[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Apr 1 09:12:12 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
6c518b49 by security tracker role at 2025-04-01T08:12:04+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,17 +1,549 @@
-CVE-2025-27427
+CVE-2025-3062 (Vulnerability in Drupal Drupal Admin LTE theme.This issue affects Drup ...)
+	TODO: check
+CVE-2025-3061 (Vulnerability in Drupal Material Admin.This issue affects Material Adm ...)
+	TODO: check
+CVE-2025-3060 (Vulnerability in Drupal Flattern \u2013 Multipurpose Bootstrap Busines ...)
+	TODO: check
+CVE-2025-3059 (Vulnerability in Drupal Profile Private.This issue affects Profile Pri ...)
+	TODO: check
+CVE-2025-3057 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-3045 (A vulnerability, which was classified as critical, was found in oretno ...)
+	TODO: check
+CVE-2025-3043 (A vulnerability, which was classified as critical, has been found in G ...)
+	TODO: check
+CVE-2025-3042 (A vulnerability classified as critical was found in Project Worlds Onl ...)
+	TODO: check
+CVE-2025-3041 (A vulnerability classified as critical has been found in Project World ...)
+	TODO: check
+CVE-2025-3040 (A vulnerability was found in Project Worlds Online Time Table Generato ...)
+	TODO: check
+CVE-2025-3039 (A vulnerability was found in code-projects Payroll Management System 1 ...)
+	TODO: check
+CVE-2025-3038 (A vulnerability was found in code-projects Payroll Management System 1 ...)
+	TODO: check
+CVE-2025-3037 (A vulnerability has been found in yzk2356911358 StudentServlet-JSP cc0 ...)
+	TODO: check
+CVE-2025-3036 (A vulnerability, which was classified as problematic, was found in yzk ...)
+	TODO: check
+CVE-2025-3018 (A vulnerability, which was classified as critical, was found in Source ...)
+	TODO: check
+CVE-2025-3017 (A vulnerability, which was classified as critical, has been found in T ...)
+	TODO: check
+CVE-2025-3016 (A vulnerability classified as problematic was found in Open Asset Impo ...)
+	TODO: check
+CVE-2025-3015 (A vulnerability classified as critical has been found in Open Asset Im ...)
+	TODO: check
+CVE-2025-31697 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31696 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31695 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31694 (Incorrect Authorization vulnerability in Drupal Two-factor Authenticat ...)
+	TODO: check
+CVE-2025-31693 (Improper Neutralization of Special Elements used in an OS Command ('OS ...)
+	TODO: check
+CVE-2025-31692 (Improper Neutralization of Special Elements used in an OS Command ('OS ...)
+	TODO: check
+CVE-2025-31691 (Missing Authorization vulnerability in Drupal OAuth2 Server allows For ...)
+	TODO: check
+CVE-2025-31690 (Cross-Site Request Forgery (CSRF) vulnerability in Drupal Cache Utilit ...)
+	TODO: check
+CVE-2025-31689 (Cross-Site Request Forgery (CSRF) vulnerability in Drupal General Data ...)
+	TODO: check
+CVE-2025-31688 (Cross-Site Request Forgery (CSRF) vulnerability in Drupal Configuratio ...)
+	TODO: check
+CVE-2025-31687 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31686 (Missing Authorization vulnerability in Drupal Open Social allows Force ...)
+	TODO: check
+CVE-2025-31685 (Missing Authorization vulnerability in Drupal Open Social allows Force ...)
+	TODO: check
+CVE-2025-31684 (Cross-Site Request Forgery (CSRF) vulnerability in Drupal OAuth2 Clien ...)
+	TODO: check
+CVE-2025-31683 (Cross-Site Request Forgery (CSRF) vulnerability in Drupal Google Tag a ...)
+	TODO: check
+CVE-2025-31682 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31681 (Missing Authorization vulnerability in Drupal Authenticator Login allo ...)
+	TODO: check
+CVE-2025-31680 (Cross-Site Request Forgery (CSRF) vulnerability in Drupal Matomo Analy ...)
+	TODO: check
+CVE-2025-31679 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31678 (Missing Authorization vulnerability in Drupal AI (Artificial Intellige ...)
+	TODO: check
+CVE-2025-31677 (Cross-Site Request Forgery (CSRF) vulnerability in Drupal AI (Artifici ...)
+	TODO: check
+CVE-2025-31676 (Weak Authentication vulnerability in Drupal Email TFA allows Brute For ...)
+	TODO: check
+CVE-2025-31675 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31674 (Improperly Controlled Modification of Dynamically-Determined Object At ...)
+	TODO: check
+CVE-2025-31673 (Incorrect Authorization vulnerability in Drupal Drupal core allows For ...)
+	TODO: check
+CVE-2025-31523
+	REJECTED
+CVE-2025-31522
+	REJECTED
+CVE-2025-31521
+	REJECTED
+CVE-2025-31520
+	REJECTED
+CVE-2025-31519
+	REJECTED
+CVE-2025-31518
+	REJECTED
+CVE-2025-31517
+	REJECTED
+CVE-2025-31516
+	REJECTED
+CVE-2025-31515
+	REJECTED
+CVE-2025-31415 (Missing Authorization vulnerability in YayCommerce YayExtra allows Exp ...)
+	TODO: check
+CVE-2025-31409 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31194 (An authentication issue was addressed with improved state management.  ...)
+	TODO: check
+CVE-2025-31192 (The issue was addressed with improved checks. This issue is fixed in S ...)
+	TODO: check
+CVE-2025-31191 (This issue was addressed through improved state management. This issue ...)
+	TODO: check
+CVE-2025-31188 (A race condition was addressed with additional validation. This issue  ...)
+	TODO: check
+CVE-2025-31187 (This issue was addressed by removing the vulnerable code. This issue i ...)
+	TODO: check
+CVE-2025-31184 (This issue was addressed with improved permissions checking. This issu ...)
+	TODO: check
+CVE-2025-31183 (The issue was addressed with improved restriction of data container ac ...)
+	TODO: check
+CVE-2025-31182 (This issue was addressed with improved handling of symlinks. This issu ...)
+	TODO: check
+CVE-2025-31095 (Authentication Bypass Using an Alternate Path or Channel vulnerability ...)
+	TODO: check
+CVE-2025-31087 (Deserialization of Untrusted Data vulnerability in silverplugins217 Mu ...)
+	TODO: check
+CVE-2025-31084 (Deserialization of Untrusted Data vulnerability in sunshinephotocart S ...)
+	TODO: check
+CVE-2025-31074 (Deserialization of Untrusted Data vulnerability in MDJM MDJM Event Man ...)
+	TODO: check
+CVE-2025-31024 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-31001 (Debug Messages Revealing Unnecessary Information vulnerability in TLA  ...)
+	TODO: check
+CVE-2025-30971 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-30926 (Missing Authorization vulnerability in KingAddons.com King Addons for  ...)
+	TODO: check
+CVE-2025-30924 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30917 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30911 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+	TODO: check
+CVE-2025-30910 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+	TODO: check
+CVE-2025-30902 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30901 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2025-30886 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-30882 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+	TODO: check
+CVE-2025-30880 (Missing Authorization vulnerability in JoomSky JS Help Desk allows Exp ...)
+	TODO: check
+CVE-2025-30878 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+	TODO: check
+CVE-2025-30876 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-30870 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2025-30869 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30849 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2025-30848 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30840 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30837 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30834 (Path Traversal vulnerability in Bit Apps Bit Assist allows Path Traver ...)
+	TODO: check
+CVE-2025-30827 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30808 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30802 (Exposure of Sensitive System Information to an Unauthorized Control Sp ...)
+	TODO: check
+CVE-2025-30798 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30797 (Missing Authorization vulnerability in bigdrop.gr Greek Multi Tool \u2 ...)
+	TODO: check
+CVE-2025-30796 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30794 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30793 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+	TODO: check
+CVE-2025-30782 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2025-30774 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-30622 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-30614 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30613 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30607 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30594 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+	TODO: check
+CVE-2025-30589 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-30579 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30563 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30559 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30548 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30547 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30544 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30520 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-30471 (A validation issue was addressed with improved logic. This issue is fi ...)
+	TODO: check
+CVE-2025-30470 (A path handling issue was addressed with improved logic. This issue is ...)
+	TODO: check
+CVE-2025-30469 (This issue was addressed through improved state management. This issue ...)
+	TODO: check
+CVE-2025-30467 (The issue was addressed with improved checks. This issue is fixed in S ...)
+	TODO: check
+CVE-2025-30465 (A permissions issue was addressed with improved validation. This issue ...)
+	TODO: check
+CVE-2025-30464 (An out-of-bounds write issue was addressed with improved bounds checki ...)
+	TODO: check
+CVE-2025-30463 (The issue was addressed with improved restriction of data container ac ...)
+	TODO: check
+CVE-2025-30462 (A library injection issue was addressed with additional restrictions.  ...)
+	TODO: check
+CVE-2025-30461 (An access issue was addressed with additional sandbox restrictions on  ...)
+	TODO: check
+CVE-2025-30460 (A permissions issue was addressed by removing vulnerable code and addi ...)
+	TODO: check
+CVE-2025-30458 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2025-30457 (This issue was addressed with improved validation of symlinks. This is ...)
+	TODO: check
+CVE-2025-30456 (A parsing issue in the handling of directory paths was addressed with  ...)
+	TODO: check
+CVE-2025-30455 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2025-30454 (A path handling issue was addressed with improved validation. This iss ...)
+	TODO: check
+CVE-2025-30452 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2025-30451 (This issue was addressed with improved redaction of sensitive informat ...)
+	TODO: check
+CVE-2025-30450 (This issue was addressed with improved validation of symlinks. This is ...)
+	TODO: check
+CVE-2025-30449 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2025-30447 (The issue was resolved by sanitizing logging This issue is fixed in vi ...)
+	TODO: check
+CVE-2025-30446 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2025-30444 (A race condition was addressed with improved locking. This issue is fi ...)
+	TODO: check
+CVE-2025-30443 (A privacy issue was addressed by removing the vulnerable code. This is ...)
+	TODO: check
+CVE-2025-30441 (This issue was addressed through improved state management. This issue ...)
+	TODO: check
+CVE-2025-30439 (The issue was addressed with improved checks. This issue is fixed in v ...)
+	TODO: check
+CVE-2025-30438 (This issue was addressed with improved access restrictions. This issue ...)
+	TODO: check
+CVE-2025-30437 (The issue was addressed with improved bounds checks. This issue is fix ...)
+	TODO: check
+CVE-2025-30435 (This issue was addressed with improved redaction of sensitive informat ...)
+	TODO: check
+CVE-2025-30434 (The issue was addressed with improved input sanitization. This issue i ...)
+	TODO: check
+CVE-2025-30433 (This issue was addressed with improved access restrictions. This issue ...)
+	TODO: check
+CVE-2025-30432 (A logic issue was addressed with improved state management. This issue ...)
+	TODO: check
+CVE-2025-30430 (This issue was addressed through improved state management. This issue ...)
+	TODO: check
+CVE-2025-30429 (A path handling issue was addressed with improved validation. This iss ...)
+	TODO: check
+CVE-2025-30428 (This issue was addressed through improved state management. This issue ...)
+	TODO: check
+CVE-2025-30427 (A use-after-free issue was addressed with improved memory management.  ...)
+	TODO: check
+CVE-2025-30426 (This issue was addressed with additional entitlement checks. This issu ...)
+	TODO: check
+CVE-2025-30425 (This issue was addressed through improved state management. This issue ...)
+	TODO: check
+CVE-2025-30424 (A logging issue was addressed with improved data redaction. This issue ...)
+	TODO: check
+CVE-2025-2891 (The Real Estate 7 WordPress theme for WordPress is vulnerable to arbit ...)
+	TODO: check
+CVE-2025-2048 (The Lana Downloads Manager WordPress plugin before 1.10.0 does not val ...)
+	TODO: check
+CVE-2025-2008 (The Import Export Suite for CSV and XML Datafeed plugin for WordPress  ...)
+	TODO: check
+CVE-2025-2007 (The Import Export Suite for CSV and XML Datafeed plugin for WordPress  ...)
+	TODO: check
+CVE-2025-26683 (Improper authorization in Azure Playwright allows an unauthorized atta ...)
+	TODO: check
+CVE-2025-24283 (A logging issue was addressed with improved data redaction. This issue ...)
+	TODO: check
+CVE-2025-24282 (A library injection issue was addressed with additional restrictions.  ...)
+	TODO: check
+CVE-2025-24281 (This issue was addressed with improved data protection. This issue is  ...)
+	TODO: check
+CVE-2025-24280 (An access issue was addressed with additional sandbox restrictions. Th ...)
+	TODO: check
+CVE-2025-24279 (This issue was addressed with improved file handling. This issue is fi ...)
+	TODO: check
+CVE-2025-24278 (This issue was addressed with improved validation of symlinks. This is ...)
+	TODO: check
+CVE-2025-24277 (A parsing issue in the handling of directory paths was addressed with  ...)
+	TODO: check
+CVE-2025-24276 (This issue was addressed by removing the vulnerable code. This issue i ...)
+	TODO: check
+CVE-2025-24273 (An out-of-bounds write issue was addressed with improved bounds checki ...)
+	TODO: check
+CVE-2025-24272 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2025-24269 (The issue was addressed with improved memory handling. This issue is f ...)
+	TODO: check
+CVE-2025-24267 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2025-24266 (A buffer overflow was addressed with improved bounds checking. This is ...)
+	TODO: check
+CVE-2025-24265 (An out-of-bounds read was addressed with improved bounds checking. Thi ...)
+	TODO: check
+CVE-2025-24264 (The issue was addressed with improved memory handling. This issue is f ...)
+	TODO: check
+CVE-2025-24263 (A privacy issue was addressed by moving sensitive data to a protected  ...)
+	TODO: check
+CVE-2025-24262 (A privacy issue was addressed with improved private data redaction for ...)
+	TODO: check
+CVE-2025-24261 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2025-24260 (The issue was addressed with improved memory handling. This issue is f ...)
+	TODO: check
+CVE-2025-24259 (This issue was addressed with additional entitlement checks. This issu ...)
+	TODO: check
+CVE-2025-24257 (An out-of-bounds write issue was addressed with improved input validat ...)
+	TODO: check
+CVE-2025-24256 (The issue was addressed with improved bounds checks. This issue is fix ...)
+	TODO: check
+CVE-2025-24255 (A file access issue was addressed with improved input validation. This ...)
+	TODO: check
+CVE-2025-24254 (This issue was addressed with improved validation of symlinks. This is ...)
+	TODO: check
+CVE-2025-24253 (This issue was addressed with improved handling of symlinks. This issu ...)
+	TODO: check
+CVE-2025-24250 (This issue was addressed with improved access restrictions. This issue ...)
+	TODO: check
+CVE-2025-24249 (A permissions issue was addressed with additional sandbox restrictions ...)
+	TODO: check
+CVE-2025-24248 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2025-24247 (A type confusion issue was addressed with improved checks. This issue  ...)
+	TODO: check
+CVE-2025-24246 (An injection issue was addressed with improved validation. This issue  ...)
+	TODO: check
+CVE-2025-24245 (This issue was addressed by adding a delay between verification code a ...)
+	TODO: check
+CVE-2025-24244 (The issue was addressed with improved memory handling. This issue is f ...)
+	TODO: check
+CVE-2025-24243 (The issue was addressed with improved memory handling. This issue is f ...)
+	TODO: check
+CVE-2025-24242 (This issue was addressed with improved handling of symlinks. This issu ...)
+	TODO: check
+CVE-2025-24241 (A configuration issue was addressed with additional restrictions. This ...)
+	TODO: check
+CVE-2025-24240 (A race condition was addressed with additional validation. This issue  ...)
+	TODO: check
+CVE-2025-24239 (A downgrade issue was addressed with additional code-signing restricti ...)
+	TODO: check
+CVE-2025-24238 (A logic issue was addressed with improved checks. This issue is fixed  ...)
+	TODO: check
+CVE-2025-24237 (A buffer overflow was addressed with improved bounds checking. This is ...)
+	TODO: check
+CVE-2025-24236 (An access issue was addressed with additional sandbox restrictions. Th ...)
+	TODO: check
+CVE-2025-24235 (A memory initialization issue was addressed with improved memory handl ...)
+	TODO: check
+CVE-2025-24234 (This issue was addressed by removing the vulnerable code. This issue i ...)
+	TODO: check
+CVE-2025-24233 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2025-24232 (This issue was addressed through improved state management. This issue ...)
+	TODO: check
+CVE-2025-24231 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2025-24230 (An out-of-bounds read issue was addressed with improved input validati ...)
+	TODO: check
+CVE-2025-24229 (A logic issue was addressed with improved checks. This issue is fixed  ...)
+	TODO: check
+CVE-2025-24228 (A buffer overflow issue was addressed with improved memory handling. T ...)
+	TODO: check
+CVE-2025-24226 (The issue was addressed with improved checks. This issue is fixed in X ...)
+	TODO: check
+CVE-2025-24221 (This issue was addressed with improved data access restriction. This i ...)
+	TODO: check
+CVE-2025-24218 (A privacy issue was addressed with improved private data redaction for ...)
+	TODO: check
+CVE-2025-24217 (This issue was addressed with improved redaction of sensitive informat ...)
+	TODO: check
+CVE-2025-24216 (The issue was addressed with improved memory handling. This issue is f ...)
+	TODO: check
+CVE-2025-24215 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2025-24214 (A privacy issue was addressed by not logging contents of text fields.  ...)
+	TODO: check
+CVE-2025-24213 (This issue was addressed with improved handling of floats. This issue  ...)
+	TODO: check
+CVE-2025-24212 (This issue was addressed with improved checks. This issue is fixed in  ...)
+	TODO: check
+CVE-2025-24211 (This issue was addressed with improved memory handling. This issue is  ...)
+	TODO: check
+CVE-2025-24210 (A logic error was addressed with improved error handling. This issue i ...)
+	TODO: check
+CVE-2025-24209 (A buffer overflow issue was addressed with improved memory handling. T ...)
+	TODO: check
+CVE-2025-24208 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2025-24207 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2025-24205 (An authorization issue was addressed with improved state management. T ...)
+	TODO: check
+CVE-2025-24204 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2025-24203 (The issue was addressed with improved checks. This issue is fixed in m ...)
+	TODO: check
+CVE-2025-24202 (A logging issue was addressed with improved data redaction. This issue ...)
+	TODO: check
+CVE-2025-24199 (An uncontrolled format string issue was addressed with improved input  ...)
+	TODO: check
+CVE-2025-24198 (This issue was addressed by restricting options offered on a locked de ...)
+	TODO: check
+CVE-2025-24196 (A type confusion issue was addressed with improved memory handling. Th ...)
+	TODO: check
+CVE-2025-24195 (An integer overflow was addressed with improved input validation. This ...)
+	TODO: check
+CVE-2025-24194 (A logic issue was addressed with improved checks. This issue is fixed  ...)
+	TODO: check
+CVE-2025-24193 (This issue was addressed with improved authentication. This issue is f ...)
+	TODO: check
+CVE-2025-24192 (A script imports issue was addressed with improved isolation. This iss ...)
+	TODO: check
+CVE-2025-24191 (The issue was addressed with improved validation of environment variab ...)
+	TODO: check
+CVE-2025-24190 (The issue was addressed with improved memory handling. This issue is f ...)
+	TODO: check
+CVE-2025-24182 (An out-of-bounds read issue was addressed with improved input validati ...)
+	TODO: check
+CVE-2025-24181 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2025-24180 (The issue was addressed with improved input validation. This issue is  ...)
+	TODO: check
+CVE-2025-24178 (This issue was addressed through improved state management. This issue ...)
+	TODO: check
+CVE-2025-24173 (This issue was addressed with additional entitlement checks. This issu ...)
+	TODO: check
+CVE-2025-24172 (A permissions issue was addressed with additional sandbox restrictions ...)
+	TODO: check
+CVE-2025-24170 (A logic issue was addressed with improved file handling. This issue is ...)
+	TODO: check
+CVE-2025-24167 (This issue was addressed through improved state management. This issue ...)
+	TODO: check
+CVE-2025-24164 (A logic issue was addressed with improved checks. This issue is fixed  ...)
+	TODO: check
+CVE-2025-24157 (A buffer overflow issue was addressed with improved memory handling. T ...)
+	TODO: check
+CVE-2025-24148 (This issue was addressed with improved handling of executable types. T ...)
+	TODO: check
+CVE-2025-24097 (A permissions issue was addressed with additional restrictions. This i ...)
+	TODO: check
+CVE-2025-24095 (This issue was addressed with additional entitlement checks. This issu ...)
+	TODO: check
+CVE-2025-22277 (Authentication Bypass Using an Alternate Path or Channel vulnerability ...)
+	TODO: check
+CVE-2025-21384 (An authenticated attacker can exploit an Server-Side Request Forgery ( ...)
+	TODO: check
+CVE-2025-1986 (The Gutentor  WordPress plugin before 3.4.7 does not sanitize and esca ...)
+	TODO: check
+CVE-2025-1665 (The Avada (Fusion) Builder plugin for WordPress is vulnerable to Store ...)
+	TODO: check
+CVE-2025-1534 (CVE-79: Improper Neutralization of Input During Web Page Generation (' ...)
+	TODO: check
+CVE-2025-1512 (The PowerPack Elementor Addons (Free Widgets, Extensions and Templates ...)
+	TODO: check
+CVE-2025-1267 (The Groundhogg plugin for Wordpress is vulnerable to Stored Cross-Site ...)
+	TODO: check
+CVE-2025-0418 (Valmet DNA user passwords in plain text.This practice poses a security ...)
+	TODO: check
+CVE-2025-0417 (Lack of protection against brute force attacks in Valmet DNA visualiza ...)
+	TODO: check
+CVE-2025-0416 (Local privilege escalation through insecure DCOM configuration in Valm ...)
+	TODO: check
+CVE-2024-54809 (Netgear Inc WNR854T 1.5.2 (North America) contains a stack-based buffe ...)
+	TODO: check
+CVE-2024-54808 (Netgear WNR854T 1.5.2 (North America) contains a stack-based buffer ov ...)
+	TODO: check
+CVE-2024-54807 (In Netgear WNR854T 1.5.2 (North America), the UPNP service is vulnerab ...)
+	TODO: check
+CVE-2024-54806 (Netgear WNR854T 1.5.2 (North America) is vulnerable to Arbitrary comma ...)
+	TODO: check
+CVE-2024-54805 (Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injecti ...)
+	TODO: check
+CVE-2024-54804 (Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injecti ...)
+	TODO: check
+CVE-2024-54803 (Netgear WNR854T 1.5.2 (North America) is vulnerable to Command Injecti ...)
+	TODO: check
+CVE-2024-54802 (In Netgear WNR854T 1.5.2 (North America), the UPNP service (/usr/sbin/ ...)
+	TODO: check
+CVE-2024-54533 (A permissions issue was addressed with additional sandbox restrictions ...)
+	TODO: check
+CVE-2024-40864 (The issue was addressed with improved handling of protocols. This issu ...)
+	TODO: check
+CVE-2024-24456 (An E-RAB Release Command packet containing a malformed NAS PDUwill cau ...)
+	TODO: check
+CVE-2024-13567 (The Awesome Support \u2013 WordPress HelpDesk & Support Plugin plugin  ...)
+	TODO: check
+CVE-2024-12278 (The Booster for WooCommerce plugin for WordPress is vulnerable to Stor ...)
+	TODO: check
+CVE-2024-12189 (The WDesignKit \u2013 Elementor & Gutenberg Starter Templates, Pattern ...)
+	TODO: check
+CVE-2025-27427 (A vulnerability exists in Apache ActiveMQ Artemis whereby a user with  ...)
 	NOT-FOR-US: Apache ActiveMQ Artemis
-CVE-2025-30065
+CVE-2025-30065 (Schema parsing in the parquet-avro module of Apache Parquet 1.15.0 and ...)
 	NOT-FOR-US: Apache Parquet
-CVE-2025-29868
+CVE-2025-29868 (Private Data Structure Returned From A Public Method vulnerability in  ...)
 	NOT-FOR-US: Apache Answer
-CVE-2025-3051
+CVE-2025-3051 (Linux::Statm::Tiny for Perl before 0.0701 allows untrusted code from t ...)
 	NOT-FOR-US: Linux::Statm::Tiny
 	NOTE: https://lists.security.metacpan.org/cve-announce/msg/28383471/
-CVE-2025-30673
+CVE-2025-30673 (Sub::HandlesVia for Perl before 0.050002 allows untrusted code from th ...)
 	- libsub-handlesvia-perl 0.050002-1
 	NOTE: https://lists.security.metacpan.org/cve-announce/msg/28383041/
 	NOTE: Fixed by: https://github.com/tobyink/p5-sub-handlesvia/commit/9bc3cfb22ade4b407413ae1c746bb331fff52954 (0.050002)
-CVE-2025-30672
+CVE-2025-30672 (Mite for Perl before 0.013000 generates code with the current working  ...)
 	NOT-FOR-US: Mite for Perl
 	NOTE: https://lists.security.metacpan.org/cve-announce/msg/28382470/
 	NOTE: Fixed by: https://github.com/tobyink/p5-mite/commit/bf57dddd242f4520204e1e946e636f11c91f2e4e (0.013000)
@@ -239,7 +771,7 @@ CVE-2025-30155 (Tuleap is an Open Source Suite to improve management of software
 	NOT-FOR-US: Tuleap
 CVE-2025-30149 (OpenEMR is a free and open source electronic health records and medica ...)
 	NOT-FOR-US: OpenEMR
-CVE-2025-30095 (VyOS 1.3 through 1.5 or any Debian-based system using dropbear in comb ...)
+CVE-2025-30095 (VyOS 1.3 through 1.5 (fixed in 1.4.2) or any Debian-based system using ...)
 	NOT-FOR-US: VyOS
 CVE-2025-30006 (Xorcom CompletePBX is vulnerable to a reflected cross-site scripting ( ...)
 	NOT-FOR-US: Xorcom CompletePBX
@@ -417,7 +949,7 @@ CVE-2025-1268 (Out-of-bounds vulnerability in EMF Recode processing of Generic P
 	TODO: check
 CVE-2025-0613 (The Photo Gallery by 10Web  WordPress plugin before 1.8.34 does not sa ...)
 	NOT-FOR-US: WordPress plugin
-CVE-2024-13804 (Vulnerability in Hewlett Packard Enterprise HPE Insight Cluster Manage ...)
+CVE-2024-13804 (Unauthenticated RCE in HPE Insight Cluster Management Utility)
 	NOT-FOR-US: HPE
 CVE-2025-2958 (A vulnerability was found in TRENDnet TEW-818DRU 1.0.14.6. It has been ...)
 	NOT-FOR-US: TRENDnet
@@ -3174,6 +3706,7 @@ CVE-2025-30348 (encodeText in QDom in Qt before 6.8.0 has a complex algorithm in
 CVE-2025-30347 (Varnish Enterprise before 6.0.13r13 allows remote attackers to obtain  ...)
 	NOT-FOR-US: Varnish Enterprise
 CVE-2025-30346 (Varnish Cache before 7.6.2 and Varnish Enterprise before 6.0.13r10 all ...)
+	{DLA-4101-1}
 	- varnish 7.7.0-1
 	NOTE: https://varnish-cache.org/security/VSV00015.html
 	NOTE: https://github.com/varnishcache/varnish-cache/commit/8ef69a03b36aeac5f364c01eb20f821860e47f14 (varnish-7.7.0)
@@ -3206,7 +3739,7 @@ CVE-2025-2581 (A vulnerability has been found in xmedcon 0.25.0 and classified a
 	NOTE: https://sourceforge.net/p/xmedcon/code/ci/e7a88836fc2277f8ab777f3ef24f917d08415559/
 CVE-2025-2574 (Out-of-bounds array write in Xpdf 4.05 and earlier, due to incorrect i ...)
 	- xpdf <not-affected> (Debian uses poppler)
-CVE-2025-2538 (Some deployments of Esri ArcGIS Enterprise are vulnerable to an improp ...)
+CVE-2025-2538 (A specific type of Portal for ArcGIS deployment is vulnerable to a Pas ...)
 	NOT-FOR-US: ArcGIS Enterprise
 CVE-2025-2198
 	REJECTED
@@ -4227,6 +4760,7 @@ CVE-2024-10442 (Off-by-one error vulnerability in the transmission component in
 CVE-2024-10441 (Improper encoding or escaping of output vulnerability in the system pl ...)
 	NOT-FOR-US: Synology
 CVE-2025-29918 [detect: infinite loop with negated pcre and indefinite recursion limit setting]
+	{DLA-4103-1}
 	- suricata 1:7.0.9-1
 	[bookworm] - suricata <no-dsa> (Minor issue)
 	NOTE: Fixed by: https://github.com/OISF/suricata/commit/b14c67cbdf25fa6c7ffe0d04ddf3ebe67b12b50b (master)
@@ -5870,7 +6404,7 @@ CVE-2025-27393 (A vulnerability has been identified in SCALANCE LPE9403 (6GK5998
 CVE-2025-27392 (A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00 ...)
 	NOT-FOR-US: Siemens
 CVE-2025-27363 (An out of bounds write exists in FreeType versions 2.13.0 and below (n ...)
-	{DSA-5880-1}
+	{DSA-5880-1 DLA-4104-1}
 	- freetype 2.13.1+dfsg-1
 	NOTE: https://www.facebook.com/security/advisories/cve-2025-27363
 	NOTE: https://gitlab.freedesktop.org/freetype/freetype/-/issues/1322
@@ -6884,6 +7418,7 @@ CVE-2025-21836 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8802766324e1f5d414a81ac43365c20142e85603 (6.14-rc3)
 CVE-2025-21835 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/da1668997052ed1cb00322e1f3b63702615c9429 (6.14-rc3)
@@ -7086,6 +7621,7 @@ CVE-2025-21833 (In the Linux kernel, the following vulnerability has been resolv
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/60f030f7418d3f1d94f2fb207fe3080e1844630b (6.14-rc1)
 CVE-2025-21832 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/b13ee668e8280ca5b07f8ce2846b9957a8a10853 (6.14-rc1)
@@ -7093,11 +7629,13 @@ CVE-2025-21831 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.12.15-1
 	NOTE: https://git.kernel.org/linus/b1049f2d68693c80a576c4578d96774a68df2bad (6.14-rc1)
 CVE-2025-21830 (In the Linux kernel, the following vulnerability has been resolved:  l ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/49440290a0935f428a1e43a5ac8dc275a647ff80 (6.14-rc1)
 CVE-2025-21829 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -7113,6 +7651,7 @@ CVE-2025-21827 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e9087e828827e5a5c85e124ce77503f2b81c3491 (6.14-rc1)
 CVE-2025-21826 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/1b9335a8000fb70742f7db10af314104b6ace220 (6.14-rc1)
@@ -7121,11 +7660,13 @@ CVE-2025-21825 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/58f038e6d209d2dd862fcf5de55407855856794d (6.14-rc1)
 CVE-2024-58086 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/21f1435b1e6b012a07c42f36b206d2b66fc8f13b (6.14-rc1)
 CVE-2024-58085 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/3df7546fc03b8f004eee0b9e3256369f7d096685 (6.14-rc1)
@@ -7135,6 +7676,7 @@ CVE-2024-58084 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b628510397b5cafa1f5d3e848a28affd1c635302 (6.14-rc1)
 CVE-2024-58083 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/1e7381f3617d14b3c11da80ff5f8a93ab14cfc46 (6.14-rc1)
@@ -7149,6 +7691,7 @@ CVE-2024-58081 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e24b15d4704dcb73920c3d18a6157abd18df08c1 (6.14-rc1)
 CVE-2024-58080 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -7163,10 +7706,12 @@ CVE-2024-58078 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6d04d2b554b14ae6c428a9c60b6c85f1e5c89f68 (6.14-rc1)
 CVE-2024-58077 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/301c26a018acb94dd537a4418cefa0f654500c6f (6.14-rc1)
 CVE-2024-58076 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -7185,10 +7730,12 @@ CVE-2024-58073 (In the Linux kernel, the following vulnerability has been resolv
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/789384eb1437aed94155dc0eac8a8a6ba1baf578 (6.14-rc1)
 CVE-2024-58072 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/2fdac64c3c35858aa8ac5caa70b232e03456e120 (6.14-rc1)
 CVE-2024-58071 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/3fff5da4ca2164bb4d0f1e6cd33f6eb8a0e73e50 (6.14-rc1)
@@ -7198,10 +7745,12 @@ CVE-2024-58070 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8eef6ac4d70eb1f0099fff93321d90ce8fa49ee1 (6.14-rc1)
 CVE-2024-58069 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/3ab8c5ed4f84fa20cd16794fe8dc31f633fbc70c (6.14-rc1)
 CVE-2024-58068 (In the Linux kernel, the following vulnerability has been resolved:  O ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -7221,6 +7770,7 @@ CVE-2024-58064 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/13c4f7714c6a1ecf748a2f22099447c14fe6ed8c (6.14-rc1)
 CVE-2024-58063 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/e7ceefbfd8d447abc8aca8ab993a942803522c06 (6.14-rc1)
@@ -7230,6 +7780,7 @@ CVE-2024-58062 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/cf704a7624f99eb2ffca1a16c69183e85544a613 (6.14-rc1)
 CVE-2024-58061 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -7243,6 +7794,7 @@ CVE-2024-58059 (In the Linux kernel, the following vulnerability has been resolv
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a67f75c2b5ecf534eab416ce16c11fe780c4f8f6 (6.14-rc1)
 CVE-2024-58058 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/bdb0ca39e0acccf6771db49c3f94ed787d05f2d7 (6.14-rc1)
@@ -7252,15 +7804,18 @@ CVE-2024-58057 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9a5b021cb8186f1854bac2812bd4f396bb1e881c (6.14-rc1)
 CVE-2024-58056 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7378aeb664e5ebc396950b36a1f2dedf5aabec20 (6.14-rc1)
 CVE-2024-58055 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/c225d006a31949d673e646d585d9569bc28feeb9 (6.14-rc1)
 CVE-2024-58054 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -7269,10 +7824,12 @@ CVE-2024-58053 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.12.13-1
 	NOTE: https://git.kernel.org/linus/0e56ebde245e4799ce74d38419426f2a80d39950 (6.14-rc1)
 CVE-2024-58052 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/357445e28ff004d7f10967aa93ddb4bffa5c3688 (6.14-rc1)
 CVE-2024-58051 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/2378bd0b264ad3a1f76bd957caf33ee0c7945351 (6.14-rc1)
@@ -9197,6 +9754,7 @@ CVE-2025-21824 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/02458fbfaa0170aabf8506f7d4ed054f02414251 (6.14-rc3)
 CVE-2025-21823 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/8c8ecc98f5c65947b0070a24bac11e12e47cc65d (6.14-rc3)
@@ -9204,14 +9762,17 @@ CVE-2025-21822 (In the Linux kernel, the following vulnerability has been resolv
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f7d07cd4f77d77f366c8ffbb8ba8b61f614e5fce (6.14-rc3)
 CVE-2025-21821 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/e4b6b665df815b4841e71b72f06446884e8aad40 (6.14-rc1)
 CVE-2025-21820 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/b06f388994500297bb91be60ffaf6825ecfd2afe (6.14-rc1)
 CVE-2025-21819 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -9230,6 +9791,7 @@ CVE-2025-21815 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d1366e74342e75555af2648a2964deb2d5c92200 (6.14-rc1)
 CVE-2025-21814 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/fd53aa40e65f518453115b6f56183b0c201db26b (6.14-rc1)
@@ -9239,10 +9801,12 @@ CVE-2025-21813 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/868c9037df626b3c245ee26a290a03ae1f9f58d3 (6.14-rc2)
 CVE-2025-21812 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/95fc45d1dea8e1253f8ec58abc5befb71553d666 (6.14-rc1)
 CVE-2025-21811 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/367a9bffabe08c04f6d725032cce3d891b2b9e1a (6.14-rc1)
@@ -9267,6 +9831,7 @@ CVE-2025-21807 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c99f66e4084a62a2cc401c4704a84328aeddc9ec (6.14-rc1)
 CVE-2025-21806 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/d1f9f79fa2af8e3b45cffdeef66e05833480148a (6.14-rc1)
@@ -9276,6 +9841,7 @@ CVE-2025-21805 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/81468c4058a62e84e475433b83b3edc613294f5e (6.14-rc1)
 CVE-2025-21804 (In the Linux kernel, the following vulnerability has been resolved:  P ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/2d2da5a4c1b4509f6f7e5a8db015cd420144beb4 (6.14-rc1)
@@ -9285,6 +9851,7 @@ CVE-2025-21803 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/26c0a2d93af55d30a46d5f45d3e9c42cde730168 (6.14-rc1)
 CVE-2025-21802 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/92e5995773774a3e70257e9c95ea03518268bea5 (6.14-rc1)
@@ -9297,6 +9864,7 @@ CVE-2025-21800 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/be482f1d10da781db9445d2753c1e3f1fd82babf (6.14-rc1)
 CVE-2025-21799 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/4395a44acb15850e492dd1de9ec4b6479d96bc80 (6.14-rc1)
@@ -9311,6 +9879,7 @@ CVE-2024-58042 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e1d3422c95f003eba241c176adfe593c33e8a8f6 (6.14-rc1)
 CVE-2024-58034 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/b9784e5cde1f9fb83661a70e580e381ae1264d12 (6.14-rc1)
@@ -9467,14 +10036,17 @@ CVE-2025-21797 (In the Linux kernel, the following vulnerability has been resolv
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/48e487b002891eb0aeaec704c9bed51f028deff1 (6.14-rc3)
 CVE-2025-21796 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/7faf14a7b0366f153284db0ad3347c457ea70136 (6.14-rc3)
 CVE-2025-21795 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/036ac2778f7b28885814c6fbc07e156ad1624d03 (6.14-rc3)
 CVE-2025-21794 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -9485,14 +10057,17 @@ CVE-2025-21793 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3588b1c0fde2f58d166e3f94a5a58d64b893526c (6.14-rc3)
 CVE-2025-21792 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/bca0902e61731a75fc4860c8720168d9f1bae3b6 (6.14-rc3)
 CVE-2025-21791 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/6d0ce46a93135d96b7fa075a94a88fe0da8e8773 (6.14-rc3)
 CVE-2025-21790 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -9508,6 +10083,7 @@ CVE-2025-21788 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5db843258de1e4e6b1ef1cbd1797923c9e3de548 (6.14-rc3)
 CVE-2025-21787 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/5bef3ac184b5626ea62385d6b82a1992b89d7940 (6.14-rc3)
@@ -9517,6 +10093,7 @@ CVE-2025-21786 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e76946110137703c16423baf6ee177b751a34b7e (6.14-rc3)
 CVE-2025-21785 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/875d742cf5327c93cba1f11e12b08d3cce7a88d2 (6.14-rc3)
@@ -9531,18 +10108,22 @@ CVE-2025-21783 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7b4aebeecbbd5b5fe73e35fad3f62ed21aa7ef44 (6.14-rc3)
 CVE-2025-21782 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/f7c848431632598ff9bce57a659db6af60d75b39 (6.14-rc1)
 CVE-2025-21781 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/ccb7276a6d26d6f8416e315b43b45e15ee7f29e2 (6.14-rc3)
 CVE-2025-21780 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/1abb2648698bf10783d2236a6b4a7ca5e8021699 (6.14-rc3)
 CVE-2025-21779 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/a8de7f100bb5989d9c3627d3a223ee1c863f3b69 (6.14-rc3)
@@ -9557,10 +10138,12 @@ CVE-2025-21777 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f5b95f1fa2ef3a03f49eeec658ba97e721412b32 (6.14-rc3)
 CVE-2025-21776 (In the Linux kernel, the following vulnerability has been resolved:  U ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/2240fed37afbcdb5e8b627bc7ad986891100e05d (6.14-rc3)
 CVE-2025-21775 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -9576,6 +10159,7 @@ CVE-2025-21773 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a1ad2109ce41c9e3912dadd07ad8a9c640064ffb (6.14-rc3)
 CVE-2025-21772 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/80e648042e512d5a767da251d44132553fe04ae0 (6.14-rc3)
@@ -9596,34 +10180,42 @@ CVE-2025-21768 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.12.16-1
 	NOTE: https://git.kernel.org/linus/92191dd1073088753821b862b791dcc83e558e07 (6.14-rc2)
 CVE-2025-21767 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/6bb05a33337b2c842373857b63de5c9bf1ae2a09 (6.14-rc2)
 CVE-2025-21766 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/139512191bd06f1b496117c76372b2ce372c9a41 (6.14-rc3)
 CVE-2025-21765 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/3c8ffcd248da34fc41e52a46e51505900115fc2a (6.14-rc3)
 CVE-2025-21764 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/628e6d18930bbd21f2d4562228afe27694f66da9 (6.14-rc3)
 CVE-2025-21763 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/becbd5850c03ed33b232083dd66c6e38c0c0e569 (6.14-rc3)
 CVE-2025-21762 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/a42b69f692165ec39db42d595f4f65a4c8f42e44 (6.14-rc3)
 CVE-2025-21761 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/90b2f49a502fa71090d9f4fe29a2f51fe5dff76d (6.14-rc3)
 CVE-2025-21760 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/ed6ae1f325d3c43966ec1b62ac1459e2b8e45640 (6.14-rc3)
@@ -9631,6 +10223,7 @@ CVE-2025-21759 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.12.16-1
 	NOTE: https://git.kernel.org/linus/087c1faa594fa07a66933d750c0b2610aa1a2946 (6.14-rc3)
 CVE-2025-21758 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/a527750d877fd334de87eef81f1cb5f0f0ca3373 (6.14-rc3)
@@ -9647,6 +10240,7 @@ CVE-2025-21754 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0d85f5c2dd91df6b5da454406756f463ba923b69 (6.14-rc2)
 CVE-2025-21753 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/e2f0943cf37305dbdeaf9846e3c941451bcdef63 (6.14-rc2)
@@ -9659,14 +10253,17 @@ CVE-2025-21751 (In the Linux kernel, the following vulnerability has been resolv
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/1ce840c7a659aa53a31ef49f0271b4fd0dc10296 (6.14-rc1)
 CVE-2025-21750 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/082d9e263af8de68f0c34f67b251818205160f6e (6.14-rc1)
 CVE-2025-21749 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/a1300691aed9ee852b0a9192e29e2bdc2411a7e6 (6.14-rc2)
 CVE-2025-21748 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -9680,10 +10277,12 @@ CVE-2025-21746 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/08bd5b7c9a2401faabdaa1472d45c7de0755fd7e (6.14-rc1)
 CVE-2025-21745 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/d1248436cbef1f924c04255367ff4845ccd9025e (6.14-rc1)
 CVE-2025-21744 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/68abd0c4ebf24cd499841a488b97a6873d5efabb (6.14-rc1)
@@ -9709,6 +10308,7 @@ CVE-2025-21739 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f8fb2403ddebb5eea0033d90d9daae4c88749ada (6.14-rc2)
 CVE-2025-21738 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/6e74e53b34b6dec5a50e1404e2680852ec6768d2 (6.14-rc1)
@@ -9718,14 +10318,17 @@ CVE-2025-21737 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3b7d93db450e9d8ead80d75e2a303248f1528c35 (6.14-rc1)
 CVE-2025-21736 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/6438ef381c183444f7f9d1de18f22661cba1e946 (6.14-rc1)
 CVE-2025-21735 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/110b43ef05342d5a11284cc8b21582b698b4ef1c (6.14-rc1)
 CVE-2025-21734 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/e966eae72762ecfdbdb82627e2cda48845b9dd66 (6.14-rc1)
@@ -9739,6 +10342,7 @@ CVE-2025-21732 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/abb604a1a9c87255c7a6f3b784410a9707baf467 (6.14-rc1)
 CVE-2025-21731 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/844b8cdc681612ff24df62cdefddeab5772fadf1 (6.14-rc1)
@@ -9752,23 +10356,28 @@ CVE-2025-21729 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ba4bb0402c60e945c4c396c51f0acac3c3e3ea5c (6.14-rc1)
 CVE-2025-21728 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/87c544108b612512b254c8f79aa5c0a8546e2cc4 (6.14-rc1)
 CVE-2025-21727 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/e01780ea4661172734118d2a5f41bc9720765668 (6.14-rc1)
 CVE-2025-21726 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/dd7d37ccf6b11f3d95e797ebe4e9e886d0332600 (6.14-rc1)
 CVE-2025-21725 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/be7a6a77669588bfa5022a470989702bbbb11e7f (6.14-rc1)
 CVE-2025-21724 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -9778,6 +10387,7 @@ CVE-2025-21723 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/295006f6e8c17212d3098811166e29627d19e05c (6.14-rc1)
 CVE-2025-21722 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/ca76bb226bf47ff04c782cacbd299f12ddee1ec1 (6.14-rc1)
@@ -9790,10 +10400,12 @@ CVE-2025-21720 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/600258d555f0710b9c47fb78d2d80a4aecd608cc (6.14-rc1)
 CVE-2025-21719 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/15a901361ec3fb1c393f91880e1cbf24ec0a88bd (6.14-rc1)
 CVE-2025-21718 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/5de7665e0a0746b5ad7943554b34db8f8614a196 (6.14-rc1)
@@ -9801,11 +10413,13 @@ CVE-2025-21717 (In the Linux kernel, the following vulnerability has been resolv
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/979284535aaf12a287a2f43d9d5dfcbdc1dc4cac (6.14-rc1)
 CVE-2025-21716 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5066293b9b7046a906eff60e3949a887ae185a43 (6.14-rc1)
 CVE-2025-21715 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/19e65c45a1507a1a2926649d2db3583ed9d55fd9 (6.14-rc1)
@@ -9821,6 +10435,7 @@ CVE-2025-21712 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.12.13-1
 	NOTE: https://git.kernel.org/linus/8d28d0ddb986f56920ac97ae704cc3340a699a30 (6.14-rc1)
 CVE-2025-21711 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/d640627663bfe7d8963c7615316d7d4ef60f3b0b (6.14-rc1)
@@ -9835,20 +10450,24 @@ CVE-2025-21709 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/64c37e134b120fb462fb4a80694bfb8e7be77b14 (6.14-rc1)
 CVE-2025-21708 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/90b7f2961798793275b4844348619b622f983907 (6.14-rc1)
 CVE-2025-21707 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c86b000782daba926c627d2fa00c3f60a75e7472 (6.14-rc1)
 CVE-2025-21706 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1bb0d1348546ad059f55c93def34e67cb2a034a6 (6.14-rc1)
 CVE-2025-21705 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -9859,6 +10478,7 @@ CVE-2024-58021 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/45ab5166a82d038c898985b0ad43ead69c1f9573 (6.14-rc3)
 CVE-2024-58020 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/9b8e2220d3a052a690b1d1b23019673e612494c5 (6.14-rc3)
@@ -9873,10 +10493,12 @@ CVE-2024-58018 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/01ed662bdd6fce4f59c1804b334610d710d79fa0 (6.14-rc1)
 CVE-2024-58017 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/3d6f83df8ff2d5de84b50377e4f0d45e25311c7a (6.14-rc1)
 CVE-2024-58016 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/f09ff307c7299392f1c88f763299e24bc99811c7 (6.14-rc1)
@@ -9886,10 +10508,12 @@ CVE-2024-58015 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/eb8c0534713865d190856f10bfc97cf0b88475b1 (6.14-rc1)
 CVE-2024-58014 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/3f4a0948c3524ae50f166dbc6572a3296b014e62 (6.14-rc1)
 CVE-2024-58013 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/26fbd3494a7dd26269cb0817c289267dbcfdec06 (6.14-rc1)
@@ -9897,15 +10521,18 @@ CVE-2024-58012 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.12.15-1
 	NOTE: https://git.kernel.org/linus/569922b82ca660f8b24e705f6cf674e6b1f99cc7 (6.14-rc1)
 CVE-2024-58011 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/cd2fd6eab480dfc247b737cf7a3d6b009c4d0f1c (6.14-rc1)
 CVE-2024-58010 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/55cf2f4b945f6a6416cc2524ba740b83cc9af25a (6.14-rc1)
 CVE-2024-58009 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux 5.10.234-1
@@ -9916,6 +10543,7 @@ CVE-2024-58008 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e8d9fab39d1f87b52932646b2f1e7877aa3fc0f4 (6.14-rc1)
 CVE-2024-58007 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/22cf4fae6660b6e1a583a41cbf84e3046ca9ccd0 (6.14-rc1)
@@ -9940,6 +10568,7 @@ CVE-2024-58002 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.12.15-1
 	NOTE: https://git.kernel.org/linus/221cd51efe4565501a3dbf04cc011b537dcce7fb (6.14-rc1)
 CVE-2024-58001 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/2b4c2094da6d84e69b843dd3317902e977bf64bd (6.14-rc1)
@@ -9951,16 +10580,19 @@ CVE-2024-57999 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8f70caad82e9c088ed93b4fea48d941ab6441886 (6.14-rc1)
 CVE-2024-57998 (In the Linux kernel, the following vulnerability has been resolved:  O ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d659bc68ed489022ea33342cfbda2911a81e7a0d (6.14-rc1)
 CVE-2024-57997 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6200d947f050efdba4090dfefd8a01981363d954 (6.14-rc1)
 CVE-2024-57996 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/10685681bafce6febb39770f3387621bf5d67d0b (6.14-rc1)
@@ -9975,6 +10607,7 @@ CVE-2024-57994 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a126061c80d5efb4baef4bcf346094139cd81df6 (6.14-rc1)
 CVE-2024-57993 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -10008,6 +10641,7 @@ CVE-2024-57987 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3c15082f3567032d196e8760753373332508c2ca (6.14-rc1)
 CVE-2024-57986 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/64f2657b579343cf923aa933f08074e6258eb07b (6.14-rc1)
@@ -10026,18 +10660,22 @@ CVE-2024-57982 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.12.13-1
 	NOTE: https://git.kernel.org/linus/e952837f3ddb0ff726d5b582aa1aad9aa38d024d (6.14-rc1)
 CVE-2024-57981 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/1e0a19912adb68a4b2b74fd77001c96cd83eb073 (6.14-rc1)
 CVE-2024-57980 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/c6ef3a7fa97ec823a1e1af9085cf13db9f7b3bac (6.14-rc1)
 CVE-2024-57979 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/c79a39dc8d060b9e64e8b0fa9d245d44befeefbe (6.14-rc1)
 CVE-2024-57978 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -10055,6 +10693,7 @@ CVE-2024-57974 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.12.13-1
 	NOTE: https://git.kernel.org/linus/a502ea6fa94b1f7be72a24bcf9e3f5f6b7e6e90c (6.14-rc1)
 CVE-2024-57973 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/bd96a3935e89486304461a21752f824fc25e0f0b (6.14-rc1)
@@ -10067,10 +10706,12 @@ CVE-2024-57852 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.12.16-1
 	NOTE: https://git.kernel.org/linus/94f48ecf0a538019ca2025e0b0da391f8e7cc58c (6.14-rc1)
 CVE-2024-57834 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/1221989555db711578a327a9367f1be46500cb48 (6.14-rc1)
 CVE-2024-54458 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/1e95c798d8a7f70965f0f88d4657b682ff0ec75f (6.14-rc1)
@@ -13740,6 +14381,7 @@ CVE-2024-13564 (The Rife Elementor Extensions & Templates plugin for WordPress i
 CVE-2024-12577 (Kernel software installed and running inside a Guest VM may exploit me ...)
 	NOT-FOR-US: Imagination Technologies
 CVE-2025-21704 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
+	{DLA-4102-1}
 	- linux 6.12.16-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/e563b01208f4d1f609bcab13333b6c0e24ce6a01 (6.14-rc3)
@@ -14751,6 +15393,7 @@ CVE-2024-56171 (libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-
 	NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/5880a9a6bd97c0f9ac8fc4f30110fe023f484746
 	NOTE: Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/245b70d7d2768572ae1b05b3668ca858b9ec4ed4 (v2.12.10)
 CVE-2025-21703 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.15-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux 5.10.234-1
@@ -15686,10 +16329,12 @@ CVE-2025-1094 (Improper neutralization of quoting syntax in PostgreSQL libpq fun
 	NOTE: Regression: https://www.openwall.com/lists/oss-security/2025/02/16/3
 	NOTE: https://www.postgresql.org/about/news/postgresql-174-168-1512-1417-and-1320-released-3018/
 CVE-2025-21701 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/12e070eb6964b341b41677fd260af5a305316a1f (6.14-rc1)
 CVE-2025-21700 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.12.13-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/bc50835e83f60f56e9bec2b392fb5544f250fb6f (6.14-rc1)
@@ -17378,6 +18023,7 @@ CVE-2025-21685 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/59616a91e5e74833b2008b56c66879857c616006 (6.13)
 CVE-2025-21684 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
+	{DLA-4102-1}
 	- linux 6.12.11-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -27997,6 +28643,7 @@ CVE-2024-55627 (Suricata is a network Intrusion Detection System, Intrusion Prev
 	NOTE: Fixed by: https://github.com/OISF/suricata/commit/949bfeca0e5f92212dc3d79f4a87c7c482d376aa (suricata-7.0.8)
 	NOTE: Fixed by: https://github.com/OISF/suricata/commit/7d47fcf7f7fefacd2b0d8f482534a83b35a3c45e (suricata-7.0.8)
 CVE-2024-55626 (Suricata is a network Intrusion Detection System, Intrusion Prevention ...)
+	{DLA-4103-1}
 	- suricata 1:7.0.8-1
 	[bookworm] - suricata <no-dsa> (Minor issue)
 	NOTE: https://github.com/OISF/suricata/security/advisories/GHSA-wmg4-jqx5-4h9v
@@ -30549,6 +31196,7 @@ CVE-2024-56550 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/588a9836a4ef7ec3bfcffda526dfa399637e6cfc (6.13-rc1)
 CVE-2024-56549 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	{DLA-4102-1}
 	- linux 6.12.3-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -41529,19 +42177,19 @@ CVE-2024-3334 (A security bypass vulnerability exists in the Removable Media Enc
 	NOT-FOR-US: Digital Guardian Windows Agents
 CVE-2024-39726 (IBM Engineering Lifecycle Optimization - Engineering Insights 7.0.2 an ...)
 	NOT-FOR-US: IBM
-CVE-2024-24459 (An invalid memory access when handling the ProtocolIE_ID field of S1Se ...)
+CVE-2024-24459 (An invalid memory access when handling the ProtocolIE_ID field ofS1Set ...)
 	NOT-FOR-US: Athonet vEPC MME
-CVE-2024-24458 (An invalid memory access when handling the ENB Configuration Transfer  ...)
+CVE-2024-24458 (An invalid memory access when handling the ENB Configuration Transferm ...)
 	NOT-FOR-US: Athonet vEPC MME
 CVE-2024-24457 (An invalid memory access when handling the ProtocolIE_ID field of E-RA ...)
 	NOT-FOR-US: Athonet vEPC MME
-CVE-2024-24455 (An invalid memory access when handling a UE Context Release message co ...)
+CVE-2024-24455 (An invalid memory access when handling a UE Context Release messagecon ...)
 	NOT-FOR-US: Athonet vEPC MME
-CVE-2024-24454 (An invalid memory access when handling the ProtocolIE_ID field of E-RA ...)
+CVE-2024-24454 (An invalid memory access when handling the ProtocolIE_ID field ofE-RAB ...)
 	NOT-FOR-US: Athonet vEPC MME
-CVE-2024-24453 (An invalid memory access when handling the ProtocolIE_ID field of E-RA ...)
+CVE-2024-24453 (An invalid memory access when handling the ProtocolIE_ID field ofE-RAB ...)
 	NOT-FOR-US: Athonet vEPC MME
-CVE-2024-24452 (An invalid memory access when handling the ProtocolIE_ID field of E-RA ...)
+CVE-2024-24452 (An invalid memory access when handling the ProtocolIE_ID field ofE-RAB ...)
 	NOT-FOR-US: Athonet vEPC MME
 CVE-2024-24450 (Stack-based memcpy buffer overflow in the ngap_handle_pdu_session_reso ...)
 	NOT-FOR-US: OpenAirInterface CN5G AMF
@@ -49593,6 +50241,7 @@ CVE-2024-50062 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/d0e62bf7b575fbfe591f6f570e7595dd60a2f5eb (6.12-rc1)
 CVE-2024-50061 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
+	{DLA-4102-1}
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/609366e7a06d035990df78f1562291c3bf0d4a12 (6.12-rc1)
@@ -49909,6 +50558,7 @@ CVE-2024-49990 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b4224f6bae3801d589f815672ec62800a1501b0d (6.12-rc1)
 CVE-2024-49989 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	{DLA-4102-1}
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/20b5a8f9f4670a8503aa9fa95ca632e77c6bf55d (6.12-rc1)
@@ -50725,6 +51375,7 @@ CVE-2024-47727 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d4fc4d01471528da8a9797a065982e05090e1d81 (6.12-rc1)
 CVE-2024-47726 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	{DLA-4102-1}
 	- linux 6.11.2-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/96cfeb0389530ae32ade8a48ae3ae1ac3b6c009d (6.12-rc1)
@@ -51821,6 +52472,7 @@ CVE-2024-45797 (LibHTP is a security-aware parser for the HTTP protocol and the
 	NOTE: https://github.com/OISF/libhtp/security/advisories/GHSA-rqqp-24ch-248f
 	NOTE: https://redmine.openinfosecfoundation.org/issues/7191
 CVE-2024-45796 (Suricata is a network Intrusion Detection System, Intrusion Prevention ...)
+	{DLA-4103-1}
 	- suricata 1:7.0.7-1
 	[bookworm] - suricata <no-dsa> (Minor issue)
 	NOTE: https://github.com/OISF/suricata/security/advisories/GHSA-mf6r-3xp2-v7xg
@@ -60972,6 +61624,7 @@ CVE-2024-45002 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/90574d2a675947858b47008df8d07f75ea50d0d0 (6.11-rc4)
 CVE-2024-45001 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.10.7-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -69656,6 +70309,7 @@ CVE-2024-42123 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.9.9-1
 	NOTE: https://git.kernel.org/linus/506c245f3f1cd989cb89811a7f06e04ff8813a0d (6.10-rc1)
 CVE-2024-42122 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	{DLA-4102-1}
 	- linux 6.9.9-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/8e65a1b7118acf6af96449e1e66b7adbc9396912 (6.10-rc1)
@@ -70254,6 +70908,7 @@ CVE-2024-42070 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux 5.10.221-1
 	NOTE: https://git.kernel.org/linus/7931d32955e09d0a11b1fe0b6aac1bfa061c005c (6.10-rc6)
 CVE-2024-42069 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.9.8-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -73943,7 +74598,7 @@ CVE-2024-40947 (In the Linux kernel, the following vulnerability has been resolv
 CVE-2024-40946
 	REJECTED
 CVE-2024-40945 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
-	{DSA-5730-1}
+	{DSA-5730-1 DLA-4102-1}
 	- linux 6.9.7-1
 	[bookworm] - linux 6.1.129-1
 	NOTE: https://git.kernel.org/linus/89e8a2366e3bce584b6c01549d5019c5cda1205e (6.10-rc3)
@@ -74398,6 +75053,7 @@ CVE-2024-38534 (Suricata is a network Intrusion Detection System, Intrusion Prev
 	NOTE: https://redmine.openinfosecfoundation.org/issues/6987
 	NOTE: https://redmine.openinfosecfoundation.org/issues/6988
 CVE-2024-37151 (Suricata is a network Intrusion Detection System, Intrusion Prevention ...)
+	{DLA-4103-1}
 	- suricata 1:7.0.6-1
 	[bookworm] - suricata <no-dsa> (Minor issue)
 	NOTE: https://github.com/OISF/suricata/security/advisories/GHSA-qrp7-g66m-px24
@@ -95144,6 +95800,7 @@ CVE-2024-32664 (Suricata is a network Intrusion Detection System, Intrusion Prev
 	NOTE: https://github.com/OISF/suricata/commit/311002baf288a225f62cf18a90c5fdd294447379 (suricata-7.0.5)
 	NOTE: https://github.com/OISF/suricata/commit/d5ffecf11ad2c6fe89265e518f5d7443caf26ba4 (suricata-6.0.19)
 CVE-2024-32663 (Suricata is a network Intrusion Detection System, Intrusion Prevention ...)
+	{DLA-4103-1}
 	- suricata 1:7.0.5-1
 	[bookworm] - suricata <no-dsa> (Minor issue)
 	NOTE: https://github.com/OISF/suricata/security/advisories/GHSA-9jxm-qw9v-266r
@@ -118854,6 +119511,7 @@ CVE-2024-26598 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux 5.10.209-1
 	NOTE: https://git.kernel.org/linus/ad362fe07fecf0aba839ff2cc59a3617bd42c33f (6.8-rc1)
 CVE-2024-26596 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DLA-4102-1}
 	- linux 6.7.7-1
 	[bookworm] - linux 6.1.129-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -160730,6 +161388,7 @@ CVE-2023-35853 (In Suricata before 6.0.13, an adversary who controls an external
 	[buster] - suricata <no-dsa> (Minor issue)
 	NOTE: https://github.com/OISF/suricata/commit/b95bbcc66db526ffcc880eb439dbe8abc87a81da
 CVE-2023-35852 (In Suricata before 6.0.13 (when there is an adversary who controls an  ...)
+	{DLA-4103-1}
 	- suricata 1:6.0.13-1
 	[bookworm] - suricata <no-dsa> (Minor issue)
 	[buster] - suricata <no-dsa> (Minor issue)
@@ -277943,6 +278602,7 @@ CVE-2021-45101 (An issue was discovered in HTCondor before 8.8.15, 9.0.x before
 CVE-2021-45099 (The addon.stdin service in addon-ssh (aka Home Assistant Community Add ...)
 	NOT-FOR-US: Home Assistant Community Add-on: SSH & Web Terminal
 CVE-2021-45098 (An issue was discovered in Suricata before 6.0.4. It is possible to by ...)
+	{DLA-4103-1}
 	- suricata 1:6.0.4-1
 	[buster] - suricata <no-dsa> (Minor issue)
 	[stretch] - suricata <no-dsa> (Minor issue)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6c518b4932ed880976f608c82e0c1978cbf11359

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6c518b4932ed880976f608c82e0c1978cbf11359
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250401/0cfd1eab/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list