[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue May 21 21:13:07 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
7aa6eab1 by security tracker role at 2024-05-21T20:12:46+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,1778 +1,1898 @@
-CVE-2023-52879 [tracing: Have trace_event_file have ref counters]
+CVE-2024-4988 (The mobile application (com.transsion.videocallenhancer) interface has ...)
+	TODO: check
+CVE-2024-4876 (The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress  ...)
+	TODO: check
+CVE-2024-4875 (The HT Mega \u2013 Absolute Addons For Elementor plugin for WordPress  ...)
+	TODO: check
+CVE-2024-4700 (The WP Table Builder \u2013 WordPress Table Plugin plugin for WordPres ...)
+	TODO: check
+CVE-2024-4695 (The Move Addons for Elementor plugin for WordPress is vulnerable to St ...)
+	TODO: check
+CVE-2024-4619 (The Elementor Website Builder \u2013 More than Just a Page Builder plu ...)
+	TODO: check
+CVE-2024-4566 (The ShopLentor plugin for WordPress is vulnerable to unauthorized modi ...)
+	TODO: check
+CVE-2024-4553 (The WP Shortcodes Plugin \u2014 Shortcodes Ultimate plugin for WordPre ...)
+	TODO: check
+CVE-2024-4452 (The ElementsKit Pro plugin for WordPress is vulnerable to Stored Cross ...)
+	TODO: check
+CVE-2024-4435 (When storing unbounded types in a BTreeMap, a node is represented as a ...)
+	TODO: check
+CVE-2024-4420 (There exists a Denial of service vulnerability in Tink-cc in versions  ...)
+	TODO: check
+CVE-2024-4361 (The Page Builder by SiteOrigin plugin for WordPress is vulnerable to S ...)
+	TODO: check
+CVE-2024-4154 (In lunary-ai/lunary version 1.2.2, an incorrect synchronization vulner ...)
+	TODO: check
+CVE-2024-3345 (The ShopLentor plugin for WordPress is vulnerable to Stored Cross-Site ...)
+	TODO: check
+CVE-2024-3268 (The YouTube Video Gallery by YouTube Showcase \u2013 Video Gallery Plu ...)
+	TODO: check
+CVE-2024-36052 (RARLAB WinRAR before 7.00, on Windows, allows attackers to spoof the s ...)
+	TODO: check
+CVE-2024-36039 (PyMySQL through 1.1.0 allows SQL injection if used with untrusted JSON ...)
+	TODO: check
+CVE-2024-35386 (An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a den ...)
+	TODO: check
+CVE-2024-35385 (An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a den ...)
+	TODO: check
+CVE-2024-35384 (An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a den ...)
+	TODO: check
+CVE-2024-35361 (MTab Bookmark v1.9.5 has an SQL injection vulnerability in /LinkStore/ ...)
+	TODO: check
+CVE-2024-35218 (Umbraco CMS is an ASP.NET CMS used by more than 730.000 websites. Stor ...)
+	TODO: check
+CVE-2024-35180 (OMERO.web provides a web based client and plugin infrastructure. There ...)
+	TODO: check
+CVE-2024-35061 (NASA AIT-Core v2.5.2 was discovered to use unencrypted channels to exc ...)
+	TODO: check
+CVE-2024-35060 (An issue in the YAML Python library of NASA AIT-Core v2.5.2 allows att ...)
+	TODO: check
+CVE-2024-35059 (An issue in the Pickle Python library of NASA AIT-Core v2.5.2 allows a ...)
+	TODO: check
+CVE-2024-35058 (An issue in the API wait function of NASA AIT-Core v2.5.2 allows attac ...)
+	TODO: check
+CVE-2024-35057 (An issue in NASA AIT-Core v2.5.2 allows attackers to execute arbitrary ...)
+	TODO: check
+CVE-2024-35056 (NASA AIT-Core v2.5.2 was discovered to contain multiple SQL injection  ...)
+	TODO: check
+CVE-2024-34274 (OpenBD 20210306203917-6cbe797 is vulnerable to Deserialization of Untr ...)
+	TODO: check
+CVE-2024-34240 (QDOCS Smart School 7.0.0 is vulnerable to Cross Site Scripting (XSS) r ...)
+	TODO: check
+CVE-2024-34071 (Umbraco is an ASP.NET CMS used by more than 730.000 websites. Umbraco  ...)
+	TODO: check
+CVE-2024-33529 (ILIAS 7 before 7.30 and ILIAS 8 before 8.11 as well as ILIAS 9.0 allow ...)
+	TODO: check
+CVE-2024-33528 (A Stored Cross-site Scripting (XSS) vulnerability in ILIAS 7 before 7. ...)
+	TODO: check
+CVE-2024-33527 (A Stored Cross-site Scripting (XSS) vulnerability in the "Import of Us ...)
+	TODO: check
+CVE-2024-33526 (A Stored Cross-site Scripting (XSS) vulnerability in the "Import of us ...)
+	TODO: check
+CVE-2024-33525 (A Stored Cross-site Scripting (XSS) vulnerability in the "Import of or ...)
+	TODO: check
+CVE-2024-31989 (Argo CD is a declarative, GitOps continuous delivery tool for Kubernet ...)
+	TODO: check
+CVE-2024-31847 (An issue was discovered in Italtel Embrace 1.6.4. A stored cross-site  ...)
+	TODO: check
+CVE-2024-31845 (An issue was discovered in Italtel Embrace 1.6.4. The product does not ...)
+	TODO: check
+CVE-2024-31844 (An issue was discovered in Italtel Embrace 1.6.4. The server does not  ...)
+	TODO: check
+CVE-2024-31840 (An issue was discovered in Italtel Embrace 1.6.4. The web application  ...)
+	TODO: check
+CVE-2024-31757 (An issue in TeraByte Unlimited Image for Windows v.3.64.0.0 and before ...)
+	TODO: check
+CVE-2024-31756 (An issue in MarvinTest Solutions Hardware Access Driver v.5.0.3.0 and  ...)
+	TODO: check
+CVE-2024-27130 (A buffer copy without checking size of input vulnerability has been re ...)
+	TODO: check
+CVE-2024-27129 (A buffer copy without checking size of input vulnerability has been re ...)
+	TODO: check
+CVE-2024-27128 (A buffer copy without checking size of input vulnerability has been re ...)
+	TODO: check
+CVE-2024-27127 (Adouble free vulnerabilityhas been reported to affect several QNAP ope ...)
+	TODO: check
+CVE-2024-25724 (In RTI Connext Professional 5.3.1 through 6.1.0 before 6.1.1, a buffer ...)
+	TODO: check
+CVE-2024-22275 (The vCenter Server contains a partial file read vulnerability.A malici ...)
+	TODO: check
+CVE-2024-22274 (The vCenter Server contains an authenticated remote code execution vul ...)
+	TODO: check
+CVE-2024-22273 (The storage controllers on VMware ESXi, Workstation, and Fusion have o ...)
+	TODO: check
+CVE-2024-21902 (An incorrect permission assignment for critical resource vulnerability ...)
+	TODO: check
+CVE-2024-1721 (Improper Verification of Cryptographic Signature vulnerability in HYPR ...)
+	TODO: check
+CVE-2023-3943 (Stack-based Buffer Overflow vulnerability in ZkTeco-based OEM devices  ...)
+	TODO: check
+CVE-2023-3942 (An 'SQL Injection' vulnerability, due to improper neutralization of sp ...)
+	TODO: check
+CVE-2023-3941 (Relative Path Traversal vulnerability in ZkTeco-based OEM devices allo ...)
+	TODO: check
+CVE-2023-3940 (Relative Path Traversal vulnerability in ZkTeco-based OEM devices allo ...)
+	TODO: check
+CVE-2023-3939 (Improper Neutralization of Special Elements used in an OS Command ('OS ...)
+	TODO: check
+CVE-2023-3938 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2023-52879 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/bb32500fb9b78215e4ef6ee8b4345c5f5d7eafb4 (6.7-rc1)
-CVE-2023-52878 [can: dev: can_put_echo_skb(): don't crash kernel if can_priv::echo_skb is accessed out of bounds]
+CVE-2023-52878 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/6411959c10fe917288cbb1038886999148560057 (6.7-rc1)
-CVE-2023-52877 [usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm()]
+CVE-2023-52877 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/4987daf86c152ff882d51572d154ad12e4ff3a4b (6.7-rc1)
-CVE-2023-52876 [clk: mediatek: clk-mt7629-eth: Add check for mtk_alloc_clk_data]
+CVE-2023-52876 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0884393c63cc9a1772f7121a6645ba7bd76feeb9 (6.7-rc1)
-CVE-2023-52875 [clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_data]
+CVE-2023-52875 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/0d6e24b422a2166a9297a8286ff2e6ab9a5e8cd3 (6.7-rc1)
-CVE-2023-52874 [x86/tdx: Zero out the missing RSI in TDX_HYPERCALL macro]
+CVE-2023-52874 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 6.6.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5d092b66119d774853cc9308522620299048a662 (6.7-rc1)
-CVE-2023-52873 [clk: mediatek: clk-mt6779: Add check for mtk_alloc_clk_data]
+CVE-2023-52873 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1f57f78fbacf630430bf954e5a84caafdfea30c0 (6.7-rc1)
-CVE-2023-52872 [tty: n_gsm: fix race condition in status line change on dead connections]
+CVE-2023-52872 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3a75b205de43365f80a33b98ec9289785da56243 (6.7-rc1)
-CVE-2023-52871 [soc: qcom: llcc: Handle a second device without data corruption]
+CVE-2023-52871 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	NOTE: https://git.kernel.org/linus/f1a1bc8775b26345aba2be278118999e7f661d3d (6.7-rc1)
-CVE-2023-52870 [clk: mediatek: clk-mt6765: Add check for mtk_alloc_clk_data]
+CVE-2023-52870 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b82681042724924ae3ba0f2f2eeec217fa31e830 (6.7-rc1)
-CVE-2023-52869 [pstore/platform: Add check for kstrdup]
+CVE-2023-52869 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a19d48f7c5d57c0f0405a7d4334d1d38fe9d3c1c (6.7-rc1)
-CVE-2023-52868 [thermal: core: prevent potential string overflow]
+CVE-2023-52868 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/c99626092efca3061b387043d4a7399bf75fbdd5 (6.7-rc1)
-CVE-2023-52867 [drm/radeon: possible buffer overflow]
+CVE-2023-52867 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/dd05484f99d16715a88eedfca363828ef9a4c2d4 (6.7-rc1)
-CVE-2023-52866 [HID: uclogic: Fix user-memory-access bug in uclogic_params_ugee_v2_init_event_hooks()]
+CVE-2023-52866 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
 	- linux 6.6.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/91cfe0bbaa1c434d4271eb6e1d7aaa1fe8d121f6 (6.7-rc1)
-CVE-2023-52865 [clk: mediatek: clk-mt6797: Add check for mtk_alloc_clk_data]
+CVE-2023-52865 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/606f6366a35a3329545e38129804d65ef26ed7d2 (6.7-rc1)
-CVE-2023-52864 [platform/x86: wmi: Fix opening of char device]
+CVE-2023-52864 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/eba9ac7abab91c8f6d351460239108bef5e7a0b6 (6.7-rc1)
-CVE-2023-52863 [hwmon: (axi-fan-control) Fix possible NULL pointer dereference]
+CVE-2023-52863 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2a5b3370a1d9750eca325292e291c8c7cb8cf2e0 (6.7-rc1)
-CVE-2023-52862 [drm/amd/display: Fix null pointer dereference in error message]
+CVE-2023-52862 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0c3601a2fbfb265ce283651480e30c8e60459112 (6.7-rc1)
-CVE-2023-52861 [drm: bridge: it66121: Fix invalid connector dereference]
+CVE-2023-52861 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d0375f6858c4ff7244b62b02eb5e93428e1916cd (6.7-rc1)
-CVE-2023-52860 [drivers/perf: hisi: use cpuhp_state_remove_instance_nocalls() for hisi_hns3_pmu uninit process]
+CVE-2023-52860 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/50b560783f7f71790bcf70e9e9855155fb0af8c1 (6.7-rc1)
-CVE-2023-52859 [perf: hisi: Fix use-after-free when register pmu fails]
+CVE-2023-52859 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b805cafc604bfdb671fae7347a57f51154afa735 (6.7-rc1)
-CVE-2023-52858 [clk: mediatek: clk-mt7629: Add check for mtk_alloc_clk_data]
+CVE-2023-52858 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2befa515c1bb6cdd33c262b909d93d1973a219aa (6.7-rc1)
-CVE-2023-52857 [drm/mediatek: Fix coverity issue with unintentional integer overflow]
+CVE-2023-52857 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b0b0d811eac6b4c52cb9ad632fa6384cf48869e7 (6.7-rc1)
-CVE-2023-52856 [drm/bridge: lt8912b: Fix crash on bridge detach]
+CVE-2023-52856 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/44283993144a03af9df31934d6c32bbd42d1a347 (6.7-rc1)
-CVE-2023-52855 [usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency]
+CVE-2023-52855 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/ef307bc6ef04e8c1ea843231db58e3afaafa9fa6 (6.7-rc1)
-CVE-2023-52854 [padata: Fix refcnt handling in padata_free_shell()]
+CVE-2023-52854 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	NOTE: https://git.kernel.org/linus/7ddc21e317b360c3444de3023bcc83b85fabae2f (6.7-rc1)
-CVE-2023-52853 [hid: cp2112: Fix duplicate workqueue initialization]
+CVE-2023-52853 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/e3c2d2d144c082dd71596953193adf9891491f42 (6.7-rc1)
-CVE-2023-52852 [f2fs: compress: fix to avoid use-after-free on dic]
+CVE-2023-52852 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b0327c84e91a0f4f0abced8cb83ec86a7083f086 (6.7-rc1)
-CVE-2023-52851 [IB/mlx5: Fix init stage error handling to avoid double free of same QP and UAF]
+CVE-2023-52851 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2ef422f063b74adcc4a4a9004b0a87bb55e0a836 (6.7-rc1)
-CVE-2023-52850 [media: hantro: Check whether reset op is defined before use]
+CVE-2023-52850 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/88d4b23a629ebd34f682f770cb6c2116c851f7b8 (6.7-rc1)
-CVE-2023-52849 [cxl/mem: Fix shutdown order]
+CVE-2023-52849 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/88d3917f82ed4215a2154432c26de1480a61b209 (6.7-rc1)
-CVE-2023-52848 [f2fs: fix to drop meta_inode's page cache in f2fs_put_super()]
+CVE-2023-52848 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.6.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a4639380bbe66172df329f8b54aa7d2e943f0f64 (6.7-rc1)
-CVE-2023-52847 [media: bttv: fix use after free error due to btv->timeout timer]
+CVE-2023-52847 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/bd5b50b329e850d467e7bcc07b2b6bde3752fbda (6.7-rc1)
-CVE-2023-52846 [hsr: Prevent use after free in prp_create_tagged_frame()]
+CVE-2023-52846 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d (6.7-rc1)
-CVE-2023-52845 [tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING]
+CVE-2023-52845 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/19b3f72a41a8751e26bffc093bb7e1cef29ad579 (6.7-rc1)
-CVE-2023-52844 [media: vidtv: psi: Add check for kstrdup]
+CVE-2023-52844 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/76a2c5df6ca8bd8ada45e953b8c72b746f42918d (6.7-rc1)
-CVE-2023-52843 [llc: verify mac len before reading mac header]
+CVE-2023-52843 (In the Linux kernel, the following vulnerability has been resolved:  l ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/7b3ba18703a63f6fd487183b9262b08e5632da1b (6.7-rc1)
-CVE-2023-52842 [virtio/vsock: Fix uninit-value in virtio_transport_recv_pkt()]
+CVE-2023-52842 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/34c4effacfc329aeca5635a69fd9e0f6c90b4101 (6.7-rc1)
-CVE-2023-52841 [media: vidtv: mux: Add check and kfree for kstrdup]
+CVE-2023-52841 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1fd6eb12642e0c32692924ff359c07de4b781d78 (6.7-rc1)
-CVE-2023-52840 [Input: synaptics-rmi4 - fix use after free in rmi_unregister_function()]
+CVE-2023-52840 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/eb988e46da2e4eae89f5337e047ce372fe33d5b1 (6.7-rc1)
-CVE-2023-52839 [drivers: perf: Do not broadcast to other cpus when starting a counter]
+CVE-2023-52839 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/61e3d993c8bd3e80f8f1363ed5e04f88ab531b72 (6.7-rc1)
-CVE-2023-52838 [fbdev: imsttfb: fix a resource leak in probe]
+CVE-2023-52838 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/aba6ab57a910ad4b940c2024d15f2cdbf5b7f76b (6.7-rc1)
-CVE-2023-52837 [nbd: fix uaf in nbd_open]
+CVE-2023-52837 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/327462725b0f759f093788dfbcb2f1fd132f956b (6.7-rc1)
-CVE-2023-52836 [locking/ww_mutex/test: Fix potential workqueue corruption]
+CVE-2023-52836 (In the Linux kernel, the following vulnerability has been resolved:  l ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/bccdd808902f8c677317cec47c306e42b93b849e (6.7-rc1)
-CVE-2023-52835 [perf/core: Bail out early if the request AUX area is out of bound]
+CVE-2023-52835 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/54aee5f15b83437f23b2b2469bcf21bdd9823916 (6.7-rc1)
-CVE-2023-52834 [atl1c: Work around the DMA RX overflow issue]
+CVE-2023-52834 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/86565682e9053e5deb128193ea9e88531bbae9cf (6.7-rc1)
-CVE-2023-52833 [Bluetooth: btusb: Add date->evt_skb is NULL check]
+CVE-2023-52833 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	NOTE: https://git.kernel.org/linus/624820f7c8826dd010e8b1963303c145f99816e9 (6.7-rc1)
-CVE-2023-52832 [wifi: mac80211: don't return unset power in ieee80211_get_tx_power()]
+CVE-2023-52832 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/e160ab85166e77347d0cbe5149045cb25e83937f (6.7-rc1)
-CVE-2023-52831 [cpu/hotplug: Don't offline the last non-isolated CPU]
+CVE-2023-52831 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/38685e2a0476127db766f81b1c06019ddc4c9ffa (6.7-rc1)
-CVE-2023-52830 [Bluetooth: Fix double free in hci_conn_cleanup]
+CVE-2023-52830 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/a85fb91e3d728bdfc80833167e8162cce8bc7004 (6.7-rc1)
-CVE-2023-52829 [wifi: ath12k: fix possible out-of-bound write in ath12k_wmi_ext_hal_reg_caps()]
+CVE-2023-52829 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.6.8-1
 	NOTE: https://git.kernel.org/linus/b302dce3d9edea5b93d1902a541684a967f3c63c (6.7-rc1)
-CVE-2023-52828 [bpf: Detect IP == ksym.end as part of BPF program]
+CVE-2023-52828 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	NOTE: https://git.kernel.org/linus/66d9111f3517f85ef2af0337ece02683ce0faf21 (6.7-rc1)
-CVE-2023-52827 [wifi: ath12k: fix possible out-of-bound read in ath12k_htt_pull_ppdu_stats()]
+CVE-2023-52827 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.6.8-1
 	NOTE: https://git.kernel.org/linus/1bc44a505a229bb1dd4957e11aa594edeea3690e (6.7-rc1)
-CVE-2023-52826 [drm/panel/panel-tpo-tpg110: fix a possible null pointer dereference]
+CVE-2023-52826 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	NOTE: https://git.kernel.org/linus/f22def5970c423ea7f87d5247bd0ef91416b0658 (6.7-rc1)
-CVE-2023-52825 [drm/amdkfd: Fix a race condition of vram buffer unref in svm code]
+CVE-2023-52825 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/709c348261618da7ed89d6c303e2ceb9e453ba74 (6.7-rc1)
-CVE-2023-52824 [kernel: watch_queue: copy user-array safely]
+CVE-2023-52824 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/ca0776571d3163bd03b3e8c9e3da936abfaecbf6 (6.7-rc1)
-CVE-2023-52823 [kernel: kexec: copy user-array safely]
+CVE-2023-52823 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/569c8d82f95eb5993c84fb61a649a9c4ddd208b3 (6.7-rc1)
-CVE-2023-52822 [drm: vmwgfx_surface.c: copy user-array safely]
+CVE-2023-52822 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/06ab64a0d836ac430c5f94669710a78aa43942cb (6.7-rc1)
-CVE-2023-52821 [drm/panel: fix a possible null pointer dereference]
+CVE-2023-52821 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	NOTE: https://git.kernel.org/linus/924e5814d1f84e6fa5cb19c6eceb69f066225229 (6.7-rc1)
-CVE-2023-52820 [drm_lease.c: copy user-array safely]
+CVE-2023-52820 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/f37d63e219c39199a59b8b8a211412ff27192830 (6.7-rc1)
-CVE-2023-52819 [drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga]
+CVE-2023-52819 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/0f0e59075b5c22f1e871fbd508d6e4f495048356 (6.7-rc1)
-CVE-2023-52818 [drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7]
+CVE-2023-52818 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/760efbca74a405dc439a013a5efaa9fadc95a8c3 (6.7-rc1)
-CVE-2023-52817 [drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL]
+CVE-2023-52817 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/5104fdf50d326db2c1a994f8b35dcd46e63ae4ad (6.7-rc1)
-CVE-2023-52816 [drm/amdkfd: Fix shift out-of-bounds issue]
+CVE-2023-52816 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/282c1d793076c2edac6c3db51b7e8ed2b41d60a5 (6.7-rc1)
-CVE-2023-52815 [drm/amdgpu/vkms: fix a possible null pointer dereference]
+CVE-2023-52815 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/cd90511557fdfb394bb4ac4c3b539b007383914c (6.7-rc1)
-CVE-2023-52814 [drm/amdgpu: Fix potential null pointer derefernce]
+CVE-2023-52814 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	NOTE: https://git.kernel.org/linus/80285ae1ec8717b597b20de38866c29d84d321a1 (6.7-rc1)
-CVE-2023-52813 [crypto: pcrypt - Fix hungtask for PADATA_RESET]
+CVE-2023-52813 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/8f4f68e788c3a7a696546291258bfa5fdb215523 (6.7-rc1)
-CVE-2023-52812 [drm/amd: check num of link levels when update pcie param]
+CVE-2023-52812 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	NOTE: https://git.kernel.org/linus/406e8845356d18bdf3d3a23b347faf67706472ec (6.7-rc1)
-CVE-2023-52811 [scsi: ibmvfc: Remove BUG_ON in the case of an empty event pool]
+CVE-2023-52811 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/b39f2d10b86d0af353ea339e5815820026bca48f (6.7-rc1)
-CVE-2023-52810 [fs/jfs: Add check for negative db_l2nbperpage]
+CVE-2023-52810 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/525b861a008143048535011f3816d407940f4bfa (6.7-rc1)
-CVE-2023-52809 [scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()]
+CVE-2023-52809 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f (6.7-rc1)
-CVE-2023-52808 [scsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs]
+CVE-2023-52808 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/6de426f9276c448e2db7238911c97fb157cb23be (6.7-rc1)
-CVE-2023-52807 [net: hns3: fix out-of-bounds access may occur when coalesce info is read via debugfs]
+CVE-2023-52807 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/53aba458f23846112c0d44239580ff59bc5c36c3 (6.7-rc2)
-CVE-2023-52806 [ALSA: hda: Fix possible null-ptr-deref when assigning a stream]
+CVE-2023-52806 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/f93dc90c2e8ed664985e366aa6459ac83cdab236 (6.7-rc1)
-CVE-2023-52805 [jfs: fix array-index-out-of-bounds in diAlloc]
+CVE-2023-52805 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/05d9ea1ceb62a55af6727a69269a4fd310edf483 (6.7-rc1)
-CVE-2023-52804 [fs/jfs: Add validity check for db_maxag and db_agpref]
+CVE-2023-52804 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/64933ab7b04881c6c18b21ff206c12278341c72e (6.7-rc1)
-CVE-2023-52803 [SUNRPC: Fix RPC client cleaned up the freed pipefs dentries]
+CVE-2023-52803 (In the Linux kernel, the following vulnerability has been resolved:  S ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	NOTE: https://git.kernel.org/linus/bfca5fb4e97c46503ddfc582335917b0cc228264 (6.7-rc1)
-CVE-2023-52802 [iio: adc: stm32-adc: harden against NULL pointer deref in stm32_adc_probe()]
+CVE-2023-52802 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/3a23b384e7e3d64d5587ad10729a34d4f761517e (6.7-rc1)
-CVE-2023-52801 [iommufd: Fix missing update of domains_itree after splitting iopt_area]
+CVE-2023-52801 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.6.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e7250ab7ca4998fe026f2149805b03e09dc32498 (6.7-rc1)
-CVE-2023-52800 [wifi: ath11k: fix htt pktlog locking]
+CVE-2023-52800 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3f77c7d605b29df277d77e9ee75d96e7ad145d2d (6.7-rc1)
-CVE-2023-52799 [jfs: fix array-index-out-of-bounds in dbFindLeaf]
+CVE-2023-52799 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/22cad8bc1d36547cdae0eef316c47d917ce3147c (6.7-rc1)
-CVE-2023-52798 [wifi: ath11k: fix dfs radar event locking]
+CVE-2023-52798 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3b6c14833165f689cc5928574ebafe52bbce5f1e (6.7-rc1)
-CVE-2023-52797 [drivers: perf: Check find_first_bit() return value]
+CVE-2023-52797 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c6e316ac05532febb0c966fa9b55f5258ed037be (6.7-rc1)
-CVE-2023-52796 [ipvlan: add ipvlan_route_v6_outbound() helper]
+CVE-2023-52796 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/18f039428c7df183b09c69ebf10ffd4e521035d2 (6.7-rc2)
-CVE-2023-52795 [vhost-vdpa: fix use after free in vhost_vdpa_probe()]
+CVE-2023-52795 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e07754e0a1ea2d63fb29574253d1fd7405607343 (6.7-rc2)
-CVE-2023-52794 [thermal: intel: powerclamp: fix mismatch in get function for max_idle]
+CVE-2023-52794 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.6.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fae633cfb729da2771b5433f6b84ae7e8b4aa5f7 (6.7-rc1)
-CVE-2023-52793 [samples/bpf: syscall_tp_user: Fix array out-of-bound access]
+CVE-2023-52793 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.6.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9220c3ef6fefbf18f24aeedb1142a642b3de0596 (6.7-rc1)
-CVE-2023-52792 [cxl/region: Do not try to cleanup after cxl_region_setup_targets() fails]
+CVE-2023-52792 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0718588c7aaa7a1510b4de972370535b61dddd0d (6.7-rc1)
-CVE-2023-52791 [i2c: core: Run atomic i2c xfer when !preemptible]
+CVE-2023-52791 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/aa49c90894d06e18a1ee7c095edbd2f37c232d02 (6.7-rc1)
-CVE-2023-52790 [swiotlb: fix out-of-bounds TLB allocations with CONFIG_SWIOTLB_DYNAMIC]
+CVE-2023-52790 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.6.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/53c87e846e335e3c18044c397cc35178163d7827 (6.7-rc1)
-CVE-2023-52789 [tty: vcc: Add check for kstrdup() in vcc_probe()]
+CVE-2023-52789 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/d81ffb87aaa75f842cd7aa57091810353755b3e6 (6.7-rc1)
-CVE-2023-52788 [i915/perf: Fix NULL deref bugs with drm_dbg() calls]
+CVE-2023-52788 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/471aa951bf1206d3c10d0daa67005b8e4db4ff83 (6.7-rc1)
-CVE-2023-52787 [blk-mq: make sure active queue usage is held for bio_integrity_prep()]
+CVE-2023-52787 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.76-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b0077e269f6c152e807fdac90b58caf012cdbaab (6.7-rc2)
-CVE-2023-52786 [ext4: fix racy may inline data check in dio write]
+CVE-2023-52786 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.6.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ce56d21355cd6f6937aca32f1f44ca749d1e4808 (6.7-rc1)
-CVE-2023-52785 [scsi: ufs: core: Fix racing issue between ufshcd_mcq_abort() and ISR]
+CVE-2023-52785 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.6.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/27900d7119c464b43cd9eac69c85884d17bae240 (6.7-rc2)
-CVE-2023-52784 [bonding: stop the device in bond_setup_by_slave()]
+CVE-2023-52784 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	NOTE: https://git.kernel.org/linus/3cffa2ddc4d3fcf70cde361236f5a614f81a09b2 (6.7-rc2)
-CVE-2023-52783 [net: wangxun: fix kernel panic due to null pointer]
+CVE-2023-52783 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.6.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8ba2c459668cfe2aaacc5ebcd35b4b9ef8643013 (6.7-rc3)
-CVE-2023-52782 [net/mlx5e: Track xmit submission to PTP WQ after populating metadata map]
+CVE-2023-52782 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.6.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7e3f3ba97e6cc6fce5bf62df2ca06c8e59040167 (6.7-rc2)
-CVE-2023-52781 [usb: config: fix iteration issue in 'usb_get_bos_descriptor()']
+CVE-2023-52781 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.66-1
 	[bullseye] - linux 5.10.205-1
 	NOTE: https://git.kernel.org/linus/974bba5c118f4c2baf00de0356e3e4f7928b4cbc (6.7-rc3)
-CVE-2023-52780 [net: mvneta: fix calls to page_pool_get_stats]
+CVE-2023-52780 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ca8add922f9c7f6e2e3c71039da8e0dcc64b87ed (6.7-rc2)
-CVE-2023-52779 [fs: Pass AT_GETATTR_NOSEC flag to getattr interface function]
+CVE-2023-52779 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.6.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8a924db2d7b5eb69ba08b1a0af46e9f1359a9bdf (6.7-rc3)
-CVE-2023-52778 [mptcp: deal with large GSO size]
+CVE-2023-52778 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9fce92f050f448a0d1ddd9083ef967d9930f1e52 (6.7-rc2)
-CVE-2023-52777 [wifi: ath11k: fix gtk offload status event locking]
+CVE-2023-52777 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1dea3c0720a146bd7193969f2847ccfed5be2221 (6.7-rc1)
-CVE-2023-52776 [wifi: ath12k: fix dfs-radar and temperature event locking]
+CVE-2023-52776 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.6.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/69bd216e049349886405b1c87a55dce3d35d1ba7 (6.7-rc1)
-CVE-2023-52775 [net/smc: avoid data corruption caused by decline]
+CVE-2023-52775 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.66-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e6d71b437abc2f249e3b6a1ae1a7228e09c6e563 (6.7-rc3)
-CVE-2023-52774 [s390/dasd: protect device queue against concurrent access]
+CVE-2023-52774 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.66-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/db46cd1e0426f52999d50fa72cfa97fa39952885 (6.7-rc3)
-CVE-2023-52773 [drm/amd/display: fix a NULL pointer dereference in amdgpu_dm_i2c_xfer()]
+CVE-2023-52773 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b71f4ade1b8900d30c661d6c27f87c35214c398c (6.7-rc2)
-CVE-2023-52772 [af_unix: fix use-after-free in unix_stream_read_actor()]
+CVE-2023-52772 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/4b7b492615cf3017190f55444f7016812b66611d (6.7-rc2)
-CVE-2023-52771 [cxl/port: Fix delete_endpoint() vs parent unregistration race]
+CVE-2023-52771 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.6.8-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8d2ad999ca3c64cb08cf6a58d227b9d9e746d708 (6.7-rc1)
-CVE-2023-52770 [f2fs: split initial and dynamic conditions for extent_cache]
+CVE-2023-52770 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.6.8-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f803982190f0265fd36cf84670aa6daefc2b0768 (6.7-rc1)
-CVE-2023-52769 [wifi: ath12k: fix htt mlo-offset event locking]
+CVE-2023-52769 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.6.8-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6afc57ea315e0f660b1f870a681737bb7b71faef (6.7-rc1)
-CVE-2023-52768 [wifi: wilc1000: use vmm_table as array in wilc struct]
+CVE-2023-52768 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/05ac1a198a63ad66bf5ae8b7321407c102d40ef3 (6.7-rc1)
-CVE-2023-52767 [tls: fix NULL deref on tls_sw_splice_eof() with empty record]
+CVE-2023-52767 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.82-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/53f2cb491b500897a619ff6abd72f565933760f0 (6.7-rc3)
-CVE-2023-52766 [i3c: mipi-i3c-hci: Fix out of bounds access in hci_dma_irq_handler]
+CVE-2023-52766 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/45a832f989e520095429589d5b01b0c65da9b574 (6.7-rc1)
-CVE-2023-52765 [mfd: qcom-spmi-pmic: Fix revid implementation]
+CVE-2023-52765 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7b439aaa62fee474a0d84d67a25f4984467e7b95 (6.7-rc1)
-CVE-2023-52764 [media: gspca: cpia1: shift-out-of-bounds in set_flicker]
+CVE-2023-52764 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/099be1822d1f095433f4b08af9cc9d6308ec1953 (6.7-rc1)
-CVE-2023-52763 [i3c: master: mipi-i3c-hci: Fix a kernel panic for accessing DAT_data.]
+CVE-2023-52763 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/b53e9758a31c683fc8615df930262192ed5f034b (6.7-rc1)
-CVE-2023-52762 [virtio-blk: fix implicit overflow on virtio_max_dma_size]
+CVE-2023-52762 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/fafb51a67fb883eb2dde352539df939a251851be (6.7-rc1)
-CVE-2023-52761 [riscv: VMAP_STACK overflow detection thread-safe]
+CVE-2023-52761 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 6.6.8-1
 	NOTE: https://git.kernel.org/linus/be97d0db5f44c0674480cb79ac6f5b0529b84c76 (6.7-rc1)
-CVE-2023-52760 [gfs2: Fix slab-use-after-free in gfs2_qd_dealloc]
+CVE-2023-52760 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 6.6.8-1
 	NOTE: https://git.kernel.org/linus/bdcb8aa434c6d36b5c215d02a9ef07551be25a37 (6.7-rc1)
-CVE-2023-52759 [gfs2: ignore negated quota changes]
+CVE-2023-52759 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/4c6a08125f2249531ec01783a5f4317d7342add5 (6.7-rc1)
-CVE-2023-52758 [i2c: dev: copy userspace array safely]
+CVE-2023-52758 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/cc9c54232f04aef3a5d7f64a0ece7df00f1aaa3d (6.7-rc1)
-CVE-2023-52757 [smb: client: fix potential deadlock when releasing mids]
+CVE-2023-52757 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/e6322fd177c6885a21dd4609dc5e5c973d1a2eb7 (6.7-rc1)
-CVE-2023-52756 [pwm: Fix double shift bug]
+CVE-2023-52756 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/d27abbfd4888d79dd24baf50e774631046ac4732 (6.7-rc1)
-CVE-2023-52755 [ksmbd: fix slab out of bounds write in smb_inherit_dacl()]
+CVE-2023-52755 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/eebff19acaa35820cb09ce2ccb3d21bee2156ffb (6.7-rc1)
-CVE-2023-52754 [media: imon: fix access to invalid resource for the second interface]
+CVE-2023-52754 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	NOTE: https://git.kernel.org/linus/a1766a4fd83befa0b34d932d532e7ebb7fab1fa7 (6.7-rc1)
-CVE-2023-52753 [drm/amd/display: Avoid NULL dereference of timing generator]
+CVE-2023-52753 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	[buster] - linux 4.19.304-1
 	NOTE: https://git.kernel.org/linus/b1904ed480cee3f9f4036ea0e36d139cb5fee2d6 (6.7-rc1)
-CVE-2023-52752 [smb: client: fix use-after-free bug in cifs_debug_data_proc_show()]
+CVE-2023-52752 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/d328c09ee9f15ee5a26431f5aad7c9239fa85e62 (6.7-rc1)
-CVE-2023-52751 [smb: client: fix use-after-free in smb2_query_info_compound()]
+CVE-2023-52751 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.6.8-1
 	NOTE: https://git.kernel.org/linus/5c86919455c1edec99ebd3338ad213b59271a71b (6.7-rc1)
-CVE-2023-52750 [arm64: Restrict CPU_BIG_ENDIAN to GNU as or LLVM IAS 15.x or newer]
+CVE-2023-52750 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	NOTE: https://git.kernel.org/linus/146a15b873353f8ac28dc281c139ff611a3c4848 (6.7-rc1)
-CVE-2023-52749 [spi: Fix null dereference on suspend]
+CVE-2023-52749 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.66-1
 	NOTE: https://git.kernel.org/linus/bef4a48f4ef798c4feddf045d49e53c8a97d5e37 (6.7-rc1)
-CVE-2023-52748 [f2fs: avoid format-overflow warning]
+CVE-2023-52748 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	[bullseye] - linux 5.10.205-1
 	NOTE: https://git.kernel.org/linus/e0d4e8acb3789c5a8651061fbab62ca24a45c063 (6.7-rc1)
-CVE-2023-52747 [IB/hfi1: Restore allocated resources on failed copyout]
+CVE-2023-52747 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
 	- linux 6.1.12-1
 	[bullseye] - linux 5.10.178-1
 	[buster] - linux 4.19.282-1
 	NOTE: https://git.kernel.org/linus/6601fc0d15ffc20654e39486f9bef35567106d68 (6.2-rc8)
-CVE-2023-52746 [xfrm/compat: prevent potential spectre v1 gadget in xfrm_xlate32_attr()]
+CVE-2023-52746 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 6.1.12-1
 	[bullseye] - linux 5.10.178-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b6ee896385380aa621102e8ea402ba12db1cabff (6.2-rc8)
-CVE-2023-52745 [IB/IPoIB: Fix legacy IPoIB due to wrong number of queues]
+CVE-2023-52745 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
 	- linux 6.1.12-1
 	[bullseye] - linux 5.10.178-1
 	NOTE: https://git.kernel.org/linus/e632291a2dbce45a24cddeb5fe28fe71d724ba43 (6.2-rc8)
-CVE-2023-52744 [RDMA/irdma: Fix potential NULL-ptr-dereference]
+CVE-2023-52744 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.1.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5d9745cead1f121974322b94ceadfb4d1e67960e (6.2-rc8)
-CVE-2023-52743 [ice: Do not use WQ_MEM_RECLAIM flag for workqueue]
+CVE-2023-52743 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.1.12-1
 	[bullseye] - linux 5.10.178-1
 	NOTE: https://git.kernel.org/linus/4d159f7884f78b1aacb99b4fc37d1e3cb1194e39 (6.2-rc8)
-CVE-2023-52742 [net: USB: Fix wrong-direction WARNING in plusb.c]
+CVE-2023-52742 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.1.12-1
 	[bullseye] - linux 5.10.178-1
 	[buster] - linux 4.19.282-1
 	NOTE: https://git.kernel.org/linus/811d581194f7412eda97acc03d17fc77824b561f (6.2-rc8)
-CVE-2023-52741 [cifs: Fix use-after-free in rdata->read_into_pages()]
+CVE-2023-52741 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.1.12-1
 	[bullseye] - linux 5.10.178-1
 	NOTE: https://git.kernel.org/linus/aa5465aeca3c66fecdf7efcf554aed79b4c4b211 (6.2-rc8)
-CVE-2023-52740 [powerpc/64s/interrupt: Fix interrupt exit race with security mitigation switch]
+CVE-2023-52740 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.1.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2ea31e2e62bbc4d11c411eeb36f1b02841dbcab1 (6.2-rc8)
-CVE-2023-52739 [Fix page corruption caused by racy check in __free_pages]
+CVE-2023-52739 (In the Linux kernel, the following vulnerability has been resolved:  F ...)
 	- linux 6.1.12-1
 	[bullseye] - linux 5.10.178-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/462a8e08e0e6287e5ce13187257edbf24213ed03 (6.2-rc8)
-CVE-2023-52738 [drm/amdgpu/fence: Fix oops due to non-matching drm_sched init/fini]
+CVE-2023-52738 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.1.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5ad7bbf3dba5c4a684338df1f285080f2588b535 (6.2-rc8)
-CVE-2023-52737 [btrfs: lock the inode in shared mode before starting fiemap]
+CVE-2023-52737 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.1.15-1
 	NOTE: https://git.kernel.org/linus/519b7e13b5ae8dd38da1e52275705343be6bb508 (6.2-rc8)
-CVE-2023-52736 [ALSA: hda: Do not unset preset when cleaning up codec]
+CVE-2023-52736 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.1.15-1
 	[bullseye] - linux 5.10.178-1
 	NOTE: https://git.kernel.org/linus/87978e6ad45a16835cc58234451111091be3c59a (6.2-rc7)
-CVE-2023-52735 [bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself]
+CVE-2023-52735 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.1.15-1
 	NOTE: https://git.kernel.org/linus/5b4a79ba65a1ab479903fff2e604865d229b70a9 (6.2-rc7)
-CVE-2023-52734 [net: sched: sch: Bounds check priority]
+CVE-2023-52734 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.1.15-1
 	[bullseye] - linux 5.10.178-1
 	NOTE: https://git.kernel.org/linus/de5ca4c3852f896cacac2bf259597aab5e17d9e3 (6.2-rc7)
-CVE-2023-52733 [s390/decompressor: specify __decompress() buf len to avoid overflow]
+CVE-2023-52733 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.1.15-1
 	[bullseye] - linux 5.10.178-1
 	NOTE: https://git.kernel.org/linus/7ab41c2c08a32132ba8c14624910e2fe8ce4ba4b (6.2-rc7)
-CVE-2023-52732 [ceph: blocklist the kclient when receiving corrupted snap trace]
+CVE-2023-52732 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.1.15-1
 	NOTE: https://git.kernel.org/linus/a68e564adcaa69b0930809fb64d9d5f7d9c32ba9 (6.2-rc7)
-CVE-2023-52731 [fbdev: Fix invalid page access after closing deferred I/O devices]
+CVE-2023-52731 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.1.15-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3efc61d95259956db25347e2a9562c3e54546e20 (6.2)
-CVE-2023-52730 [mmc: sdio: fix possible resource leaks in some error paths]
+CVE-2023-52730 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.1.15-1
 	[bullseye] - linux 5.10.178-1
 	[buster] - linux 4.19.282-1
 	NOTE: https://git.kernel.org/linus/605d9fb9556f8f5fb4566f4df1480f280f308ded (6.2)
-CVE-2023-52708 [mmc: mmc_spi: fix error handling in mmc_spi_probe()]
+CVE-2023-52708 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.1.15-1
 	[bullseye] - linux 5.10.178-1
 	NOTE: https://git.kernel.org/linus/cf4c9d2ac1e42c7d18b921bec39486896645b714 (6.2)
-CVE-2023-52707 [sched/psi: Fix use-after-free in ep_remove_wait_queue()]
+CVE-2023-52707 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.1.15-1
 	[bullseye] - linux 5.10.178-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c2dbe32d5db5c4ead121cf86dabd5ab691fb47fe (6.2)
-CVE-2023-52706 [gpio: sim: fix a memory leak]
+CVE-2023-52706 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 6.1.15-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/79eeab1d85e0fee4c0bc36f3b6ddf3920f39f74b (6.2)
-CVE-2023-52705 [nilfs2: fix underflow in second superblock position calculations]
+CVE-2023-52705 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.1.15-1
 	[bullseye] - linux 5.10.178-1
 	[buster] - linux 4.19.282-1
 	NOTE: https://git.kernel.org/linus/99b9402a36f0799f25feee4465bfa4b8dfa74b4d (6.2)
-CVE-2023-52704 [freezer,umh: Fix call_usermode_helper_exec() vs SIGKILL]
+CVE-2023-52704 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.1.15-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/eedeb787ebb53de5c5dcf7b7b39d01bf1b0f037d (6.2)
-CVE-2023-52703 [net/usb: kalmia: Don't pass act_len in usb_bulk_msg error path]
+CVE-2023-52703 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.1.15-1
 	[bullseye] - linux 5.10.178-1
 	[buster] - linux 4.19.282-1
 	NOTE: https://git.kernel.org/linus/c68f345b7c425b38656e1791a0486769a8797016 (6.2)
-CVE-2023-52702 [net: openvswitch: fix possible memory leak in ovs_meter_cmd_set()]
+CVE-2023-52702 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.1.15-1
 	[bullseye] - linux 5.10.178-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2fa28f5c6fcbfc794340684f36d2581b4f2d20b5 (6.2)
-CVE-2023-52701 [net: use a bounce buffer for copying skb->mark]
+CVE-2023-52701 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.1.15-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2558b8039d059342197610498c8749ad294adee5 (6.2)
-CVE-2023-52700 [tipc: fix kernel warning when sending SYN message]
+CVE-2023-52700 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.1.15-1
 	NOTE: https://git.kernel.org/linus/11a4d6f67cf55883dc78e31c247d1903ed7feccc (6.2)
-CVE-2022-48710 [drm/radeon: fix a possible null pointer dereference]
+CVE-2022-48710 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.18.5-1
 	[bullseye] - linux 5.10.127-1
 	[buster] - linux 4.19.249-1
 	NOTE: https://git.kernel.org/linus/a2b28708b645c5632dc93669ab06e97874c8244f (5.19-rc1)
-CVE-2022-48709 [ice: switch: fix potential memleak in ice_add_adv_recipe()]
+CVE-2022-48709 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.1.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/4a606ce68426c88ff2563382b33cc34f3485fe57 (6.2-rc8)
-CVE-2022-48708 [pinctrl: single: fix potential NULL dereference]
+CVE-2022-48708 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.1.12-1
 	[bullseye] - linux 5.10.178-1
 	[buster] - linux 4.19.282-1
 	NOTE: https://git.kernel.org/linus/d2d73e6d4822140445ad4a7b1c6091e0f5fe703b (6.2-rc8)
-CVE-2022-48707 [cxl/region: Fix null pointer dereference for resetting decoder]
+CVE-2022-48707 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.1.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/4fa4302d6dc7de7e8e74dc7405611a2efb4bf54b (6.2-rc8)
-CVE-2022-48706 [vdpa: ifcvf: Do proper cleanup if IFCVF init fails]
+CVE-2022-48706 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 6.1.15-1
 	NOTE: https://git.kernel.org/linus/6b04456e248761cf68f562f2fd7c04e591fcac94 (6.2-rc7)
-CVE-2021-47432 [lib/generic-radix-tree.c: Don't overflow in peek()]
+CVE-2021-47432 (In the Linux kernel, the following vulnerability has been resolved:  l ...)
 	- linux 6.6.8-1
 	[bookworm] - linux 6.1.64-1
 	NOTE: https://git.kernel.org/linus/9492261ff2460252cf2d8de89cdf854c7e2b28a0 (6.7-rc1)
-CVE-2021-47431 [drm/amdgpu: fix gart.bo pin_count leak]
+CVE-2021-47431 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.14.16-1
 	[bullseye] - linux 5.10.84-1
 	NOTE: https://git.kernel.org/linus/66805763a97f8f7bdf742fc0851d85c02ed9411f (5.15-rc4)
-CVE-2021-47430 [x86/entry: Clear X86_FEATURE_SMAP when CONFIG_X86_SMAP=n]
+CVE-2021-47430 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3958b9c34c2729597e182cc606cc43942fd19f7c (5.15-rc5)
-CVE-2021-47429 [powerpc/64s: Fix unrecoverable MCE calling async handler from NMI]
+CVE-2021-47429 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 5.14.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f08fb25bc66986b0952724530a640d9970fa52c1 (5.15-rc5)
-CVE-2021-47428 [powerpc/64s: fix program check interrupt emergency stack path]
+CVE-2021-47428 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3e607dc4df180b72a38e75030cb0f94d12808712 (5.15-rc5)
-CVE-2021-47427 [scsi: iscsi: Fix iscsi_task use after free]
+CVE-2021-47427 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.14.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/258aad75c62146453d03028a44f2f1590d58e1f6 (5.15-rc5)
-CVE-2021-47426 [bpf, s390: Fix potential memory leak about jit_data]
+CVE-2021-47426 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/686cb8b9f6b46787f035afe8fbd132a74e6b1bdd (5.15-rc5)
-CVE-2021-47425 [i2c: acpi: fix resource leak in reconfiguration device addition]
+CVE-2021-47425 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/6558b646ce1c2a872fe1c2c7cb116f05a2c1950f (5.15-rc5)
-CVE-2021-47424 [i40e: Fix freeing of uninitialized misc IRQ vector]
+CVE-2021-47424 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/2e5a20573a926302b233b0c2e1077f5debc7ab2e (5.15-rc5)
-CVE-2021-47423 [drm/nouveau/debugfs: fix file release memory leak]
+CVE-2021-47423 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/f5a8703a9c418c6fc54eb772712dfe7641e3991c (5.15-rc5)
-CVE-2021-47422 [drm/nouveau/kms/nv50-: fix file release memory leak]
+CVE-2021-47422 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0b3d4945cc7e7ea1acd52cb06dfa83bfe265b6d5 (5.15-rc5)
-CVE-2021-47421 [drm/amdgpu: handle the case of pci_channel_io_frozen only in amdgpu_pci_resume]
+CVE-2021-47421 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.14.12-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/248b061689a40f4fed05252ee2c89f87cf26d7d8 (5.15-rc5)
-CVE-2021-47420 [drm/amdkfd: fix a potential ttm->sg memory leak]
+CVE-2021-47420 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.14.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b072ef1215aca33186e3a10109e872e528a9e516 (5.15-rc5)
-CVE-2021-47419 [net/sched: sch_taprio: properly cancel timer from taprio_destroy()]
+CVE-2021-47419 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a56d447f196fa9973c568f54c0d76d5391c3b0c0 (5.15-rc5)
-CVE-2021-47418 [net_sched: fix NULL deref in fifo_set_limit()]
+CVE-2021-47418 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/560ee196fe9e5037e5015e2cdb14b3aecb1cd7dc (5.15-rc5)
-CVE-2021-47417 [libbpf: Fix memory leak in strset]
+CVE-2021-47417 (In the Linux kernel, the following vulnerability has been resolved:  l ...)
 	- linux 5.14.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b0e875bac0fab3e7a7431c2eee36a8ccc0c712ac (5.15-rc5)
-CVE-2021-47416 [phy: mdio: fix memory leak]
+CVE-2021-47416 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/ca6e11c337daf7925ff8a2aac8e84490a8691905 (5.15-rc5)
-CVE-2021-47415 [iwlwifi: mvm: Fix possible NULL dereference]
+CVE-2021-47415 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.14.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/24d5f16e407b75bc59d5419b957a9cab423b2681 (5.15-rc5)
-CVE-2021-47414 [riscv: Flush current cpu icache before other cpus]
+CVE-2021-47414 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	NOTE: https://git.kernel.org/linus/bb8958d5dc79acbd071397abb57b8756375fe1ce (5.15-rc5)
-CVE-2021-47413 [usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle]
+CVE-2021-47413 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8253a34bfae3278baca52fc1209b7c29270486ca (5.15-rc5)
-CVE-2021-47412 [block: don't call rq_qos_ops->done_bio if the bio isn't tracked]
+CVE-2021-47412 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.14.12-1
 	NOTE: https://git.kernel.org/linus/a647a524a46736786c95cdb553a070322ca096e3 (5.15-rc3)
-CVE-2021-47411 [io_uring: allow conditional reschedule for intensive iterators]
+CVE-2021-47411 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.14.12-1
 	NOTE: https://git.kernel.org/linus/8bab4c09f24ec8d4a7a78ab343620f89d3a24804 (5.15-rc3)
-CVE-2021-47410 [drm/amdkfd: fix svm_migrate_fini warning]
+CVE-2021-47410 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.14.12-1
 	NOTE: https://git.kernel.org/linus/197ae17722e989942b36e33e044787877f158574 (5.15-rc3)
-CVE-2021-47409 [usb: dwc2: check return value after calling platform_get_resource()]
+CVE-2021-47409 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/856e6e8e0f9300befa87dde09edb578555c99a82 (5.15-rc3)
-CVE-2021-47408 [netfilter: conntrack: serialize hash resizes and cleanups]
+CVE-2021-47408 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	NOTE: https://git.kernel.org/linus/e9edc188fc76499b0b9bd60364084037f6d03773 (5.15-rc4)
-CVE-2021-47407 [KVM: x86: Handle SRCU initialization failure during page track init]
+CVE-2021-47407 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	NOTE: https://git.kernel.org/linus/eb7511bf9182292ef1df1082d23039e856d1ddfb (5.15-rc4)
-CVE-2021-47406 [ext4: add error checking to ext4_ext_replay_set_iblocks()]
+CVE-2021-47406 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1fd95c05d8f742abfe906620780aee4dbe1a2db0 (5.15-rc4)
-CVE-2021-47405 [HID: usbhid: free raw_report buffers in usbhid_stop]
+CVE-2021-47405 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/f7744fa16b96da57187dc8e5634152d3b63d72de (5.15-rc1)
-CVE-2021-47404 [HID: betop: fix slab-out-of-bounds Write in betop_probe]
+CVE-2021-47404 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/1e4ce418b1cb1a810256b5fb3fd33d22d1325993 (5.15-rc4)
-CVE-2021-47403 [ipack: ipoctal: fix module reference leak]
+CVE-2021-47403 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/bb8a4fcb2136508224c596a7e665bdba1d7c3c27 (5.15-rc4)
-CVE-2021-47402 [net: sched: flower: protect fl_walk() with rcu]
+CVE-2021-47402 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d5ef190693a7d76c5c192d108e8dec48307b46ee (5.15-rc4)
-CVE-2021-47401 [ipack: ipoctal: fix stack information leak]
+CVE-2021-47401 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/a89936cce87d60766a75732a9e7e25c51164f47c (5.15-rc4)
-CVE-2021-47400 [net: hns3: do not allow call hns3_nic_net_open repeatedly]
+CVE-2021-47400 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5b09e88e1bf7fe86540fab4b5f3eece8abead39e (5.15-rc4)
-CVE-2021-47399 [ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup]
+CVE-2021-47399 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/513e605d7a9ce136886cb42ebb2c40e9a6eb6333 (5.15-rc4)
-CVE-2021-47398 [RDMA/hfi1: Fix kernel pointer leak]
+CVE-2021-47398 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 5.14.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7d5cfafe8b4006a75b55c2f1fdfdb363f9a5cc98 (5.15-rc4)
-CVE-2021-47397 [sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb]
+CVE-2021-47397 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/f7e745f8e94492a8ac0b0a26e25f2b19d342918f (5.15-rc4)
-CVE-2021-47396 [mac80211-hwsim: fix late beacon hrtimer handling]
+CVE-2021-47396 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	NOTE: https://git.kernel.org/linus/313bbd1990b6ddfdaa7da098d0c56b098a833572 (5.15-rc4)
-CVE-2021-47395 [mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap]
+CVE-2021-47395 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/13cb6d826e0ac0d144b0d48191ff1a111d32f0c6 (5.15-rc4)
-CVE-2021-47394 [netfilter: nf_tables: unlink table before deleting it]
+CVE-2021-47394 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a499b03bf36b0c2e3b958a381d828678ab0ffc5e (5.15-rc4)
-CVE-2021-47393 [hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs]
+CVE-2021-47393 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/e6fab7af6ba1bc77c78713a83876f60ca7a4a064 (5.15-rc4)
-CVE-2021-47392 [RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure]
+CVE-2021-47392 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ca465e1f1f9b38fe916a36f7d80c5d25f2337c81 (5.15-rc4)
-CVE-2021-47391 [RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests]
+CVE-2021-47391 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.191-1
 	NOTE: https://git.kernel.org/linus/305d568b72f17f674155a2a8275f865f207b3808 (5.15-rc4)
-CVE-2021-47390 [KVM: x86: Fix stack-out-of-bounds memory access from ioapic_write_indirect()]
+CVE-2021-47390 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2f9b68f57c6278c322793a06063181deded0ad69 (5.15-rc4)
-CVE-2021-47389 [KVM: SVM: fix missing sev_decommission in sev_receive_start]
+CVE-2021-47389 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 5.14.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f1815e0aa770f2127c5df31eb5c2f0e37b60fa77 (5.15-rc4)
-CVE-2021-47388 [mac80211: fix use-after-free in CCMP/GCMP RX]
+CVE-2021-47388 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/94513069eb549737bcfc3d988d6ed4da948a2de8 (5.15-rc4)
-CVE-2021-47387 [cpufreq: schedutil: Use kobject release() method to free sugov_tunables]
+CVE-2021-47387 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/e5c6b312ce3cc97e90ea159446e6bfa06645364d (5.15-rc1)
-CVE-2021-47386 [hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field]
+CVE-2021-47386 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	NOTE: https://git.kernel.org/linus/943c15ac1b84d378da26bba41c83c67e16499ac4 (5.15-rc4)
-CVE-2021-47385 [hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field]
+CVE-2021-47385 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	NOTE: https://git.kernel.org/linus/0f36b88173f028e372668ae040ab1a496834d278 (5.15-rc4)
-CVE-2021-47384 [hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field]
+CVE-2021-47384 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	NOTE: https://git.kernel.org/linus/dd4d747ef05addab887dc8ff0d6ab9860bbcd783 (5.15-rc4)
-CVE-2021-47383 [tty: Fix out-of-bound vmalloc access in imageblit]
+CVE-2021-47383 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/3b0c406124719b625b1aba431659f5cdc24a982c (5.15-rc1)
-CVE-2021-47382 [s390/qeth: fix deadlock during failing recovery]
+CVE-2021-47382 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.14.12-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d2b59bd4b06d84a4eadb520b0f71c62fe8ec0a62 (5.15-rc3)
-CVE-2021-47381 [ASoC: SOF: Fix DSP oops stack dump output contents]
+CVE-2021-47381 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 5.14.12-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ac4dfccb96571ca03af7cac64b7a0b2952c97f3a (5.15-rc4)
-CVE-2021-47380 [HID: amd_sfh: Fix potential NULL pointer dereference]
+CVE-2021-47380 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
 	- linux 5.14.12-1
 	NOTE: https://git.kernel.org/linus/d46ef750ed58cbeeba2d9a55c99231c30a172764 (5.15-rc4)
-CVE-2021-47379 [blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd]
+CVE-2021-47379 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.14.9-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/858560b27645e7e97aca37ee8f232cccd658fbd2 (5.15-rc2)
-CVE-2021-47378 [nvme-rdma: destroy cm id before destroy qp to avoid use after free]
+CVE-2021-47378 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.9-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/9817d763dbe15327b9b3ff4404fa6f27f927e744 (5.15-rc2)
-CVE-2021-47377 [xen/balloon: use a kernel thread instead a workqueue]
+CVE-2021-47377 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 5.14.9-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/8480ed9c2bbd56fc86524998e5f2e3e22f5038f6 (5.15-rc2)
-CVE-2021-47376 [bpf: Add oversize check before call kvcalloc()]
+CVE-2021-47376 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.14.9-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/0e6491b559704da720f6da09dd0a52c4df44c514 (5.15-rc2)
-CVE-2021-47375 [blktrace: Fix uaf in blk_trace access after removing by sysfs]
+CVE-2021-47375 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.14.9-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/5afedf670caf30a2b5a52da96eb7eac7dee6a9c9 (5.15-rc3)
-CVE-2021-47374 [dma-debug: prevent an error message from causing runtime problems]
+CVE-2021-47374 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.14.9-1
 	NOTE: https://git.kernel.org/linus/510e1a724ab1bf38150be2c1acabb303f98d0047 (5.15-rc2)
-CVE-2021-47373 [irqchip/gic-v3-its: Fix potential VPE leak on error]
+CVE-2021-47373 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.14.9-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/280bef512933b2dda01d681d8cbe499b98fc5bdd (5.15-rc3)
-CVE-2021-47372 [net: macb: fix use after free on rmmod]
+CVE-2021-47372 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.9-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/d82d5303c4c539db86588ffb5dc5b26c3f1513e8 (5.15-rc2)
-CVE-2021-47371 [nexthop: Fix memory leaks in nexthop notification chain listeners]
+CVE-2021-47371 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.9-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3106a0847525befe3e22fc723909d1b21eb0d520 (5.15-rc3)
-CVE-2021-47370 [mptcp: ensure tx skbs always have the MPTCP ext]
+CVE-2021-47370 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.14.9-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/977d293e23b48a1129830d7968605f61c4af71a0 (5.15-rc3)
-CVE-2021-47369 [s390/qeth: fix NULL deref in qeth_clear_working_pool_list()]
+CVE-2021-47369 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.14.9-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/248f064af222a1f97ee02c84a98013dfbccad386 (5.15-rc3)
-CVE-2021-47368 [enetc: Fix illegal access when reading affinity_hint]
+CVE-2021-47368 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 5.14.9-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7237a494decfa17d0b9d0076e6cee3235719de90 (5.15-rc3)
-CVE-2021-47367 [virtio-net: fix pages leaking when building skb in big mode]
+CVE-2021-47367 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 5.14.9-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/afd92d82c9d715fb97565408755acad81573591a (5.15-rc3)
-CVE-2021-47366 [afs: Fix corruption in reads at fpos 2G-4G from an OpenAFS server]
+CVE-2021-47366 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 5.14.9-1
 	NOTE: https://git.kernel.org/linus/b537a3c21775075395af475dcc6ef212fcf29db8 (5.15-rc3)
-CVE-2021-47365 [afs: Fix page leak]
+CVE-2021-47365 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 5.14.9-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/581b2027af0018944ba301d68e7af45c6d1128b5 (5.15-rc3)
-CVE-2021-47364 [comedi: Fix memory leak in compat_insnlist()]
+CVE-2021-47364 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.14.9-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/bb509a6ffed2c8b0950f637ab5779aa818ed1596 (5.15-rc3)
-CVE-2021-47363 [nexthop: Fix division by zero while replacing a resilient group]
+CVE-2021-47363 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.9-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/563f23b002534176f49524b5ca0e1d94d8906c40 (5.15-rc3)
-CVE-2021-47362 [drm/amd/pm: Update intermediate power state for SI]
+CVE-2021-47362 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.14.9-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/ab39d3cef526ba09c4c6923b4cd7e6ec1c5d4faa (5.15-rc3)
-CVE-2021-47361 [mcb: fix error handling in mcb_alloc_bus()]
+CVE-2021-47361 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.14.9-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.232-1
 	NOTE: https://git.kernel.org/linus/25a1433216489de4abc889910f744e952cb6dbae (5.15-rc3)
-CVE-2021-47360 [binder: make sure fd closes complete]
+CVE-2021-47360 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.14.9-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5fdb55c1ac9585eb23bb2541d5819224429e103d (5.15-rc3)
-CVE-2021-47359 [cifs: Fix soft lockup during fsstress]
+CVE-2021-47359 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.14.9-1
 	NOTE: https://git.kernel.org/linus/71826b068884050d5fdd37fda857ba1539c513d3 (5.15-rc3)
-CVE-2020-36788 [drm/nouveau: avoid a use-after-free when BO init fails]
+CVE-2020-36788 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.14.12-1
 	[bullseye] - linux 5.10.84-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/bcf34aa5082ee2343574bc3f4d1c126030913e54 (5.15-rc5)
-CVE-2021-47220 [usb: dwc3: core: fix kernel panic when do reboot]
+CVE-2021-47220 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/4bf584a03eec674975ee9fe36c8583d9d470dab1 (5.13-rc7)
-CVE-2021-47221 [mm/slub: actually fix freelist pointer vs redzoning]
+CVE-2021-47221 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e41a49fadbc80b60b48d3c095d9e2ee7ef7c9a8e (5.13-rc7)
-CVE-2021-47222 [net: bridge: fix vlan tunnel dst refcnt when egressing]
+CVE-2021-47222 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/cfc579f9d89af4ada58c69b03bcaa4887840f3b3 (5.13-rc7)
-CVE-2021-47223 [net: bridge: fix vlan tunnel dst null pointer dereference]
+CVE-2021-47223 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/58e2071742e38f29f051b709a5cca014ba51166f (5.13-rc7)
-CVE-2021-47224 [net: ll_temac: Make sure to free skb when it is completely used]
+CVE-2021-47224 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.46-1
 	NOTE: https://git.kernel.org/linus/6aa32217a9a446275440ee8724b1ecaf1838df47 (5.13-rc7)
-CVE-2021-47225 [mac80211: fix deadlock in AP/VLAN handling]
+CVE-2021-47225 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d5befb224edbe53056c2c18999d630dafb4a08b9 (5.13-rc7)
-CVE-2021-47226 [x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer]
+CVE-2021-47226 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d8778e393afa421f1f117471144f8ce6deb6953a (5.13-rc7)
-CVE-2021-47227 [x86/fpu: Prevent state corruption in __fpu__restore_sig()]
+CVE-2021-47227 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/484cea4f362e1eeb5c869abbfb5f90eae6421b38 (5.13-rc7)
-CVE-2021-47228 [x86/ioremap: Map EFI-reserved memory as encrypted for SEV]
+CVE-2021-47228 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8d651ee9c71bb12fc0c8eb2786b66cbe5aa3e43b (5.13-rc7)
-CVE-2021-47229 [PCI: aardvark: Fix kernel panic during PIO transfer]
+CVE-2021-47229 (In the Linux kernel, the following vulnerability has been resolved:  P ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/f18139966d072dab8e4398c95ce955a9742e04f7 (5.13-rc7)
-CVE-2021-47230 [KVM: x86: Immediately reset the MMU context when the SMM flag is cleared]
+CVE-2021-47230 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/78fcb2c91adfec8ce3a2ba6b4d0dda89f2f4a7c6 (5.13-rc7)
-CVE-2021-47231 [can: mcba_usb: fix memory leak in mcba_usb]
+CVE-2021-47231 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/91c02557174be7f72e46ed7311e3bea1939840b0 (5.13-rc7)
-CVE-2021-47232 [can: j1939: fix Use-after-Free, hold skb ref while in use]
+CVE-2021-47232 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2030043e616cab40f510299f09b636285e0a3678 (5.13-rc7)
-CVE-2021-47233 [regulator: rt4801: Fix NULL pointer dereference if priv->enable_gpios is NULL]
+CVE-2021-47233 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 5.10.46-1
 	NOTE: https://git.kernel.org/linus/cb2381cbecb81a8893b2d1e1af29bc2e5531df27 (5.13-rc6)
-CVE-2021-47234 [phy: phy-mtk-tphy: Fix some resource leaks in mtk_phy_init()]
+CVE-2021-47234 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 5.10.46-1
 	NOTE: https://git.kernel.org/linus/aaac9a1bd370338ce372669eb9a6059d16b929aa (5.13-rc6)
-CVE-2021-47235 [net: ethernet: fix potential use-after-free in ec_bhf_remove]
+CVE-2021-47235 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/9cca0c2d70149160407bda9a9446ce0c29b6e6c6 (5.13-rc7)
-CVE-2021-47236 [net: cdc_eem: fix tx fixup skb leak]
+CVE-2021-47236 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/c3b26fdf1b32f91c7a3bc743384b4a298ab53ad7 (5.13-rc7)
-CVE-2021-47237 [net: hamradio: fix memory leak in mkiss_close]
+CVE-2021-47237 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/7edcc682301492380fbdd604b4516af5ae667a13 (5.13-rc7)
-CVE-2021-47238 [net: ipv4: fix memory leak in ip_mc_add1_src]
+CVE-2021-47238 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/d8e2973029b8b2ce477b564824431f3385c77083 (5.13-rc7)
-CVE-2021-47239 [net: usb: fix possible use-after-free in smsc75xx_bind]
+CVE-2021-47239 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/56b786d86694e079d8aad9b314e015cd4ac02a3d (5.13-rc7)
-CVE-2021-47240 [net: qrtr: fix OOB Read in qrtr_endpoint_post]
+CVE-2021-47240 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/ad9d24c9429e2159d1e279dc3a83191ccb4daf1d (5.13-rc7)
-CVE-2021-47241 [ethtool: strset: fix message length calculation]
+CVE-2021-47241 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e175aef902697826d344ce3a12189329848fe898 (5.13-rc7)
-CVE-2021-47242 [mptcp: fix soft lookup in subflow_error_report()]
+CVE-2021-47242 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/499ada5073361c631f2a3c4a8aed44d53b6f82ec (5.13-rc7)
-CVE-2021-47243 [sch_cake: Fix out of bounds when parsing TCP options and header]
+CVE-2021-47243 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/ba91c49dedbde758ba0b72f57ac90b06ddf8e548 (5.13-rc7)
-CVE-2021-47244 [mptcp: Fix out of bounds when parsing TCP options]
+CVE-2021-47244 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/07718be265680dcf496347d475ce1a5442f55ad7 (5.13-rc7)
-CVE-2021-47245 [netfilter: synproxy: Fix out of bounds when parsing TCP options]
+CVE-2021-47245 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/5fc177ab759418c9537433e63301096e733fb915 (5.13-rc7)
-CVE-2021-47246 [net/mlx5e: Fix page reclaim for dead peer hairpin]
+CVE-2021-47246 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.46-1
 	NOTE: https://git.kernel.org/linus/a3e5fd9314dfc4314a9567cde96e1aef83a7458a (5.13-rc7)
-CVE-2021-47247 [net/mlx5e: Fix use-after-free of encap entry in neigh update handler]
+CVE-2021-47247 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.6-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fb1a3132ee1ac968316e45d21a48703a6db0b6c3 (5.13-rc7)
-CVE-2021-47248 [udp: fix race between close() and udp_abort()]
+CVE-2021-47248 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/a8b897c7bcd47f4147d066e22cc01d1026d7640e (5.13-rc7)
-CVE-2021-47249 [net: rds: fix memory leak in rds_recvmsg]
+CVE-2021-47249 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/49bfcbfd989a8f1f23e705759a6bb099de2cff9f (5.13-rc7)
-CVE-2021-47250 [net: ipv4: fix memory leak in netlbl_cipsov4_add_std]
+CVE-2021-47250 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/d612c3f3fae221e7ea736d196581c2217304bbbc (5.13-rc7)
-CVE-2021-47251 [mac80211: fix skb length check in ieee80211_scan_rx()]
+CVE-2021-47251 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e298aa358f0ca658406d524b6639fe389cb6e11e (5.13-rc7)
-CVE-2021-47252 [batman-adv: Avoid WARN_ON timing related checks]
+CVE-2021-47252 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/9f460ae31c4435fd022c443a6029352217a16ac1 (5.13-rc7)
-CVE-2021-47253 [drm/amd/display: Fix potential memory leak in DMUB hw_init]
+CVE-2021-47253 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.10.46-1
 	NOTE: https://git.kernel.org/linus/c5699e2d863f58221044efdc3fa712dd32d55cde (5.13-rc5)
-CVE-2021-47254 [gfs2: Fix use-after-free in gfs2_glock_shrink_scan]
+CVE-2021-47254 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/1ab19c5de4c537ec0d9b21020395a5b5a6c059b2 (5.13-rc5)
-CVE-2021-47255 [kvm: LAPIC: Restore guard to prevent illegal APIC register access]
+CVE-2021-47255 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/218bf772bddd221489c38dde6ef8e917131161f6 (5.13-rc7)
-CVE-2021-47256 [mm/memory-failure: make sure wait for page writeback in memory_failure]
+CVE-2021-47256 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/e8675d291ac007e1c636870db880f837a9ea112a (5.13-rc7)
-CVE-2021-47257 [net: ieee802154: fix null deref in parse dev addr]
+CVE-2021-47257 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/9fdd04918a452980631ecc499317881c1d120b70 (5.13-rc5)
-CVE-2021-47258 [scsi: core: Fix error handling of scsi_host_alloc()]
+CVE-2021-47258 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/66a834d092930cf41d809c0e989b13cd6f9ca006 (5.13-rc6)
-CVE-2021-47259 [NFS: Fix use-after-free in nfs4_init_client()]
+CVE-2021-47259 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/476bdb04c501fc64bf3b8464ffddefc8dbe01577 (5.13-rc6)
-CVE-2021-47260 [NFS: Fix a potential NULL dereference in nfs_get_client()]
+CVE-2021-47260 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/09226e8303beeec10f2ff844d2e46d1371dc58e0 (5.13-rc6)
-CVE-2021-47261 [IB/mlx5: Fix initializing CQ fragments buffer]
+CVE-2021-47261 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/2ba0aa2feebda680ecfc3c552e867cf4d1b05a3a (5.13-rc6)
-CVE-2021-47262 [KVM: x86: Ensure liveliness of nested VM-Enter fail tracepoint message]
+CVE-2021-47262 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f31500b0d437a2464ca5972d8f5439e156b74960 (5.13-rc6)
-CVE-2021-47263 [gpio: wcd934x: Fix shift-out-of-bounds error]
+CVE-2021-47263 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/dbec64b11c65d74f31427e2b9d5746fbf17bf840 (5.13-rc6)
-CVE-2021-47264 [ASoC: core: Fix Null-point-dereference in fmt_single_name()]
+CVE-2021-47264 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/41daf6ba594d55f201c50280ebcd430590441da1 (5.13-rc6)
-CVE-2021-47265 [RDMA: Verify port when creating flow rule]
+CVE-2021-47265 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 5.14.6-1
 	NOTE: https://git.kernel.org/linus/2adcb4c5a52a2623cd2b43efa7041e74d19f3a5e (5.13-rc6)
-CVE-2021-47266 [RDMA/ipoib: Fix warning caused by destroying non-initial netns]
+CVE-2021-47266 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a3e74fb9247cd530dca246699d5eb5a691884d32 (5.13-rc6)
-CVE-2021-47267 [usb: fix various gadget panics on 10gbps cabling]
+CVE-2021-47267 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/032e288097a553db5653af552dd8035cd2a0ba96 (5.13-rc6)
-CVE-2021-47268 [usb: typec: tcpm: cancel vdm and state machine hrtimer when unregister tcpm port]
+CVE-2021-47268 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3a13ff7ef4349d70d1d18378d661117dd5af8efe (5.13-rc6)
-CVE-2021-47269 [usb: dwc3: ep0: fix NULL pointer exception]
+CVE-2021-47269 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/d00889080ab60051627dab1d85831cd9db750e2a (5.13-rc6)
-CVE-2021-47270 [usb: fix various gadgets null ptr deref on 10gbps cabling.]
+CVE-2021-47270 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/90c4d05780d47e14a50e11a7f17373104cd47d25 (5.13-rc6)
-CVE-2021-47271 [usb: cdnsp: Fix deadlock issue in cdnsp_thread_irq_handler]
+CVE-2021-47271 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a9aecef198faae3240921b707bc09b602e966fce (5.13-rc6)
-CVE-2021-47272 [usb: dwc3: gadget: Bail from dwc3_gadget_exit() if dwc->gadget is NULL]
+CVE-2021-47272 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/03715ea2e3dbbc56947137ce3b4ac18a726b2f87 (5.13-rc6)
-CVE-2021-47273 [usb: dwc3-meson-g12a: fix usb2 PHY glue init when phy0 is disabled]
+CVE-2021-47273 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/4d2aa178d2ad2fb156711113790dde13e9aa2376 (5.13-rc6)
-CVE-2021-47274 [tracing: Correct the length check which causes memory corruption]
+CVE-2021-47274 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/3e08a9f9760f4a70d633c328a76408e62d6f80a3 (5.13-rc6)
-CVE-2021-47275 [bcache: avoid oversized read request in cache missing code path]
+CVE-2021-47275 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.14.6-1
 	NOTE: https://git.kernel.org/linus/41fe8d088e96472f63164e213de44ec77be69478 (5.13-rc6)
-CVE-2021-47276 [ftrace: Do not blindly read the ip address in ftrace_bug()]
+CVE-2021-47276 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/6c14133d2d3f768e0a35128faac8aa6ed4815051 (5.13-rc6)
-CVE-2021-47277 [kvm: avoid speculation-based attacks from out-of-range memslot accesses]
+CVE-2021-47277 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/da27a83fd6cc7780fea190e1f5c19e87019da65c (5.13-rc6)
-CVE-2021-47278 [bus: mhi: pci_generic: Fix possible use-after-free in mhi_pci_remove()]
+CVE-2021-47278 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0b67808ade8893a1b3608ddd74fac7854786c919 (5.13-rc6)
-CVE-2021-47279 [usb: misc: brcmstb-usb-pinmap: check return value after calling platform_get_resource()]
+CVE-2021-47279 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fbf649cd6d64d40c03c5397ecd6b1ae922ba7afc (5.13-rc6)
-CVE-2021-47280 [drm: Fix use-after-free read in drm_getunique()]
+CVE-2021-47280 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/b436acd1cf7fac0ba987abd22955d98025c80c2b (5.13-rc6)
-CVE-2021-47281 [ALSA: seq: Fix race of snd_seq_timer_open()]
+CVE-2021-47281 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 5.10.46-1
 	NOTE: https://git.kernel.org/linus/83e197a8414c0ba545e7e3916ce05f836f349273 (5.13-rc6)
-CVE-2021-47282 [spi: bcm2835: Fix out-of-bounds access with more than 4 slaves]
+CVE-2021-47282 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.10.46-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/13817d466eb8713a1ffd254f537402f091d48444 (5.13-rc6)
-CVE-2021-47283 [net:sfc: fix non-freed irq in legacy irq mode]
+CVE-2021-47283 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.46-1
 	NOTE: https://git.kernel.org/linus/8f03eeb6e0a0a0b8d617ee0a4bce729e47130036 (5.13-rc4)
-CVE-2021-47284 [isdn: mISDN: netjet: Fix crash in nj_probe:]
+CVE-2021-47284 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/9f6f852550d0e1b7735651228116ae9d300f69b3 (5.13-rc4)
-CVE-2021-47285 [net/nfc/rawsock.c: fix a permission check bug]
+CVE-2021-47285 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.10.46-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/8ab78863e9eff11910e1ac8bcf478060c29b379e (5.13-rc4)
-CVE-2021-47286 [bus: mhi: core: Validate channel ID when processing command completions]
+CVE-2021-47286 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/546362a9ef2ef40b57c6605f14e88ced507f8dd0 (5.14-rc3)
-CVE-2021-47287 [driver core: auxiliary bus: Fix memory leak when driver_register() fail]
+CVE-2021-47287 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/4afa0c22eed33cfe0c590742387f0d16f32412f3 (5.14-rc3)
-CVE-2021-47288 [media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()]
+CVE-2021-47288 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/8d4abca95ecc82fc8c41912fa0085281f19cc29f (5.14-rc3)
-CVE-2021-47289 [ACPI: fix NULL pointer dereference]
+CVE-2021-47289 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/fc68f42aa737dc15e7665a4101d4168aadb8e4c4 (5.14-rc3)
-CVE-2021-47290 [scsi: target: Fix NULL dereference on XCOPY completion]
+CVE-2021-47290 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a47fa41381a09e5997afd762664db4f5f6657e03 (5.14-rc3)
-CVE-2021-47291 [ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions]
+CVE-2021-47291 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8fb4792f091e608a0a1d353dfdf07ef55a719db5 (5.14-rc3)
-CVE-2021-47292 [io_uring: fix memleak in io_init_wq_offload()]
+CVE-2021-47292 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/362a9e65289284f36403058eea2462d0330c1f24 (5.14-rc3)
-CVE-2021-47293 [net/sched: act_skbmod: Skip non-Ethernet packets]
+CVE-2021-47293 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/727d6a8b7ef3d25080fad228b2c4a1d4da5999c6 (5.14-rc3)
-CVE-2021-47294 [netrom: Decrease sock refcount when sock timers expire]
+CVE-2021-47294 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/517a16b1a88bdb6b530f48d5d153478b2552d9a8 (5.14-rc3)
-CVE-2021-47295 [net: sched: fix memory leak in tcindex_partial_destroy_work]
+CVE-2021-47295 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/f5051bcece50140abd1a11a2d36dc3ec5484fc32 (5.14-rc3)
-CVE-2021-47296 [KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak]
+CVE-2021-47296 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/bc4188a2f56e821ea057aca6bf444e138d06c252 (5.14-rc3)
-CVE-2021-47297 [net: fix uninit-value in caif_seqpkt_sendmsg]
+CVE-2021-47297 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/991e634360f2622a683b48dfe44fe6d9cb765a09 (5.14-rc3)
-CVE-2021-47298 [bpf, sockmap: Fix potential memory leak on unlikely error case]
+CVE-2021-47298 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7e6b27a69167f97c56b5437871d29e9722c3e470 (5.14-rc3)
-CVE-2021-47299 [xdp, net: Fix use-after-free in bpf_xdp_link_release]
+CVE-2021-47299 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5acc7d3e8d342858405fbbc671221f676b547ce7 (5.14-rc3)
-CVE-2021-47300 [bpf: Fix tail_call_reachable rejection for interpreter when jit failed]
+CVE-2021-47300 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5dd0a6b8582ffbfa88351949d50eccd5b6694ade (5.14-rc3)
-CVE-2021-47301 [igb: Fix use-after-free error during reset]
+CVE-2021-47301 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/7b292608db23ccbbfbfa50cdb155d01725d7a52e (5.14-rc2)
-CVE-2021-47302 [igc: Fix use-after-free error during reset]
+CVE-2021-47302 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/56ea7ed103b46970e171eb1c95916f393d64eeff (5.14-rc2)
-CVE-2021-47303 [bpf: Track subprog poke descriptors correctly and fix use-after-free]
+CVE-2021-47303 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f263a81451c12da5a342d90572e317e611846f2c (5.14-rc2)
-CVE-2021-47304 [tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized]
+CVE-2021-47304 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/be5d1b61a2ad28c7e57fe8bfa277373e8ecffcdc (5.14-rc2)
-CVE-2021-47305 [dma-buf/sync_file: Don't leak fences on merge failure]
+CVE-2021-47305 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/ffe000217c5068c5da07ccb1c0f8cce7ad767435 (5.14-rc2)
-CVE-2021-47306 [net: fddi: fix UAF in fza_probe]
+CVE-2021-47306 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/deb7178eb940e2c5caca1b1db084a69b2e59b4c9 (5.14-rc2)
-CVE-2021-47307 [cifs: prevent NULL deref in cifs_compose_mount_options()]
+CVE-2021-47307 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/03313d1c3a2f086bb60920607ab79ac8f8578306 (5.14-rc1)
-CVE-2021-47308 [scsi: libfc: Fix array index out of bound exception]
+CVE-2021-47308 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/b27c4577557045f1ab3cdfeabfc7f3cd24aca1fe (5.14-rc1)
-CVE-2021-47309 [net: validate lwtstate->data before returning from skb_tunnel_info()]
+CVE-2021-47309 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/67a9c94317402b826fc3db32afc8f39336803d97 (5.14-rc2)
-CVE-2021-47310 [net: ti: fix UAF in tlan_remove_one]
+CVE-2021-47310 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/0336f8ffece62f882ab3012820965a786a983f70 (5.14-rc2)
-CVE-2021-47311 [net: qcom/emac: fix UAF in emac_remove]
+CVE-2021-47311 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/ad297cd2db8953e2202970e9504cab247b6c7cb4 (5.14-rc2)
-CVE-2021-47312 [netfilter: nf_tables: Fix dereference of null pointer flow]
+CVE-2021-47312 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/4ca041f919f13783b0b03894783deee00dbca19a (5.14-rc2)
-CVE-2021-47313 [cpufreq: CPPC: Fix potential memleak in cppc_cpufreq_cpu_init]
+CVE-2021-47313 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fe2535a44904a77615a3af8e8fd7dafb98fb0e1b (5.14-rc1)
-CVE-2021-47314 [memory: fsl_ifc: fix leak of private memory on probe failure]
+CVE-2021-47314 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/8e0d09b1232d0538066c40ed4c13086faccbdff6 (5.14-rc1)
-CVE-2021-47315 [memory: fsl_ifc: fix leak of IO mapping on probe failure]
+CVE-2021-47315 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/3b132ab67fc7a358fff35e808fa65d4bea452521 (5.14-rc1)
-CVE-2021-47316 [nfsd: fix NULL dereference in nfs3svc_encode_getaclres]
+CVE-2021-47316 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ab1016d39cc052064e32f25ad18ef8767a0ee3b8 (5.14-rc1)
-CVE-2021-47317 [powerpc/bpf: Fix detecting BPF atomic instructions]
+CVE-2021-47317 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/419ac821766cbdb9fd85872bb3f1a589df05c94c (5.14-rc1)
-CVE-2021-47318 [arch_topology: Avoid use-after-free for scale_freq_data]
+CVE-2021-47318 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 5.14.6-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/83150f5d05f065fb5c12c612f119015cabdcc124 (5.14-rc1)
-CVE-2021-47319 [virtio-blk: Fix memory leak among suspend/resume procedure]
+CVE-2021-47319 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/b71ba22e7c6c6b279c66f53ee7818709774efa1f (5.14-rc1)
-CVE-2021-47320 [nfs: fix acl memory leak of posix_acl_create()]
+CVE-2021-47320 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/1fcb6fcd74a222d9ead54d405842fc763bb86262 (5.14-rc1)
-CVE-2021-47321 [watchdog: Fix possible use-after-free by calling del_timer_sync()]
+CVE-2021-47321 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/d0212f095ab56672f6f36aabc605bda205e1e0bf (5.14-rc1)
-CVE-2021-47322 [NFSv4: Fix an Oops in pnfs_mark_request_commit() when doing O_DIRECT]
+CVE-2021-47322 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3731d44bba8e0116b052b1b374476c5f6dd9a456 (5.14-rc1)
-CVE-2021-47323 [watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()]
+CVE-2021-47323 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/90b7c141132244e8e49a34a4c1e445cce33e07f4 (5.14-rc1)
-CVE-2021-47324 [watchdog: Fix possible use-after-free in wdt_startup()]
+CVE-2021-47324 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/c08a6b31e4917034f0ed0cb457c3bb209576f542 (5.14-rc1)
-CVE-2021-47325 [iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation]
+CVE-2021-47325 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/7c8f176d6a3fa18aa0f8875da6f7c672ed2a8554 (5.14-rc1)
-CVE-2021-47326 [x86/signal: Detect and prevent an alternate signal stack overflow]
+CVE-2021-47326 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/2beb4a53fc3f1081cedc1c1a198c7f56cc4fc60c (5.14-rc1)
-CVE-2021-47327 [iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails]
+CVE-2021-47327 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/1adf30f198c26539a62d761e45af72cde570413d (5.14-rc1)
-CVE-2021-47328 [scsi: iscsi: Fix conn use after free during resets]
+CVE-2021-47328 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/ec29d0ac29be366450a7faffbcf8cba3a6a3b506 (5.14-rc1)
-CVE-2021-47329 [scsi: megaraid_sas: Fix resource leak in case of probe failure]
+CVE-2021-47329 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/b5438f48fdd8e1c3f130d32637511efd32038152 (5.14-rc1)
-CVE-2021-47330 [tty: serial: 8250: serial_cs: Fix a memory leak in error handling path]
+CVE-2021-47330 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/fad92b11047a748c996ebd6cfb164a63814eeb2e (5.14-rc1)
-CVE-2021-47331 [usb: common: usb-conn-gpio: fix NULL pointer dereference of charger]
+CVE-2021-47331 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/880287910b1892ed2cb38977893b947382a09d21 (5.14-rc1)
-CVE-2021-47332 [ALSA: usx2y: Don't call free_pages_exact() with NULL address]
+CVE-2021-47332 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/cae0cf651adccee2c3f376e78f30fbd788d0829f (5.14-rc1)
-CVE-2021-47333 [misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge]
+CVE-2021-47333 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/3ce3e45cc333da707d4d6eb433574b990bcc26f5 (5.14-rc1)
-CVE-2021-47334 [misc/libmasm/module: Fix two use after free in ibmasm_init_one]
+CVE-2021-47334 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/7272b591c4cb9327c43443f67b8fbae7657dd9ae (5.14-rc1)
-CVE-2021-47335 [f2fs: fix to avoid racing on fsync_entry_slab by multi filesystem instances]
+CVE-2021-47335 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/cad83c968c2ebe97905f900326988ed37146c347 (5.14-rc1)
-CVE-2021-47336 [smackfs: restrict bytes count in smk_set_cipso()]
+CVE-2021-47336 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/49ec114a6e62d8d320037ce71c1aaf9650b3cafd (5.14-rc1)
-CVE-2021-47337 [scsi: core: Fix bad pointer dereference when ehandler kthread is invalid]
+CVE-2021-47337 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/93aa71ad7379900e61c8adff6a710a4c18c7c99b (5.14-rc2)
-CVE-2021-47338 [fbmem: Do not delete the mode that is still in use]
+CVE-2021-47338 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0af778269a522c988ef0b4188556aba97fb420cc (5.14-rc2)
-CVE-2021-47339 [media: v4l2-core: explicitly clear ioctl input data]
+CVE-2021-47339 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.14.6-1
 	NOTE: https://git.kernel.org/linus/7b53cca764f9b291b7907fcd39d9e66ad728ee0b (5.14-rc1)
-CVE-2021-47340 [jfs: fix GPF in diFree]
+CVE-2021-47340 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/9d574f985fe33efd6911f4d752de6f485a1ea732 (5.14-rc1)
-CVE-2021-47341 [KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio]
+CVE-2021-47341 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/23fa2e46a5556f787ce2ea1a315d3ab93cced204 (5.14-rc2)
-CVE-2021-47342 [ext4: fix possible UAF when remounting r/o a mmp-protected file system]
+CVE-2021-47342 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.84-1
 	NOTE: https://git.kernel.org/linus/61bb4a1c417e5b95d9edb4f887f131de32e419cb (5.14-rc1)
-CVE-2021-47343 [dm btree remove: assign new_root only when removal succeeds]
+CVE-2021-47343 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/b6e58b5466b2959f83034bead2e2e1395cca8aeb (5.14-rc1)
-CVE-2021-47344 [media: zr364xx: fix memory leak in zr364xx_start_readpipe]
+CVE-2021-47344 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/0a045eac8d0427b64577a24d74bb8347c905ac65 (5.14-rc1)
-CVE-2021-47345 [RDMA/cma: Fix rdma_resolve_route() memory leak]
+CVE-2021-47345 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/74f160ead74bfe5f2b38afb4fcf86189f9ff40c9 (5.14-rc1)
-CVE-2021-47346 [coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer()]
+CVE-2021-47346 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/5fae8a946ac2df879caf3f79a193d4766d00239b (5.14-rc1)
-CVE-2021-47347 [wl1251: Fix possible buffer overflow in wl1251_cmd_scan]
+CVE-2021-47347 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/d10a87a3535cce2b890897914f5d0d83df669c63 (5.14-rc1)
-CVE-2021-47348 [drm/amd/display: Avoid HDCP over-read and corruption]
+CVE-2021-47348 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/06888d571b513cbfc0b41949948def6cb81021b2 (5.14-rc1)
-CVE-2021-47349 [mwifiex: bring down link before deleting interface]
+CVE-2021-47349 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1f9482aa8d412b4ba06ce6ab8e333fb8ca29a06e (5.14-rc6)
-CVE-2021-47350 [powerpc/mm: Fix lockup on kernel exec fault]
+CVE-2021-47350 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/cd5d5e602f502895e47e18cd46804d6d7014e65c (5.14-rc1)
-CVE-2021-47351 [Description:]
+CVE-2021-47351 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/f4e3634a3b642225a530c292fdb1e8a4007507f5 (5.14-rc1)
-CVE-2021-47352 [virtio-net: Add validation for used length]
+CVE-2021-47352 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/ad993a95c508417acdeb15244109e009e50d8758 (5.14-rc1)
-CVE-2021-47353 [udf: Fix NULL pointer dereference in udf_symlink function]
+CVE-2021-47353 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/fa236c2b2d4436d9f19ee4e5d5924e90ffd7bb43 (5.14-rc1)
-CVE-2021-47354 [drm/sched: Avoid data corruptions]
+CVE-2021-47354 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	NOTE: https://git.kernel.org/linus/0b10ab80695d61422337ede6ff496552d8ace99d (5.14-rc1)
-CVE-2021-47355 [atm: nicstar: Fix possible use-after-free in nicstar_cleanup()]
+CVE-2021-47355 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/34e7434ba4e97f4b85c1423a59b2922ba7dff2ea (5.14-rc1)
-CVE-2021-47356 [mISDN: fix possible use-after-free in HFC_cleanup()]
+CVE-2021-47356 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/009fc857c5f6fda81f2f7dd851b2d54193a8e733 (5.14-rc1)
-CVE-2021-47357 [atm: iphase: fix possible use-after-free in ia_module_exit()]
+CVE-2021-47357 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 5.14.6-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.208-1
 	NOTE: https://git.kernel.org/linus/1c72e6ab66b9598cac741ed397438a52065a8f1f (5.14-rc1)
-CVE-2021-47358 [staging: greybus: uart: fix tty use after free]
+CVE-2021-47358 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 5.14.9-1
 	[bullseye] - linux 5.10.70-1
 	[buster] - linux 4.19.232-1
@@ -1813,9 +1933,9 @@ CVE-2024-35191 (Formie is a Craft CMS plugin for creating forms. Prior to 2.1.6,
 	NOT-FOR-US: Craft CMS plugin
 CVE-2024-34710 (Wiki.js is al wiki app built on Node.js. Client side template injectio ...)
 	NOT-FOR-US: Wiki.js
-CVE-2024-33901 (Issue in KeePassXC 2.7.7 allows an attacker to recover some passwords  ...)
+CVE-2024-33901 (Issue in KeePassXC 2.7.7 allows an attacker (who has the privileges of ...)
 	TODO: check
-CVE-2024-33900 (KeePassXC 2.7.7 allows attackers to recover cleartext credentials.)
+CVE-2024-33900 (KeePassXC 2.7.7 allows an attacker (who has the privileges of the vict ...)
 	TODO: check
 CVE-2024-2189 (The Social Icons Widget & Block by WPZOOM WordPress plugin before 4.2. ...)
 	NOT-FOR-US: WordPress plugin
@@ -1853,7 +1973,7 @@ CVE-2024-34953 (An issue in taurusxin ncmdump v1.3.2 allows attackers to cause a
 	NOT-FOR-US: taurusxin ncmdump
 CVE-2024-34952 (taurusxin ncmdump v1.3.2 was discovered to contain a segmentation viol ...)
 	NOT-FOR-US: taurusxin ncmdump
-CVE-2024-34949 (likeshop 2.5.7 is vulnerable to SQL Injection via the getOrderList fun ...)
+CVE-2024-34949 (SQL injection vulnerability in Likeshop before 2.5.7 allows attackers  ...)
 	NOT-FOR-US: likeshop
 CVE-2024-34948 (An issue in Quanxun Huiju Network Technology(Beijing) Co.,Ltd IK-Q3000 ...)
 	NOT-FOR-US: Quanxun Huiju Network Technology(Beijing) Co.
@@ -2283,7 +2403,7 @@ CVE-2024-5100 (A vulnerability was found in SourceCodester Simple Inventory Syst
 	NOT-FOR-US: SourceCodester Simple Inventory System
 CVE-2024-36078 (In Zammad before 6.3.1, a Ruby gem bundled by Zammad is installed with ...)
 	- zammad <itp> (bug #841355)
-CVE-2024-36076 (Syslifters SysReptor before 2024.40 has a CSRF vulnerability for WebSo ...)
+CVE-2024-36076 (Cross-Site WebSocket Hijacking in SysReptor from version 2024.28 to ve ...)
 	NOT-FOR-US: Syslifters SysReptor
 CVE-2024-36070 (tine before 2023.11.8, when an LDAP backend is used, allows anonymous  ...)
 	TODO: check



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7aa6eab11ff8d4dbec280c0cdb66bce03994e90b

-- 
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7aa6eab11ff8d4dbec280c0cdb66bce03994e90b
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240521/8d10cba6/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list