[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Apr 1 21:12:40 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
3dfe9a7f by security tracker role at 2025-04-01T20:12:32+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,385 +1,759 @@
-CVE-2025-21986 [net: switchdev: Convert blocking notification chain to a raw one]
+CVE-2025-3096 (Clinic\u2019s Patient Management System versions 2.0 suffers from a SQ ...)
+	TODO: check
+CVE-2025-3085 (A MongoDB server under specific conditions running on Linux with TLS a ...)
+	TODO: check
+CVE-2025-3084 (When run on commands with certain arguments set, explain may fail to v ...)
+	TODO: check
+CVE-2025-3083 (Specifically crafted MongoDB wire protocol messages can cause mongos t ...)
+	TODO: check
+CVE-2025-3082 (A user authorized to access a view may be able to alter the intended c ...)
+	TODO: check
+CVE-2025-31910 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2025-31908 (Cross-Site Request Forgery (CSRF) vulnerability in Sami Ahmed Siddiqui ...)
+	TODO: check
+CVE-2025-31906 (Cross-Site Request Forgery (CSRF) vulnerability in ProfitShare.ro WP P ...)
+	TODO: check
+CVE-2025-31904 (Cross-Site Request Forgery (CSRF) vulnerability in Infoway LLC Ebook D ...)
+	TODO: check
+CVE-2025-31897 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31895 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31894 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31892 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31891 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31890 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31888 (Cross-Site Request Forgery (CSRF) vulnerability in WPExperts.io WP Mul ...)
+	TODO: check
+CVE-2025-31887 (Missing Authorization vulnerability in zookatron MyBookProgress by Sto ...)
+	TODO: check
+CVE-2025-31886 (Missing Authorization vulnerability in Repuso Social proof testimonial ...)
+	TODO: check
+CVE-2025-31885 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31884 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31883 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31882 (Missing Authorization vulnerability in WPWebinarSystem WebinarPress al ...)
+	TODO: check
+CVE-2025-31881 (Missing Authorization vulnerability in Stylemix Pearl allows Exploitin ...)
+	TODO: check
+CVE-2025-31880 (Cross-Site Request Forgery (CSRF) vulnerability in Stylemix Pearl allo ...)
+	TODO: check
+CVE-2025-31879 (Missing Authorization vulnerability in Dmitry V. (CEO of "UKR Solution ...)
+	TODO: check
+CVE-2025-31878 (Missing Authorization vulnerability in Dmitry V. (CEO of "UKR Solution ...)
+	TODO: check
+CVE-2025-31877 (Missing Authorization vulnerability in Magnigenie RestroPress allows E ...)
+	TODO: check
+CVE-2025-31875 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31874 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31873 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31872 (Missing Authorization vulnerability in Galaxy Weblinks WP Clone any po ...)
+	TODO: check
+CVE-2025-31871 (URL Redirection to Untrusted Site ('Open Redirect') vulnerability in G ...)
+	TODO: check
+CVE-2025-31870 (Missing Authorization vulnerability in EXEIdeas International WP AutoK ...)
+	TODO: check
+CVE-2025-31869 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31868 (Missing Authorization vulnerability in JoomSky JS Job Manager allows E ...)
+	TODO: check
+CVE-2025-31867 (Authorization Bypass Through User-Controlled Key vulnerability in Joom ...)
+	TODO: check
+CVE-2025-31866 (Missing Authorization vulnerability in Ship Depot ShipDepot for WooCom ...)
+	TODO: check
+CVE-2025-31865 (Missing Authorization vulnerability in CartBoss SMS Abandoned Cart Rec ...)
+	TODO: check
+CVE-2025-31864 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31863 (Missing Authorization vulnerability in inspry Agency Toolkit allows Ex ...)
+	TODO: check
+CVE-2025-31862 (Missing Authorization vulnerability in PickPlugins Job Board Manager a ...)
+	TODO: check
+CVE-2025-31861 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31860 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31859 (Cross-Site Request Forgery (CSRF) vulnerability in Feedbucket Feedbuck ...)
+	TODO: check
+CVE-2025-31857 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31856 (Missing Authorization vulnerability in brainvireinfo Export All Post M ...)
+	TODO: check
+CVE-2025-31855 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31854 (Missing Authorization vulnerability in Sharaz Shahid Simple Sticky Add ...)
+	TODO: check
+CVE-2025-31853 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31852 (Cross-Site Request Forgery (CSRF) vulnerability in N-Media Bulk Produc ...)
+	TODO: check
+CVE-2025-31851 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31850 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31849 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31848 (Missing Authorization vulnerability in WPFactory WordPress Adverts Plu ...)
+	TODO: check
+CVE-2025-31847 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31846 (Missing Authorization vulnerability in Jeroen Schmit Theater for WordP ...)
+	TODO: check
+CVE-2025-31845 (Cross-Site Request Forgery (CSRF) vulnerability in Rohit Choudhary The ...)
+	TODO: check
+CVE-2025-31844 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31843 (Missing Authorization vulnerability in Wilson OpenAI Tools for WordPre ...)
+	TODO: check
+CVE-2025-31842 (Insertion of Sensitive Information Into Sent Data vulnerability in vir ...)
+	TODO: check
+CVE-2025-31840 (Cross-Site Request Forgery (CSRF) vulnerability in digireturn Simple F ...)
+	TODO: check
+CVE-2025-31839 (Cross-Site Request Forgery (CSRF) vulnerability in digireturn DN Foote ...)
+	TODO: check
+CVE-2025-31838 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31837 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31836 (Missing Authorization vulnerability in matthewrubin Review Manager all ...)
+	TODO: check
+CVE-2025-31835 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31834 (Missing Authorization vulnerability in themeglow JobBoard Job listing  ...)
+	TODO: check
+CVE-2025-31833 (Authorization Bypass Through User-Controlled Key vulnerability in them ...)
+	TODO: check
+CVE-2025-31832 (Exposure of Sensitive System Information to an Unauthorized Control Sp ...)
+	TODO: check
+CVE-2025-31831 (Missing Authorization vulnerability in Team AtomChat AtomChat allows E ...)
+	TODO: check
+CVE-2025-31830 (Missing Authorization vulnerability in Uriahs Victor Printus allows Ex ...)
+	TODO: check
+CVE-2025-31829 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31828 (Cross-Site Request Forgery (CSRF) vulnerability in alextselegidis Easy ...)
+	TODO: check
+CVE-2025-31826 (Missing Authorization vulnerability in Anzar Ahmed Ni WooCommerce Cost ...)
+	TODO: check
+CVE-2025-31824 (Server-Side Request Forgery (SSRF) vulnerability in Wombat Plugins WP  ...)
+	TODO: check
+CVE-2025-31823 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31822 (Missing Authorization vulnerability in Ashish Ajani WP Simple HTML Sit ...)
+	TODO: check
+CVE-2025-31821 (URL Redirection to Untrusted Site ('Open Redirect') vulnerability in f ...)
+	TODO: check
+CVE-2025-31820 (Missing Authorization vulnerability in webdevstudios Automatic Feature ...)
+	TODO: check
+CVE-2025-31818 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31817 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31816 (Missing Authorization vulnerability in pietro Mobile App Canvas allows ...)
+	TODO: check
+CVE-2025-31815 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31814 (Cross-Site Request Forgery (CSRF) vulnerability in OwnerRez OwnerRez a ...)
+	TODO: check
+CVE-2025-31813 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31812 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31811 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31810 (Missing Authorization vulnerability in PickPlugins Question Answer all ...)
+	TODO: check
+CVE-2025-31809 (Cross-Site Request Forgery (CSRF) vulnerability in Labinator Labinator ...)
+	TODO: check
+CVE-2025-31808 (Cross-Site Request Forgery (CSRF) vulnerability in IT Path Solutions S ...)
+	TODO: check
+CVE-2025-31807 (Cross-Site Request Forgery (CSRF) vulnerability in CloudRedux Product  ...)
+	TODO: check
+CVE-2025-31806 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31805 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31804 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31803 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31802 (Missing Authorization vulnerability in Shiptimize Shiptimize for WooCo ...)
+	TODO: check
+CVE-2025-31801 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31799 (Missing Authorization vulnerability in publitio Publitio allows Exploi ...)
+	TODO: check
+CVE-2025-31798 (Missing Authorization vulnerability in publitio Publitio allows Exploi ...)
+	TODO: check
+CVE-2025-31797 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31796 (Server-Side Request Forgery (SSRF) vulnerability in TheInnovs Team Ele ...)
+	TODO: check
+CVE-2025-31793 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31792 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31791 (Missing Authorization vulnerability in Oliver Boyers Pin Generator all ...)
+	TODO: check
+CVE-2025-31790 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31788 (Insertion of Sensitive Information into Log File vulnerability in smac ...)
+	TODO: check
+CVE-2025-31787 (Missing Authorization vulnerability in Brady Vercher Cue allows Exploi ...)
+	TODO: check
+CVE-2025-31786 (Missing Authorization vulnerability in Travis Simple Icons allows Expl ...)
+	TODO: check
+CVE-2025-31785 (Cross-Site Request Forgery (CSRF) vulnerability in Clearbit Clearbit R ...)
+	TODO: check
+CVE-2025-31784 (Cross-Site Request Forgery (CSRF) vulnerability in Rudy Susanto Embed  ...)
+	TODO: check
+CVE-2025-31783 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31782 (Missing Authorization vulnerability in pupunzi mb.YTPlayer allows Expl ...)
+	TODO: check
+CVE-2025-31781 (Missing Authorization vulnerability in ahmadshyk Gift Cards for WooCom ...)
+	TODO: check
+CVE-2025-31780 (Missing Authorization vulnerability in Andy Stratton Append Content al ...)
+	TODO: check
+CVE-2025-31779 (Cross-Site Request Forgery (CSRF) vulnerability in Jonathan Daggerhart ...)
+	TODO: check
+CVE-2025-31778 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31777 (Missing Authorization vulnerability in BeastThemes Clockinator Lite al ...)
+	TODO: check
+CVE-2025-31776 (Cross-Site Request Forgery (CSRF) vulnerability in Aphotrax Uptime Rob ...)
+	TODO: check
+CVE-2025-31775 (Cross-Site Request Forgery (CSRF) vulnerability in smackcoders Google  ...)
+	TODO: check
+CVE-2025-31774 (Missing Authorization vulnerability in WebProtect.ai Astra Security Su ...)
+	TODO: check
+CVE-2025-31773 (Missing Authorization vulnerability in cedcommerce Ship Per Product al ...)
+	TODO: check
+CVE-2025-31772 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31771 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31770 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31769 (Cross-Site Request Forgery (CSRF) vulnerability in NiteoThemes CLP \u2 ...)
+	TODO: check
+CVE-2025-31767 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31766 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31765 (Missing Authorization vulnerability in themeqx GDPR Cookie Notice allo ...)
+	TODO: check
+CVE-2025-31764 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31763 (Cross-Site Request Forgery (CSRF) vulnerability in Preliot Cache contr ...)
+	TODO: check
+CVE-2025-31762 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31761 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31760 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31759 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31757 (Missing Authorization vulnerability in BinaryCarpenter Free Woocommerc ...)
+	TODO: check
+CVE-2025-31756 (Cross-Site Request Forgery (CSRF) vulnerability in tuyennv TZ PlusGall ...)
+	TODO: check
+CVE-2025-31755 (Missing Authorization vulnerability in josselynj pCloud Backup allows  ...)
+	TODO: check
+CVE-2025-31754 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31752 (Missing Authorization vulnerability in termel Bulk Fields Editor allow ...)
+	TODO: check
+CVE-2025-31751 (Cross-Site Request Forgery (CSRF) vulnerability in doit Breaking News  ...)
+	TODO: check
+CVE-2025-31750 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31749 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31748 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31747 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31745 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31744 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31743 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31742 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31741 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31740 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31738 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31737 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31735 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31734 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31733 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31732 (Missing Authorization vulnerability in gb-plugins GB Gallery Slideshow ...)
+	TODO: check
+CVE-2025-31731 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31730 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2025-31408 (Missing Authorization vulnerability in Zoho Flow allows Exploiting Inc ...)
+	TODO: check
+CVE-2025-31137 (React Router is a multi-strategy router for React bridging the gap fro ...)
+	TODO: check
+CVE-2025-31132 (Raven is an open-source messaging platform. A vulnerability allowed an ...)
+	TODO: check
+CVE-2025-31131 (YesWiki is a wiki system written in PHP. The squelette parameter is vu ...)
+	TODO: check
+CVE-2025-31121 (OpenEMR is a free and open source electronic health records and medica ...)
+	TODO: check
+CVE-2025-30676 (Improper Neutralization of Script-Related HTML Tags in a Web Page (Bas ...)
+	TODO: check
+CVE-2025-30354 (Bruno is an open source IDE for exploring and testing APIs. A bug in t ...)
+	TODO: check
+CVE-2025-30224 (MyDumper is a MySQL Logical Backup Tool. The MySQL C client library (l ...)
+	TODO: check
+CVE-2025-30210 (Bruno is an open source IDE for exploring and testing APIs. Prior to 1 ...)
+	TODO: check
+CVE-2025-30177 (Bypass/Injection vulnerability in Apache Camel in Camel-Undertow compo ...)
+	TODO: check
+CVE-2025-2906 (The Contempo Real Estate Core plugin for WordPress is vulnerable to St ...)
+	TODO: check
+CVE-2025-2237 (The WP RealEstate plugin for WordPress, used by the Homeo theme, is vu ...)
+	TODO: check
+CVE-2025-29208 (CodeZips Gym Management System v1.0 is vulnerable to SQL injection in  ...)
+	TODO: check
+CVE-2025-29069 (A heap buffer overflow vulnerability has been identified in the lcms2- ...)
+	TODO: check
+CVE-2025-28398 (D-LINK DI-8100 16.07.26A1 is vulnerable to Buffer Overflow in the ipse ...)
+	TODO: check
+CVE-2025-28395 (D-LINK DI-8100 16.07.26A1 is vulnerable to Buffer Overflow in the ipse ...)
+	TODO: check
+CVE-2025-28132 (A session management flaw in Nagios Network Analyzer 2024R1.0.3 allows ...)
+	TODO: check
+CVE-2025-28131 (A Broken Access Control vulnerability in Nagios Network Analyzer 2024R ...)
+	TODO: check
+CVE-2025-27829 (An issue was discovered in Stormshield Network Security (SNS) 4.3.x be ...)
+	TODO: check
+CVE-2025-27130 (Welcart e-Commerce 2.11.6 and earlier versions contains an untrusted d ...)
+	TODO: check
+CVE-2025-26056 (A command injection vulnerability exists in the Infinxt iEdge 100 2.1. ...)
+	TODO: check
+CVE-2025-26055 (An OS Command Injection vulnerability exists in the Infinxt iEdge 100  ...)
+	TODO: check
+CVE-2025-26054 (Infinxt iEdge 100 2.1.32 is vulnerable to Cross Site Scripting (XSS) v ...)
+	TODO: check
+CVE-2025-25041 (A vulnerability in the HPE Aruba Networking Virtual Intranet Access (V ...)
+	TODO: check
+CVE-2025-22231 (VMware Aria Operations contains a local privilege escalation vulnerabi ...)
+	TODO: check
+CVE-2025-1660 (A maliciously crafted DWFX file, when parsed through Autodesk Naviswor ...)
+	TODO: check
+CVE-2025-1659 (A maliciously crafted DWFX file, when parsed through Autodesk Naviswor ...)
+	TODO: check
+CVE-2025-1658 (A maliciously crafted DWFX file, when parsed through Autodesk Naviswor ...)
+	TODO: check
+CVE-2024-13553 (The SMS Alert Order Notifications \u2013 WooCommerce plugin for WordPr ...)
+	TODO: check
+CVE-2025-21986 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.20-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/62531a1effa87bdab12d5104015af72e60d926ff (6.14-rc7)
-CVE-2025-21985 [drm/amd/display: Fix out-of-bound accesses]
+CVE-2025-21985 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.12.20-1
 	NOTE: https://git.kernel.org/linus/8adbb2a98b00926315fd513b5fe2596b5716b82d (6.14-rc2)
-CVE-2025-21984 [mm: fix kernel BUG when userfaultfd_move encounters swapcache]
+CVE-2025-21984 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.12.20-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c50f8e6053b0503375c2975bf47f182445aebb4c (6.14-rc6)
-CVE-2025-21983 [mm/slab/kvfree_rcu: Switch to WQ_MEM_RECLAIM wq]
+CVE-2025-21983 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.12.20-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/dfd3df31c9db752234d7d2e09bef2aeabb643ce4 (6.14-rc6)
-CVE-2025-21982 [pinctrl: nuvoton: npcm8xx: Add NULL check in npcm8xx_gpio_fw]
+CVE-2025-21982 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.12.20-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/acf40ab42799e4ae1397ee6f5c5941092d66f999 (6.14-rc7)
-CVE-2025-21981 [ice: fix memory leak in aRFS after reset]
+CVE-2025-21981 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.12.20-1
 	NOTE: https://git.kernel.org/linus/23d97f18901ef5e4e264e3b1777fe65c760186b5 (6.14-rc7)
-CVE-2025-21980 [sched: address a potential NULL pointer dereference in the GRED scheduler.]
+CVE-2025-21980 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.12.20-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/115ef44a98220fddfab37a39a19370497cd718b9 (6.14-rc7)
-CVE-2025-21979 [wifi: cfg80211: cancel wiphy_work before freeing wiphy]
+CVE-2025-21979 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.12.20-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/72d520476a2fab6f3489e8388ab524985d6c4b90 (6.14-rc7)
-CVE-2025-21978 [drm/hyperv: Fix address space leak when Hyper-V DRM device is removed]
+CVE-2025-21978 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.12.20-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/aed709355fd05ef747e1af24a1d5d78cd7feb81e (6.14-rc7)
-CVE-2025-21977 [fbdev: hyperv_fb: Fix hang in kdump kernel when on Hyper-V Gen 2 VMs]
+CVE-2025-21977 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.12.20-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/304386373007aaca9236a3f36afac0bbedcd2bf0 (6.14-rc7)
-CVE-2025-21976 [fbdev: hyperv_fb: Allow graceful removal of framebuffer]
+CVE-2025-21976 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.12.20-1
 	NOTE: https://git.kernel.org/linus/ea2f45ab0e53b255f72c85ccd99e2b394fc5fceb (6.14-rc7)
-CVE-2025-21975 [net/mlx5: handle errors in mlx5_chains_create_table()]
+CVE-2025-21975 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.20-1
 	NOTE: https://git.kernel.org/linus/eab0396353be1c778eba1c0b5180176f04dd21ce (6.14-rc7)
-CVE-2025-21974 [eth: bnxt: return fail if interface is down in bnxt_queue_mem_alloc()]
+CVE-2025-21974 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.12.20-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ca2456e073957781e1184de68551c65161b2bd30 (6.14-rc7)
-CVE-2025-21973 [Description:]
+CVE-2025-21973 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.12.20-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f09af5fdfbd9b0fcee73aab1116904c53b199e97 (6.14-rc7)
-CVE-2025-21972 [net: mctp: unshare packets when reassembling]
+CVE-2025-21972 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.20-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f5d83cf0eeb90fade4d5c4d17d24b8bee9ceeecc (6.14-rc7)
-CVE-2025-21971 [net_sched: Prevent creation of classes with TC_H_ROOT]
+CVE-2025-21971 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.20-1
 	NOTE: https://git.kernel.org/linus/0c3057a5a04d07120b3d0ec9c79568fceb9c921e (6.14-rc7)
-CVE-2025-21970 [net/mlx5: Bridge, fix the crash caused by LAG state check]
+CVE-2025-21970 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.20-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/4b8eeed4fb105770ce6dc84a2c6ef953c7b71cbb (6.14-rc7)
-CVE-2025-21969 [Bluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd]
+CVE-2025-21969 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
 	- linux 6.12.20-1
 	NOTE: https://git.kernel.org/linus/b4f82f9ed43aefa79bec2504ae8c29be0c0f5d1d (6.14-rc3)
-CVE-2025-21968 [drm/amd/display: Fix slab-use-after-free on hdcp_work]
+CVE-2025-21968 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.12.20-1
 	NOTE: https://git.kernel.org/linus/e65e7bea220c3ce8c4c793b4ba35557f4994ab2b (6.14-rc7)
-CVE-2025-21967 [ksmbd: fix use-after-free in ksmbd_free_work_struct]
+CVE-2025-21967 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.12.20-1
 	NOTE: https://git.kernel.org/linus/bb39ed47065455604729404729d9116868638d31 (6.14-rc7)
-CVE-2025-21966 [dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature]
+CVE-2025-21966 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.12.20-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/57e9417f69839cb10f7ffca684c38acd28ceb57b (6.14-rc7)
-CVE-2025-21965 [sched_ext: Validate prev_cpu in scx_bpf_select_cpu_dfl()]
+CVE-2025-21965 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.12.20-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9360dfe4cbd62ff1eb8217b815964931523b75b3 (6.14-rc7)
-CVE-2025-21964 [cifs: Fix integer overflow while processing acregmax mount option]
+CVE-2025-21964 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.12.20-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7489161b1852390b4413d57f2457cd40b34da6cc (6.14-rc7)
-CVE-2025-21963 [cifs: Fix integer overflow while processing acdirmax mount option]
+CVE-2025-21963 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.12.20-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5b29891f91dfb8758baf1e2217bef4b16b2b165b (6.14-rc7)
-CVE-2025-21962 [cifs: Fix integer overflow while processing closetimeo mount option]
+CVE-2025-21962 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.12.20-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d5a30fddfe2f2e540f6c43b59cf701809995faef (6.14-rc7)
-CVE-2025-21961 [eth: bnxt: fix truesize for mb-xdp-pass case]
+CVE-2025-21961 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.12.20-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9f7b2aa5034e24d3c49db73d5f760c0435fe31c2 (6.14-rc7)
-CVE-2025-21960 [eth: bnxt: do not update checksum in bnxt_xdp_build_skb()]
+CVE-2025-21960 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.12.20-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c03e7d05aa0e2f7e9a9ce5ad8a12471a53f941dc (6.14-rc7)
-CVE-2025-21959 [netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()]
+CVE-2025-21959 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.20-1
 	NOTE: https://git.kernel.org/linus/d653bfeb07ebb3499c403404c21ac58a16531607 (6.14-rc7)
-CVE-2025-21958 [Revert "openvswitch: switch to per-action label counting in conntrack"]
+CVE-2025-21958 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.12.20-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1063ae07383c0ddc5bcce170260c143825846b03 (6.14-rc7)
-CVE-2025-21957 [scsi: qla1280: Fix kernel oops when debug level > 2]
+CVE-2025-21957 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.12.20-1
 	NOTE: https://git.kernel.org/linus/5233e3235dec3065ccc632729675575dbe3c6b8a (6.14-rc2)
-CVE-2025-21956 [drm/amd/display: Assign normalized_pix_clk when color depth = 14]
+CVE-2025-21956 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.12.20-1
 	NOTE: https://git.kernel.org/linus/79e31396fdd7037c503e6add15af7cb00633ea92 (6.14-rc7)
-CVE-2025-21955 [ksmbd: prevent connection release during oplock break notification]
+CVE-2025-21955 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.12.20-1
 	NOTE: https://git.kernel.org/linus/3aa660c059240e0c795217182cf7df32909dd917 (6.14-rc7)
-CVE-2025-21954 [netmem: prevent TX of unreadable skbs]
+CVE-2025-21954 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.20-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f3600c867c99a2cc8038680ecf211089c50e7971 (6.14-rc7)
-CVE-2025-21953 [net: mana: cleanup mana struct after debugfs_remove()]
+CVE-2025-21953 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3e64bb2ae7d9f2b3a8259d4d6b86ed1984d5460a (6.14-rc7)
-CVE-2025-21952 [HID: corsair-void: Update power supply values with a unified work handler]
+CVE-2025-21952 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0c28e4d1e10d2aae608094620bb386e6fd73d55e (6.14-rc6)
-CVE-2025-21951 [bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock]
+CVE-2025-21951 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.12.19-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a321d163de3d8aa38a6449ab2becf4b1581aed96 (6.14-rc6)
-CVE-2025-21950 [drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl]
+CVE-2025-21950 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.12.19-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/819cec1dc47cdeac8f5dd6ba81c1dbee2a68c3bb (6.14-rc6)
-CVE-2025-21949 [LoongArch: Set hugetlb mmap base address aligned with pmd size]
+CVE-2025-21949 (In the Linux kernel, the following vulnerability has been resolved:  L ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/3109d5ff484b7bc7b955f166974c6776d91f247b (6.14-rc6)
-CVE-2025-21948 [HID: appleir: Fix potential NULL dereference at raw event handle]
+CVE-2025-21948 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/2ff5baa9b5275e3acafdf7f2089f74cccb2f38d1 (6.14-rc6)
-CVE-2025-21947 [ksmbd: fix type confusion via race condition when using ipc_msg_send_request]
+CVE-2025-21947 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/e2ff19f0b7a30e03516e6eb73b948e27a55bc9d2 (6.14-rc6)
-CVE-2025-21946 [ksmbd: fix out-of-bounds in parse_sec_desc()]
+CVE-2025-21946 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/d6e13e19063db24f94b690159d0633aaf72a0f03 (6.14-rc6)
-CVE-2025-21945 [ksmbd: fix use-after-free in smb2_lock]
+CVE-2025-21945 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/84d2d1641b71dec326e8736a749b7ee76a9599fc (6.14-rc6)
-CVE-2025-21944 [ksmbd: fix bug on trap in smb2_lock]
+CVE-2025-21944 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/e26e2d2e15daf1ab33e0135caf2304a0cfa2744b (6.14-rc6)
-CVE-2025-21943 [gpio: aggregator: protect driver attr handlers against module unload]
+CVE-2025-21943 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/12f65d1203507f7db3ba59930fe29a3b8eee9945 (6.14-rc6)
-CVE-2025-21942 [btrfs: zoned: fix extent range end unlock in cow_file_range()]
+CVE-2025-21942 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5a4041f2c47247575a6c2e53ce14f7b0ac946c33 (6.14-rc6)
-CVE-2025-21941 [drm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params]
+CVE-2025-21941 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/374c9faac5a763a05bc3f68ad9f73dab3c6aec90 (6.14-rc6)
-CVE-2025-21940 [drm/amdkfd: Fix NULL Pointer Dereference in KFD queue]
+CVE-2025-21940 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.12.19-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fd617ea3b79d2116d53f76cdb5a3601c0ba6e42f (6.14-rc6)
-CVE-2025-21939 [drm/xe/hmm: Don't dereference struct page pointers without notifier lock]
+CVE-2025-21939 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.12.19-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0a98219bcc961edd3388960576e4353e123b4a51 (6.14-rc6)
-CVE-2025-21938 [mptcp: fix 'scheduling while atomic' in mptcp_pm_nl_append_new_local_addr]
+CVE-2025-21938 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.12.19-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/022bfe24aad8937705704ff2e414b100cf0f2e1a (6.14-rc6)
-CVE-2025-21937 [Bluetooth: Add check for mgmt_alloc_skb() in mgmt_remote_name()]
+CVE-2025-21937 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
 	- linux 6.12.19-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f2176a07e7b19f73e05c805cf3d130a2999154cb (6.14-rc6)
-CVE-2025-21936 [Bluetooth: Add check for mgmt_alloc_skb() in mgmt_device_connected()]
+CVE-2025-21936 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
 	- linux 6.12.19-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d8df010f72b8a32aaea393e36121738bb53ed905 (6.14-rc6)
-CVE-2025-21935 [rapidio: add check for rio_add_net() in rio_scan_alloc_net()]
+CVE-2025-21935 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/e842f9a1edf306bf36fe2a4d847a0b0d458770de (6.14-rc6)
-CVE-2025-21934 [rapidio: fix an API misues when rio_add_net() fails]
+CVE-2025-21934 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/b2ef51c74b0171fde7eb69b6152d3d2f743ef269 (6.14-rc6)
-CVE-2025-21933 [arm: pgtable: fix NULL pointer dereference issue]
+CVE-2025-21933 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a564ccfe300fa6a065beda06ab7f3c140d6b4d63 (6.14-rc6)
-CVE-2025-21932 [mm: abort vma_modify() on merge out of memory failure]
+CVE-2025-21932 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.12.19-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/47b16d0462a460000b8f05dfb1292377ac48f3ca (6.14-rc6)
-CVE-2025-21931 [hwpoison, memory_hotplug: lock folio before unmap hwpoisoned folio]
+CVE-2025-21931 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/af288a426c3e3552b62595c6138ec6371a17dbba (6.14-rc6)
-CVE-2025-21930 [wifi: iwlwifi: mvm: don't try to talk to a dead firmware]
+CVE-2025-21930 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.12.19-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d73d2c6e3313f0ba60711ab4f4b9044eddca9ca5 (6.14-rc6)
-CVE-2025-21929 [HID: intel-ish-hid: Fix use-after-free issue in hid_ishtp_cl_remove()]
+CVE-2025-21929 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
 	- linux 6.12.19-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/823987841424289339fdb4ba90e6d2c3792836db (6.14-rc6)
-CVE-2025-21928 [HID: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove()]
+CVE-2025-21928 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/07583a0010696a17fb0942e0b499a62785c5fc9f (6.14-rc6)
-CVE-2025-21927 [nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu()]
+CVE-2025-21927 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/ad95bab0cd28ed77c2c0d0b6e76e03e031391064 (6.14-rc6)
-CVE-2025-21926 [net: gso: fix ownership in __udp_gso_segment]
+CVE-2025-21926 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/ee01b2f2d7d0010787c2343463965bbc283a497f (6.14-rc6)
-CVE-2025-21925 [llc: do not use skb_get() before dev_queue_xmit()]
+CVE-2025-21925 (In the Linux kernel, the following vulnerability has been resolved:  l ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/64e6a754d33d31aa844b3ee66fb93ac84ca1565e (6.14-rc6)
-CVE-2025-21924 [net: hns3: make sure ptp clock is unregister and freed if hclge_ptp_get_cycle returns an error]
+CVE-2025-21924 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.19-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b7365eab39831487a84e63a9638209b68dc54008 (6.14-rc6)
-CVE-2025-21923 [HID: hid-steam: Fix use-after-free when detaching device]
+CVE-2025-21923 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
 	- linux 6.12.19-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e53fc232a65f7488ab75d03a5b95f06aaada7262 (6.14-rc6)
-CVE-2025-21922 [ppp: Fix KMSAN uninit-value warning with bpf]
+CVE-2025-21922 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/4c2d14c40a68678d885eab4008a0129646805bae (6.14-rc6)
-CVE-2025-21921 [net: ethtool: netlink: Allow NULL nlattrs when getting a phy_device]
+CVE-2025-21921 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.19-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/637399bf7e77797811adf340090b561a8f9d1213 (6.14-rc6)
-CVE-2025-21920 [vlan: enforce underlying device type]
+CVE-2025-21920 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/b33a534610067ade2bdaf2052900aaad99701353 (6.14-rc6)
-CVE-2025-21919 [sched/fair: Fix potential memory corruption in child_cfs_rq_on_list]
+CVE-2025-21919 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.12.19-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3b4035ddbfc8e4521f85569998a7569668cccf51 (6.14-rc6)
-CVE-2025-21918 [usb: typec: ucsi: Fix NULL pointer access]
+CVE-2025-21918 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.12.19-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b13abcb7ddd8d38de769486db5bd917537b32ab1 (6.14-rc6)
-CVE-2025-21917 [usb: renesas_usbhs: Flush the notify_hotplug_work]
+CVE-2025-21917 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/552ca6b87e3778f3dd5b87842f95138162e16c82 (6.14-rc6)
-CVE-2025-21916 [usb: atm: cxacru: fix a flaw in existing endpoint checks]
+CVE-2025-21916 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/c90aad369899a607cfbc002bebeafd51e31900cd (6.14-rc6)
-CVE-2025-21915 [cdx: Fix possible UAF error in driver_override_show()]
+CVE-2025-21915 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/91d44c1afc61a2fec37a9c7a3485368309391e0b (6.14-rc6)
-CVE-2025-21914 [slimbus: messaging: Free transaction ID in delayed interrupt scenario]
+CVE-2025-21914 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/dcb0d43ba8eb9517e70b1a0e4b0ae0ab657a0e5a (6.14-rc6)
-CVE-2025-21913 [x86/amd_nb: Use rdmsr_safe() in amd_get_mmconfig_range()]
+CVE-2025-21913 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 6.12.19-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/14cb5d83068ecf15d2da6f7d0e9ea9edbcbc0457 (6.14-rc6)
-CVE-2025-21912 [gpio: rcar: Use raw_spinlock to protect register access]
+CVE-2025-21912 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/f02c41f87cfe61440c18bf77d1ef0a884b9ee2b5 (6.14-rc6)
-CVE-2025-21911 [drm/imagination: avoid deadlock on fence release]
+CVE-2025-21911 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.12.19-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/df1a1ed5e1bdd9cc13148e0e5549f5ebcf76cf13 (6.14-rc6)
-CVE-2025-21910 [wifi: cfg80211: regulatory: improve invalid hints checking]
+CVE-2025-21910 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/59b348be7597c4a9903cb003c69e37df20c04a30 (6.14-rc6)
-CVE-2025-21909 [wifi: nl80211: reject cooked mode if it is set along with other flags]
+CVE-2025-21909 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/49f27f29446a5bfe633dd2cc0cfebd48a1a5e77f (6.14-rc6)
-CVE-2025-21908 [NFS: fix nfs_release_folio() to not deadlock via kcompactd writeback]
+CVE-2025-21908 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
 	- linux 6.12.19-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ce6d9c1c2b5cc785016faa11b48b6cd317eb367e (6.14-rc6)
-CVE-2025-21907 [mm: memory-failure: update ttu flag inside unmap_poisoned_folio]
+CVE-2025-21907 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.12.19-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b81679b1633aa43c0d973adfa816d78c1ed0d032 (6.14-rc6)
-CVE-2025-21906 [wifi: iwlwifi: mvm: clean up ROC on failure]
+CVE-2025-21906 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.12.19-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f9751163bffd3fe60794929829f810968c6de73d (6.14-rc6)
-CVE-2025-21905 [wifi: iwlwifi: limit printed string from FW file]
+CVE-2025-21905 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/e0dc2c1bef722cbf16ae557690861e5f91208129 (6.14-rc6)
-CVE-2025-21904 [caif_virtio: fix wrong pointer check in cfv_probe()]
+CVE-2025-21904 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/a466fd7e9fafd975949e5945e2f70c33a94b1a70 (6.14-rc6)
-CVE-2025-21903 [mctp i3c: handle NULL header address]
+CVE-2025-21903 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.12.19-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/cf7ee25e70c6edfac4553d6b671e8b19db1d9573 (6.14-rc6)
-CVE-2025-21902 [acpi: typec: ucsi: Introduce a ->poll_cci method]
+CVE-2025-21902 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
 	- linux 6.12.19-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/976e7e9bdc7719a023a4ecccd2e3daec9ab20a40 (6.14-rc6)
-CVE-2025-21901 [RDMA/bnxt_re: Add sanity checks on rdev validity]
+CVE-2025-21901 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux 6.12.19-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f0df225d12fcb049429fb5bf5122afe143c2dd15 (6.14-rc5)
-CVE-2025-21900 [NFSv4: Fix a deadlock when recovering state on a sillyrenamed file]
+CVE-2025-21900 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
 	- linux 6.12.19-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8f8df955f078e1a023ee55161935000a67651f38 (6.14-rc5)
-CVE-2025-21899 [tracing: Fix bad hist from corrupting named_triggers list]
+CVE-2025-21899 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/6f86bdeab633a56d5c6dccf1a2c5989b6a5e323e (6.14-rc5)
-CVE-2025-21898 [ftrace: Avoid potential division by zero in function_stat_show()]
+CVE-2025-21898 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/a1a7eb89ca0b89dc1c326eeee2596f263291aca3 (6.14-rc5)
-CVE-2025-21897 [sched_ext: Fix pick_task_scx() picking non-queued tasks when it's called without balance()]
+CVE-2025-21897 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.12.19-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8fef0a3b17bb258130a4fcbcb5addf94b25e9ec5 (6.14-rc5)
-CVE-2025-21896 [fuse: revert back to __readahead_folio() for readahead]
+CVE-2025-21896 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0c67c37e1710b2a8f61c8a02db95a51fe577e2c1 (6.14-rc5)
-CVE-2025-21895 [perf/core: Order the PMU list to fix warning about unordered pmu_ctx_list]
+CVE-2025-21895 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.12.19-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2016066c66192a99d9e0ebf433789c490a6785a2 (6.14-rc5)
-CVE-2025-21894 [net: enetc: VFs do not support HWTSTAMP_TX_ONESTEP_SYNC]
+CVE-2025-21894 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.12.19-1
 	NOTE: https://git.kernel.org/linus/a562d0c4a893eae3ea51d512c4d90ab858a6b7ec (6.14-rc5)
-CVE-2025-3034
+CVE-2025-3034 (Memory safety bugs present in Firefox 136 and Thunderbird 136. Some of ...)
 	- firefox <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-20/#CVE-2025-3034
-CVE-2025-3030
+CVE-2025-3030 (Memory safety bugs present in Firefox 136, Thunderbird 136, Firefox ES ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	- thunderbird <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-20/#CVE-2025-3030
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-22/#CVE-2025-3030
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-24/#CVE-2025-3030
-CVE-2025-3033
+CVE-2025-3033 (After selecting a malicious Windows `.url` shortcut from the local fil ...)
 	- firefox <not-affected> (Only affects Firefox on Windows)
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-20/#CVE-2025-3033
-CVE-2025-3035
+CVE-2025-3035 (By first using the AI chatbot in one tab and later activating it in an ...)
 	- firefox <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-20/#CVE-2025-3035
-CVE-2025-3029
+CVE-2025-3029 (A crafted URL containing specific Unicode characters could have hidden ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	- thunderbird <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-20/#CVE-2025-3029
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-22/#CVE-2025-3029
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-24/#CVE-2025-3029
-CVE-2025-3032
+CVE-2025-3032 (Leaking of file descriptors from the fork server to web content proces ...)
 	- firefox <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-20/#CVE-2025-3032
-CVE-2025-3031
+CVE-2025-3031 (An attacker could read 32 bits of values spilled onto the stack in a J ...)
 	- firefox <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2025-20/#CVE-2025-3031
-CVE-2025-3028
+CVE-2025-3028 (JavaScript code running while transforming a document with the XSLTPro ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	- thunderbird <unfixed>
@@ -1823,7 +2197,7 @@ CVE-2024-13939 (String::Compare::ConstantTime for Perl through 0.321 is vulnerab
 	[bookworm] - libstring-compare-constanttime-perl <no-dsa> (Minor issue)
 	NOTE: https://lists.security.metacpan.org/cve-announce/msg/28284732/
 	NOTE: https://metacpan.org/release/FRACTAL/String-Compare-ConstantTime-0.321/view/lib/String/Compare/ConstantTime.pm#TIMING-SIDE-CHANNEL
-CVE-2024-56325
+CVE-2024-56325 (Authentication Bypass Issue  If the path does not contain / and contai ...)
 	NOT-FOR-US: Apache Pinot
 CVE-2025-31181 (A flaw was found in gnuplot. The X11_graphics() function may lead to a ...)
 	- gnuplot <unfixed> (unimportant)
@@ -4158,7 +4532,7 @@ CVE-2025-2581 (A vulnerability has been found in xmedcon 0.25.0 and classified a
 	NOTE: https://sourceforge.net/p/xmedcon/code/ci/e7a88836fc2277f8ab777f3ef24f917d08415559/
 CVE-2025-2574 (Out-of-bounds array write in Xpdf 4.05 and earlier, due to incorrect i ...)
 	- xpdf <not-affected> (Debian uses poppler)
-CVE-2025-2538 (A specific type of Portal for ArcGIS deployment is vulnerable to a Pas ...)
+CVE-2025-2538 (A hardcoded credential vulnerability exists in a specific deployment p ...)
 	NOT-FOR-US: ArcGIS Enterprise
 CVE-2025-2198
 	REJECTED
@@ -4525,7 +4899,8 @@ CVE-2024-7819 (A CORS misconfiguration in danswer-ai/danswer v1.4.1 allows attac
 	NOT-FOR-US: danswer-ai/danswer
 CVE-2024-7806 (A vulnerability in open-webui/open-webui versions <= 0.3.8 allows remo ...)
 	NOT-FOR-US: open-webui/open-webui
-CVE-2024-7804 (A deserialization vulnerability exists in the Pytorch RPC framework (t ...)
+CVE-2024-7804
+	REJECTED
 	NOTE: https://huntr.com/bounties/0e870eeb-f924-4054-8fac-d926b1fb7259
 	NOTE: Non issue as only documented to be used for internal communication:
 	NOTE: https://github.com/pytorch/pytorch/security/policy#using-distributed-features
@@ -225336,7 +225711,7 @@ CVE-2022-38869
 	RESERVED
 CVE-2022-38868 (SQL Injection vulnerability in Ehoney version 2.0.0 in models/protocol ...)
 	NOT-FOR-US: Ehoney
-CVE-2022-38867 (SQL Injection vulnerability in rttys versions 4.0.0, 4.0.1, and 4.0.2  ...)
+CVE-2022-38867 (SQL Injection vulnerability in rttys versions 4.0.0, 4.0.1, 4.0.2, and ...)
 	NOT-FOR-US: rttys
 CVE-2022-38866 (Certain The MPlayer Project products are vulnerable to Buffer Overflow ...)
 	{DLA-3255-1}
@@ -537147,7 +537522,7 @@ CVE-2018-1474 (IBM BigFix Platform 9.2.0 through 9.2.14 and 9.5 through 9.5.9 is
 CVE-2018-1473 (IBM BigFix Platform 9.2 and 9.5 is vulnerable to cross-site scripting. ...)
 	NOT-FOR-US: IBM
 CVE-2018-1472
-	RESERVED
+	REJECTED
 CVE-2018-1471
 	REJECTED
 CVE-2018-1470 (IBM Sterling File Gateway 2.2.0 through 2.2.6 could allow a remote aut ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3dfe9a7f546e35334977c2552d45f8dc386edbef

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3dfe9a7f546e35334977c2552d45f8dc386edbef
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250401/b2a55dca/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list