[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Jul 29 21:13:02 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
817d4e1d by security tracker role at 2024-07-29T20:12:39+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,455 +1,545 @@
-CVE-2024-42098 [crypto: ecdh - explicitly zeroize private_key]
+CVE-2024-7200 (A vulnerability, which was classified as problematic, has been found i ...)
+	TODO: check
+CVE-2024-7199 (A vulnerability classified as critical was found in SourceCodester Com ...)
+	TODO: check
+CVE-2024-7198 (A vulnerability classified as critical has been found in SourceCodeste ...)
+	TODO: check
+CVE-2024-7197 (A vulnerability was found in SourceCodester Complaints Report Manageme ...)
+	TODO: check
+CVE-2024-7196 (A vulnerability was found in SourceCodester Complaints Report Manageme ...)
+	TODO: check
+CVE-2024-7195 (A vulnerability was found in itsourcecode Society Management System 1. ...)
+	TODO: check
+CVE-2024-7194 (A vulnerability was found in itsourcecode Society Management System 1. ...)
+	TODO: check
+CVE-2024-7193 (A vulnerability has been found in Mp3tag up to 3.26d and classified as ...)
+	TODO: check
+CVE-2024-7192 (A vulnerability, which was classified as critical, was found in itsour ...)
+	TODO: check
+CVE-2024-7191 (A vulnerability, which was classified as critical, has been found in i ...)
+	TODO: check
+CVE-2024-6984 (An issue was discovered in Juju that resulted in the leak of the sensi ...)
+	TODO: check
+CVE-2024-6881 (Stored XSS in M-Files Hubshare versions before 5.0.6.0 allows an authe ...)
+	TODO: check
+CVE-2024-6761
+	REJECTED
+CVE-2024-6748 (Zohocorp ManageEngineOpManager, OpManager Plus, OpManager MSP and RMM  ...)
+	TODO: check
+CVE-2024-6727 (A flaw in versions of Delphix Data Control Tower (DCT) prior to 19.0.0 ...)
+	TODO: check
+CVE-2024-6726 (Versions of Delphix Engine prior to Release 25.0.0.0 contain a flaw wh ...)
+	TODO: check
+CVE-2024-6578 (A stored cross-site scripting (XSS) vulnerability exists in aimhubio/a ...)
+	TODO: check
+CVE-2024-6576 (Improper Authentication vulnerability in Progress MOVEit Transfer (SFT ...)
+	TODO: check
+CVE-2024-6124 (Reflected XSS in M-Files Hubshare before version 5.0.6.0 allowsan atta ...)
+	TODO: check
+CVE-2024-4848
+	REJECTED
+CVE-2024-41881 (SDoP versions prior to 1.11 fails to handle appropriately some paramet ...)
+	TODO: check
+CVE-2024-41819 (Note Mark is a web-based Markdown notes app. A stored cross-site scrip ...)
+	TODO: check
+CVE-2024-41818 (fast-xml-parser is an open source, pure javascript xml parser. a ReDOS ...)
+	TODO: check
+CVE-2024-41817 (ImageMagick is a free and open-source software suite, used for editing ...)
+	TODO: check
+CVE-2024-41810 (Twisted is an event-based framework for internet applications, support ...)
+	TODO: check
+CVE-2024-41799 (tgstation-server is a production scale tool for BYOND server managemen ...)
+	TODO: check
+CVE-2024-41726 (Path traversal vulnerability exists in SKYSEA Client View Ver.3.013.00 ...)
+	TODO: check
+CVE-2024-41676 (Magento-lts is a long-term support alternative to Magento Community Ed ...)
+	TODO: check
+CVE-2024-41671 (Twisted is an event-based framework for internet applications, support ...)
+	TODO: check
+CVE-2024-41640 (Cross Site Scripting (XSS) vulnerability in AML Surety Eco up to 3.5 a ...)
+	TODO: check
+CVE-2024-41631 (Buffer Overflow vulnerability in host-host NEUQ_board v.1.0 allows a r ...)
+	TODO: check
+CVE-2024-41624 (Incorrect access control in Himalaya Xiaoya nano smart speaker rom_ver ...)
+	TODO: check
+CVE-2024-41143 (Origin validation error vulnerability exists in SKYSEA Client View Ver ...)
+	TODO: check
+CVE-2024-41139 (Incorrect privilege assignment vulnerability exists in SKYSEA Client V ...)
+	TODO: check
+CVE-2024-40576 (Cross Site Scripting vulnerability in Best House Rental Management Sys ...)
+	TODO: check
+CVE-2024-38529 (Admidio is a free, open source user management system for websites of  ...)
+	TODO: check
+CVE-2024-37906 (Admidio is a free, open source user management system for websites of  ...)
+	TODO: check
+CVE-2024-37859 (Cross Site Scripting vulnerability in Lost and Found Information Syste ...)
+	TODO: check
+CVE-2024-37858 (SQL Injection vulnerability in Lost and Found Information System 1.0 a ...)
+	TODO: check
+CVE-2024-37857 (SQL Injection vulnerability in Lost and Found Information System 1.0 a ...)
+	TODO: check
+CVE-2024-37856 (Cross Site Scripting vulnerability in Lost and Found Information Syste ...)
+	TODO: check
+CVE-2024-33365 (Buffer Overflow vulnerability in Tenda AC10 v4 US_AC10V4.0si_V16.03.10 ...)
+	TODO: check
+CVE-2024-28806 (An issue was discovered in Italtel i-MCS NFV 12.1.0-20211215. Remote u ...)
+	TODO: check
+CVE-2024-28805 (An issue was discovered in Italtel i-MCS NFV 12.1.0-20211215. There is ...)
+	TODO: check
+CVE-2024-28804 (An issue was discovered in Italtel i-MCS NFV 12.1.0-20211215. Stored C ...)
+	TODO: check
+CVE-2024-42098 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/73e5984e540a76a2ee1868b91590c922da8c24c9 (6.10-rc1)
-CVE-2024-42097 [ALSA: emux: improve patch ioctl data validation]
+CVE-2024-42097 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/89b32ccb12ae67e630c6453d778ec30a592a212f (6.10-rc1)
-CVE-2024-42096 [x86: stop playing stack games in profile_pc()]
+CVE-2024-42096 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/093d9603b60093a9aaae942db56107f6432a5dca (6.10-rc6)
-CVE-2024-42095 [serial: 8250_omap: Implementation of Errata i2310]
+CVE-2024-42095 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/9d141c1e615795eeb93cd35501ad144ee997a826 (6.10-rc6)
-CVE-2024-42094 [net/iucv: Avoid explicit cpumask var allocation on stack]
+CVE-2024-42094 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/be4e1304419c99a164b4c0e101c7c2a756b635b9 (6.10-rc1)
-CVE-2024-42093 [net/dpaa2: Avoid explicit cpumask var allocation on stack]
+CVE-2024-42093 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/d33fe1714a44ff540629b149d8fab4ac6967585c (6.10-rc1)
-CVE-2024-42092 [gpio: davinci: Validate the obtained number of IRQs]
+CVE-2024-42092 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/7aa9b96e9a73e4ec1771492d0527bd5fc5ef9164 (6.10-rc6)
-CVE-2024-42091 [drm/xe: Check pat.ops before dumping PAT settings]
+CVE-2024-42091 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.9.8-1
 	NOTE: https://git.kernel.org/linus/a918e771e6fbe1fa68932af5b0cdf473e23090cc (6.10-rc1)
-CVE-2024-42090 [pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER]
+CVE-2024-42090 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/adec57ff8e66aee632f3dd1f93787c13d112b7a1 (6.10-rc6)
-CVE-2024-42089 [ASoC: fsl-asoc-card: set priv->pdev before using it]
+CVE-2024-42089 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/90f3feb24172185f1832636264943e8b5e289245 (6.10-rc6)
-CVE-2024-42088 [ASoC: mediatek: mt8195: Add platform entry for ETDM1_OUT_BE dai link]
+CVE-2024-42088 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.9.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/282a4482e198e03781c152c88aac8aa382ef9a55 (6.10-rc6)
-CVE-2024-42087 [drm/panel: ilitek-ili9881c: Fix warning with GPIO controllers that sleep]
+CVE-2024-42087 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/ee7860cd8b5763017f8dc785c2851fecb7a0c565 (6.10-rc1)
-CVE-2024-42086 [iio: chemical: bme680: Fix overflows in compensate() functions]
+CVE-2024-42086 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/fdd478c3ae98c3f13628e110dce9b6cfb0d9b3c8 (6.10-rc6)
-CVE-2024-42085 [usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlock]
+CVE-2024-42085 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7838de15bb700c2898a7d741db9b1f3cbc86c136 (6.10-rc6)
-CVE-2024-42084 [ftruncate: pass a signed offset]
+CVE-2024-42084 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/4b8e88e563b5f666446d002ad0dc1e6e8e7102b0 (6.10-rc6)
-CVE-2024-42083 [ionic: fix kernel panic due to multi-buffer handling]
+CVE-2024-42083 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.9.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e3f02f32a05009a688a87f5799e049ed6b55bab5 (6.10-rc6)
-CVE-2024-42082 [xdp: Remove WARN() from __xdp_reg_mem_model()]
+CVE-2024-42082 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/7e9f79428372c6eab92271390851be34ab26bfb4 (6.10-rc6)
-CVE-2024-42081 [drm/xe/xe_devcoredump: Check NULL before assignments]
+CVE-2024-42081 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.9.8-1
 	NOTE: https://git.kernel.org/linus/b15e65349553b1689d15fbdebea874ca5ae2274a (6.10-rc1)
-CVE-2024-42080 [RDMA/restrack: Fix potential invalid address access]
+CVE-2024-42080 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/ca537a34775c103f7b14d7bbd976403f1d1525d8 (6.10-rc1)
-CVE-2024-42079 [gfs2: Fix NULL pointer dereference in gfs2_log_flush]
+CVE-2024-42079 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 6.9.8-1
 	NOTE: https://git.kernel.org/linus/35264909e9d1973ab9aaa2a1b07cda70f12bb828 (6.10-rc1)
-CVE-2024-42078 [nfsd: initialise nfsd_info.mutex early.]
+CVE-2024-42078 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e0011bca603c101f2a3c007bdb77f7006fa78fb1 (6.10-rc6)
-CVE-2024-42077 [ocfs2: fix DIO failure due to insufficient transaction credits]
+CVE-2024-42077 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/be346c1a6eeb49d8fda827d2a9522124c2f72f36 (6.10-rc6)
-CVE-2024-42076 [net: can: j1939: Initialize unused data in j1939_send_one()]
+CVE-2024-42076 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/b7cdf1dd5d2a2d8200efd98d1893684db48fe134 (6.10-rc6)
-CVE-2024-42075 [bpf: Fix remap of arena.]
+CVE-2024-42075 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.9.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b90d77e5fd784ada62ddd714d15ee2400c28e1cf (6.10-rc6)
-CVE-2024-42074 [ASoC: amd: acp: add a null check for chip_pdev structure]
+CVE-2024-42074 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.9.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/98d919dfee1cc402ca29d45da642852d7c9a2301 (6.10-rc6)
-CVE-2024-42073 [mlxsw: spectrum_buffers: Fix memory corruptions on Spectrum-4 systems]
+CVE-2024-42073 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c28947de2bed40217cf256c5d0d16880054fcf13 (6.10-rc6)
-CVE-2024-42072 [bpf: Fix may_goto with negative offset.]
+CVE-2024-42072 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.9.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2b2efe1937ca9f8815884bd4dcd5b32733025103 (6.10-rc6)
-CVE-2024-42071 [ionic: use dev_consume_skb_any outside of napi]
+CVE-2024-42071 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.9.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/84b767f9e34fdb143c09e66a2a20722fc2921821 (6.10-rc6)
-CVE-2024-42070 [netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers]
+CVE-2024-42070 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/7931d32955e09d0a11b1fe0b6aac1bfa061c005c (6.10-rc6)
-CVE-2024-42069 [net: mana: Fix possible double free in error handling path]
+CVE-2024-42069 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1864b8224195d0e43ddb92a8151f54f6562090cc (6.10-rc6)
-CVE-2024-42068 [bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro()]
+CVE-2024-42068 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/7d2cc63eca0c993c99d18893214abf8f85d566d8 (6.10-rc1)
-CVE-2024-42067 [bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro()]
+CVE-2024-42067 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.9.8-1
 	NOTE: https://git.kernel.org/linus/e60adf513275c3a38e5cb67f7fd12387e43a3ff5 (6.10-rc1)
-CVE-2024-42066 [drm/xe: Fix potential integer overflow in page size calculation]
+CVE-2024-42066 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.9.8-1
 	NOTE: https://git.kernel.org/linus/4f4fcafde343a54465f85a2909fc684918507a4b (6.10-rc1)
-CVE-2024-42065 [drm/xe: Add a NULL check in xe_ttm_stolen_mgr_init]
+CVE-2024-42065 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.9.8-1
 	NOTE: https://git.kernel.org/linus/a6eff8f9c7e844cb24ccb188ca24abcd59734e74 (6.10-rc1)
-CVE-2024-42064 [drm/amd/display: Skip pipe if the pipe idx not set properly]
+CVE-2024-42064 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.9.8-1
 	NOTE: https://git.kernel.org/linus/af114efe8d24b5711cfbedf7180f2ac1a296c24b (6.10-rc1)
-CVE-2024-42063 [bpf: Mark bpf prog stack with kmsan_unposion_memory in interpreter mode]
+CVE-2024-42063 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/e8742081db7d01f980c6161ae1e8a1dbc1e30979 (6.10-rc1)
-CVE-2024-41098 [ata: libata-core: Fix null pointer dereference on error]
+CVE-2024-41098 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 6.9.8-1
 	NOTE: https://git.kernel.org/linus/5d92c7c566dc76d96e0e19e481d926bbe6631c1e (6.10-rc6)
-CVE-2024-41097 [usb: atm: cxacru: fix endpoint checking in cxacru_bind()]
+CVE-2024-41097 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/2eabb655a968b862bc0c31629a09f0fbf3c80d51 (6.10-rc6)
-CVE-2024-41096 [PCI/MSI: Fix UAF in msi_capability_init]
+CVE-2024-41096 (In the Linux kernel, the following vulnerability has been resolved:  P ...)
 	- linux 6.9.8-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9eee5330656bf92f51cb1f09b2dc9f8cf975b3d1 (6.10-rc6)
-CVE-2024-41095 [drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes]
+CVE-2024-41095 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/66edf3fb331b6c55439b10f9862987b0916b3726 (6.10-rc6)
-CVE-2024-41094 [drm/fbdev-dma: Only set smem_start is enable per module option]
+CVE-2024-41094 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.9.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d92a7580392ad4681b1d4f9275d00b95375ebe01 (6.10-rc6)
-CVE-2024-41093 [drm/amdgpu: avoid using null object of framebuffer]
+CVE-2024-41093 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/bcfa48ff785bd121316592b131ff6531e3e696bb (6.10-rc6)
-CVE-2024-41092 [drm/i915/gt: Fix potential UAF by revoke of fence registers]
+CVE-2024-41092 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/996c3412a06578e9d779a16b9e79ace18125ab50 (6.10-rc6)
-CVE-2024-41089 [drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes]
+CVE-2024-41089 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/6d411c8ccc0137a612e0044489030a194ff5c843 (6.10-rc6)
-CVE-2024-41088 [can: mcp251xfd: fix infinite loop when xmit fails]
+CVE-2024-41088 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	NOTE: https://git.kernel.org/linus/d8fb63e46c884c898a38f061c2330f7729e75510 (6.10-rc6)
-CVE-2024-41087 [ata: libata-core: Fix double free on error]
+CVE-2024-41087 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/ab9e0c529eb7cafebdd31fe1644524e80a48b05d (6.10-rc6)
-CVE-2024-41086 [bcachefs: Fix sb_field_downgrade validation]
+CVE-2024-41086 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.9.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/692aa7a54b2b28d59f24b3bf8250837805484b99 (6.10-rc1)
-CVE-2024-41085 [cxl/mem: Fix no cxl_nvd during pmem region auto-assembling]
+CVE-2024-41085 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.9.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/84ec985944ef34a34a1605b93ce401aa8737af96 (6.10-rc7)
-CVE-2024-41084 [cxl/region: Avoid null pointer dereference in region lookup]
+CVE-2024-41084 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.9.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/285f2a08841432fc3e498b1cd00cce5216cdf189 (6.10-rc7)
-CVE-2024-41083 [netfs: Fix netfs_page_mkwrite() to check folio->mapping is valid]
+CVE-2024-41083 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a81c98bfa40c11f8ea79b5a9b3f5fda73bfbb4d2 (6.10-rc7)
-CVE-2024-41082 [nvme-fabrics: use reserved tag for reg read/write command]
+CVE-2024-41082 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/7dc3bfcb4c9cc58970fff6aaa48172cb224d85aa (6.10-rc3)
-CVE-2024-41081 [ila: block BH in ila_output()]
+CVE-2024-41081 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/cf28ff8e4c02e1ffa850755288ac954b6ff0db8c (6.10-rc3)
-CVE-2024-41080 [io_uring: fix possible deadlock in io_register_iowq_max_workers()]
+CVE-2024-41080 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/73254a297c2dd094abec7c9efee32455ae875bdf (6.10-rc3)
-CVE-2024-41079 [nvmet: always initialize cqe.result]
+CVE-2024-41079 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/cd0c1b8e045a8d2785342b385cb2684d9b48e426 (6.10-rc4)
-CVE-2024-41078 [btrfs: qgroup: fix quota root leak after quota disable failure]
+CVE-2024-41078 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/a7e4c6a3031c74078dba7fa36239d0f4fe476c53 (6.10-rc6)
-CVE-2024-41077 [null_blk: fix validation of block size]
+CVE-2024-41077 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/c462ecd659b5fce731f1d592285832fd6ad54053 (6.10-rc3)
-CVE-2024-41076 [NFSv4: Fix memory leak in nfs4_set_security_label]
+CVE-2024-41076 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/aad11473f8f4be3df86461081ce35ec5b145ba68 (6.10-rc4)
-CVE-2024-41075 [cachefiles: add consistency check for copen/cread]
+CVE-2024-41075 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/a26dc49df37e996876f50a0210039b2d211fdd6f (6.10-rc4)
-CVE-2024-41074 [cachefiles: Set object to close if ondemand_id < 0 in copen]
+CVE-2024-41074 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/4f8703fb3482f92edcfd31661857b16fec89c2c0 (6.10-rc4)
-CVE-2024-41073 [nvme: avoid double free special payload]
+CVE-2024-41073 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/e5d574ab37f5f2e7937405613d9b1a724811e5ad (6.10-rc4)
-CVE-2024-41072 [wifi: cfg80211: wext: add extra SIOCSIWSCAN data check]
+CVE-2024-41072 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/6ef09cdc5ba0f93826c09d810c141a8d103a80fc (6.10-rc5)
-CVE-2024-41071 [wifi: mac80211: Avoid address calculations via out of bounds array indexing]
+CVE-2024-41071 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/2663d0462eb32ae7c9b035300ab6b1523886c718 (6.10-rc5)
-CVE-2024-41070 [KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group()]
+CVE-2024-41070 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/a986fa57fd81a1430e00b3c6cf8a325d6f894a63 (6.10-rc5)
-CVE-2024-41069 [ASoC: topology: Fix references to freed memory]
+CVE-2024-41069 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/97ab304ecd95c0b1703ff8c8c3956dc6e2afe8e1 (6.10-rc6)
-CVE-2024-41068 [s390/sclp: Fix sclp_init() cleanup on failure]
+CVE-2024-41068 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/6434b33faaa063df500af355ee6c3942e0f8d982 (6.10-rc6)
-CVE-2024-41067 [btrfs: scrub: handle RST lookup error correctly]
+CVE-2024-41067 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/2c49908634a2b97b1c3abe0589be2739ac5e7fd5 (6.10-rc6)
-CVE-2024-41066 [ibmvnic: Add tx check to prevent skb leak]
+CVE-2024-41066 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/0983d288caf984de0202c66641577b739caad561 (6.10-rc6)
-CVE-2024-41065 [powerpc/pseries: Whitelist dtl slub object for copying to userspace]
+CVE-2024-41065 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/1a14150e1656f7a332a943154fc486504db4d586 (6.10-rc7)
-CVE-2024-41064 [powerpc/eeh: avoid possible crash when edev->pdev changes]
+CVE-2024-41064 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/a1216e62d039bf63a539bbe718536ec789a853dd (6.10-rc7)
-CVE-2024-41063 [Bluetooth: hci_core: cancel all works upon hci_unregister_dev()]
+CVE-2024-41063 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/0d151a103775dd9645c78c97f77d6e2a5298d913 (6.10-rc7)
-CVE-2024-41062 [bluetooth/l2cap: sync sock recv cb and release]
+CVE-2024-41062 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/89e856e124f9ae548572c56b1b70c2255705f8fe (6.10-rc7)
-CVE-2024-41061 [drm/amd/display: Fix array-index-out-of-bounds in dml2/FCLKChangeSupport]
+CVE-2024-41061 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/0ad4b4a2f6357c45fbe444ead1a929a0b4017d03 (6.10-rc7)
-CVE-2024-41060 [drm/radeon: check bo_va->bo is non-NULL before using it]
+CVE-2024-41060 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/6fb15dcbcf4f212930350eaee174bb60ed40a536 (6.10-rc7)
-CVE-2024-41059 [hfsplus: fix uninit-value in copy_name]
+CVE-2024-41059 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 6.9.11-1
 	NOTE: https://git.kernel.org/linus/0570730c16307a72f8241df12363f76600baf57d (6.10)
-CVE-2024-41058 [cachefiles: fix slab-use-after-free in fscache_withdraw_volume()]
+CVE-2024-41058 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.9.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/522018a0de6b6fcce60c04f86dfc5f0e4b6a1b36 (6.10)
-CVE-2024-41057 [cachefiles: fix slab-use-after-free in cachefiles_withdraw_cookie()]
+CVE-2024-41057 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.9.11-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5d8f805789072ea7fd39504694b7bd17e5f751c4 (6.10)
-CVE-2024-41056 [firmware: cs_dsp: Use strnlen() on name fields in V1 wmfw files]
+CVE-2024-41056 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.9.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/680e126ec0400f6daecf0510c5bb97a55779ff03 (6.10)
-CVE-2024-41055 [mm: prevent derefencing NULL ptr in pfn_section_valid()]
+CVE-2024-41055 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/82f0b6f041fad768c28b4ad05a683065412c226e (6.10)
-CVE-2024-41054 [scsi: ufs: core: Fix ufshcd_clear_cmd racing issue]
+CVE-2024-41054 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.9.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9307a998cb9846a2557fdca286997430bee36a2a (6.10)
-CVE-2024-41053 [scsi: ufs: core: Fix ufshcd_abort_one racing issue]
+CVE-2024-41053 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.9.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/74736103fb4123c71bf11fb7a6abe7c884c5269e (6.10)
-CVE-2024-41052 [vfio/pci: Init the count variable in collecting hot-reset devices]
+CVE-2024-41052 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 6.9.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5a88a3f67e37e39f933b38ebb4985ba5822e9eca (6.10)
-CVE-2024-41051 [cachefiles: wait for ondemand_object_worker to finish when dropping object]
+CVE-2024-41051 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.9.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/12e009d60852f7bce0afc373ca0b320f14150418 (6.10)
-CVE-2024-41050 [cachefiles: cyclic allocation of msg_id to avoid reuse]
+CVE-2024-41050 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.9.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/19f4f399091478c95947f6bd7ad61622300c30d9 (6.10)
-CVE-2024-41049 [filelock: fix potential use-after-free in posix_lock_inode]
+CVE-2024-41049 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/1b3ec4f7c03d4b07bad70697d7e2f4088d2cfe92 (6.10)
-CVE-2024-41048 [skmsg: Skip zero length skb in sk_msg_recvmsg]
+CVE-2024-41048 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/f0c18025693707ec344a70b6887f7450bf4c826b (6.10)
-CVE-2024-41047 [i40e: Fix XDP program unloading while removing the driver]
+CVE-2024-41047 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.9.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/01fc5142ae6b06b61ed51a624f2732d6525d8ea3 (6.10)
-CVE-2024-41046 [net: ethernet: lantiq_etop: fix double free in detach]
+CVE-2024-41046 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/e1533b6319ab9c3a97dad314dd88b3783bc41b69 (6.10)
-CVE-2024-41045 [bpf: Defer work in bpf_timer_cancel_and_free]
+CVE-2024-41045 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.9.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a6fcd19d7eac1335eb76bc16b6a66b7f574d1d69 (6.10)
-CVE-2024-41044 [ppp: reject claimed-as-LCP but actually malformed packets]
+CVE-2024-41044 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/f2aeb7306a898e1cbd03963d376f4b6656ca2b55 (6.10)
-CVE-2024-41043 [netfilter: nfnetlink_queue: drop bogus WARN_ON]
+CVE-2024-41043 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/631a4b3ddc7831b20442c59c28b0476d0704c9af (6.10)
-CVE-2024-41042 [netfilter: nf_tables: prefer nft_chain_validate]
+CVE-2024-41042 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/cff3bd012a9512ac5ed858d38e6ed65f6391008c (6.10)
-CVE-2024-41041 [udp: Set SOCK_RCU_FREE earlier in udp_lib_get_port().]
+CVE-2024-41041 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/5c0b485a8c6116516f33925b9ce5b6104a6eadfd (6.10)
-CVE-2024-41040 [net/sched: Fix UAF when resolving a clash]
+CVE-2024-41040 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/26488172b0292bed837b95a006a3f3431d1898c3 (6.10)
-CVE-2024-41039 [firmware: cs_dsp: Fix overflow checking of wmfw header]
+CVE-2024-41039 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.9.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3019b86bce16fbb5bc1964f3544d0ce7d0137278 (6.10)
-CVE-2024-41038 [firmware: cs_dsp: Prevent buffer overrun when processing V2 alg headers]
+CVE-2024-41038 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.9.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2163aff6bebbb752edf73f79700f5e2095f3559e (6.10)
-CVE-2024-41037 [ASoC: SOF: Intel: hda: fix null deref on system suspend entry]
+CVE-2024-41037 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.9.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9065693dcc13f287b9e4991f43aee70cf5538fdd (6.10)
-CVE-2024-41036 [net: ks8851: Fix deadlock with the SPI chip variant]
+CVE-2024-41036 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/0913ec336a6c0c4a2b296bd9f74f8e41c4c83c8c (6.10)
-CVE-2024-41035 [USB: core: Fix duplicate endpoint bug by clearing reserved bits in the descriptor]
+CVE-2024-41035 (In the Linux kernel, the following vulnerability has been resolved:  U ...)
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/a368ecde8a5055b627749b09c6218ef793043e47 (6.10)
-CVE-2024-41034 [nilfs2: fix kernel bug on rename operation of broken directory]
+CVE-2024-41034 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/a9e1ddc09ca55746079cc479aa3eb6411f0d99d4 (6.10)
-CVE-2024-41033 [cachestat: do not flush stats in recency check]
+CVE-2024-41033 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.9.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5a4d8944d6b1e1aaaa83ea42c116b520b4ed0394 (6.10)
-CVE-2024-41032 [mm: vmalloc: check if a hash-index is in cpu_possible_mask]
+CVE-2024-41032 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.9.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a34acf30b19bc4ee3ba2f1082756ea2604c19138 (6.10)
-CVE-2024-41031 [mm/filemap: skip to create PMD-sized page cache if needed]
+CVE-2024-41031 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.9.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3390916aca7af1893ed2ebcdfee1d6fdb65bb058 (6.10)
-CVE-2024-41030 [ksmbd: discard write access to the directory open]
+CVE-2024-41030 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/e2e33caa5dc2eae7bddf88b22ce11ec3d760e5cd (6.10)
-CVE-2024-41029 [nvmem: core: limit cell sysfs permissions to main attribute ones]
+CVE-2024-41029 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6bef98bafd82903a8d461463f9594f19f1fd6a85 (6.10)
-CVE-2024-41028 [platform/x86: toshiba_acpi: Fix array out-of-bounds access]
+CVE-2024-41028 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.9.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b6e02c6b0377d4339986e07aeb696c632cd392aa (6.10)
-CVE-2024-41027 [Fix userfaultfd_api to return EINVAL as expected]
+CVE-2024-41027 (In the Linux kernel, the following vulnerability has been resolved:  F ...)
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/1723f04caacb32cadc4e063725d836a0c4450694 (6.10)
-CVE-2024-41026 [mmc: davinci_mmc: Prevent transmitted data size from exceeding sgm's length]
+CVE-2024-41026 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.9.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/16198eef11c1929374381d7f6271b4bf6aa44615 (6.10)
-CVE-2024-41025 [misc: fastrpc: Fix memory leak in audio daemon attach operation]
+CVE-2024-41025 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.9.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ad0bd973a033003ca578c42a760d1dc77aeea15e (6.10)
-CVE-2024-41024 [misc: fastrpc: Restrict untrusted app to attach to privileged PD]
+CVE-2024-41024 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.9.10-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/bab2f5e8fd5d2f759db26b78d9db57412888f187 (6.10)
-CVE-2024-41023 [sched/deadline: Fix task_struct reference leak]
+CVE-2024-41023 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.9.10-1
 	NOTE: https://git.kernel.org/linus/b58652db66c910c2245f5bee7deca41c12d707b9 (6.10)
-CVE-2024-41022 [drm/amdgpu: Fix signedness bug in sdma_v4_0_process_trap_irq()]
+CVE-2024-41022 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.9.12-1
 	NOTE: https://git.kernel.org/linus/6769a23697f17f9bf9365ca8ed62fe37e361a05a (6.11-rc1)
-CVE-2024-41021 [s390/mm: Fix VM_FAULT_HWPOISON handling in do_exception()]
+CVE-2024-41021 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.9.12-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/df39038cd89525d465c2c8827eb64116873f141a (6.11-rc1)
-CVE-2024-41020 [filelock: Fix fcntl/close race recovery compat path]
+CVE-2024-41020 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.9.12-1
 	NOTE: https://git.kernel.org/linus/f8138f2ad2f745b9a1c696a05b749eabe44337ea (6.11-rc1)
-CVE-2023-52887 [net: can: j1939: enhanced error handling for tightly received RTS messages in xtp_rx_rts_session_new]
+CVE-2023-52887 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.98-1
 	[bullseye] - linux 5.10.221-1
@@ -122410,7 +122500,7 @@ CVE-2022-48187
 CVE-2022-48186 (A certificate validation vulnerability exists in the Baiying Android a ...)
 	NOT-FOR-US: Baiying Android application
 CVE-2022-48185
-	RESERVED
+	REJECTED
 CVE-2022-48184
 	RESERVED
 CVE-2022-48183 (A vulnerability was reported in ThinkPad T14s Gen 3 and X13 Gen3 that  ...)
@@ -132454,7 +132544,7 @@ CVE-2022-4040
 CVE-2022-4039 (A flaw was found in Red Hat Single Sign-On for OpenShift container ima ...)
 	NOT-FOR-US: Keycloak
 CVE-2022-4038
-	RESERVED
+	REJECTED
 CVE-2022-4037 (An issue has been discovered in GitLab CE/EE affecting all versions be ...)
 	- gitlab 15.10.8+ds1-2
 CVE-2022-45459 (Sensitive information disclosure due to insecure registry permissions. ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/817d4e1dde9baa29833bf52130d0fed9d5000a40

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/817d4e1dde9baa29833bf52130d0fed9d5000a40
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240729/35017791/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list