[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Oct 21 21:12:46 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
84f1ecba by security tracker role at 2024-10-21T20:12:39+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,1039 +1,1271 @@
-CVE-2024-50065 [ntfs3: Change to non-blocking allocation in ntfs_d_hash]
+CVE-2024-8305 (prepareUnique index may cause secondaries to crash due to incorrect en ...)
+	TODO: check
+CVE-2024-49368 (Nginx UI is a web user interface for the Nginx web server. Prior to ve ...)
+	TODO: check
+CVE-2024-49367 (Nginx UI is a web user interface for the Nginx web server. Prior to ve ...)
+	TODO: check
+CVE-2024-49366 (Nginx UI is a web user interface for the Nginx web server. Nginx UI v2 ...)
+	TODO: check
+CVE-2024-49321 (Missing Authorization vulnerability in Colorlib Simple Custom Post Ord ...)
+	TODO: check
+CVE-2024-49293 (Missing Authorization vulnerability in Rextheme WP VR allows Exploitin ...)
+	TODO: check
+CVE-2024-49273 (Missing Authorization vulnerability in ProfileGrid User Profiles Profi ...)
+	TODO: check
+CVE-2024-48930 (secp256k1-node is a Node.js binding for an Optimized C library for EC  ...)
+	TODO: check
+CVE-2024-48709 (CodeAstro Membership Management System v1.0 is vulnerable to Cross Sit ...)
+	TODO: check
+CVE-2024-48659 (An issue in DCME-320-L <=9.3.2.114 allows a remote attacker to execute ...)
+	TODO: check
+CVE-2024-48645 (In Minecraft mod "Command Block IDE" up to and including version 0.4.9 ...)
+	TODO: check
+CVE-2024-48597 (Online Clinic Management System v1.0 was discovered to contain a SQL i ...)
+	TODO: check
+CVE-2024-48509 (Learning with Texts (LWT) 2.0.3 is vulnerable to SQL Injection. This o ...)
+	TODO: check
+CVE-2024-48231 (Funadmin 5.0.2 is vulnerable to SQL Injection via the selectFields par ...)
+	TODO: check
+CVE-2024-47912 (A vulnerability in the AWV (Audio, Web, and Video) Conferencing compon ...)
+	TODO: check
+CVE-2024-47825 (Cilium is a networking, observability, and security solution with an e ...)
+	TODO: check
+CVE-2024-47722
+	REJECTED
+CVE-2024-47328 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2024-47223 (A vulnerability in the AWV (Audio, Web and Video Conferencing) compone ...)
+	TODO: check
+CVE-2024-47189 (The API Interface of the AWV (Audio, Web and Video Conferencing) compo ...)
+	TODO: check
+CVE-2024-46326 (Public Knowledge Project pkp-lib 3.4.0-7 and earlier is vulnerable to  ...)
+	TODO: check
+CVE-2024-46239 (Multiple cross-site scripting vulnerabilities exist in PHPGurukul Hosp ...)
+	TODO: check
+CVE-2024-46238 (Multiple Cross Site Scripting (XSS) vulnerabilities exist in PHPGuruku ...)
+	TODO: check
+CVE-2024-46236 (CodeAstro Membership Management System v1.0 is vulnerable to Cross Sit ...)
+	TODO: check
+CVE-2024-45309 (OneDev is a Git server with CI/CD, kanban, and packages. A vulnerabili ...)
+	TODO: check
+CVE-2024-43945 (Cross-Site Request Forgery (CSRF) vulnerability in Latepoint LatePoint ...)
+	TODO: check
+CVE-2024-40746 (A stored cross-site scripting (XSS) vulnerability in HikaShop Joomla C ...)
+	TODO: check
+CVE-2024-31007 (Buffer Overflow vulnerability in IrfanView 32bit v.4.66 allows a local ...)
+	TODO: check
+CVE-2022-49033 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	TODO: check
+CVE-2022-49032 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2022-49031 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2022-49030 (In the Linux kernel, the following vulnerability has been resolved:  l ...)
+	TODO: check
+CVE-2022-49029 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
+	TODO: check
+CVE-2022-49028 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2022-49027 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2022-49026 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
+	TODO: check
+CVE-2022-49025 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-49024 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2022-49023 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	TODO: check
+CVE-2022-49022 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	TODO: check
+CVE-2022-49021 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-49020 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-49019 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-49018 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	TODO: check
+CVE-2022-49017 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
+	TODO: check
+CVE-2022-49016 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-49015 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-49014 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-49013 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	TODO: check
+CVE-2022-49012 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
+	TODO: check
+CVE-2022-49011 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
+	TODO: check
+CVE-2022-49010 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
+	TODO: check
+CVE-2022-49009 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
+	TODO: check
+CVE-2022-49008 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2022-49007 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-49006 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
+	TODO: check
+CVE-2022-49005 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
+	TODO: check
+CVE-2022-49004 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
+	TODO: check
+CVE-2022-49003 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-49002 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2022-49001 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
+	TODO: check
+CVE-2022-49000 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2022-48999 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2022-48998 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
+	TODO: check
+CVE-2022-48997 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2022-48996 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	TODO: check
+CVE-2022-48995 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
+	TODO: check
+CVE-2022-48994 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
+	TODO: check
+CVE-2022-48993 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	TODO: check
+CVE-2022-48992 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
+	TODO: check
+CVE-2022-48991 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	TODO: check
+CVE-2022-48990 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2022-48989 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	TODO: check
+CVE-2022-48988 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	TODO: check
+CVE-2022-48987 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	TODO: check
+CVE-2022-48986 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	TODO: check
+CVE-2022-48985 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-48984 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2022-48983 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2022-48982 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
+	TODO: check
+CVE-2022-48981 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2022-48980 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-48979 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2022-48978 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
+	TODO: check
+CVE-2022-48977 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	TODO: check
+CVE-2022-48976 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-48975 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
+	TODO: check
+CVE-2022-48974 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-48973 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
+	TODO: check
+CVE-2022-48972 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	TODO: check
+CVE-2022-48971 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
+	TODO: check
+CVE-2022-48970 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
+	TODO: check
+CVE-2022-48969 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
+	TODO: check
+CVE-2022-48968 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
+	TODO: check
+CVE-2022-48967 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
+	TODO: check
+CVE-2022-48966 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-48965 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
+	TODO: check
+CVE-2022-48964 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
+	TODO: check
+CVE-2022-48963 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-48962 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-48961 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-48960 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-48959 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-48958 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
+	TODO: check
+CVE-2022-48957 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	TODO: check
+CVE-2022-48956 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2022-48955 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	TODO: check
+CVE-2022-48954 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	TODO: check
+CVE-2022-48953 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
+	TODO: check
+CVE-2022-48952 (In the Linux kernel, the following vulnerability has been resolved:  P ...)
+	TODO: check
+CVE-2022-48951 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
+	TODO: check
+CVE-2022-48950 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
+	TODO: check
+CVE-2022-48949 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	TODO: check
+CVE-2022-48948 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
+	TODO: check
+CVE-2022-48947 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
+	TODO: check
+CVE-2022-48946 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
+	TODO: check
+CVE-2024-50065 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/589996bf8c459deb5bbc9747d8f1c51658608103 (6.12-rc3)
-CVE-2024-50064 [zram: free secondary algorithms names]
+CVE-2024-50064 (In the Linux kernel, the following vulnerability has been resolved:  z ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/684826f8271ad97580b138b9ffd462005e470b99 (6.12-rc1)
-CVE-2024-50063 [bpf: Prevent tail call between progs attached to different hooks]
+CVE-2024-50063 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/28ead3eaabc16ecc907cfb71876da028080f6356 (6.12-rc1)
-CVE-2024-50062 [RDMA/rtrs-srv: Avoid null pointer deref during path establishment]
+CVE-2024-50062 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/d0e62bf7b575fbfe591f6f570e7595dd60a2f5eb (6.12-rc1)
-CVE-2024-50061 [i3c: master: cdns: Fix use after free vulnerability in cdns_i3c_master Driver Due to Race Condition]
+CVE-2024-50061 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/609366e7a06d035990df78f1562291c3bf0d4a12 (6.12-rc1)
-CVE-2024-50060 [io_uring: check if we need to reschedule during overflow flush]
+CVE-2024-50060 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/eac2ca2d682f94f46b1973bdf5e77d85d77b8e53 (6.12-rc1)
-CVE-2024-50059 [ntb: ntb_hw_switchtec: Fix use after free vulnerability in switchtec_ntb_remove due to race condition]
+CVE-2024-50059 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/e51aded92d42784313ba16c12f4f88cc4f973bbb (6.12-rc1)
-CVE-2024-50058 [serial: protect uart_port_dtr_rts() in uart_shutdown() too]
+CVE-2024-50058 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/602babaa84d627923713acaf5f7e9a4369e77473 (6.12-rc1)
-CVE-2024-50057 [usb: typec: tipd: Free IRQ only if it was requested before]
+CVE-2024-50057 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/db63d9868f7f310de44ba7bea584e2454f8b4ed0 (6.12-rc1)
-CVE-2024-50056 [usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c]
+CVE-2024-50056 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/a7bb96b18864225a694e3887ac2733159489e4b0 (6.12-rc1)
-CVE-2024-50055 [driver core: bus: Fix double free in driver API bus_register()]
+CVE-2024-50055 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/bfa54a793ba77ef696755b66f3ac4ed00c7d1248 (6.12-rc1)
-CVE-2024-50049 [drm/amd/display: Check null pointer before dereferencing se]
+CVE-2024-50049 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/ff599ef6970ee000fa5bc38d02fa5ff5f3fc7575 (6.12-rc1)
-CVE-2024-50048 [fbcon: Fix a NULL pointer dereference issue in fbcon_putcs]
+CVE-2024-50048 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/5b97eebcce1b4f3f07a71f635d6aa3af96c236e7 (6.12-rc1)
-CVE-2024-50047 [smb: client: fix UAF in async decryption]
+CVE-2024-50047 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/b0abcd65ec545701b8793e12bc27dc98042b151a (6.12-rc1)
-CVE-2024-50046 [NFSv4: Prevent NULL-pointer dereference in nfs42_complete_copies()]
+CVE-2024-50046 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/a848c29e3486189aaabd5663bc11aea50c5bd144 (6.12-rc3)
-CVE-2024-50045 [netfilter: br_netfilter: fix panic with metadata_dst skb]
+CVE-2024-50045 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/f9ff7665cd128012868098bbd07e28993e314fdb (6.12-rc3)
-CVE-2024-50044 [Bluetooth: RFCOMM: FIX possible deadlock in rfcomm_sk_state_change]
+CVE-2024-50044 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/08d1914293dae38350b8088980e59fbc699a72fe (6.12-rc3)
-CVE-2024-50043 [nfsd: fix possible badness in FREE_STATEID]
+CVE-2024-50043 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c88c150a467fcb670a1608e2272beeee3e86df6e (6.12-rc3)
-CVE-2024-50042 [ice: Fix increasing MSI-X on VF]
+CVE-2024-50042 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/bce9af1b030bf59d51bbabf909a3ef164787e44e (6.12-rc3)
-CVE-2024-50041 [i40e: Fix macvlan leak by synchronizing access to mac_filter_hash]
+CVE-2024-50041 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/dac6c7b3d33756d6ce09f00a96ea2ecd79fae9fb (6.12-rc3)
-CVE-2024-50040 [igb: Do not bring the device up after non-fatal error]
+CVE-2024-50040 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/330a699ecbfc9c26ec92c6310686da1230b4e7eb (6.12-rc3)
-CVE-2024-50039 [net/sched: accept TCA_STAB only for root qdisc]
+CVE-2024-50039 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/3cb7cf1540ddff5473d6baeb530228d19bc97b8a (6.12-rc3)
-CVE-2024-50038 [netfilter: xtables: avoid NFPROTO_UNSPEC where needed]
+CVE-2024-50038 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/0bfcb7b71e735560077a42847f69597ec7dcc326 (6.12-rc3)
-CVE-2024-50037 [drm/fbdev-dma: Only cleanup deferred I/O if necessary]
+CVE-2024-50037 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fcddc71ec7ecf15b4df3c41288c9cf0b8e886111 (6.12-rc3)
-CVE-2024-50036 [net: do not delay dst_entries_add() in dst_release()]
+CVE-2024-50036 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/ac888d58869bb99753e7652be19a151df9ecb35d (6.12-rc3)
-CVE-2024-50035 [ppp: fix ppp_async_encode() illegal access]
+CVE-2024-50035 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/40dddd4b8bd08a69471efd96107a4e1c73fabefc (6.12-rc3)
-CVE-2024-50034 [net/smc: fix lacks of icsk_syn_mss with IPPROTO_SMC]
+CVE-2024-50034 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6fd27ea183c208e478129a85e11d880fc70040f2 (6.12-rc3)
-CVE-2024-50033 [slip: make slhc_remember() more robust against malicious packets]
+CVE-2024-50033 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/7d3fce8cbe3a70a1c7c06c9b53696be5d5d8dd5c (6.12-rc3)
-CVE-2024-50032 [rcu/nocb: Fix rcuog wake-up from offline softirq]
+CVE-2024-50032 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f7345ccc62a4b880cf76458db5f320725f28e400 (6.12-rc3)
-CVE-2024-50031 [drm/v3d: Stop the active perfmon before being destroyed]
+CVE-2024-50031 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7d1fd3638ee3a9f9bca4785fffb638ca19120718 (6.12-rc3)
-CVE-2024-50030 [drm/xe/ct: prevent UAF in send_recv()]
+CVE-2024-50030 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/db7f92af626178ba59dbbcdd5dee9ec24a987a88 (6.12-rc3)
-CVE-2024-50029 [Bluetooth: hci_conn: Fix UAF in hci_enhanced_setup_sync]
+CVE-2024-50029 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/18fd04ad856df07733f5bb07e7f7168e7443d393 (6.12-rc3)
-CVE-2024-50028 [thermal: core: Reference count the zone in thermal_zone_get_by_id()]
+CVE-2024-50028 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/a42a5839f400e929c489bb1b58f54596c4535167 (6.12-rc3)
-CVE-2024-50027 [thermal: core: Free tzp copy along with the thermal zone]
+CVE-2024-50027 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/827a07525c099f54d3b15110408824541ec66b3c (6.12-rc3)
-CVE-2024-50026 [scsi: wd33c93: Don't use stale scsi_pointer value]
+CVE-2024-50026 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9023ed8d91eb1fcc93e64dc4962f7412b1c4cbec (6.12-rc3)
-CVE-2024-50025 [scsi: fnic: Move flush_work initialization out of if block]
+CVE-2024-50025 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f30e5f77d2f205ac14d09dec40fd4bb76712f13d (6.12-rc3)
-CVE-2024-50024 [net: Fix an unsafe loop on the list]
+CVE-2024-50024 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/1dae9f1187189bc09ff6d25ca97ead711f7e26f9 (6.12-rc3)
-CVE-2024-50023 [net: phy: Remove LED entry from LEDs list on unregister]
+CVE-2024-50023 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f50b5d74c68e551667e265123659b187a30fe3a5 (6.12-rc3)
-CVE-2024-50022 [device-dax: correct pgoff align in dax_set_mapping()]
+CVE-2024-50022 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7fcbd9785d4c17ea533c42f20a9083a83f301fa6 (6.12-rc3)
-CVE-2024-50021 [ice: Fix improper handling of refcount in ice_dpll_init_rclk_pins()]
+CVE-2024-50021 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ccca30a18e36a742e606d5bf0630e75be7711d0a (6.12-rc3)
-CVE-2024-50020 [ice: Fix improper handling of refcount in ice_sriov_set_msix_vec_count()]
+CVE-2024-50020 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d517cf89874c6039e6294b18d66f40988e62502a (6.12-rc3)
-CVE-2024-50019 [kthread: unpark only parked kthread]
+CVE-2024-50019 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/214e01ad4ed7158cab66498810094fac5d09b218 (6.12-rc3)
-CVE-2024-50018 [net: napi: Prevent overflow of napi_defer_hard_irqs]
+CVE-2024-50018 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/08062af0a52107a243f7608fd972edb54ca5b7f8 (6.12-rc1)
-CVE-2024-50017 [x86/mm/ident_map: Use gbpages only where full GB page should be mapped.]
+CVE-2024-50017 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/cc31744a294584a36bf764a0ffa3255a8e69f036 (6.12-rc1)
-CVE-2024-50016 [drm/amd/display: Avoid overflow assignment in link_dp_cts]
+CVE-2024-50016 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/a15268787b79fd183dd526cc16bec9af4f4e49a1 (6.12-rc1)
-CVE-2024-50015 [ext4: dax: fix overflowing extents beyond inode size when partially writing]
+CVE-2024-50015 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/dda898d7ffe85931f9cca6d702a51f33717c501e (6.12-rc1)
-CVE-2024-50014 [ext4: fix access to uninitialised lock in fc replay path]
+CVE-2024-50014 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/23dfdb56581ad92a9967bcd720c8c23356af74c1 (6.12-rc1)
-CVE-2024-50013 [exfat: fix memory leak in exfat_load_bitmap()]
+CVE-2024-50013 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/d2b537b3e533f28e0d97293fe9293161fe8cd137 (6.12-rc1)
-CVE-2024-50012 [cpufreq: Avoid a bad reference count on CPU node]
+CVE-2024-50012 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/c0f02536fffbbec71aced36d52a765f8c4493dc2 (6.12-rc2)
-CVE-2024-50011 [ASoC: Intel: soc-acpi-intel-rpl-match: add missing empty item]
+CVE-2024-50011 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5afc29ba44fdd1bcbad4e07246c395d946301580 (6.12-rc2)
-CVE-2024-50010 [exec: don't WARN for racy path_noexec check]
+CVE-2024-50010 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/0d196e7589cefe207d5d41f37a0a28a1fdeeb7c6 (6.12-rc1)
-CVE-2024-50009 [cpufreq: amd-pstate: add check for cpufreq_cpu_get's return value]
+CVE-2024-50009 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/5493f9714e4cdaf0ee7cec15899a231400cb1a9f (6.12-rc1)
-CVE-2024-50008 [wifi: mwifiex: Fix memcpy() field-spanning write warning in mwifiex_cmd_802_11_scan_ext()]
+CVE-2024-50008 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/498365e52bebcbc36a93279fe7e9d6aec8479cee (6.12-rc1)
-CVE-2024-50007 [ALSA: asihpi: Fix potential OOB array access]
+CVE-2024-50007 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/7b986c7430a6bb68d523dac7bfc74cbd5b44ef96 (6.12-rc1)
-CVE-2024-50006 [ext4: fix i_data_sem unlock order in ext4_ind_migrate()]
+CVE-2024-50006 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/cc749e61c011c255d81b192a822db650c68b313f (6.12-rc1)
-CVE-2024-50005 [mac802154: Fix potential RCU dereference issue in mac802154_scan_worker]
+CVE-2024-50005 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/bff1709b3980bd7f80be6786f64cc9a9ee9e56da (6.12-rc2)
-CVE-2024-50004 [drm/amd/display: update DML2 policy EnhancedPrefetchScheduleAccelerationFinal DCN35]
+CVE-2024-50004 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/0d5e5e8a0aa49ea2163abf128da3b509a6c58286 (6.12-rc2)
-CVE-2024-50003 [drm/amd/display: Fix system hang while resume with TBT monitor]
+CVE-2024-50003 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/52d4e3fb3d340447dcdac0e14ff21a764f326907 (6.12-rc2)
-CVE-2024-50002 [static_call: Handle module init failure correctly in static_call_del_module()]
+CVE-2024-50002 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/4b30051c4864234ec57290c3d142db7c88f10d8a (6.12-rc1)
-CVE-2024-50001 [net/mlx5: Fix error path in multi-packet WQE transmit]
+CVE-2024-50001 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/2bcae12c795f32ddfbf8c80d1b5f1d3286341c32 (6.12-rc2)
-CVE-2024-50000 [net/mlx5e: Fix NULL deref in mlx5e_tir_builder_alloc()]
+CVE-2024-50000 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f25389e779500cf4a59ef9804534237841bce536 (6.12-rc2)
-CVE-2024-49999 [afs: Fix the setting of the server responding flag]
+CVE-2024-49999 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ff98751bae40faed1ba9c6a7287e84430f7dec64 (6.12-rc2)
-CVE-2024-49998 [net: dsa: improve shutdown sequence]
+CVE-2024-49998 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6c24a03a61a245fe34d47582898331fa034b6ccd (6.12-rc2)
-CVE-2024-49997 [net: ethernet: lantiq_etop: fix memory disclosure]
+CVE-2024-49997 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/45c0de18ff2dc9af01236380404bbd6a46502c69 (6.12-rc2)
-CVE-2024-49996 [cifs: Fix buffer overflow when parsing NFS reparse points]
+CVE-2024-49996 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/e2a8910af01653c1c268984855629d71fb81f404 (6.12-rc2)
-CVE-2024-49995 [tipc: guard against string buffer overrun]
+CVE-2024-49995 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/6555a2a9212be6983d2319d65276484f7c5f431a (6.12-rc1)
-CVE-2024-49994 [block: fix integer overflow in BLKSECDISCARD]
+CVE-2024-49994 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/697ba0b6ec4ae04afb67d3911799b5e2043b4455 (6.12-rc1)
-CVE-2024-49993 [iommu/vt-d: Fix potential lockup if qi_submit_sync called with 0 count]
+CVE-2024-49993 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/3cf74230c139f208b7fb313ae0054386eee31a81 (6.12-rc1)
-CVE-2024-49992 [drm/stm: Avoid use-after-free issues with crtc and plane]
+CVE-2024-49992 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/19dd9780b7ac673be95bf6fd6892a184c9db611f (6.12-rc1)
-CVE-2024-49991 [drm/amdkfd: amdkfd_free_gtt_mem clear the correct pointer]
+CVE-2024-49991 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/c86ad39140bbcb9dc75a10046c2221f657e8083b (6.12-rc1)
-CVE-2024-49990 [drm/xe/hdcp: Check GSC structure validity]
+CVE-2024-49990 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/b4224f6bae3801d589f815672ec62800a1501b0d (6.12-rc1)
-CVE-2024-49989 [drm/amd/display: fix double free issue during amdgpu module unload]
+CVE-2024-49989 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/20b5a8f9f4670a8503aa9fa95ca632e77c6bf55d (6.12-rc1)
-CVE-2024-49988 [ksmbd: add refcnt to ksmbd_conn struct]
+CVE-2024-49988 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/ee426bfb9d09b29987369b897fe9b6485ac2be27 (6.12-rc1)
-CVE-2024-49987 [bpftool: Fix undefined behavior in qsort(NULL, 0, ...)]
+CVE-2024-49987 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/f04e2ad394e2755d0bb2d858ecb5598718bf00d5 (6.12-rc1)
-CVE-2024-49986 [platform/x86: x86-android-tablets: Fix use after free on platform_device_register() errors]
+CVE-2024-49986 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2fae3129c0c08e72b1fe93e61fd8fd203252094a (6.12-rc2)
-CVE-2024-49985 [i2c: stm32f7: Do not prepare/unprepare clock during runtime suspend/resume]
+CVE-2024-49985 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/048bbbdbf85e5e00258dfb12f5e368f908801d7b (6.12-rc2)
-CVE-2024-49984 [drm/v3d: Prevent out of bounds access in performance query extensions]
+CVE-2024-49984 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f32b5128d2c440368b5bf3a7a356823e235caabb (6.12-rc1)
-CVE-2024-49983 [ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free]
+CVE-2024-49983 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/5c0f4cc84d3a601c99bc5e6e6eb1cbda542cce95 (6.12-rc1)
-CVE-2024-49982 [aoe: fix the potential use-after-free problem in more places]
+CVE-2024-49982 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/6d6e54fc71ad1ab0a87047fd9c211e75d86084a3 (6.12-rc2)
-CVE-2024-49981 [media: venus: fix use after free bug in venus_remove due to race condition]
+CVE-2024-49981 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/c5a85ed88e043474161bbfe54002c89c1cb50ee2 (6.12-rc1)
-CVE-2024-49980 [vrf: revert "vrf: Remove unnecessary RCU-bh critical section"]
+CVE-2024-49980 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b04c4d9eb4f25b950b33218e33b04c94e7445e51 (6.12-rc2)
-CVE-2024-49979 [net: gso: fix tcp fraglist segmentation after pull from frag_list]
+CVE-2024-49979 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/17bd3bd82f9f79f3feba15476c2b2c95a9b11ff8 (6.12-rc2)
-CVE-2024-49978 [gso: fix udp gso fraglist segmentation after pull from frag_list]
+CVE-2024-49978 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/a1e40ac5b5e9077fe1f7ae0eb88034db0f9ae1ab (6.12-rc2)
-CVE-2024-49977 [net: stmmac: Fix zero-division error when disabling tc cbs]
+CVE-2024-49977 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/675faf5a14c14a2be0b870db30a70764df81e2df (6.12-rc1)
-CVE-2024-49976 [tracing/timerlat: Drop interface_lock in stop_kthread()]
+CVE-2024-49976 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b484a02c9cedf8703eff8f0756f94618004bd165 (6.12-rc2)
-CVE-2024-49975 [uprobes: fix kernel info leak via "[uprobes]" vma]
+CVE-2024-49975 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/34820304cc2cd1804ee1f8f3504ec77813d29c8e (6.12-rc2)
-CVE-2024-49974 [NFSD: Limit the number of concurrent async COPY operations]
+CVE-2024-49974 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/aadc3bbea163b6caaaebfdd2b6c4667fbc726752 (6.12-rc1)
-CVE-2024-49973 [r8169: add tally counter fields added with RTL8125]
+CVE-2024-49973 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/ced8e8b8f40accfcce4a2bbd8b150aa76d5eff9a (6.12-rc1)
-CVE-2024-49972 [drm/amd/display: Deallocate DML memory if allocation fails]
+CVE-2024-49972 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/892abca6877a96c9123bb1c010cafccdf8ca1b75 (6.12-rc1)
-CVE-2024-49971 [drm/amd/display: Increase array size of dummy_boolean]
+CVE-2024-49971 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/6d64d39486197083497a01b39e23f2f8474b35d3 (6.12-rc1)
-CVE-2024-49970 [drm/amd/display: Implement bounds check for stream encoder creation in DCN401]
+CVE-2024-49970 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/bdf606810210e8e07a0cdf1af3c467291363b295 (6.12-rc1)
-CVE-2024-49969 [drm/amd/display: Fix index out of bounds in DCN30 color transformation]
+CVE-2024-49969 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/d81873f9e715b72d4f8d391c8eb243946f784dfc (6.12-rc1)
-CVE-2024-49968 [ext4: filesystems without casefold feature cannot be mounted with siphash]
+CVE-2024-49968 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/985b67cd86392310d9e9326de941c22fc9340eec (6.12-rc1)
-CVE-2024-49967 [ext4: no need to continue when the number of entries is 1]
+CVE-2024-49967 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/1a00a393d6a7fb1e745a41edd09019bd6a0ad64c (6.12-rc1)
-CVE-2024-49966 [ocfs2: cancel dqi_sync_work before freeing oinfo]
+CVE-2024-49966 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/35fccce29feb3706f649726d410122dd81b92c18 (6.12-rc1)
-CVE-2024-49965 [ocfs2: remove unreasonable unlock in ocfs2_read_blocks]
+CVE-2024-49965 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/c03a82b4a0c935774afa01fd6d128b444fd930a1 (6.12-rc1)
-CVE-2024-49964 [mm/hugetlb: fix memfd_pin_folios free_huge_pages leak]
+CVE-2024-49964 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c56b6f3d801d7ec8965993342bdd9e2972b6cb8e (6.12-rc1)
-CVE-2024-49963 [mailbox: bcm2835: Fix timeout during suspend mode]
+CVE-2024-49963 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/dc09f007caed3b2f6a3b6bd7e13777557ae22bfd (6.12-rc1)
-CVE-2024-49962 [ACPICA: check null return of ACPI_ALLOCATE_ZEROED() in acpi_db_convert_to_package()]
+CVE-2024-49962 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/a5242874488eba2b9062985bf13743c029821330 (6.12-rc1)
-CVE-2024-49961 [media: i2c: ar0521: Use cansleep version of gpiod_set_value()]
+CVE-2024-49961 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/bee1aed819a8cda47927436685d216906ed17f62 (6.12-rc1)
-CVE-2024-49960 [ext4: fix timer use-after-free on failed mount]
+CVE-2024-49960 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/0ce160c5bdb67081a62293028dc85758a8efb22a (6.12-rc1)
-CVE-2024-49959 [jbd2: stop waiting for space when jbd2_cleanup_journal_tail() returns error]
+CVE-2024-49959 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/f5cacdc6f2bb2a9bf214469dd7112b43dd2dd68a (6.12-rc1)
-CVE-2024-49958 [ocfs2: reserve space for inline xattr before attaching reflink tree]
+CVE-2024-49958 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/5ca60b86f57a4d9648f68418a725b3a7de2816b0 (6.12-rc1)
-CVE-2024-49957 [ocfs2: fix null-ptr-deref when journal load failed.]
+CVE-2024-49957 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/5784d9fcfd43bd853654bb80c87ef293b9e8e80a (6.12-rc1)
-CVE-2024-49956 [gfs2: fix double destroy_workqueue error]
+CVE-2024-49956 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6cb9df81a2c462b89d2f9611009ab43ae8717841 (6.12-rc1)
-CVE-2024-49955 [ACPI: battery: Fix possible crash when unregistering a battery hook]
+CVE-2024-49955 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/76959aff14a0012ad6b984ec7686d163deccdc16 (6.12-rc2)
-CVE-2024-49954 [static_call: Replace pointless WARN_ON() in static_call_module_notify()]
+CVE-2024-49954 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/fe513c2ef0a172a58f158e2e70465c4317f0a9a2 (6.12-rc1)
-CVE-2024-49953 [net/mlx5e: Fix crash caused by calling __xfrm_state_delete() twice]
+CVE-2024-49953 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7b124695db40d5c9c5295a94ae928a8d67a01c3d (6.12-rc2)
-CVE-2024-49952 [netfilter: nf_tables: prevent nf_skb_duplicated corruption]
+CVE-2024-49952 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/92ceba94de6fb4cee2bf40b485979c342f44a492 (6.12-rc2)
-CVE-2024-49951 [Bluetooth: MGMT: Fix possible crash on mgmt_index_removed]
+CVE-2024-49951 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f53e1c9c726d83092167f2226f32bd3b73f26c21 (6.12-rc2)
-CVE-2024-49950 [Bluetooth: L2CAP: Fix uaf in l2cap_connect]
+CVE-2024-49950 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/333b4fd11e89b29c84c269123f871883a30be586 (6.12-rc2)
-CVE-2024-49949 [net: avoid potential underflow in qdisc_pkt_len_init() with UFO]
+CVE-2024-49949 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/c20029db28399ecc50e556964eaba75c43b1e2f1 (6.12-rc2)
-CVE-2024-49948 [net: add more sanity checks to qdisc_pkt_len_init()]
+CVE-2024-49948 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/ab9a9a9e9647392a19e7a885b08000e89c86b535 (6.12-rc2)
-CVE-2024-49947 [net: test for not too small csum_start in virtio_net_hdr_to_skb()]
+CVE-2024-49947 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/49d14b54a527289d09a9480f214b8c586322310a (6.12-rc2)
-CVE-2024-49946 [ppp: do not assume bh is held in ppp_channel_bridge_input()]
+CVE-2024-49946 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/aec7291003df78cb71fd461d7b672912bde55807 (6.12-rc2)
-CVE-2024-49945 [net/ncsi: Disable the ncsi work before freeing the associated structure]
+CVE-2024-49945 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/a0ffa68c70b367358b2672cdab6fa5bc4c40de2c (6.12-rc2)
-CVE-2024-49944 [sctp: set sk_state back to CLOSED if autobind fails in sctp_listen_start]
+CVE-2024-49944 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/8beee4d8dee76b67c75dc91fd8185d91e845c160 (6.12-rc2)
-CVE-2024-49943 [drm/xe/guc_submit: add missing locking in wedged_fini]
+CVE-2024-49943 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/790533e44bfc7af929842fccd9674c9f424d4627 (6.12-rc2)
-CVE-2024-49942 [drm/xe: Prevent null pointer access in xe_migrate_copy]
+CVE-2024-49942 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7257d9c9a3c6cfe26c428e9b7ae21d61f2f55a79 (6.12-rc2)
-CVE-2024-49941 [gpiolib: Fix potential NULL pointer dereference in gpiod_get_label()]
+CVE-2024-49941 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7b99b5ab885993bff010ebcd93be5e511c56e28a (6.12-rc2)
-CVE-2024-49940 [l2tp: prevent possible tunnel refcount underflow]
+CVE-2024-49940 (In the Linux kernel, the following vulnerability has been resolved:  l ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/24256415d18695b46da06c93135f5b51c548b950 (6.12-rc1)
-CVE-2024-49939 [wifi: rtw89: avoid to add interface to list twice when SER]
+CVE-2024-49939 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/7dd5d2514a8ea58f12096e888b0bd050d7eae20a (6.12-rc1)
-CVE-2024-49938 [wifi: ath9k_htc: Use __skb_set_length() for resetting urb before resubmit]
+CVE-2024-49938 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/94745807f3ebd379f23865e6dab196f220664179 (6.12-rc1)
-CVE-2024-49937 [wifi: cfg80211: Set correct chandef when starting CAC]
+CVE-2024-49937 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/20361712880396e44ce80aaeec2d93d182035651 (6.12-rc1)
-CVE-2024-49936 [net/xen-netback: prevent UAF in xenvif_flush_hash()]
+CVE-2024-49936 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/0fa5e94a1811d68fbffa0725efe6d4ca62c03d12 (6.12-rc1)
-CVE-2024-49935 [ACPI: PAD: fix crash in exit_round_robin()]
+CVE-2024-49935 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/0a2ed70a549e61c5181bad5db418d223b68ae932 (6.12-rc1)
-CVE-2024-49934 [fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name]
+CVE-2024-49934 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/7f7b850689ac06a62befe26e1fd1806799e7f152 (6.12-rc1)
-CVE-2024-49933 [blk_iocost: fix more out of bound shifts]
+CVE-2024-49933 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/9bce8005ec0dcb23a58300e8522fe4a31da606fa (6.12-rc1)
-CVE-2024-49932 [btrfs: don't readahead the relocation inode on RST]
+CVE-2024-49932 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/04915240e2c3a018e4c7f23418478d27226c8957 (6.12-rc1)
-CVE-2024-49931 [wifi: ath12k: fix array out-of-bound access in SoC stats]
+CVE-2024-49931 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/e106b7ad13c1d246adaa57df73edb8f8b8acb240 (6.12-rc1)
-CVE-2024-49930 [wifi: ath11k: fix array out-of-bound access in SoC stats]
+CVE-2024-49930 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/69f253e46af98af17e3efa3e5dfa72fcb7d1983d (6.12-rc1)
-CVE-2024-49929 [wifi: iwlwifi: mvm: avoid NULL pointer dereference]
+CVE-2024-49929 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/557a6cd847645e667f3b362560bd7e7c09aac284 (6.12-rc1)
-CVE-2024-49928 [wifi: rtw89: avoid reading out of bounds when loading TX power FW elements]
+CVE-2024-49928 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/ed2e4bb17a4884cf29c3347353d8aabb7265b46c (6.12-rc1)
-CVE-2024-49927 [x86/ioapic: Handle allocation failures gracefully]
+CVE-2024-49927 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/830802a0fea8fb39d3dc9fb7d6b5581e1343eb1f (6.12-rc1)
-CVE-2024-49926 [rcu-tasks: Fix access non-existent percpu rtpcp variable in rcu_tasks_need_gpcb()]
+CVE-2024-49926 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/fd70e9f1d85f5323096ad313ba73f5fe3d15ea41 (6.12-rc1)
-CVE-2024-49925 [fbdev: efifb: Register sysfs groups through driver core]
+CVE-2024-49925 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/95cdd538e0e5677efbdf8aade04ec098ab98f457 (6.12-rc1)
-CVE-2024-49924 [fbdev: pxafb: Fix possible use after free in pxafb_task()]
+CVE-2024-49924 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/4a6921095eb04a900e0000da83d9475eb958e61e (6.12-rc1)
-CVE-2024-49923 [drm/amd/display: Pass non-null to dcn20_validate_apply_pipe_split_flags]
+CVE-2024-49923 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/5559598742fb4538e4c51c48ef70563c49c2af23 (6.12-rc1)
-CVE-2024-49922 [drm/amd/display: Check null pointers before using them]
+CVE-2024-49922 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/1ff12bcd7deaeed25efb5120433c6a45dd5504a8 (6.12-rc1)
-CVE-2024-49921 [drm/amd/display: Check null pointers before used]
+CVE-2024-49921 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/be1fb44389ca3038ad2430dac4234669bc177ee3 (6.12-rc1)
-CVE-2024-49920 [drm/amd/display: Check null pointers before multiple uses]
+CVE-2024-49920 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/fdd5ecbbff751c3b9061d8ebb08e5c96119915b4 (6.12-rc1)
-CVE-2024-49919 [drm/amd/display: Add null check for head_pipe in dcn201_acquire_free_pipe_for_layer]
+CVE-2024-49919 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/f22f4754aaa47d8c59f166ba3042182859e5dff7 (6.12-rc1)
-CVE-2024-49918 [drm/amd/display: Add null check for head_pipe in dcn32_acquire_idle_pipe_for_head_pipe_in_layer]
+CVE-2024-49918 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/ac2140449184a26eac99585b7f69814bd3ba8f2d (6.12-rc1)
-CVE-2024-49917 [drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn30_init_hw]
+CVE-2024-49917 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/cba7fec864172dadd953daefdd26e01742b71a6a (6.12-rc1)
-CVE-2024-49916 [drm/amd/display: Add NULL check for clk_mgr and clk_mgr->funcs in dcn401_init_hw]
+CVE-2024-49916 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/4b6377f0e96085cbec96eb7f0b282430ccdd3d75 (6.12-rc1)
-CVE-2024-49915 [drm/amd/display: Add NULL check for clk_mgr in dcn32_init_hw]
+CVE-2024-49915 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/c395fd47d1565bd67671f45cca281b3acc2c31ef (6.12-rc1)
-CVE-2024-49914 [drm/amd/display: Add null check for pipe_ctx->plane_state in dcn20_program_pipe]
+CVE-2024-49914 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/8e4ed3cf1642df0c4456443d865cff61a9598aa8 (6.12-rc1)
-CVE-2024-49913 [drm/amd/display: Add null check for top_pipe_to_program in commit_planes_for_stream]
+CVE-2024-49913 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/66d71a72539e173a9b00ca0b1852cbaa5f5bf1ad (6.12-rc1)
-CVE-2024-49912 [drm/amd/display: Handle null 'stream_status' in 'planes_changed_for_existing_stream']
+CVE-2024-49912 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/8141f21b941710ecebe49220b69822cab3abd23d (6.12-rc1)
-CVE-2024-49911 [drm/amd/display: Add NULL check for function pointer in dcn20_set_output_transfer_func]
+CVE-2024-49911 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/62ed6f0f198da04e884062264df308277628004f (6.12-rc1)
-CVE-2024-49910 [drm/amd/display: Add NULL check for function pointer in dcn401_set_output_transfer_func]
+CVE-2024-49910 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/dd340acd42c24a3f28dd22fae6bf38662334264c (6.12-rc1)
-CVE-2024-49909 [drm/amd/display: Add NULL check for function pointer in dcn32_set_output_transfer_func]
+CVE-2024-49909 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/28574b08c70e56d34d6f6379326a860b96749051 (6.12-rc1)
-CVE-2024-49908 [drm/amd/display: Add null check for 'afb' in amdgpu_dm_update_cursor (v2)]
+CVE-2024-49908 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/0fe20258b4989b9112b5e9470df33a0939403fd4 (6.12-rc1)
-CVE-2024-49907 [drm/amd/display: Check null pointers before using dc->clk_mgr]
+CVE-2024-49907 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/95d9e0803e51d5a24276b7643b244c7477daf463 (6.12-rc1)
-CVE-2024-49906 [drm/amd/display: Check null pointer before try to access it]
+CVE-2024-49906 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/1b686053c06ffb9f4524b288110cf2a831ff7a25 (6.12-rc1)
-CVE-2024-49905 [drm/amd/display: Add null check for 'afb' in amdgpu_dm_plane_handle_cursor_update (v2)]
+CVE-2024-49905 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/cd9e9e0852d501f169aa3bb34e4b413d2eb48c37 (6.12-rc1)
-CVE-2024-49904 [drm/amdgpu: add list empty check to avoid null pointer issue]
+CVE-2024-49904 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/4416377ae1fdc41a90b665943152ccd7ff61d3c5 (6.12-rc1)
-CVE-2024-49903 [jfs: Fix uaf in dbFreeBits]
+CVE-2024-49903 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/d6c1b3599b2feb5c7291f5ac3a36e5fa7cedb234 (6.12-rc1)
-CVE-2024-49902 [jfs: check if leafidx greater than num leaves per dmap tree]
+CVE-2024-49902 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/d64ff0d2306713ff084d4b09f84ed1a8c75ecc32 (6.12-rc1)
-CVE-2024-49901 [drm/msm/adreno: Assign msm_gpu->pdev earlier to avoid nullptrs]
+CVE-2024-49901 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/16007768551d5bfe53426645401435ca8d2ef54f (6.12-rc1)
-CVE-2024-49900 [jfs: Fix uninit-value access of new_ea in ea_buffer]
+CVE-2024-49900 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/2b59ffad47db1c46af25ccad157bb3b25147c35c (6.12-rc1)
-CVE-2024-49899 [drm/amd/display: Initialize denominators' default to 1]
+CVE-2024-49899 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/b995c0a6de6c74656a0c39cd57a0626351b13e3c (6.12-rc1)
-CVE-2024-49898 [drm/amd/display: Check null-initialized variables]
+CVE-2024-49898 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/367cd9ceba1933b63bc1d87d967baf6d9fd241d2 (6.12-rc1)
-CVE-2024-49897 [drm/amd/display: Check phantom_stream before it is used]
+CVE-2024-49897 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/3718a619a8c0a53152e76bb6769b6c414e1e83f4 (6.12-rc1)
-CVE-2024-49896 [drm/amd/display: Check stream before comparing them]
+CVE-2024-49896 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/35ff747c86767937ee1e0ca987545b7eed7a0810 (6.12-rc1)
-CVE-2024-49895 [drm/amd/display: Fix index out of bounds in DCN30 degamma hardware format translation]
+CVE-2024-49895 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/bc50b614d59990747dd5aeced9ec22f9258991ff (6.12-rc1)
-CVE-2024-49894 [drm/amd/display: Fix index out of bounds in degamma hardware format translation]
+CVE-2024-49894 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/b7e99058eb2e86aabd7a10761e76cae33d22b49f (6.12-rc1)
-CVE-2024-49893 [drm/amd/display: Check stream_status before it is used]
+CVE-2024-49893 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/58a8ee96f84d2c21abb85ad8c22d2bbdf59bd7a9 (6.12-rc1)
-CVE-2024-49892 [drm/amd/display: Initialize get_bytes_per_element's default to 1]
+CVE-2024-49892 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/4067f4fa0423a89fb19a30b57231b384d77d2610 (6.12-rc1)
-CVE-2024-49891 [scsi: lpfc: Validate hdwq pointers before dereferencing in reset/errata paths]
+CVE-2024-49891 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/2be1d4f11944cd6283cb97268b3e17c4424945ca (6.12-rc1)
-CVE-2024-49890 [drm/amd/pm: ensure the fw_info is not null before using it]
+CVE-2024-49890 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/186fb12e7a7b038c2710ceb2fb74068f1b5d55a4 (6.12-rc1)
-CVE-2024-49889 [ext4: avoid use-after-free in ext4_ext_show_leaf()]
+CVE-2024-49889 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/4e2524ba2ca5f54bdbb9e5153bea00421ef653f5 (6.12-rc1)
-CVE-2024-49888 [bpf: Fix a sdiv overflow issue]
+CVE-2024-49888 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/7dd34d7b7dcf9309fc6224caf4dd5b35bedddcb7 (6.12-rc1)
-CVE-2024-49887 [f2fs: fix to don't panic system for no free segment fault injection]
+CVE-2024-49887 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/65a6ce4726c27b45600303f06496fef46d00b57f (6.12-rc1)
-CVE-2024-49886 [platform/x86: ISST: Fix the KASAN report slab-out-of-bounds bug]
+CVE-2024-49886 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7d59ac07ccb58f8f604f8057db63b8efcebeb3de (6.12-rc2)
-CVE-2024-49885 [mm, slub: avoid zeroing kmalloc redzone]
+CVE-2024-49885 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/59090e479ac78ae18facd4c58eb332562a23020e (6.12-rc1)
-CVE-2024-49884 [ext4: fix slab-use-after-free in ext4_split_extent_at()]
+CVE-2024-49884 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/c26ab35702f8cd0cdc78f96aa5856bfb77be798f (6.12-rc1)
-CVE-2024-49883 [ext4: aovid use-after-free in ext4_ext_insert_extent()]
+CVE-2024-49883 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/a164f3a432aae62ca23d03e6d926b122ee5b860d (6.12-rc1)
-CVE-2024-49882 [ext4: fix double brelse() the buffer of the extents path]
+CVE-2024-49882 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/dcaa6c31134c0f515600111c38ed7750003e1b9c (6.12-rc1)
-CVE-2024-49881 [ext4: update orig_path in ext4_find_extent()]
+CVE-2024-49881 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/5b4b2dcace35f618fe361a87bae6f0d13af31bc1 (6.12-rc1)
-CVE-2024-49880 [ext4: fix off by one issue in alloc_flex_gd()]
+CVE-2024-49880 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6121258c2b33ceac3d21f6a221452692c465df88 (6.12-rc2)
-CVE-2024-49879 [drm: omapdrm: Add missing check for alloc_ordered_workqueue]
+CVE-2024-49879 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/e794b7b9b92977365c693760a259f8eef940c536 (6.12-rc1)
-CVE-2024-49878 [resource: fix region_intersects() vs add_memory_driver_managed()]
+CVE-2024-49878 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/b4afe4183ec77f230851ea139d91e5cf2644c68b (6.12-rc1)
-CVE-2024-49877 [ocfs2: fix possible null-ptr-deref in ocfs2_set_buffer_uptodate]
+CVE-2024-49877 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/33b525cef4cff49e216e4133cc48452e11c0391e (6.12-rc1)
-CVE-2024-49876 [drm/xe: fix UAF around queue destruction]
+CVE-2024-49876 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2d2be279f1ca9e7288282d4214f16eea8a727cdb (6.12-rc2)
-CVE-2024-49875 [nfsd: map the EBADMSG to nfserr_io to avoid warning]
+CVE-2024-49875 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/340e61e44c1d2a15c42ec72ade9195ad525fd048 (6.12-rc1)
-CVE-2024-49874 [i3c: master: svc: Fix use after free vulnerability in svc_i3c_master Driver Due to Race Condition]
+CVE-2024-49874 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/61850725779709369c7e907ae8c7c75dc7cec4f3 (6.12-rc1)
-CVE-2024-49873 [mm/filemap: fix filemap_get_folios_contig THP panic]
+CVE-2024-49873 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c225c4f6056b46a8a5bf2ed35abf17a2d6887691 (6.12-rc1)
-CVE-2024-49872 [mm/gup: fix memfd_pin_folios alloc race panic]
+CVE-2024-49872 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ce645b9fdc78ec5d28067286e92871ddae6817d5 (6.12-rc1)
-CVE-2024-49871 [Input: adp5589-keys - fix NULL pointer dereference]
+CVE-2024-49871 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fb5cc65f973661241e4a2b7390b429aa7b330c69 (6.12-rc2)
-CVE-2024-49870 [cachefiles: fix dentry leak in cachefiles_open_file()]
+CVE-2024-49870 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/da6ef2dffe6056aad3435e6cf7c6471c2a62187c (6.12-rc2)
-CVE-2024-49869 [btrfs: send: fix buffer overflow detection when copying path to cache entry]
+CVE-2024-49869 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/96c6ca71572a3556ed0c37237305657ff47174b7 (6.12-rc2)
-CVE-2024-49868 [btrfs: fix a NULL pointer dereference when failed to start a new trasacntion]
+CVE-2024-49868 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/c3b47f49e83197e8dffd023ec568403bcdbb774b (6.12-rc2)
-CVE-2024-49867 [btrfs: wait for fixup workers before stopping cleaner kthread during umount]
+CVE-2024-49867 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/41fd1e94066a815a7ab0a7025359e9b40e4b3576 (6.12-rc2)
-CVE-2024-49866 [tracing/timerlat: Fix a race during cpuhp processing]
+CVE-2024-49866 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.11.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/829e0c9f0855f26b3ae830d17b24aec103f7e915 (6.12-rc2)
-CVE-2024-49865 [drm/xe/vm: move xa_alloc to prevent UAF]
+CVE-2024-49865 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/74231870cf4976f69e83aa24f48edb16619f652f (6.12-rc2)
-CVE-2024-49864 [rxrpc: Fix a race between socket set up and I/O thread creation]
+CVE-2024-49864 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 6.11.4-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/bc212465326e8587325f520a052346f0b57360e6 (6.12-rc3)
-CVE-2024-49863 [vhost/scsi: null-ptr-dereference in vhost_scsi_get_req()]
+CVE-2024-49863 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 6.11.4-1
 	NOTE: https://git.kernel.org/linus/221af82f606d928ccef19a16d35633c63026f1be (6.12-rc3)
-CVE-2024-49862 [powercap: intel_rapl: Fix off by one in get_rpi()]
+CVE-2024-49862 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/95f6580352a7225e619551febb83595bcb77ab17 (6.12-rc1)
-CVE-2024-49861 [bpf: Fix helper writes to read-only maps]
+CVE-2024-49861 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/32556ce93bc45c730829083cb60f95a2728ea48b (6.12-rc1)
-CVE-2024-49860 [ACPI: sysfs: validate return type of _STR method]
+CVE-2024-49860 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/4bb1e7d027413835b086aed35bc3f0713bc0f72b (6.12-rc1)
-CVE-2024-49859 [f2fs: fix to check atomic_file in f2fs ioctl interfaces]
+CVE-2024-49859 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/bfe5c02654261bfb8bd9cb174a67f3279ea99e58 (6.12-rc1)
-CVE-2024-49858 [efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption]
+CVE-2024-49858 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/77d48d39e99170b528e4f2e9fc5d1d64cdedd386 (6.12-rc1)
-CVE-2024-49857 [wifi: iwlwifi: mvm: set the cipher for secured NDP ranging]
+CVE-2024-49857 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a949075d4bbf1ca83ccdeaa6ef4ac2ce7526c5f4 (6.12-rc1)
-CVE-2024-49856 [x86/sgx: Fix deadlock in SGX NUMA node search]
+CVE-2024-49856 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9c936844010466535bd46ea4ce4656ef17653644 (6.12-rc1)
-CVE-2024-49855 [nbd: fix race between timeout and normal completion]
+CVE-2024-49855 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c9ea57c91f03bcad415e1a20113bdb2077bcf990 (6.12-rc1)
-CVE-2024-49854 [block, bfq: fix uaf for accessing waker_bfqq after splitting]
+CVE-2024-49854 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/1ba0403ac6447f2d63914fb760c44a3b19c44eaf (6.12-rc1)
-CVE-2024-49853 [firmware: arm_scmi: Fix double free in OPTEE transport]
+CVE-2024-49853 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e98dba934b2fc587eafb83f47ad64d9053b18ae0 (6.12-rc1)
-CVE-2024-49852 [scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()]
+CVE-2024-49852 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2e4b02fad094976763af08fec2c620f4f8edd9ae (6.12-rc1)
-CVE-2024-49851 [tpm: Clean up TPM space after command failure]
+CVE-2024-49851 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/e3aaebcbb7c6b403416f442d1de70d437ce313a7 (6.12-rc1)
-CVE-2024-49850 [bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos]
+CVE-2024-49850 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3d2786d65aaa954ebd3fcc033ada433e10da21c4 (6.12-rc1)
-CVE-2024-47757 [nilfs2: fix potential oob read in nilfs_btree_check_delete()]
+CVE-2024-47757 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/f9c96351aa6718b42a9f42eaf7adce0356bdb5e8 (6.12-rc1)
-CVE-2024-47756 [PCI: keystone: Fix if-statement expression in ks_pcie_quirk()]
+CVE-2024-47756 (In the Linux kernel, the following vulnerability has been resolved:  P ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/6188a1c762eb9bbd444f47696eda77a5eae6207a (6.12-rc1)
-CVE-2024-47755 [nvdimm: Fix devs leaks in scan_labels()]
+CVE-2024-47755 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/62c2aa6b1f565d2fc1ec11a6e9e8336ce37a6426 (6.12-rc1)
-CVE-2024-47754 [media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning]
+CVE-2024-47754 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9be85491619f1953b8a29590ca630be571941ffa (6.12-rc1)
-CVE-2024-47753 [media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning]
+CVE-2024-47753 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b113bc7c0e83b32f4dd2d291a2b6c4803e0a2c44 (6.12-rc1)
-CVE-2024-47752 [media: mediatek: vcodec: Fix H264 stateless decoder smatch warning]
+CVE-2024-47752 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7878d3a385efab560dce793b595447867fb163f2 (6.12-rc1)
-CVE-2024-47751 [PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port()]
+CVE-2024-47751 (In the Linux kernel, the following vulnerability has been resolved:  P ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c500a86693a126c9393e602741e348f80f1b0fc5 (6.12-rc1)
-CVE-2024-47750 [RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08]
+CVE-2024-47750 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fd8489294dd2beefb70f12ec4f6132aeec61a4d0 (6.12-rc1)
-CVE-2024-47749 [RDMA/cxgb4: Added NULL check for lookup_atid]
+CVE-2024-47749 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/e766e6a92410ca269161de059fff0843b8ddd65f (6.12-rc1)
-CVE-2024-47748 [vhost_vdpa: assign irq bypass producer token correctly]
+CVE-2024-47748 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/02e9e9366fefe461719da5d173385b6685f70319 (6.12-rc1)
-CVE-2024-47747 [net: seeq: Fix use after free vulnerability in ether3 Driver Due to Race Condition]
+CVE-2024-47747 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/b5109b60ee4fcb2f2bb24f589575e10cc5283ad4 (6.12-rc1)
-CVE-2024-47746 [fuse: use exclusive lock when FUSE_I_CACHE_IO_MODE is set]
+CVE-2024-47746 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2f3d8ff457982f4055fe8f7bf19d3821ba22c376 (6.12-rc1)
-CVE-2024-47745 [mm: call the security_mmap_file() LSM hook in remap_file_pages()]
+CVE-2024-47745 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/ea7e2d5e49c05e5db1922387b09ca74aa40f46e2 (6.12-rc1)
-CVE-2024-47744 [KVM: Use dedicated mutex to protect kvm_usage_count to avoid deadlock]
+CVE-2024-47744 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/44d17459626052a2390457e550a12cb973506b2f (6.12-rc1)
-CVE-2024-47743 [KEYS: prevent NULL pointer dereference in find_asymmetric_key()]
+CVE-2024-47743 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/70fd1966c93bf3bfe3fe6d753eb3d83a76597eef (6.12-rc1)
-CVE-2024-47742 [firmware_loader: Block path traversal]
+CVE-2024-47742 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/f0e5311aa8022107d63c54e2f03684ec097d1394 (6.12-rc1)
-CVE-2024-47741 [btrfs: fix race setting file private on concurrent lseek using same fd]
+CVE-2024-47741 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7ee85f5515e86a4e2a2f51969795920733912bad (6.12-rc1)
-CVE-2024-47740 [f2fs: Require FMODE_WRITE for atomic write ioctls]
+CVE-2024-47740 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/4f5a100f87f32cb65d4bb1ad282a08c92f6f591e (6.12-rc1)
-CVE-2024-47739 [padata: use integer wrap around to prevent deadlock on seq_nr overflow]
+CVE-2024-47739 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/9a22b2812393d93d84358a760c347c21939029a6 (6.12-rc1)
-CVE-2024-47738 [wifi: mac80211: don't use rate mask for offchannel TX either]
+CVE-2024-47738 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/e7a7ef9a0742dbd0818d5b15fba2c5313ace765b (6.12-rc1)
-CVE-2024-47737 [nfsd: call cache_put if xdr_reserve_space returns NULL]
+CVE-2024-47737 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/d078cbf5c38de83bc31f83c47dcd2184c04a50c7 (6.12-rc1)
-CVE-2024-47736 [erofs: handle overlapped pclusters out of crafted images properly]
+CVE-2024-47736 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9e2f9d34dd12e6e5b244ec488bcebd0c2d566c50 (6.12-rc1)
-CVE-2024-47735 [RDMA/hns: Fix spin_unlock_irqrestore() called with IRQs enabled]
+CVE-2024-47735 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/74d315b5af180220d561684d15897730135733a6 (6.12-rc1)
-CVE-2024-47734 [bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()]
+CVE-2024-47734 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0cbfd45fbcf0cb26d85c981b91c62fe73cdee01c (6.12-rc1)
-CVE-2024-47733 [netfs: Delete subtree of 'fs/netfs' when netfs module exits]
+CVE-2024-47733 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3c58a9575e02c2b90a3180007d57105ceaa7c246 (6.12-rc1)
-CVE-2024-47732 [crypto: iaa - Fix potential use after free bug]
+CVE-2024-47732 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e0d3b845a1b10b7b5abdad7ecc69d45b2aab3209 (6.12-rc1)
-CVE-2024-47731 [drivers/perf: Fix ali_drw_pmu driver interrupt status clearing]
+CVE-2024-47731 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a3dd920977dccc453c550260c4b7605b280b79c3 (6.12-rc1)
-CVE-2024-47730 [crypto: hisilicon/qm - inject error before stopping queue]
+CVE-2024-47730 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/b04f06fc0243600665b3b50253869533b7938468 (6.12-rc1)
-CVE-2024-47729 [drm/xe: Use reserved copy engine for user binds on faulting devices]
+CVE-2024-47729 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/852856e3b6f679c694dd5ec41e5a3c11aa46640b (6.12-rc1)
-CVE-2024-47728 [bpf: Zero former ARG_PTR_TO_{LONG,INT} args in case of error]
+CVE-2024-47728 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/4b3786a6c5397dc220b1483d8e2f4867743e966f (6.12-rc1)
-CVE-2024-47727 [x86/tdx: Fix "in-kernel MMIO" check]
+CVE-2024-47727 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d4fc4d01471528da8a9797a065982e05090e1d81 (6.12-rc1)
-CVE-2024-47726 [f2fs: fix to wait dio completion]
+CVE-2024-47726 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/96cfeb0389530ae32ade8a48ae3ae1ac3b6c009d (6.12-rc1)
-CVE-2024-47725 [dm-verity: restart or panic on an I/O error]
+CVE-2024-47725 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/e6a3531dd542cb127c8de32ab1e54a48ae19962b (6.12-rc1)
-CVE-2024-47724 [wifi: ath11k: use work queue to process beacon tx event]
+CVE-2024-47724 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/177b49dbf9c1d8f9f25a22ffafa416fc2c8aa6a3 (6.12-rc1)
-CVE-2024-47723 [jfs: fix out-of-bounds in dbNextAG() and diAlloc()]
+CVE-2024-47723 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/e63866a475562810500ea7f784099bfe341e761a (6.12-rc1)
-CVE-2024-47721 [wifi: rtw89: remove unused C2H event ID RTW89_MAC_C2H_FUNC_READ_WOW_CAM to prevent out-of-bounds reading]
+CVE-2024-47721 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/56310ddb50b190b3390fdc974aec455d0a516bd2 (6.12-rc1)
-CVE-2024-47720 [drm/amd/display: Add null check for set_output_gamma in dcn30_set_output_transfer_func]
+CVE-2024-47720 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/08ae395ea22fb3d9b318c8bde28c0dfd2f5fa4d2 (6.12-rc1)
-CVE-2024-47719 [iommufd: Protect against overflow of ALIGN() during iova allocation]
+CVE-2024-47719 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8f6887349b2f829a4121c518aeb064fc922714e4 (6.12-rc1)
-CVE-2024-47718 [wifi: rtw88: always wait for both firmware loading attempts]
+CVE-2024-47718 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/0e735a4c6137262bcefe45bb52fde7b1f5fc6c4d (6.12-rc1)
-CVE-2024-47717 [RISC-V: KVM: Don't zero-out PMU snapshot area before freeing data]
+CVE-2024-47717 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/47d40d93292d9cff8dabb735bed83d930fa03950 (6.12-rc1)
-CVE-2024-47716 [ARM: 9410/1: vfp: Use asm volatile in fmrx/fmxr macros]
+CVE-2024-47716 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/89a906dfa8c3b21b3e5360f73c49234ac1eb885b (6.12-rc1)
-CVE-2024-47715 [wifi: mt76: mt7915: fix oops on non-dbdc mt7986]
+CVE-2024-47715 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/862bf7cbd772c2bad570ef0c5b5556a1330656dd (6.12-rc1)
-CVE-2024-47714 [wifi: mt76: mt7996: use hweight16 to get correct tx antenna]
+CVE-2024-47714 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f98c3de92bb05dac4a4969df8a4595ed380b4604 (6.12-rc1)
-CVE-2024-47713 [wifi: mac80211: use two-phase skb reclamation in ieee80211_do_stop()]
+CVE-2024-47713 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/9d301de12da6e1bb069a9835c38359b8e8135121 (6.12-rc1)
-CVE-2024-47712 [wifi: wilc1000: fix potential RCU dereference issue in wilc_parse_join_bss_param]
+CVE-2024-47712 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/6d7c6ae1efb1ff68bc01d79d94fdf0388f86cdd8 (6.12-rc1)
-CVE-2024-47711 [af_unix: Don't return OOB skb in manage_oob().]
+CVE-2024-47711 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5aa57d9f2d5311f19434d95b2a81610aa263e23b (6.12-rc1)
-CVE-2024-47710 [sock_map: Add a cond_resched() in sock_hash_free()]
+CVE-2024-47710 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/b1339be951ad31947ae19bc25cb08769bf255100 (6.12-rc1)
-CVE-2024-47709 [can: bcm: Clear bo->bcm_proc_read after remove_proc_entry().]
+CVE-2024-47709 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/94b0818fa63555a65f6ba107080659ea6bcca63e (6.12-rc1)
-CVE-2024-47708 [netkit: Assign missing bpf_net_context]
+CVE-2024-47708 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/157f29152b61ca41809dd7ead29f5733adeced19 (6.12-rc1)
-CVE-2024-47707 [ipv6: avoid possible NULL deref in rt6_uncached_list_flush_dev()]
+CVE-2024-47707 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/04ccecfa959d3b9ae7348780d8e379c6486176ac (6.12-rc1)
-CVE-2024-47706 [block, bfq: fix possible UAF for bfqq->bic with merge chain]
+CVE-2024-47706 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/18ad4df091dd5d067d2faa8fce1180b79f7041a7 (6.12-rc1)
-CVE-2024-47705 [block: fix potential invalid pointer dereference in blk_add_partition]
+CVE-2024-47705 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/26e197b7f9240a4ac301dd0ad520c0c697c2ea7d (6.12-rc1)
-CVE-2024-47704 [drm/amd/display: Check link_res->hpo_dp_link_enc before using it]
+CVE-2024-47704 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/0beca868cde8742240cd0038141c30482d2b7eb8 (6.12-rc1)
-CVE-2024-47703 [bpf, lsm: Add check for BPF LSM return value]
+CVE-2024-47703 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/5d99e198be279045e6ecefe220f5c52f8ce9bfd5 (6.12-rc1)
-CVE-2024-47702 [bpf: Fail verification for sign-extension of packet data/data_end/data_meta]
+CVE-2024-47702 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/92de36080c93296ef9005690705cba260b9bd68a (6.12-rc1)
-CVE-2024-47701 [ext4: avoid OOB when system.data xattr changes underneath the filesystem]
+CVE-2024-47701 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/c6b72f5d82b1017bad80f9ebf502832fc321d796 (6.12-rc1)
-CVE-2024-47700 [ext4: check stripe size compatibility on remount as well]
+CVE-2024-47700 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ee85e0938aa8f9846d21e4d302c3cf6a2a75110d (6.12-rc1)
-CVE-2024-47699 [nilfs2: fix potential null-ptr-deref in nilfs_btree_insert()]
+CVE-2024-47699 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/9403001ad65ae4f4c5de368bdda3a0636b51d51a (6.12-rc1)
-CVE-2024-47698 [drivers: media: dvb-frontends/rtl2832: fix an out-of-bounds write error]
+CVE-2024-47698 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/8ae06f360cfaca2b88b98ca89144548b3186aab1 (6.12-rc1)
-CVE-2024-47697 [drivers: media: dvb-frontends/rtl2830: fix an out-of-bounds write error]
+CVE-2024-47697 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/46d7ebfe6a75a454a5fa28604f0ef1491f9d8d14 (6.12-rc1)
-CVE-2024-47696 [RDMA/iwcm: Fix WARNING:at_kernel/workqueue.c:#check_flush_dependency]
+CVE-2024-47696 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/86dfdd8288907f03c18b7fb462e0e232c4f98d89 (6.12-rc1)
-CVE-2024-47695 [RDMA/rtrs-clt: Reset cid to con_num - 1 to stay in bounds]
+CVE-2024-47695 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/3e4289b29e216a55d08a89e126bc0b37cbad9f38 (6.12-rc1)
-CVE-2024-47694 [IB/mlx5: Fix UMR pd cleanup on error flow of driver init]
+CVE-2024-47694 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/112e6e83a894260cc7efe79a1fc47d4d51461742 (6.12-rc1)
-CVE-2024-47693 [IB/core: Fix ib_cache_setup_one error flow cleanup]
+CVE-2024-47693 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/1403c8b14765eab805377dd3b75e96ace8747aed (6.12-rc1)
-CVE-2024-47692 [nfsd: return -EINVAL when namelen is 0]
+CVE-2024-47692 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/22451a16b7ab7debefce660672566be887db1637 (6.12-rc1)
-CVE-2024-47691 [f2fs: fix to avoid use-after-free in f2fs_stop_gc_thread()]
+CVE-2024-47691 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/c7f114d864ac91515bb07ac271e9824a20f5ed95 (6.12-rc1)
-CVE-2024-47690 [f2fs: get rid of online repaire on corrupted directory]
+CVE-2024-47690 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/884ee6dc85b959bc152f15bca80c30f06069e6c4 (6.12-rc1)
-CVE-2024-47689 [f2fs: fix to don't set SB_RDONLY in f2fs_handle_critical_error()]
+CVE-2024-47689 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/930c6ab93492c4b15436524e704950b364b2930c (6.12-rc1)
-CVE-2024-47688 [driver core: Fix a potential null-ptr-deref in module_add_driver()]
+CVE-2024-47688 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/18ec12c97b39ff6aa15beb8d2b25d15cd44b87d8 (6.12-rc1)
-CVE-2024-47687 [vdpa/mlx5: Fix invalid mr resource destroy]
+CVE-2024-47687 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/dc12502905b7a3de9097ea6b98870470c2921e09 (6.12-rc1)
-CVE-2024-47686 [ep93xx: clock: Fix off by one in ep93xx_div_recalc_rate()]
+CVE-2024-47686 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c7f06284a6427475e3df742215535ec3f6cd9662 (6.12-rc1)
-CVE-2024-47685 [netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put()]
+CVE-2024-47685 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/9c778fe48d20ef362047e3376dee56d77f8500d4 (6.12-rc1)
-CVE-2024-47684 [tcp: check skb is non-NULL in tcp_rto_delta_us()]
+CVE-2024-47684 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/c8770db2d54437a5f49417ae7b46f7de23d14db6 (6.12-rc1)
-CVE-2024-47683 [drm/amd/display: Skip Recompute DSC Params if no Stream on Link]
+CVE-2024-47683 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/8151a6c13111b465dbabe07c19f572f7cbd16fef (6.12-rc1)
-CVE-2024-47682 [scsi: sd: Fix off-by-one error in sd_read_block_characteristics()]
+CVE-2024-47682 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.11.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f81eaf08385ddd474a2f41595a7757502870c0eb (6.12-rc1)
-CVE-2024-47681 [wifi: mt76: mt7996: fix NULL pointer dereference in mt7996_mcu_sta_bfer_he]
+CVE-2024-47681 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f503ae90c7355e8506e68498fe84c1357894cd5b (6.12-rc1)
-CVE-2024-47680 [f2fs: check discard support for conventional zones]
+CVE-2024-47680 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/43aec4d01bd2ce961817a777b3846f8318f398e4 (6.12-rc1)
-CVE-2024-47679 [vfs: fix race between evice_inodes() and find_inode()Description:iput()]
+CVE-2024-47679 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/88b1afbf0f6b221f6c5bb66cc80cd3b38d696687 (6.12-rc1)
-CVE-2024-47678 [icmp: change the order of rate limits]
+CVE-2024-47678 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/8c2bd38b95f75f3d2a08c93e35303e26d480d24e (6.12-rc1)
-CVE-2024-47677 [exfat: resolve memory leak from exfat_create_upcase_table()]
+CVE-2024-47677 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c290fe508eee36df1640c3cb35dc8f89e073c8a8 (6.12-rc1)
-CVE-2024-47676 [mm/hugetlb.c: fix UAF of vma in hugetlb fault pathway]
+CVE-2024-47676 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/98b74bb4d7e96b4da5ef3126511febe55b76b807 (6.12-rc1)
-CVE-2024-47675 [bpf: Fix use-after-free in bpf_uprobe_multi_link_attach()]
+CVE-2024-47675 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.11.2-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5fe6e308abaea082c20fbf2aa5df8e14495622cf (6.12-rc1)
-CVE-2023-52917 [ntb: intel: Fix the NULL vs IS_ERR() bug for debugfs_create_dir()]
+CVE-2023-52917 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.11.2-1
 	NOTE: https://git.kernel.org/linus/e229897d373a87ee09ec5cc4ecd4bb2f895fc16b (6.12-rc1)
 CVE-2024-8625 (The TS Poll  WordPress plugin before 2.4.0 does not sanitize and escap ...)
@@ -1231,6 +1463,7 @@ CVE-2024-10134 (A vulnerability was found in ESAFENET CDG 5 and classified as cr
 CVE-2024-10133 (A vulnerability has been found in ESAFENET CDG 5 and classified as cri ...)
 	NOT-FOR-US: ESAFENET CDG
 CVE-2024-9774
+	{DSA-5795-1}
 	- python-sql 1.5.2-1
 	NOTE: https://discuss.tryton.org/t/security-release-for-issue-93
 CVE-2024-XXXX [sogo SOGoForbidUnknownDomainsAuth issue]
@@ -2428,6 +2661,7 @@ CVE-2024-21237 (Vulnerability in the MySQL Server product of Oracle MySQL (compo
 CVE-2024-21236 (Vulnerability in the MySQL Server product of Oracle MySQL (component:  ...)
 	- mysql-8.0 8.0.40-1 (bug #1085294)
 CVE-2024-21235 (Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle Gr ...)
+	{DSA-5794-1 DLA-3929-1 DLA-3927-1}
 	- openjdk-8 <unfixed> (bug #1085696)
 	- openjdk-11 11.0.25+9-1
 	- openjdk-17 17.0.13+11-1
@@ -2448,6 +2682,7 @@ CVE-2024-21219 (Vulnerability in the MySQL Server product of Oracle MySQL (compo
 CVE-2024-21218 (Vulnerability in the MySQL Server product of Oracle MySQL (component:  ...)
 	- mysql-8.0 8.0.40-1 (bug #1085294)
 CVE-2024-21217 (Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle Gr ...)
+	{DSA-5794-1 DLA-3929-1 DLA-3927-1}
 	- openjdk-8 <unfixed> (bug #1085696)
 	- openjdk-11 11.0.25+9-1
 	- openjdk-17 17.0.13+11-1
@@ -2466,6 +2701,7 @@ CVE-2024-21212 (Vulnerability in the MySQL Server product of Oracle MySQL (compo
 CVE-2024-21211 (Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle Gr ...)
 	- openjdk-23 23.0.1+11-1
 CVE-2024-21210 (Vulnerability in Oracle Java SE (component: Hotspot).  Supported versi ...)
+	{DSA-5794-1 DLA-3929-1 DLA-3927-1}
 	- openjdk-8 <unfixed> (bug #1085696)
 	- openjdk-11 11.0.25+9-1
 	- openjdk-17 17.0.13+11-1
@@ -2474,6 +2710,7 @@ CVE-2024-21210 (Vulnerability in Oracle Java SE (component: Hotspot).  Supported
 CVE-2024-21209 (Vulnerability in the MySQL Client product of Oracle MySQL (component:  ...)
 	- mysql-8.0 <not-affected> (Only affects 8.4 and later)
 CVE-2024-21208 (Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle Gr ...)
+	{DSA-5794-1 DLA-3929-1 DLA-3927-1}
 	- openjdk-8 <unfixed> (bug #1085696)
 	- openjdk-11 11.0.25+9-1
 	- openjdk-17 17.0.13+11-1
@@ -2793,7 +3030,7 @@ CVE-2024-8757 (The WP Post Author \u2013 Boost Your Blog's Engagement with
 	NOT-FOR-US: WordPress plugin
 CVE-2024-49193 (Zendesk before 2024-07-02 allows remote attackers to read ticket histo ...)
 	NOT-FOR-US: Zendesk
-CVE-2024-6519 [qemu: SCSI: lsi53c895a: use-after-free local privilege escalation vulnerability]
+CVE-2024-6519 (A use-after-free vulnerability was found in the QEMU LSI53C895A SCSI H ...)
 	- qemu <unfixed> (bug #1085299)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2292089
 CVE-2024-9860 (The Bridge Core plugin for WordPress is vulnerable to unauthorized mod ...)
@@ -17295,7 +17532,7 @@ CVE-2024-22069 (There is a permission and access control vulnerability of ZTE's
 	NOT-FOR-US: ZTE
 CVE-2024-21302 (Summary: Microsoft was notified that an elevation of privilege vulnera ...)
 	NOT-FOR-US: Microsoft
-CVE-2024-43168 (A heap-buffer-overflow flaw was found in the cfg_mark_ports function w ...)
+CVE-2024-43168 (DISPUTE NOTE: this issue does not pose a security risk as it (accordin ...)
 	{DLA-3903-1}
 	- unbound 1.20.0-1 (unimportant)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2303462
@@ -17303,7 +17540,7 @@ CVE-2024-43168 (A heap-buffer-overflow flaw was found in the cfg_mark_ports func
 	NOTE: https://github.com/NLnetLabs/unbound/pull/1040
 	NOTE: Fixed by: https://github.com/NLnetLabs/unbound/commit/193401e7543a1e561dd634a3eaae932fa462a2b9 (release-1.20.0rc1)
 	NOTE: Negligible security impact according to upstream
-CVE-2024-43167 (A NULL pointer dereference flaw was found in the ub_ctx_set_fwd functi ...)
+CVE-2024-43167 (DISPUTE NOTE: this issue does not pose a security risk as it (accordin ...)
 	{DLA-3903-1}
 	- unbound 1.21.1-1 (bug #1078647; unimportant)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2303456
@@ -17938,7 +18175,7 @@ CVE-2024-7084 (The Ajax Search Lite WordPress plugin before 4.12.1 does not sani
 CVE-2024-7082 (The Easy Table of Contents WordPress plugin before 2.0.68 does not san ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2024-7055 (A vulnerability was found in FFmpeg up to 7.0.1. It has been classifie ...)
-	{DSA-5748-1}
+	{DSA-5748-1 DLA-3928-1}
 	- ffmpeg 7:7.0.2-1
 	NOTE: https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=3faadbe2a27e74ff5bb5f7904ec27bb1f5287dc8 (master)
 	NOTE: https://git.videolan.org/?p=ffmpeg.git;a=commitdiff;h=587acd0d4020859e67d1f07aeff2c885797ebcce (n7.0.2)
@@ -27883,7 +28120,7 @@ CVE-2024-34991 (In the module "Axepta" (axepta) before 1.3.4 from Quadra Informa
 	NOT-FOR-US: PrestaShop module
 CVE-2024-34988 (SQL injection vulnerability in the module "Complete for Create a Quote ...)
 	NOT-FOR-US: PrestaShop module
-CVE-2024-33898 (Axiros AXESS Auto Configuration Server (ACS) 4.x and 5.0.0 has Incorre ...)
+CVE-2024-33898 (Axiros AXESS Auto Configuration Server (ACS) 4.x and 5.0.0 is affected ...)
 	NOT-FOR-US: Axiros AXESS Auto Configuration Server (ACS)
 CVE-2024-32855 (Dell Client Platform BIOS contains an Out-of-bounds Write vulnerabilit ...)
 	NOT-FOR-US: Dell
@@ -50822,6 +51059,7 @@ CVE-2023-50007 (Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 all
 CVE-2023-49963 (DYMO LabelWriter Print Server through 2.366 contains a backdoor hard-c ...)
 	NOT-FOR-US: DYMO LabelWriter Print Server
 CVE-2023-49502 (Buffer Overflow vulnerability in Ffmpeg v.n6.1-3-g466799d4f5 allows a  ...)
+	{DLA-3928-1}
 	[experimental] - ffmpeg 7:7.0-1
 	- ffmpeg 7:7.0.1-3
 	[bookworm] - ffmpeg <postponed> (Pick up when fixed in 5.1.x)
@@ -51337,6 +51575,7 @@ CVE-2024-31580 (PyTorch before v2.2.0 was discovered to contain a heap buffer ov
 	[bullseye] - pytorch <no-dsa> (Minor issue)
 	NOTE: https://github.com/pytorch/pytorch/commit/b5c3a17c2c207ebefcb85043f0cf94be9b2fef81
 CVE-2024-31578 (FFmpeg version n6.1.1 was discovered to contain a heap use-after-free  ...)
+	{DLA-3928-1}
 	[experimental] - ffmpeg 7:7.0-1
 	- ffmpeg 7:7.0.1-3
 	[bookworm] - ffmpeg <postponed> (Pick up when fixed in 5.1.x)
@@ -114693,6 +114932,7 @@ CVE-2023-31485 (GitLab::API::v4 through 0.26 does not verify TLS certificates wh
 	NOTE: https://github.com/bluefeet/GitLab-API-v4/pull/57
 	NOTE: https://github.com/bluefeet/GitLab-API-v4/commit/02a2862cba323fe37e10afba8183d14847866fd2 (0.27)
 CVE-2023-31484 (CPAN.pm before 2.35 does not verify TLS certificates when downloading  ...)
+	{DLA-3926-1}
 	[experimental] - perl 5.38.0~rc2-1
 	- perl 5.38.2-2 (bug #1035109)
 	[bookworm] - perl <no-dsa> (Minor issue)
@@ -334891,6 +335131,7 @@ CVE-2020-16158 (GoPro gpmf-parser through 1.5 has a stack out-of-bounds write vu
 CVE-2020-16157 (A Stored XSS vulnerability exists in Nagios Log Server before 2.1.7 vi ...)
 	NOT-FOR-US: Nagios Log Server
 CVE-2020-16156 (CPAN 2.28 allows Signature Verification Bypass.)
+	{DLA-3926-1}
 	- perl 5.36.0-4 (bug #1015985)
 	[buster] - perl <no-dsa> (Minor issue)
 	[stretch] - perl <no-dsa> (Minor issue)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/84f1ecba66a2ddddc02013d0aa32e36df89b91b2

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/84f1ecba66a2ddddc02013d0aa32e36df89b91b2
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241021/74a75d8a/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list