40947 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/9a95c5bfbf02a0a7f5983280fe284a0ff0836c34 (6.10-rc5)
 CVE-2024-40946
@@ -1066,30 +1165,34 @@ CVE-2024-40944 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/93c1800b3799f17375989b0daf76497dd3e80922 (6.10-rc3)
 CVE-2024-40943 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/952b023f06a24b2ad6ba67304c4c84d45bea2f18 (6.10-rc1)
 CVE-2024-40942 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/b7d7f11a291830fdf69d3301075dd0fb347ced84 (6.10-rc3)
 CVE-2024-40941 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/4bb95f4535489ed830cf9b34b0a891e384d1aee4 (6.10-rc3)
 CVE-2024-40940 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/229bedbf62b13af5aba6525ad10b62ad38d9ccb5 (6.10-rc3)
 CVE-2024-40939 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b0c9a26435413b81799047a7be53255640432547 (6.10-rc3)
 CVE-2024-40938 (In the Linux kernel, the following vulnerability has been resolved:  l ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/88da52ccd66e65f2e63a6c35c9dff55d448ef4dc (6.10-rc2)
 CVE-2024-40937 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6f4d93b78ade0a4c2cafd587f7b429ce95abb02e (6.10-rc4)
@@ -1099,11 +1202,12 @@ CVE-2024-40936 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/49ba7b515c4c0719b866d16f068e62d16a8a3dd1 (6.10-rc3)
 CVE-2024-40935 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/85e833cd7243bda7285492b0653c3abb1e2e757b (6.10-rc4)
 CVE-2024-40934 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/ce3af2ee95170b7d9e15fff6e500d67deab1e7b3 (6.10-rc3)
 CVE-2024-40933 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
@@ -1112,11 +1216,11 @@ CVE-2024-40933 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a23c14b062d8800a2192077d83273bbfe6c7552d (6.10-rc4)
 CVE-2024-40932 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/38e3825631b1f314b21e3ade00b5a4d737eb054e (6.10-rc4)
 CVE-2024-40931 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/8031b58c3a9b1db3ef68b3bd749fbee2e1e1aaa3 (6.10-rc4)
 CVE-2024-40930 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
@@ -1125,7 +1229,7 @@ CVE-2024-40930 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/4dc3a3893dae5a7f73e5809273aca0f1f3548d55 (6.10-rc3)
 CVE-2024-40929 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/60d62757df30b74bf397a2847a6db7385c6ee281 (6.10-rc3)
 CVE-2024-40928 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
@@ -1134,6 +1238,7 @@ CVE-2024-40928 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0dcc53abf58d572d34c5313de85f607cd33fc691 (6.10-rc3)
 CVE-2024-40927 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/5ceac4402f5d975e5a01c806438eb4e554771577 (6.10-rc4)
 CVE-2024-40926 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
@@ -1147,6 +1252,7 @@ CVE-2024-40925 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d0321c812d89c5910d8da8e4b10c891c6b96ff70 (6.10-rc4)
 CVE-2024-40924 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/43e2b37e2ab660c3565d4cff27922bc70e79c3f1 (6.10-rc2)
@@ -1161,14 +1267,17 @@ CVE-2024-40922 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/54559642b96116b45e4b5ca7fd9f7835b8561272 (6.10-rc4)
 CVE-2024-40921 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/36c92936e868601fa1f43da6758cf55805043509 (6.10-rc4)
 CVE-2024-40920 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/546ceb1dfdac866648ec959cbc71d9525bd73462 (6.10-rc4)
 CVE-2024-40919 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a9b9741854a9fe9df948af49ca5514e0ed0429df (6.10-rc4)
@@ -1181,28 +1290,33 @@ CVE-2024-40917 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e0eec24e2e199873f43df99ec39773ad3af2bff7 (6.10-rc4)
 CVE-2024-40916 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/799d4b392417ed6889030a5b2335ccb6dcf030ab (6.10-rc4)
 CVE-2024-40915 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/fb1cf0878328fe75d47f0aed0a65b30126fcefc4 (6.10-rc1)
 CVE-2024-40914 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fe6f86f4b40855a130a19aa589f9ba7f650423f4 (6.10-rc1)
 CVE-2024-40913 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/4b4391e77a6bf24cba2ef1590e113d9b73b11039 (6.10-rc4)
 CVE-2024-40912 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/44c06bbde6443de206b30f513100b5670b23fc5e (6.10-rc3)
 CVE-2024-40911 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/642f89daa34567d02f312d03e41523a894906dae (6.10-rc3)
 CVE-2024-40910 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/3c34fb0bd4a4237592c5ecb5b2e2531900c55774 (6.10-rc3)
 CVE-2024-40909 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
@@ -1211,6 +1325,7 @@ CVE-2024-40909 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2884dc7d08d98a89d8d65121524bb7533183a63a (6.10-rc3)
 CVE-2024-40908 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d0d1df8ba18abc57f28fb3bc053b2bf319367f2c (6.10-rc3)
@@ -1220,57 +1335,63 @@ CVE-2024-40907 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/491aee894a08bc9b8bb52e7363b9d4bc6403f363 (6.10-rc3)
 CVE-2024-40906 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c8b3f38d2dae0397944814d691a419c451f9906f (6.10-rc3)
 CVE-2024-40905 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/b01e1c030770ff3b4fe37fc7cc6bca03f594133f (6.10-rc3)
 CVE-2024-40904 (In the Linux kernel, the following vulnerability has been resolved:  U ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/22f00812862564b314784167a89f27b444f82a46 (6.10-rc4)
 CVE-2024-40903 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e7e921918d905544500ca7a95889f898121ba886 (6.10-rc4)
 CVE-2024-40902 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/7c55b78818cfb732680c4a72ab270cc2d2ee3d0f (6.10-rc4)
 CVE-2024-40901 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/4254dfeda82f20844299dca6c38cbffcfd499f41 (6.10-rc4)
 CVE-2024-40900 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0fc75c5940fa634d84e64c93bfc388e1274ed013 (6.10-rc4)
 CVE-2024-40899 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/de3e26f9e5b76fc628077578c001c4a51bf54d06 (6.10-rc4)
 CVE-2024-39510 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/da4a827416066191aafeeccee50a8836a826ba10 (6.10-rc4)
 CVE-2024-39509 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/4aa2dcfbad538adf7becd0034a3754e1bd01b2b5 (6.10-rc3)
 CVE-2024-39508 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/8a565304927fbd28c9f028c492b5c1714002cbab (6.10-rc1)
 CVE-2024-39507 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/12cda920212a49fa22d9e8b9492ac4ea013310a4 (6.10-rc4)
 CVE-2024-39506 (In the Linux kernel, the following vulnerability has been resolved:  l ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/c44711b78608c98a3e6b49ce91678cd0917d5349 (6.10-rc4)
 CVE-2024-39505 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/b880018edd3a577e50366338194dee9b899947e0 (6.10-rc4)
 CVE-2024-39504 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
@@ -1279,23 +1400,24 @@ CVE-2024-39504 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c4ab9da85b9df3692f861512fe6c9812f38b7471 (6.10-rc4)
 CVE-2024-39503 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/4e7aaa6b82d63e8ddcbfb56b4fd3d014ca586f10 (6.10-rc4)
 CVE-2024-39502 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/79f18a41dd056115d685f3b0a419c7cd40055e13 (6.10-rc4)
 CVE-2024-39501 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/c0a40097f0bc81deafc15f9195d1fb54595cd6d0 (6.10-rc4)
 CVE-2024-39500 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/4b4647add7d3c8530493f7247d11e257ee425bf0 (6.10-rc2)
 CVE-2024-39499 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/8003f00d895310d409b2bf9ef907c56b42a4e0f4 (6.10-rc1)
 CVE-2024-39498 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
@@ -1307,13 +1429,15 @@ CVE-2024-39497 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/39bc27bd688066a63e56f7f64ad34fae03fbe3b8 (6.10-rc2)
 CVE-2024-39496 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/0090d6e1b210551e63cf43958dc7a1ec942cdde9 (6.10-rc1)
 CVE-2024-39495 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/5c9c5d7f26acc2c669c1dcf57d1bb43ee99220ce (6.10-rc1)
 CVE-2024-39494 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/be84f32bb2c981ca670922e047cdde1488b233de (6.10-rc1)
 CVE-2024-6677 (Privilege escalation in uberAgent)
@@ -1481,7 +1605,7 @@ CVE-2024-6676 (A vulnerability has been found in witmy my-springsecurity-plus up
 	NOT-FOR-US: witmy my-springsecurity-plus
 CVE-2024-6666 (The WP ERP plugin for WordPress is vulnerable to SQL Injection via the ...)
 	NOT-FOR-US: WordPress plugin
-CVE-2024-6655
+CVE-2024-6655 (A flaw was found in the GTK library. Under certain conditions, it is p ...)
 	- gtk+3.0 3.24.43-1
 	[bookworm] - gtk+3.0 <no-dsa> (Minor issue)
 	[bullseye] - gtk+3.0 <no-dsa> (Minor issue)
@@ -2626,7 +2750,7 @@ CVE-2023-32737 (A vulnerability has been identified in SIMATIC STEP 7 Safety V18
 	NOT-FOR-US: Siemens
 CVE-2023-32735 (A vulnerability has been identified in SIMATIC STEP 7 Safety V16 (All  ...)
 	NOT-FOR-US: Siemens
-CVE-2024-6615 (Memory safety bugs present in Firefox 127. Some of these bugs showed e ...)
+CVE-2024-6615 (Memory safety bugs present in Firefox 127 and Thunderbird 127. Some of ...)
 	- firefox 128.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-29/#CVE-2024-6615
 CVE-2024-6614 (The frame iterator could get stuck in a loop when encountering certain ...)
@@ -2701,6 +2825,7 @@ CVE-2024-6600 (Due to large allocation checks in Angle for GLSL shaders being to
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-30/#CVE-2024-6600
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2024-31/#CVE-2024-6600
 CVE-2024-39487 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DSA-5731-1}
 	- linux 6.9.9-1
 	NOTE: https://git.kernel.org/linus/e271ff53807e8f2c628758290f0e499dbe51cb3d (6.10-rc7)
 CVE-2024-6365 (The Product Table by WBW plugin for WordPress is vulnerable to Remote  ...)
@@ -3167,7 +3292,7 @@ CVE-2024-39485 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9537a8425a7a0222999d5839a0b394b1e8834b4a (6.10-rc1)
 CVE-2024-39484 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/55c421b364482b61c4c45313a535e61ed5ae4ea3 (6.10-rc1)
 CVE-2024-39483 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
@@ -3211,6 +3336,7 @@ CVE-2024-39475 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.94-1
 	NOTE: https://git.kernel.org/linus/6ad959b6703e2c4c5d7af03b4cfd5ff608036339 (6.10-rc1)
 CVE-2024-39474 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8e0545c83d672750632f46e3f9ad95c48c91a0fc (6.10-rc1)
@@ -4966,7 +5092,7 @@ CVE-2024-39470 (In the Linux kernel, the following vulnerability has been resolv
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d4e9a968738bf66d3bb852dd5588d4c7afd6d7f4 (6.10-rc1)
 CVE-2024-39469 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/7373a51e7998b508af7136530f3a997b286ce81c (6.10-rc3)
 CVE-2024-39468 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
@@ -5016,6 +5142,7 @@ CVE-2024-39461 (In the Linux kernel, the following vulnerability has been resolv
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6dc445c1905096b2ed4db1a84570375b4e00cc0f (6.10-rc1)
 CVE-2024-39371 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
@@ -5029,6 +5156,7 @@ CVE-2024-39301 (In the Linux kernel, the following vulnerability has been resolv
 	[buster] - linux 4.19.316-1
 	NOTE: https://git.kernel.org/linus/25460d6f39024cc3b8241b14c7ccf0d6f11a736a (6.10-rc2)
 CVE-2024-39298 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
@@ -5071,7 +5199,7 @@ CVE-2024-37354 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.94-1
 	NOTE: https://git.kernel.org/linus/9d274c19a71b3a276949933859610721a453946b (6.10-rc3)
 CVE-2024-37078 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/a4ca369ca221bb7e06c725792ac107f0e48e82e7 (6.10-rc3)
 CVE-2022-48772 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
@@ -6421,7 +6549,7 @@ CVE-2024-1168 (The SEOPress \u2013 On-site SEO plugin for WordPress is vulnerabl
 CVE-2023-3204 (The Materialis theme for WordPress is vulnerable to limited arbitrary  ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2024-38619 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	NOTE: https://git.kernel.org/linus/16637fea001ab3c8df528a8995b3211906165a30 (6.10-rc4)
 CVE-2024-XXXX [RUSTSEC-2024-0344]
@@ -7228,7 +7356,7 @@ CVE-2024-37387 (Use of potentially dangerous function issue exists in Ricoh Stre
 CVE-2024-37124 (Use of potentially dangerous function issue exists in Ricoh Streamline ...)
 	NOT-FOR-US: Ricoh
 CVE-2024-36978 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.7-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/affc18fdc694190ca7575b9a86632a73b9fe043d (6.10-rc3)
@@ -7582,6 +7710,7 @@ CVE-2018-25103 (There exists use-after-free vulnerabilities in lighttpd <= 1.4.5
 	NOTE: https://github.com/lighttpd/lighttpd1.4/commit/d161f53de04bc826ce1bdaeb3dce2c72ca50a3f8 (lighttpd-1.4.50)
 	NOTE: https://github.com/lighttpd/lighttpd1.4/commit/df8e4f95614e476276a55e34da2aa8b00b1148e9 (lighttpd-1.4.51)
 CVE-2024-36973 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DSA-5731-1}
 	- linux 6.9.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
@@ -12322,7 +12451,7 @@ CVE-2024-36895 (In the Linux kernel, the following vulnerability has been resolv
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/650ae71c80749fc7cb8858c8049f532eaec64410 (6.9-rc7)
 CVE-2024-36894 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.8.11-1
 	NOTE: https://git.kernel.org/linus/24729b307eefcd7c476065cd7351c1a018082c19 (6.9-rc7)
 CVE-2024-36893 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
@@ -15331,6 +15460,7 @@ CVE-2023-52761 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.6.8-1
 	NOTE: https://git.kernel.org/linus/be97d0db5f44c0674480cb79ac6f5b0529b84c76 (6.7-rc1)
 CVE-2023-52760 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
+	{DSA-5731-1}
 	- linux 6.6.8-1
 	NOTE: https://git.kernel.org/linus/bdcb8aa434c6d36b5c215d02a9ef07551be25a37 (6.7-rc1)
 CVE-2023-52759 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
@@ -21499,6 +21629,7 @@ CVE-2024-1438 (Missing Authorization vulnerability in PressFore Rolo Slider.This
 CVE-2023-41651 (Missing Authorization vulnerability in Multi-column Tag Map.This issue ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2024-27397 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-5731-1}
 	- linux 6.7.7-1
 	NOTE: https://git.kernel.org/linus/7395dfacfff65e9938ac0889dafa1ab01e987d15 (6.8-rc4)
 CVE-2024-27396 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
@@ -48239,7 +48370,7 @@ CVE-2024-25744 (In the Linux kernel before 6.6.7, an untrusted VMM can trigger i
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b82a8dbd3d2f4563156f7150c6f2ecab6e960b30 (6.7-rc5)
 CVE-2024-25741 (printer_write in drivers/usb/gadget/function/f_printer.c in the Linux  ...)
-	{DSA-5730-1}
+	{DSA-5731-1 DSA-5730-1}
 	- linux 6.9.8-1
 	NOTE: https://www.spinics.net/lists/linux-usb/msg252167.html
 	NOTE: https://git.kernel.org/linus/e587a7633dfee8987a999cf253f7c52a8e09276c (6.10-rc6)
@@ -129751,8 +129882,8 @@ CVE-2022-45451 (Local privilege escalation due to insecure driver communication
 	NOT-FOR-US: Acronis
 CVE-2022-45450 (Sensitive information disclosure and manipulation due to improper auth ...)
 	NOT-FOR-US: Acronis
-CVE-2022-45449
-	RESERVED
+CVE-2022-45449 (Sensitive information disclosure due to excessive privileges assigned  ...)
+	TODO: check
 CVE-2022-45448 (M4 PDF plugin for Prestashop sites, in its 3.2.3 version and before, i ...)
 	NOT-FOR-US: M4 PDF plugin for Prestashop sites
 CVE-2022-45447 (M4 PDF plugin for Prestashop sites, in its 3.2.3 version and before, i ...)
@@ -363311,14 +363442,14 @@ CVE-2019-16643 (An issue was discovered in ZrLog 2.1.1. There is a Stored XSS vu
 	NOT-FOR-US: ZrLog
 CVE-2019-16642 (App\Mobile\Controller\ZhuantiController.class.php in TuziCMS 2.0.6 has ...)
 	NOT-FOR-US: TuziCMS
-CVE-2019-16641
-	RESERVED
-CVE-2019-16640
-	RESERVED
-CVE-2019-16639
-	RESERVED
-CVE-2019-16638
-	RESERVED
+CVE-2019-16641 (An issue was found on the Ruijie EG-2000 series gateway. There is a bu ...)
+	TODO: check
+CVE-2019-16640 (An issue was found in upload.php on the Ruijie EG-2000 series gateway. ...)
+	TODO: check
+CVE-2019-16639 (An issue was found on the Ruijie EG-2000 series gateway. There is a ne ...)
+	TODO: check
+CVE-2019-16638 (An issue was found on the Ruijie EG-2000 series gateway. An attacker c ...)
+	TODO: check
 CVE-2019-16637
 	RESERVED
 CVE-2019-16636



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/668e0550565e59f521f123887de55a21b59706f1

-- 
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/668e0550565e59f521f123887de55a21b59706f1
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240716/bcd67969/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list