[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Jan 13 20:13:20 GMT 2026



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
c136ed1a by security tracker role at 2026-01-13T20:13:08+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,415 +1,819 @@
-CVE-2025-71101 [platform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package parsing]
+CVE-2026-22818 (Hono is a Web application framework that provides support for any Java ...)
+	TODO: check
+CVE-2026-22817 (Hono is a Web application framework that provides support for any Java ...)
+	TODO: check
+CVE-2026-22814 (@adonisjs/lucid is an SQL ORM for AdonisJS built on top of Knex. Prior ...)
+	TODO: check
+CVE-2026-22809 (tarteaucitron.js is a compliant and accessible cookie banner. Prior to ...)
+	TODO: check
+CVE-2026-22791 (openCryptoki is a PKCS#11 library and tools for Linux and AIX. In 3.25 ...)
+	TODO: check
+CVE-2026-22755 (Improper Neutralization of Special Elements used in a Command ('Comman ...)
+	TODO: check
+CVE-2026-21306 (Substance3D - Sampler versions 5.1.0 and earlier are affected by an ou ...)
+	TODO: check
+CVE-2026-21305 (Substance3D - Painter versions 11.0.3 and earlier are affected by an o ...)
+	TODO: check
+CVE-2026-21304 (InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by a H ...)
+	TODO: check
+CVE-2026-21288 (Illustrator versions 29.8.3, 30.0 and earlier are affected by a NULL P ...)
+	TODO: check
+CVE-2026-21287 (Substance3D - Stager versions 3.1.5 and earlier are affected by a Use  ...)
+	TODO: check
+CVE-2026-21283 (Bridge versions 15.1.2, 16.0 and earlier are affected by a Heap-based  ...)
+	TODO: check
+CVE-2026-21281 (InCopy versions 21.0, 19.5.5 and earlier are affected by a Heap-based  ...)
+	TODO: check
+CVE-2026-21280 (Illustrator versions 29.8.3, 30.0 and earlier are affected by an Untru ...)
+	TODO: check
+CVE-2026-21278 (InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by an  ...)
+	TODO: check
+CVE-2026-21277 (InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by a H ...)
+	TODO: check
+CVE-2026-21276 (InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by an  ...)
+	TODO: check
+CVE-2026-21275 (InDesign Desktop versions 21.0, 19.5.5 and earlier are affected by an  ...)
+	TODO: check
+CVE-2026-21274 (Dreamweaver Desktop versions 21.6 and earlier are affected by an Incor ...)
+	TODO: check
+CVE-2026-21272 (Dreamweaver Desktop versions 21.6 and earlier are affected by an Impro ...)
+	TODO: check
+CVE-2026-21271 (Dreamweaver Desktop versions 21.6 and earlier are affected by an Impro ...)
+	TODO: check
+CVE-2026-21268 (Dreamweaver Desktop versions 21.6 and earlier are affected by an Impro ...)
+	TODO: check
+CVE-2026-21267 (Dreamweaver Desktop versions 21.6 and earlier are affected by an Impro ...)
+	TODO: check
+CVE-2026-21265 (Windows Secure Boot stores Microsoft certificates in the UEFI KEK and  ...)
+	TODO: check
+CVE-2026-21226 (Deserialization of untrusted data in Azure Core shared client library  ...)
+	TODO: check
+CVE-2026-21224 (Stack-based buffer overflow in Azure Connected Machine Agent allows an ...)
+	TODO: check
+CVE-2026-21221 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-21219 (Use after free in Inbox COM Objects allows an unauthorized attacker to ...)
+	TODO: check
+CVE-2026-20965 (Improper verification of cryptographic signature in Windows Admin Cent ...)
+	TODO: check
+CVE-2026-20963 (Deserialization of untrusted data in Microsoft Office SharePoint allow ...)
+	TODO: check
+CVE-2026-20962 (Use of uninitialized resource in Dynamic Root of Trust for Measurement ...)
+	TODO: check
+CVE-2026-20959 (Improper neutralization of input during web page generation ('cross-si ...)
+	TODO: check
+CVE-2026-20958 (Server-side request forgery (ssrf) in Microsoft Office SharePoint allo ...)
+	TODO: check
+CVE-2026-20957 (Integer underflow (wrap or wraparound) in Microsoft Office Excel allow ...)
+	TODO: check
+CVE-2026-20956 (Untrusted pointer dereference in Microsoft Office Excel allows an unau ...)
+	TODO: check
+CVE-2026-20955 (Untrusted pointer dereference in Microsoft Office Excel allows an unau ...)
+	TODO: check
+CVE-2026-20953 (Use after free in Microsoft Office allows an unauthorized attacker to  ...)
+	TODO: check
+CVE-2026-20952 (Use after free in Microsoft Office allows an unauthorized attacker to  ...)
+	TODO: check
+CVE-2026-20951 (Improper input validation in Microsoft Office SharePoint allows an una ...)
+	TODO: check
+CVE-2026-20950 (Use after free in Microsoft Office Excel allows an unauthorized attack ...)
+	TODO: check
+CVE-2026-20949 (Improper access control in Microsoft Office Excel allows an unauthoriz ...)
+	TODO: check
+CVE-2026-20948 (Untrusted pointer dereference in Microsoft Office Word allows an unaut ...)
+	TODO: check
+CVE-2026-20947 (Improper neutralization of special elements used in an sql command ('s ...)
+	TODO: check
+CVE-2026-20946 (Out-of-bounds read in Microsoft Office Excel allows an unauthorized at ...)
+	TODO: check
+CVE-2026-20944 (Out-of-bounds read in Microsoft Office Word allows an unauthorized att ...)
+	TODO: check
+CVE-2026-20943 (Untrusted search path in Microsoft Office allows an unauthorized attac ...)
+	TODO: check
+CVE-2026-20941 (Improper link resolution before file access ('link following') in Host ...)
+	TODO: check
+CVE-2026-20940 (Heap-based buffer overflow in Windows Cloud Files Mini Filter Driver a ...)
+	TODO: check
+CVE-2026-20939 (Exposure of sensitive information to an unauthorized actor in Windows  ...)
+	TODO: check
+CVE-2026-20938 (Untrusted pointer dereference in Windows Virtualization-Based Security ...)
+	TODO: check
+CVE-2026-20937 (Exposure of sensitive information to an unauthorized actor in Windows  ...)
+	TODO: check
+CVE-2026-20936 (Out-of-bounds read in Windows NDIS allows an authorized attacker to di ...)
+	TODO: check
+CVE-2026-20935 (Untrusted pointer dereference in Windows Virtualization-Based Security ...)
+	TODO: check
+CVE-2026-20934 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20932 (Exposure of sensitive information to an unauthorized actor in Windows  ...)
+	TODO: check
+CVE-2026-20931 (External control of file name or path in Windows Telephony Service all ...)
+	TODO: check
+CVE-2026-20929 (Improper access control in Windows HTTP.sys allows an authorized attac ...)
+	TODO: check
+CVE-2026-20927 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20926 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20925 (External control of file name or path in Windows NTLM allows an unauth ...)
+	TODO: check
+CVE-2026-20924 (Use after free in Windows Management Services allows an authorized att ...)
+	TODO: check
+CVE-2026-20923 (Use after free in Windows Management Services allows an authorized att ...)
+	TODO: check
+CVE-2026-20922 (Heap-based buffer overflow in Windows NTFS allows an authorized attack ...)
+	TODO: check
+CVE-2026-20921 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20920 (Use after free in Windows Win32K - ICOMP allows an authorized attacker ...)
+	TODO: check
+CVE-2026-20919 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20918 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20877 (Use after free in Windows Management Services allows an authorized att ...)
+	TODO: check
+CVE-2026-20876 (Heap-based buffer overflow in Windows Virtualization-Based Security (V ...)
+	TODO: check
+CVE-2026-20875 (Null pointer dereference in Windows Local Security Authority Subsystem ...)
+	TODO: check
+CVE-2026-20874 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20873 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20872 (External control of file name or path in Windows NTLM allows an unauth ...)
+	TODO: check
+CVE-2026-20871 (Use after free in Desktop Windows Manager allows an authorized attacke ...)
+	TODO: check
+CVE-2026-20870 (Use after free in Windows Win32K - ICOMP allows an authorized attacker ...)
+	TODO: check
+CVE-2026-20869 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20868 (Heap-based buffer overflow in Windows Routing and Remote Access Servic ...)
+	TODO: check
+CVE-2026-20867 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20866 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20865 (Use after free in Windows Management Services allows an authorized att ...)
+	TODO: check
+CVE-2026-20864 (Heap-based buffer overflow in Connected Devices Platform Service (Cdps ...)
+	TODO: check
+CVE-2026-20863 (Double free in Windows Win32K - ICOMP allows an authorized attacker to ...)
+	TODO: check
+CVE-2026-20862 (Exposure of sensitive information to an unauthorized actor in Windows  ...)
+	TODO: check
+CVE-2026-20861 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20860 (Access of resource using incompatible type ('type confusion') in Windo ...)
+	TODO: check
+CVE-2026-20859 (Use after free in Windows Kernel-Mode Drivers allows an authorized att ...)
+	TODO: check
+CVE-2026-20858 (Use after free in Windows Management Services allows an authorized att ...)
+	TODO: check
+CVE-2026-20857 (Untrusted pointer dereference in Windows Cloud Files Mini Filter Drive ...)
+	TODO: check
+CVE-2026-20856 (Improper input validation in Windows Server Update Service allows an u ...)
+	TODO: check
+CVE-2026-20854 (Use after free in Windows Local Security Authority Subsystem Service ( ...)
+	TODO: check
+CVE-2026-20853 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20852 (Incorrect privilege assignment in Windows Hello allows an unauthorized ...)
+	TODO: check
+CVE-2026-20851 (Out-of-bounds read in Capability Access Management Service (camsvc) al ...)
+	TODO: check
+CVE-2026-20849 (Reliance on untrusted inputs in a security decision in Windows Kerbero ...)
+	TODO: check
+CVE-2026-20848 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20847 (Exposure of sensitive information to an unauthorized actor in Windows  ...)
+	TODO: check
+CVE-2026-20844 (Use after free in Windows Clipboard Server allows an unauthorized atta ...)
+	TODO: check
+CVE-2026-20843 (Improper access control in Windows Routing and Remote Access Service ( ...)
+	TODO: check
+CVE-2026-20842 (Use after free in Windows DWM allows an authorized attacker to elevate ...)
+	TODO: check
+CVE-2026-20840 (Heap-based buffer overflow in Windows NTFS allows an authorized attack ...)
+	TODO: check
+CVE-2026-20839 (Improper access control in Windows Client-Side Caching (CSC) Service a ...)
+	TODO: check
+CVE-2026-20838 (Generation of error message containing sensitive information in Window ...)
+	TODO: check
+CVE-2026-20837 (Heap-based buffer overflow in Windows Media allows an unauthorized att ...)
+	TODO: check
+CVE-2026-20836 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20835 (Out-of-bounds read in Capability Access Management Service (camsvc) al ...)
+	TODO: check
+CVE-2026-20834 (Absolute path traversal in Windows Shell allows an unauthorized attack ...)
+	TODO: check
+CVE-2026-20833 (Use of a broken or risky cryptographic algorithm in Windows Kerberos a ...)
+	TODO: check
+CVE-2026-20832 (Windows Remote Procedure Call Interface Definition Language (IDL) Elev ...)
+	TODO: check
+CVE-2026-20831 (Time-of-check time-of-use (toctou) race condition in Windows Ancillary ...)
+	TODO: check
+CVE-2026-20830 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20829 (Out-of-bounds read in Windows TPM allows an authorized attacker to dis ...)
+	TODO: check
+CVE-2026-20828 (Out-of-bounds read in Windows Internet Connection Sharing (ICS) allows ...)
+	TODO: check
+CVE-2026-20827 (Exposure of sensitive information to an unauthorized actor in Tablet W ...)
+	TODO: check
+CVE-2026-20826 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20825 (Improper access control in Windows Hyper-V allows an authorized attack ...)
+	TODO: check
+CVE-2026-20824 (Protection mechanism failure in Windows Remote Assistance allows an un ...)
+	TODO: check
+CVE-2026-20823 (Exposure of sensitive information to an unauthorized actor in Windows  ...)
+	TODO: check
+CVE-2026-20822 (Use after free in Microsoft Graphics Component allows an authorized at ...)
+	TODO: check
+CVE-2026-20821 (Exposure of sensitive information to an unauthorized actor in Windows  ...)
+	TODO: check
+CVE-2026-20820 (Heap-based buffer overflow in Windows Common Log File System Driver al ...)
+	TODO: check
+CVE-2026-20819 (Untrusted pointer dereference in Windows Virtualization-Based Security ...)
+	TODO: check
+CVE-2026-20818 (Insertion of sensitive information into log file in Windows Kernel all ...)
+	TODO: check
+CVE-2026-20817 (Improper handling of insufficient permissions or privileges in Windows ...)
+	TODO: check
+CVE-2026-20816 (Time-of-check time-of-use (toctou) race condition in Windows Installer ...)
+	TODO: check
+CVE-2026-20815 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20814 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20812 (Improper input validation in Windows LDAP - Lightweight Directory Acce ...)
+	TODO: check
+CVE-2026-20811 (Access of resource using incompatible type ('type confusion') in Windo ...)
+	TODO: check
+CVE-2026-20810 (Free of memory not on the heap in Windows Ancillary Function Driver fo ...)
+	TODO: check
+CVE-2026-20809 (Time-of-check time-of-use (toctou) race condition in Windows Kernel Me ...)
+	TODO: check
+CVE-2026-20808 (Concurrent execution using shared resource with improper synchronizati ...)
+	TODO: check
+CVE-2026-20805 (Exposure of sensitive information to an unauthorized actor in Desktop  ...)
+	TODO: check
+CVE-2026-20804 (Incorrect privilege assignment in Windows Hello allows an unauthorized ...)
+	TODO: check
+CVE-2026-20803 (Missing authentication for critical function in SQL Server allows an a ...)
+	TODO: check
+CVE-2026-0859 (TYPO3's mail\u2011file spool deserialization flaw lets local users wit ...)
+	TODO: check
+CVE-2026-0684 (The CP Image Store with Slideshow plugin for WordPress is vulnerable t ...)
+	TODO: check
+CVE-2026-0408 (A path traversal vulnerability in NETGEAR WiFi range extenders allows  ...)
+	TODO: check
+CVE-2026-0407 (An insufficient authentication vulnerability in NETGEAR WiFi range  ex ...)
+	TODO: check
+CVE-2026-0406 (An insufficient input validation vulnerability in the NETGEAR XR1000v2 ...)
+	TODO: check
+CVE-2026-0405 (An authentication bypass vulnerability in NETGEAR Orbi devices allows  ...)
+	TODO: check
+CVE-2026-0404 (An insufficient input validation vulnerability in NETGEAR Orbi devices ...)
+	TODO: check
+CVE-2026-0403 (An insufficient input validation vulnerability in NETGEAR Orbi routers ...)
+	TODO: check
+CVE-2026-0386 (Improper access control in Windows Deployment Services allows an unaut ...)
+	TODO: check
+CVE-2025-9435 (Zohocorp ManageEngine ADManager Plus versions below7230are vulnerable  ...)
+	TODO: check
+CVE-2025-9427 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+	TODO: check
+CVE-2025-8090 (Null pointer dereference in the MsgRegisterEvent() system call could a ...)
+	TODO: check
+CVE-2025-71027 (Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow  ...)
+	TODO: check
+CVE-2025-71026 (Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow  ...)
+	TODO: check
+CVE-2025-71025 (Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow  ...)
+	TODO: check
+CVE-2025-71024 (Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow  ...)
+	TODO: check
+CVE-2025-71023 (Tenda AX-3 v16.03.12.10_CN was discovered to contain a stack overflow  ...)
+	TODO: check
+CVE-2025-70753 (Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in t ...)
+	TODO: check
+CVE-2025-69992 (phpgurukul News Portal Project V4.1 has File Upload Vulnerability via  ...)
+	TODO: check
+CVE-2025-69991 (phpgurukul News Portal Project V4.1 is vulnerable to SQL Injection in  ...)
+	TODO: check
+CVE-2025-69990 (phpgurukul News Portal Project V4.1 has an Arbitrary File Deletion Vul ...)
+	TODO: check
+CVE-2025-68949 (n8n is an open source workflow automation platform. From 1.36.0 to bef ...)
+	TODO: check
+CVE-2025-68931 (Jervis is a library for Job DSL plugin scripts and shared Jenkins pipe ...)
+	TODO: check
+CVE-2025-68925 (Jervis is a library for Job DSL plugin scripts and shared Jenkins pipe ...)
+	TODO: check
+CVE-2025-68707 (An authentication bypass vulnerability in the Tongyu AX1800 Wi-Fi 6 Ro ...)
+	TODO: check
+CVE-2025-68704 (Jervis is a library for Job DSL plugin scripts and shared Jenkins pipe ...)
+	TODO: check
+CVE-2025-68703 (Jervis is a library for Job DSL plugin scripts and shared Jenkins pipe ...)
+	TODO: check
+CVE-2025-68702 (Jervis is a library for Job DSL plugin scripts and shared Jenkins pipe ...)
+	TODO: check
+CVE-2025-68701 (Jervis is a library for Job DSL plugin scripts and shared Jenkins pipe ...)
+	TODO: check
+CVE-2025-68698 (Jervis is a library for Job DSL plugin scripts and shared Jenkins pipe ...)
+	TODO: check
+CVE-2025-68271 (OpenC3 COSMOS provides the functionality needed to send commands to an ...)
+	TODO: check
+CVE-2025-67685 (A Server-Side Request Forgery (SSRF) vulnerability [CWE-918] vulnerabi ...)
+	TODO: check
+CVE-2025-66698 (An issue in Semantic machines v5.4.8 allows attackers to bypass authen ...)
+	TODO: check
+CVE-2025-65784 (Insecure permissions in Hubert Imoveis e Administracao Ltda Hub v2.0 1 ...)
+	TODO: check
+CVE-2025-65783 (An arbitrary file upload vulnerability in the /utils/uploadFile compon ...)
+	TODO: check
+CVE-2025-64155 (An improper neutralization of special elements used in an os command ( ...)
+	TODO: check
+CVE-2025-62182 (Pega Customer Service Framework versions 8.7.0 through 25.1.0 are affe ...)
+	TODO: check
+CVE-2025-59922 (An improper neutralization of special elements used in an SQL command  ...)
+	TODO: check
+CVE-2025-59022 (Backend users who had access to the recycler module could delete arbit ...)
+	TODO: check
+CVE-2025-59021 (Backend users with access to the redirects module and write permission ...)
+	TODO: check
+CVE-2025-59020 (By exploiting the defVals parameter, attackers could bypass field\u201 ...)
+	TODO: check
+CVE-2025-58693 (An improper limitation of a pathname to a restricted directory ('path  ...)
+	TODO: check
+CVE-2025-58411 (Software installed and run as a non-privileged user may conduct improp ...)
+	TODO: check
+CVE-2025-58409 (Software installed and run as a non-privileged user may conduct improp ...)
+	TODO: check
+CVE-2025-55462 (A CORS misconfiguration in Eramba Community and Enterprise Editions v3 ...)
+	TODO: check
+CVE-2025-47855 (An exposure of sensitive information to an unauthorized actor [CWE-200 ...)
+	TODO: check
+CVE-2025-46685 (Dell SupportAssist OS Recovery, versions prior to 5.5.15.1, contain a  ...)
+	TODO: check
+CVE-2025-46684 (Dell SupportAssist OS Recovery, versions prior to 5.5.15.1, contain a  ...)
+	TODO: check
+CVE-2025-40944 (A vulnerability has been identified in SIMATIC ET 200AL IM 157-1 PN (6 ...)
+	TODO: check
+CVE-2025-40942 (A vulnerability has been identified in TeleControl Server Basic (All v ...)
+	TODO: check
+CVE-2025-40805 (Affected devices do not properly enforce user authentication on specif ...)
+	TODO: check
+CVE-2025-37169 (A stack overflow vulnerability exists in the AOS-10 web-based manageme ...)
+	TODO: check
+CVE-2025-37168 (Arbitrary file deletion vulnerability have been identified in a system ...)
+	TODO: check
+CVE-2025-37166 (A vulnerability affecting HPE Networking Instant On Access Points has  ...)
+	TODO: check
+CVE-2025-37165 (A vulnerability in the router mode configuration of HPE Instant On Acc ...)
+	TODO: check
+CVE-2025-36640 (A vulnerability has been identified in the installation/uninstallation ...)
+	TODO: check
+CVE-2025-25652 (In Eptura Archibus 2024.03.01.109, the "Run script" and "Server File"  ...)
+	TODO: check
+CVE-2025-25249 (A heap-based buffer overflow vulnerability in Fortinet FortiOS 7.6.0 t ...)
+	TODO: check
+CVE-2025-25176 (Intermediate register values of secure workloads can be exfiltrated in ...)
+	TODO: check
+CVE-2025-14507 (The EventPrime - Events Calendar, Bookings and Tickets plugin for Word ...)
+	TODO: check
+CVE-2025-14001 (The WP Duplicate Page plugin for WordPress is vulnerable to unauthoriz ...)
+	TODO: check
+CVE-2025-13774 (A vulnerability exists in Progress Flowmon ADS versions prior to 12.5. ...)
+	TODO: check
+CVE-2025-13447 (OS Command Injection Remote Code Execution Vulnerability in API in Pro ...)
+	TODO: check
+CVE-2025-13444 (OS Command Injection Remote Code Execution Vulnerability in API in Pro ...)
+	TODO: check
+CVE-2025-11669 (ZohocorpManageEngine PAM360 versions before 8202; Password Manager Pro ...)
+	TODO: check
+CVE-2025-11250 (Zohocorp ManageEngine ADSelfService Plus versions before 6519 are vuln ...)
+	TODO: check
+CVE-2025-10865 (Software installed and run as a non-privileged user may conduct improp ...)
+	TODO: check
+CVE-2024-54855 (fabricators Ltd Vanilla OS 2 Core image v1.1.0 was discovered to conta ...)
+	TODO: check
+CVE-2025-71101 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux <unfixed>
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e44c42c830b7ab36e3a3a86321c619f24def5206 (6.19-rc4)
-CVE-2025-71100 [wifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc()]
+CVE-2025-71100 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
 	- linux <unfixed>
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/dd39edb445f07400e748da967a07d5dca5c5f96e (6.19-rc4)
-CVE-2025-71099 [drm/xe/oa: Fix potential UAF in xe_oa_add_config_ioctl()]
+CVE-2025-71099 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux <unfixed>
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/dcb171931954c51a1a7250d558f02b8f36570783 (6.19-rc1)
-CVE-2025-71098 [ip6_gre: make ip6gre_header() robust]
+CVE-2025-71098 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/db5b4e39c4e63700c68a7e65fc4e1f1375273476 (6.19-rc4)
-CVE-2025-71097 [ipv4: Fix reference count leak when using error routes with nexthop objects]
+CVE-2025-71097 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/ac782f4e3bfcde145b8a7f8af31d9422d94d172a (6.19-rc4)
-CVE-2025-71096 [RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly]
+CVE-2025-71096 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/a7b8e876e0ef0232b8076972c57ce9a7286b47ca (6.19-rc4)
-CVE-2025-71095 [net: stmmac: fix the crash issue for zero copy XDP_TX action]
+CVE-2025-71095 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux <unfixed>
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a48e232210009be50591fdea8ba7c07b0f566a13 (6.19-rc4)
-CVE-2025-71094 [net: usb: asix: validate PHY address before use]
+CVE-2025-71094 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux <unfixed>
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a1e077a3f76eea0dc671ed6792e7d543946227e8 (6.19-rc4)
-CVE-2025-71093 [e1000: fix OOB in e1000_tbi_should_accept()]
+CVE-2025-71093 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/9c72a5182ed92904d01057f208c390a303f00a0f (6.19-rc4)
-CVE-2025-71092 [RDMA/bnxt_re: Fix OOB write in bnxt_re_copy_err_stats()]
+CVE-2025-71092 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux <unfixed>
 	[trixie] - linux <not-affected> (Vulnerable code not present)
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9b68a1cc966bc947d00e4c0df7722d118125aa37 (6.19-rc4)
-CVE-2025-71091 [team: fix check for port enabled in team_queue_override_port_prio_changed()]
+CVE-2025-71091 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/932ac51d9953eaf77a1252f79b656d4ca86163c6 (6.19-rc4)
-CVE-2025-71090 [nfsd: fix nfsd_file reference leak in nfsd4_add_rdaccess_to_wrdeleg()]
+CVE-2025-71090 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux <unfixed>
 	[trixie] - linux <not-affected> (Vulnerable code not present)
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8072e34e1387d03102b788677d491e2bcceef6f5 (6.19-rc4)
-CVE-2025-71089 [iommu: disable SVA when CONFIG_X86 is set]
+CVE-2025-71089 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/72f98ef9a4be30d2a60136dd6faee376f780d06c (6.19-rc1)
-CVE-2025-71088 [mptcp: fallback earlier on simult connection]
+CVE-2025-71088 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux <unfixed>
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/71154bbe49423128c1c8577b6576de1ed6836830 (6.19-rc4)
-CVE-2025-71087 [iavf: fix off-by-one issues in iavf_config_rss_reg()]
+CVE-2025-71087 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/6daa2893f323981c7894c68440823326e93a7d61 (6.19-rc4)
-CVE-2025-71086 [net: rose: fix invalid array index in rose_kill_by_device()]
+CVE-2025-71086 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/6595beb40fb0ec47223d3f6058ee40354694c8e4 (6.19-rc4)
-CVE-2025-71085 [ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()]
+CVE-2025-71085 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/58fc7342b529803d3c221101102fe913df7adb83 (6.19-rc4)
-CVE-2025-71084 [RDMA/cm: Fix leaking the multicast GID table reference]
+CVE-2025-71084 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/57f3cb6c84159d12ba343574df2115fb18dd83ca (6.19-rc4)
-CVE-2025-71083 [drm/ttm: Avoid NULL pointer deref for evicted BOs]
+CVE-2025-71083 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/491adc6a0f9903c32b05f284df1148de39e8e644 (6.19-rc1)
-CVE-2025-71082 [Bluetooth: btusb: revert use of devm_kzalloc in btusb]
+CVE-2025-71082 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/252714f1e8bdd542025b16321c790458014d6880 (6.19-rc4)
-CVE-2025-71081 [ASoC: stm32: sai: fix OF node leak on probe]
+CVE-2025-71081 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/23261f0de09427367e99f39f588e31e2856a690e (6.19-rc1)
-CVE-2025-71080 [ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT]
+CVE-2025-71080 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux <unfixed>
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1adaea51c61b52e24e7ab38f7d3eba023b2d050d (6.19-rc4)
-CVE-2025-71079 [net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write]
+CVE-2025-71079 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/1ab526d97a57e44d26fadcc0e9adeb9c0c0182f5 (6.19-rc4)
-CVE-2025-71078 [powerpc/64s/slb: Fix SLB multihit issue during SLB preload]
+CVE-2025-71078 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/00312419f0863964625d6dcda8183f96849412c6 (6.19-rc1)
-CVE-2025-71070 [ublk: clean up user copy references on ublk server exit]
+CVE-2025-71070 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.18.3-1
 	[trixie] - linux <not-affected> (Vulnerable code not present)
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/daa24603d9f0808929514ee62ced30052ca7221c (6.19-rc3)
-CVE-2025-71077 [tpm: Cap the number of PCR banks]
+CVE-2025-71077 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/faf07e611dfa464b201223a7253e9dc5ee0f3c9e (6.19-rc1)
-CVE-2025-71076 [drm/xe/oa: Limit num_syncs to prevent oversized allocations]
+CVE-2025-71076 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.18.3-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f8dd66bfb4e184c71bd26418a00546ebe7f5c17a (6.19-rc2)
-CVE-2025-71075 [scsi: aic94xx: fix use-after-free in device removal path]
+CVE-2025-71075 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/f6ab594672d4cba08540919a4e6be2e202b60007 (6.19-rc1)
-CVE-2025-71074 [functionfs: fix the open/removal races]
+CVE-2025-71074 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/e5bf5ee266633cb18fff6f98f0b7d59a62819eee (6.19-rc1)
-CVE-2025-71073 [Input: lkkbd - disable pending work before freeing device]
+CVE-2025-71073 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/e58c88f0cb2d8ed89de78f6f17409d29cfab6c5c (6.19-rc2)
-CVE-2025-71072 [shmem: fix recovery on rename failures]
+CVE-2025-71072 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.18.3-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e1b4c6a58304fd490124cc2b454d80edc786665c (6.19-rc2)
-CVE-2025-71071 [iommu/mediatek: fix use-after-free on probe deferral]
+CVE-2025-71071 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.18.3-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/de83d4617f9fe059623e97acf7e1e10d209625b5 (6.19-rc1)
-CVE-2025-71069 [f2fs: invalidate dentry cache on failed whiteout creation]
+CVE-2025-71069 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/d33f89b34aa313f50f9a512d58dd288999f246b0 (6.19-rc1)
-CVE-2025-71068 [svcrdma: bound check rq_pages index in inline path]
+CVE-2025-71068 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.18.3-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d1bea0ce35b6095544ee82bb54156fc62c067e58 (6.19-rc3)
-CVE-2025-71067 [ntfs: set dummy blocksize to read boot_block when mounting]
+CVE-2025-71067 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/d1693a7d5a38acf6424235a6070bcf5b186a360d (6.19-rc1)
-CVE-2025-71066 [net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change]
+CVE-2025-71066 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/ce052b9402e461a9aded599f5b47e76bc727f7de (6.19-rc2)
-CVE-2025-71065 [f2fs: fix to avoid potential deadlock]
+CVE-2025-71065 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.18.3-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ca8b201f28547e28343a6f00a6e91fa8c09572fe (6.19-rc1)
-CVE-2025-71064 [net: hns3: using the num_tqps in the vf driver to apply for resources]
+CVE-2025-71064 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/c2a16269742e176fccdd0ef9c016a233491a49ad (6.19-rc2)
-CVE-2025-68812 [media: iris: Add sanity check for stop streaming]
+CVE-2025-68812 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.18.3-1
 	[trixie] - linux <not-affected> (Vulnerable code not present)
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ad699fa78b59241c9d71a8cafb51525f3dab04d4 (6.19-rc1)
-CVE-2025-68807 [block: fix race between wbt_enable_default and IO submission]
+CVE-2025-68807 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.18.3-1
 	[trixie] - linux <not-affected> (Vulnerable code not present)
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9869d3a6fed381f3b98404e26e1afc75d680cbf9 (6.19-rc2)
-CVE-2025-68805 [fuse: fix io-uring list corruption for terminated non-committed requests]
+CVE-2025-68805 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.18.3-1
 	[trixie] - linux <not-affected> (Vulnerable code not present)
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/95c39eef7c2b666026c69ab5b30471da94ea2874 (6.19-rc1)
-CVE-2025-68793 [drm/amdgpu: fix a job->pasid access race in gpu recovery]
+CVE-2025-68793 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.18.3-1
 	[trixie] - linux <not-affected> (Vulnerable code not present)
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/77f73253015cbc7893fca1821ac3eae9eb4bc943 (6.19-rc2)
-CVE-2025-68791 [fuse: missing copy_finish in fuse-over-io-uring argument copies]
+CVE-2025-68791 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.18.3-1
 	[trixie] - linux <not-affected> (Vulnerable code not present)
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6e0d7f7f4a43ac8868e98c87ecf48805aa8c24dd (6.19-rc1)
-CVE-2025-68790 [net/mlx5: Fix double unregister of HCA_PORTS component]
+CVE-2025-68790 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6a107cfe9c99a079e578a4c5eb70038101a3599f (6.19-rc2)
-CVE-2025-68779 [net/mlx5e: Avoid unregistering PSP twice]
+CVE-2025-68779 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/35e93736f69963337912594eb3951ab320b77521 (6.19-rc2)
-CVE-2025-68823 [ublk: fix deadlock when reading partition table]
+CVE-2025-68823 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.18.3-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c258f5c4502c9667bccf5d76fa731ab9c96687c1 (6.19-rc2)
-CVE-2025-68822 [Input: alps - fix use-after-free bugs caused by dev3_register_work]
+CVE-2025-68822 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/bf40644ef8c8a288742fa45580897ed0e0289474 (6.19-rc2)
-CVE-2025-68821 [fuse: fix readahead reclaim deadlock]
+CVE-2025-68821 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.18.3-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/bd5603eaae0aabf527bfb3ce1bb07e979ce5bd50 (6.19-rc1)
-CVE-2025-68820 [ext4: xattr: fix null pointer deref in ext4_raw_inode()]
+CVE-2025-68820 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/b97cb7d6a051aa6ebd57906df0e26e9e36c26d14 (6.19-rc1)
-CVE-2025-68819 [media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg()]
+CVE-2025-68819 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/b91e6aafe8d356086cc621bc03e35ba2299e4788 (6.19-rc1)
-CVE-2025-68818 [scsi: Revert "scsi: qla2xxx: Perform lockless command completion in abort path"]
+CVE-2025-68818 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/b57fbc88715b6d18f379463f48a15b560b087ffe (6.19-rc1)
-CVE-2025-68817 [ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency]
+CVE-2025-68817 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/b39a1833cc4a2755b02603eec3a71a85e9dff926 (6.19-rc1)
-CVE-2025-68816 [net/mlx5: fw_tracer, Validate format string parameters]
+CVE-2025-68816 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/b35966042d20b14e2d83330049f77deec5229749 (6.19-rc2)
-CVE-2025-68815 [net/sched: ets: Remove drr class from the active list if it changes to strict]
+CVE-2025-68815 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/b1e125ae425aba9b45252e933ca8df52a843ec70 (6.19-rc2)
-CVE-2025-68814 [io_uring: fix filename leak in __io_openat_prep()]
+CVE-2025-68814 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.18.3-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b14fad555302a2104948feaff70503b64c80ac01 (6.19-rc3)
-CVE-2025-68813 [ipvs: fix ipv4 null-ptr-deref in route error path]
+CVE-2025-68813 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/ad891bb3d079a46a821bf2b8867854645191bab0 (6.19-rc2)
-CVE-2025-68811 [svcrdma: use rc_pageoff for memcpy byte offset]
+CVE-2025-68811 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.18.3-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a8ee9099f30654917aa68f55d707b5627e1dbf77 (6.19-rc3)
-CVE-2025-68810 [KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot]
+CVE-2025-68810 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
 	- linux 6.18.3-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9935df5333aa503a18de5071f53762b65c783c4c (6.19-rc2)
-CVE-2025-68809 [ksmbd: vfs: fix race on m_flags in vfs_cache]
+CVE-2025-68809 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/991f8a79db99b14c48d20d2052c82d65b9186cad (6.19-rc1)
-CVE-2025-68808 [media: vidtv: initialize local pointers upon transfer of memory ownership]
+CVE-2025-68808 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/98aabfe2d79f74613abc2b0b1cef08f97eaf5322 (6.19-rc1)
-CVE-2025-68806 [ksmbd: fix buffer validation by including null terminator size in EA length]
+CVE-2025-68806 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/95d7a890e4b03e198836d49d699408fd1867cb55 (6.19-rc2)
-CVE-2025-68804 [platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver]
+CVE-2025-68804 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/944edca81e7aea15f83cf9a13a6ab67f711e8abd (6.19-rc1)
-CVE-2025-68803 [NFSD: NFSv4 file creation neglects setting ACL]
+CVE-2025-68803 (In the Linux kernel, the following vulnerability has been resolved:  N ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/913f7cf77bf14c13cfea70e89bcb6d0b22239562 (6.19-rc3)
-CVE-2025-68802 [drm/xe: Limit num_syncs to prevent oversized allocations]
+CVE-2025-68802 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.18.3-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8e461304009135270e9ccf2d7e2dfe29daec9b60 (6.19-rc2)
-CVE-2025-68801 [mlxsw: spectrum_router: Fix neighbour use-after-free]
+CVE-2025-68801 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/8b0e69763ef948fb872a7767df4be665d18f5fd4 (6.19-rc2)
-CVE-2025-68800 [mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats]
+CVE-2025-68800 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/8ac1dacec458f55f871f7153242ed6ab60373b90 (6.19-rc2)
-CVE-2025-68799 [caif: fix integer underflow in cffrml_receive()]
+CVE-2025-68799 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/8a11ff0948b5ad09b71896b7ccc850625f9878d1 (6.19-rc2)
-CVE-2025-68798 [perf/x86/amd: Check event before enable to avoid GPF]
+CVE-2025-68798 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/866cf36bfee4fba6a492d2dcc5133f857e3446b0 (6.19-rc1)
-CVE-2025-68797 [char: applicom: fix NULL pointer dereference in ac_ioctl]
+CVE-2025-68797 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/82d12088c297fa1cef670e1718b3d24f414c23f7 (6.19-rc1)
-CVE-2025-68796 [f2fs: fix to avoid updating zero-sized extent in extent cache]
+CVE-2025-68796 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/7c37c79510329cd951a4dedf3f7bf7e2b18dccec (6.19-rc1)
-CVE-2025-68795 [ethtool: Avoid overflowing userspace buffer on stats query]
+CVE-2025-68795 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/7b07be1ff1cb6c49869910518650e8d0abc7d25f (6.19-rc2)
-CVE-2025-68794 [iomap: adjust read range correctly for non-block-aligned positions]
+CVE-2025-68794 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/7aa6bc3e8766990824f66ca76c19596ce10daf3e (6.19-rc1)
-CVE-2025-68792 [tpm2-sessions: Fix out of range indexing in name_size]
+CVE-2025-68792 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
 	- linux 6.18.3-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6e9722e9a7bfe1bbad649937c811076acf86e1fd (6.19-rc1)
-CVE-2025-68789 [hwmon: (ibmpex) fix use-after-free in high/low store]
+CVE-2025-68789 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/6946c726c3f4c36f0f049e6f97e88c510b15f65d (6.19-rc2)
-CVE-2025-68788 [fsnotify: do not generate ACCESS/MODIFY events on child for special files]
+CVE-2025-68788 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/635bc4def026a24e071436f4f356ea08c0eed6ff (6.19-rc2)
-CVE-2025-68787 [netrom: Fix memory leak in nr_sendmsg()]
+CVE-2025-68787 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/613d12dd794e078be8ff3cf6b62a6b9acf7f4619 (6.19-rc2)
-CVE-2025-68786 [ksmbd: skip lock-range check on equal size to avoid size==0 underflow]
+CVE-2025-68786 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/5d510ac31626ed157d2182149559430350cf2104 (6.19-rc1)
-CVE-2025-68785 [net: openvswitch: fix middle attribute validation in push_nsh() action]
+CVE-2025-68785 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/5ace7ef87f059d68b5f50837ef3e8a1a4870c36e (6.19-rc2)
-CVE-2025-68784 [xfs: fix a UAF problem in xattr repair]
+CVE-2025-68784 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
 	- linux 6.18.3-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5990fd756943836978ad184aac980e2b36ab7e01 (6.19-rc2)
-CVE-2025-68783 [ALSA: usb-mixer: us16x08: validate meter packet indices]
+CVE-2025-68783 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/5526c1c6ba1d0913c7dfcbbd6fe1744ea7c55f1e (6.19-rc3)
-CVE-2025-68782 [scsi: target: Reset t_task_cdb pointer in error case]
+CVE-2025-68782 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/5053eab38a4c4543522d0c320c639c56a8b59908 (6.19-rc1)
-CVE-2025-68781 [usb: phy: fsl-usb: Fix use-after-free in delayed work during device removal]
+CVE-2025-68781 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/41ca62e3e21e48c2903b3b45e232cf4f2ff7434f (6.19-rc3)
-CVE-2025-68780 [sched/deadline: only set free_cpus for online runqueues]
+CVE-2025-68780 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/382748c05e58a9f1935f5a653c352422375566ea (6.19-rc1)
-CVE-2025-68778 [btrfs: don't log conflicting inode if it's a dir moved in the current transaction]
+CVE-2025-68778 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/266273eaf4d99475f1ae57f687b3e42bc71ec6f0 (6.19-rc2)
-CVE-2025-68777 [Input: ti_am335x_tsc - fix off-by-one error in wire_order validation]
+CVE-2025-68777 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/248d3a73a0167dce15ba100477c3e778c4787178 (6.19-rc2)
-CVE-2025-68776 [net/hsr: fix NULL pointer dereference in prp_get_untagged_frame()]
+CVE-2025-68776 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/188e0fa5a679570ea35474575e724d8211423d17 (6.19-rc2)
-CVE-2025-68775 [net/handshake: duplicate handshake cancellations leak socket]
+CVE-2025-68775 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
 	- linux 6.18.3-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/15564bd67e2975002f2a8e9defee33e321d3183f (6.19-rc2)
-CVE-2025-68774 [hfsplus: fix missing hfs_bnode_get() in __hfs_bnode_create]
+CVE-2025-68774 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/152af114287851583cf7e0abc10129941f19466a (6.19-rc1)
-CVE-2025-68773 [spi: fsl-cpm: Check length parity before switching to 16 bit mode]
+CVE-2025-68773 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/1417927df8049a0194933861e9b098669a95c762 (6.19-rc2)
-CVE-2025-68772 [f2fs: fix to avoid updating compression context during writeback]
+CVE-2025-68772 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/10b591e7fb7cdc8c1e53e9c000dc0ef7069aaa76 (6.19-rc1)
-CVE-2025-68771 [ocfs2: fix kernel BUG in ocfs2_find_victim_chain]
+CVE-2025-68771 (In the Linux kernel, the following vulnerability has been resolved:  o ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/039bef30e320827bac8990c9f29d2a68cd8adb5f (6.19-rc1)
-CVE-2025-68770 [bnxt_en: Fix XDP_TX path]
+CVE-2025-68770 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
 	- linux 6.18.3-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0373d5c387f24de749cc22e694a14b3a7c7eb515 (6.19-rc2)
-CVE-2025-68769 [f2fs: fix return value of f2fs_recover_fsync_data()]
+CVE-2025-68769 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/01fba45deaddcce0d0b01c411435d1acf6feab7b (6.19-rc1)
-CVE-2025-68768 [inet: frags: flush pending skbs in fqdir_pre_exit()]
+CVE-2025-68768 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/006a5035b495dec008805df249f92c22c89c3d2e (6.19-rc2)
-CVE-2025-68767 [hfsplus: Verify inode mode when loading from disk]
+CVE-2025-68767 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
 	- linux 6.18.3-1
 	NOTE: https://git.kernel.org/linus/005d4b0d33f6b4a23d382b7930f7a96b95b01f39 (6.19-rc1)
-CVE-2026-0892
+CVE-2026-0892 (Memory safety bugs present in Firefox 146 and Thunderbird 146. Some of ...)
 	- firefox <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0892
-CVE-2026-0891
+CVE-2026-0891 (Memory safety bugs present in Firefox ESR 140.6, Thunderbird ESR 140.6 ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0891
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0891
-CVE-2026-0890
+CVE-2026-0890 (Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. Thi ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0890
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0890
-CVE-2026-0889
+CVE-2026-0889 (Denial-of-service in the DOM: Service Workers component. This vulnerab ...)
 	- firefox <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0889
-CVE-2026-0888
+CVE-2026-0888 (Information disclosure in the XML component. This vulnerability affect ...)
 	- firefox <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0888
-CVE-2026-0887
+CVE-2026-0887 (Clickjacking issue, information disclosure in the PDF Viewer component ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0887
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0887
-CVE-2026-0886
+CVE-2026-0886 (Incorrect boundary conditions in the Graphics component. This vulnerab ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0886
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0886
-CVE-2026-0885
+CVE-2026-0885 (Use-after-free in the JavaScript: GC component. This vulnerability aff ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0885
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0885
-CVE-2026-0884
+CVE-2026-0884 (Use-after-free in the JavaScript Engine component. This vulnerability  ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0884
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0884
-CVE-2026-0883
+CVE-2026-0883 (Information disclosure in the Networking component. This vulnerability ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0883
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0883
-CVE-2026-0882
+CVE-2026-0882 (Use-after-free in the IPC component. This vulnerability affects Firefo ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0882
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0882
-CVE-2026-0881
+CVE-2026-0881 (Sandbox escape in the Messaging System component. This vulnerability a ...)
 	- firefox <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0881
-CVE-2026-0880
+CVE-2026-0880 (Sandbox escape due to integer overflow in the Graphics component. This ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0880
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0880
-CVE-2026-0879
+CVE-2026-0879 (Sandbox escape due to incorrect boundary conditions in the Graphics co ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0879
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0879
-CVE-2026-0878
+CVE-2026-0878 (Sandbox escape due to incorrect boundary conditions in the Graphics: C ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0878
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-03/#CVE-2026-0878
-CVE-2026-0877
+CVE-2026-0877 (Mitigation bypass in the DOM: Security component. This vulnerability a ...)
 	- firefox <unfixed>
 	- firefox-esr <unfixed>
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0877
@@ -15868,17 +16272,17 @@ CVE-2025-10655 (SQL Injection in Frappe HelpDesk in the dashboard get_dashboard_
 	NOT-FOR-US: Frappe HelpDesk
 CVE-2025-10573 (Stored XSS in Ivanti Endpoint Manager prior to version 2024 SU4 SR1 al ...)
 	NOT-FOR-US: Ivanti
-CVE-2024-56840 (A vulnerability has been identified in RUGGEDCOM ROX II family (All ve ...)
+CVE-2024-56840 (A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versi ...)
 	NOT-FOR-US: Siemens
-CVE-2024-56839 (A vulnerability has been identified in RUGGEDCOM ROX II family (All ve ...)
+CVE-2024-56839 (A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versi ...)
 	NOT-FOR-US: Siemens
-CVE-2024-56838 (A vulnerability has been identified in RUGGEDCOM ROX II family (All ve ...)
+CVE-2024-56838 (A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versi ...)
 	NOT-FOR-US: Siemens
-CVE-2024-56837 (A vulnerability has been identified in RUGGEDCOM ROX II family (All ve ...)
+CVE-2024-56837 (A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versi ...)
 	NOT-FOR-US: Siemens
-CVE-2024-56836 (A vulnerability has been identified in RUGGEDCOM ROX II family (All ve ...)
+CVE-2024-56836 (A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versi ...)
 	NOT-FOR-US: Siemens
-CVE-2024-56835 (A vulnerability has been identified in RUGGEDCOM ROX II family (All ve ...)
+CVE-2024-56835 (A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versi ...)
 	NOT-FOR-US: Siemens
 CVE-2024-56464 (IBM QRadar SIEM7.5 - 7.5.0 UP14 IF01 is affected by an information dis ...)
 	NOT-FOR-US: IBM
@@ -18949,7 +19353,7 @@ CVE-2024-32642 (Masa CMS is an open source Enterprise Content Management platfor
 	NOT-FOR-US: Masa CMS
 CVE-2024-32641 (Masa CMS is an open source Enterprise Content Management platform. Mas ...)
 	NOT-FOR-US: Masa CMS
-CVE-2025-12548
+CVE-2025-12548 (A flaw was found in Eclipse Che che-machine-exec. This vulnerability a ...)
 	NOT-FOR-US: Eclipse Che
 CVE-2025-65955 (ImageMagick is free and open-source software used for editing and mani ...)
 	{DLA-4429-1}
@@ -406064,7 +406468,7 @@ CVE-2021-36195 (Multiple command injection vulnerabilities in the command line i
 	NOT-FOR-US: FortiGuard
 CVE-2021-36194 (Multiple stack-based buffer overflows in the API controllers of FortiW ...)
 	NOT-FOR-US: FortiGuard
-CVE-2021-36193 (Multiple stack-based buffer overflows in the command line interpreter  ...)
+CVE-2021-36193 (Multiple stack-based buffer overflowsin the command line interpreter o ...)
 	NOT-FOR-US: FortiGuard
 CVE-2021-36192 (An exposure of sensitive information to an unauthorized actor [CWE-200 ...)
 	NOT-FOR-US: Fortiguard



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c136ed1a14232c9d6e4a19aa4f778a8033ac4a23

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c136ed1a14232c9d6e4a19aa4f778a8033ac4a23
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260113/89b5b61e/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list