[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Jan 14 20:13:40 GMT 2026
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
2f277445 by security tracker role at 2026-01-14T20:13:28+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,166 +1,282 @@
-CVE-2025-71144 [mptcp: ensure context reset on disconnect()]
+CVE-2026-23550 (Incorrect Privilege Assignment vulnerability in Modular DS allows Priv ...)
+ TODO: check
+CVE-2026-23498 (Shopware is an open commerce platform. From 6.7.0.0 to before 6.7.6.1, ...)
+ TODO: check
+CVE-2026-23497 (Frappe Learning Management System (LMS) is a learning system that help ...)
+ TODO: check
+CVE-2026-23492 (Pimcore is an Open Source Data & Experience Management Platform. Prior ...)
+ TODO: check
+CVE-2026-23477 (Rocket.Chat is an open-source, secure, fully customizable communicatio ...)
+ TODO: check
+CVE-2026-22859 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+ TODO: check
+CVE-2026-22858 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+ TODO: check
+CVE-2026-22857 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+ TODO: check
+CVE-2026-22856 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+ TODO: check
+CVE-2026-22855 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+ TODO: check
+CVE-2026-22854 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+ TODO: check
+CVE-2026-22853 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+ TODO: check
+CVE-2026-22852 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+ TODO: check
+CVE-2026-22851 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+ TODO: check
+CVE-2026-22820 (Outray openSource ngrok alternative. Prior to 0.1.5, a TOCTOU race con ...)
+ TODO: check
+CVE-2026-22819 (Outray openSource ngrok alternative. Prior to 0.1.5, this vulnerabilit ...)
+ TODO: check
+CVE-2026-22787 (html2pdf.js converts any webpage or element into a printable PDF entir ...)
+ TODO: check
+CVE-2026-22779 (BlackSheep is an asynchronous web framework to build event based web a ...)
+ TODO: check
+CVE-2026-22708 (Cursor is a code editor built for programming with AI. Prior to 2.3, h ...)
+ TODO: check
+CVE-2026-22694 (AliasVault is a privacy-first password manager with built-in email ali ...)
+ TODO: check
+CVE-2026-22240 (The vulnerability exists in BLUVOYIX due to an improper password stora ...)
+ TODO: check
+CVE-2026-22239 (The vulnerability exists in BLUVOYIX due to design flaws in the email ...)
+ TODO: check
+CVE-2026-22238 (The vulnerability exists in BLUVOYIX due to improper authentication in ...)
+ TODO: check
+CVE-2026-22237 (The vulnerability exists in BLUVOYIX due to the exposure of sensitive ...)
+ TODO: check
+CVE-2026-22236 (The vulnerability exists in BLUVOYIX due to improper authentication in ...)
+ TODO: check
+CVE-2026-22211 (TinyOS versions up to and including 2.1.2 contain a global buffer over ...)
+ TODO: check
+CVE-2026-22036 (Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, ...)
+ TODO: check
+CVE-2026-21889 (Weblate is a web based localization tool. Prior to 5.15.2, the screens ...)
+ TODO: check
+CVE-2026-0532 (External Control of File Name or Path (CWE-73) combined with Server-Si ...)
+ TODO: check
+CVE-2026-0529 (Improper Validation of Array Index (CWE-129) in Packetbeat\u2019s Mong ...)
+ TODO: check
+CVE-2025-9142 (A local user can trigger Harmony SASE Windows client to write or delet ...)
+ TODO: check
+CVE-2025-71166 (Typesetter CMS versions up to and including 5.1 contain a reflected cr ...)
+ TODO: check
+CVE-2025-71165 (Typesetter CMS versions up to and including 5.1 contain a reflected cr ...)
+ TODO: check
+CVE-2025-71164 (Typesetter CMS versions up to and including 5.1 contain a reflected cr ...)
+ TODO: check
+CVE-2025-71021 (Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in t ...)
+ TODO: check
+CVE-2025-70968 (FreeImage 3.18.0 contains a Use After Free in PluginTARGA.cpp;loadRLE( ...)
+ TODO: check
+CVE-2025-70747 (Tenda AX-1806 v1.0.0.1 was discovered to contain a stack overflow in t ...)
+ TODO: check
+CVE-2025-67835 (Paessler PRTG Network Monitor before 25.4.114 allows Denial-of-Service ...)
+ TODO: check
+CVE-2025-67834 (Paessler PRTG Network Monitor before 25.4.114 allows XSS by an unauthe ...)
+ TODO: check
+CVE-2025-67833 (Paessler PRTG Network Monitor before 25.4.114 allows XSS by an unauthe ...)
+ TODO: check
+CVE-2025-67399 (An issue in AIRTH SMART HOME AQI MONITOR Bootloader v.1.005 allows a p ...)
+ TODO: check
+CVE-2025-66169 (Cypher Injection vulnerability in Apache Camel camel-neo4j component. ...)
+ TODO: check
+CVE-2025-65397 (An insecure authentication mechanism in the safe_exec.sh startup scrip ...)
+ TODO: check
+CVE-2025-65396 (A vulnerability in the boot process of Blurams Flare Camera version 24 ...)
+ TODO: check
+CVE-2025-63644 (A stored cross-site scripting (XSS) vulnerability exists in pH7Softwar ...)
+ TODO: check
+CVE-2025-56226 (Libsndfile <=1.2.2 contains a memory leak vulnerability in the mpeg_l3 ...)
+ TODO: check
+CVE-2025-37185 (Vulnerabilities in the web-based management interface of EdgeConnect S ...)
+ TODO: check
+CVE-2025-37184 (A vulnerability exists in an Orchestrator service that could allow an ...)
+ TODO: check
+CVE-2025-37183 (Vulnerabilities in the web-based management interface of EdgeConnect S ...)
+ TODO: check
+CVE-2025-37182 (Vulnerabilities in the web-based management interface of EdgeConnect S ...)
+ TODO: check
+CVE-2025-37181 (Vulnerabilities in the web-based management interface of EdgeConnect S ...)
+ TODO: check
+CVE-2025-33206 (NVIDIA NSIGHT Graphics for Linux contains a vulnerability where an att ...)
+ TODO: check
+CVE-2025-14557 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2025-14556 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2025-14317 (In Crazy Bubble Tea mobile application authenticated attacker canobtai ...)
+ TODO: check
+CVE-2025-14242 (A flaw was found in vsftpd. This vulnerability allows a denial of serv ...)
+ TODO: check
+CVE-2025-13175 (Y Soft SafeQ 6 renders the Workflow Connector password field in a way ...)
+ TODO: check
+CVE-2025-0647 (In certain Arm CPUs, a CPP RCTX instruction executed on one Processing ...)
+ TODO: check
+CVE-2025-71144 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/86730ac255b0497a272704de9a1df559f5d6602e (6.19-rc4)
-CVE-2025-71143 [clk: samsung: exynos-clkout: Assign .num before accessing .hws]
+CVE-2025-71143 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux <unfixed>
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/cf33f0b7df13685234ccea7be7bfe316b60db4db (6.19-rc1)
-CVE-2025-71142 [cpuset: fix warning when disabling remote partition]
+CVE-2025-71142 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux <unfixed>
[trixie] - linux <not-affected> (Vulnerable code not present)
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/aa7d3a56a20f07978d9f401e13637a6479b13bd0 (6.19-rc4)
-CVE-2025-71141 [drm/tilcdc: Fix removal actions in case of failed probe]
+CVE-2025-71141 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux <unfixed>
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/a585c7ef9cabda58088916baedc6573e9a5cd2a7 (6.19-rc1)
-CVE-2025-71140 [media: mediatek: vcodec: Use spinlock for context list protection lock]
+CVE-2025-71140 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux <unfixed>
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/a5844227e0f030d2af2d85d4aed10c5eca6ca176 (6.19-rc1)
-CVE-2025-71139 [kernel/kexec: fix IMA when allocation happens in CMA area]
+CVE-2025-71139 (In the Linux kernel, the following vulnerability has been resolved: k ...)
- linux <unfixed>
[trixie] - linux <not-affected> (Vulnerable code not present)
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/a3785ae5d334bb71d47a593d54c686a03fb9d136 (6.19-rc4)
-CVE-2025-71138 [drm/msm/dpu: Add missing NULL pointer check for pingpong interface]
+CVE-2025-71138 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/88733a0b64872357e5ecd82b7488121503cb9cc6 (6.19-rc3)
-CVE-2025-71137 [octeontx2-pf: fix "UBSAN: shift-out-of-bounds error"]
+CVE-2025-71137 (In the Linux kernel, the following vulnerability has been resolved: o ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/85f4b0c650d9f9db10bda8d3acfa1af83bf78cf7 (6.19-rc4)
-CVE-2025-71136 [media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status()]
+CVE-2025-71136 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/8163419e3e05d71dcfa8fb49c8fdf8d76908fe51 (6.19-rc1)
-CVE-2025-71135 [md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt()]
+CVE-2025-71135 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux <unfixed>
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/7ad6ef91d8745d04aff9cce7bdbc6320d8e05fe9 (6.19-rc4)
-CVE-2025-71134 [mm/page_alloc: change all pageblocks migrate type on coalescing]
+CVE-2025-71134 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux <unfixed>
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/7838a4eb8a1d23160bd3f588ea7f2b8f7c00c55b (6.19-rc4)
-CVE-2025-71133 [RDMA/irdma: avoid invalid read in irdma_net_event]
+CVE-2025-71133 (In the Linux kernel, the following vulnerability has been resolved: R ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/6f05611728e9d0ab024832a4f1abb74a5f5d0bb0 (6.19-rc4)
-CVE-2025-71132 [smc91x: fix broken irq-context in PREEMPT_RT]
+CVE-2025-71132 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/6402078bd9d1ed46e79465e1faaa42e3458f8a33 (6.19-rc4)
-CVE-2025-71131 [crypto: seqiv - Do not use req->iv after crypto_aead_encrypt]
+CVE-2025-71131 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/50fdb78b7c0bcc550910ef69c0984e751cac72fa (6.19-rc4)
-CVE-2025-71130 [drm/i915/gem: Zero-initialize the eb.vma array in i915_gem_do_execbuffer]
+CVE-2025-71130 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/4fe2bd195435e71c117983d87f278112c5ab364c (6.19-rc4)
-CVE-2025-71129 [LoongArch: BPF: Sign extend kfunc call arguments]
+CVE-2025-71129 (In the Linux kernel, the following vulnerability has been resolved: L ...)
- linux <unfixed>
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/3f5a238f24d7b75f9efe324d3539ad388f58536e (6.19-rc4)
-CVE-2025-71128 [erspan: Initialize options_len before referencing options.]
+CVE-2025-71128 (In the Linux kernel, the following vulnerability has been resolved: e ...)
- linux <unfixed>
[trixie] - linux <not-affected> (Vulnerable code not present)
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/35ddf66c65eff93fff91406756ba273600bf61a3 (6.19-rc4)
-CVE-2025-71127 [wifi: mac80211: Discard Beacon frames to non-broadcast address]
+CVE-2025-71127 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux <unfixed>
NOTE: https://git.kernel.org/linus/193d18f60588e95d62e0f82b6a53893e5f2f19f8 (6.19-rc4)
-CVE-2025-71124 [drm/msm/a6xx: move preempt_prepare_postamble after error check]
+CVE-2025-71124 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.18.3-1
[trixie] - linux <not-affected> (Vulnerable code not present)
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/ef3b04091fd8bc737dc45312375df8625b8318e2 (6.19-rc3)
-CVE-2025-71110 [mm/slub: reset KASAN tag in defer_free() before accessing freed memory]
+CVE-2025-71110 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/53ca00a19d345197a37a1bf552e8d1e7b091666c (6.19-rc2)
-CVE-2025-71106 [fs: PM: Fix reverse check in filesystems_freeze_callback()]
+CVE-2025-71106 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/222047f68e8565c558728f792f6fef152a1d4d51 (6.19-rc1)
-CVE-2025-71103 [drm/msm: adreno: fix deferencing ifpc_reglist when not declared]
+CVE-2025-71103 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/129049d4fe22c998ae9fd1ec479fbb4ed5338c15 (6.19-rc3)
-CVE-2025-71126 [mptcp: avoid deadlock on fallback while reinjecting]
+CVE-2025-71126 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux 6.18.3-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/ffb8c27b0539dd90262d1021488e7817fae57c42 (6.19-rc2)
-CVE-2025-71125 [tracing: Do not register unsupported perf events]
+CVE-2025-71125 (In the Linux kernel, the following vulnerability has been resolved: t ...)
- linux 6.18.3-1
NOTE: https://git.kernel.org/linus/ef7f38df890f5dcd2ae62f8dbde191d72f3bebae (6.19-rc2)
-CVE-2025-71123 [ext4: fix string copying in parse_apply_sb_mount_options()]
+CVE-2025-71123 (In the Linux kernel, the following vulnerability has been resolved: e ...)
- linux 6.18.3-1
NOTE: https://git.kernel.org/linus/ee5a977b4e771cc181f39d504426dbd31ed701cc (6.19-rc1)
-CVE-2025-71122 [iommufd/selftest: Check for overflow in IOMMU_TEST_OP_ADD_RESERVED]
+CVE-2025-71122 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux 6.18.3-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/e6a973af11135439de32ece3b9cbe3bfc043bea8 (6.19-rc2)
-CVE-2025-71121 [parisc: Do not reprogram affinitiy on ASP chip]
+CVE-2025-71121 (In the Linux kernel, the following vulnerability has been resolved: p ...)
- linux 6.18.3-1
NOTE: https://git.kernel.org/linus/dca7da244349eef4d78527cafc0bf80816b261f5 (6.19-rc1)
-CVE-2025-71120 [SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf]
+CVE-2025-71120 (In the Linux kernel, the following vulnerability has been resolved: S ...)
- linux 6.18.3-1
NOTE: https://git.kernel.org/linus/d4b69a6186b215d2dc1ebcab965ed88e8d41768d (6.19-rc3)
-CVE-2025-71119 [powerpc/kexec: Enable SMT before waking offline CPUs]
+CVE-2025-71119 (In the Linux kernel, the following vulnerability has been resolved: p ...)
- linux 6.18.3-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/c2296a1e42418556efbeb5636c4fa6aa6106713a (6.19-rc3)
-CVE-2025-71118 [ACPICA: Avoid walking the Namespace if start_node is NULL]
+CVE-2025-71118 (In the Linux kernel, the following vulnerability has been resolved: A ...)
- linux 6.18.3-1
NOTE: https://git.kernel.org/linus/9d6c58dae8f6590c746ac5d0012ffe14a77539f0 (6.19-rc1)
-CVE-2025-71117 [block: Remove queue freezing from several sysfs store callbacks]
+CVE-2025-71117 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.18.3-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/935a20d1bebf6236076785fac3ff81e3931834e9 (6.19-rc1)
-CVE-2025-71116 [libceph: make decode_pool() more resilient against corrupted osdmaps]
+CVE-2025-71116 (In the Linux kernel, the following vulnerability has been resolved: l ...)
- linux 6.18.3-1
NOTE: https://git.kernel.org/linus/8c738512714e8c0aa18f8a10c072d5b01c83db39 (6.19-rc1)
-CVE-2025-71115 [um: init cpu_tasks[] earlier]
+CVE-2025-71115 (In the Linux kernel, the following vulnerability has been resolved: u ...)
- linux 6.18.3-1
NOTE: https://git.kernel.org/linus/7b5d4416964c07c902163822a30a622111172b01 (6.19-rc1)
-CVE-2025-71114 [via_wdt: fix critical boot hang due to unnamed resource allocation]
+CVE-2025-71114 (In the Linux kernel, the following vulnerability has been resolved: v ...)
- linux 6.18.3-1
NOTE: https://git.kernel.org/linus/7aa31ee9ec92915926e74731378c009c9cc04928 (6.19-rc1)
-CVE-2025-71113 [crypto: af_alg - zero initialize memory allocated via sock_kmalloc]
+CVE-2025-71113 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux 6.18.3-1
NOTE: https://git.kernel.org/linus/6f6e309328d53a10c0fe1f77dec2db73373179b6 (6.19-rc1)
-CVE-2025-71112 [net: hns3: add VLAN id validation before using]
+CVE-2025-71112 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.18.3-1
NOTE: https://git.kernel.org/linus/6ef935e65902bfed53980ad2754b06a284ea8ac1 (6.19-rc2)
-CVE-2025-71111 [hwmon: (w83791d) Convert macros to functions to avoid TOCTOU]
+CVE-2025-71111 (In the Linux kernel, the following vulnerability has been resolved: h ...)
- linux 6.18.3-1
NOTE: https://git.kernel.org/linus/670d7ef945d3a84683594429aea6ab2cdfa5ceb4 (6.19-rc1)
-CVE-2025-71109 [MIPS: ftrace: Fix memory corruption when kernel is located beyond 32 bits]
+CVE-2025-71109 (In the Linux kernel, the following vulnerability has been resolved: M ...)
- linux 6.18.3-1
NOTE: https://git.kernel.org/linus/36dac9a3dda1f2bae343191bc16b910c603cac25 (6.19-rc1)
-CVE-2025-71108 [usb: typec: ucsi: Handle incorrect num_connectors capability]
+CVE-2025-71108 (In the Linux kernel, the following vulnerability has been resolved: u ...)
- linux 6.18.3-1
NOTE: https://git.kernel.org/linus/30cd2cb1abf4c4acdb1ddb468c946f68939819fb (6.19-rc1)
-CVE-2025-71107 [f2fs: ensure node page reads complete before f2fs_put_super() finishes]
+CVE-2025-71107 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- linux 6.18.3-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/297baa4aa263ff8f5b3d246ee16a660d76aa82c4 (6.19-rc1)
-CVE-2025-71105 [f2fs: use global inline_xattr_slab instead of per-sb slab cache]
+CVE-2025-71105 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- linux 6.18.3-1
NOTE: https://git.kernel.org/linus/1f27ef42bb0b7c0740c5616ec577ec188b8a1d05 (6.19-rc1)
-CVE-2025-71104 [KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer]
+CVE-2025-71104 (In the Linux kernel, the following vulnerability has been resolved: K ...)
- linux 6.18.3-1
NOTE: https://git.kernel.org/linus/18ab3fc8e880791aa9f7c000261320fc812b5465 (6.19-rc1)
-CVE-2025-71102 [scs: fix a wrong parameter in __scs_magic]
+CVE-2025-71102 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.18.3-1
NOTE: https://git.kernel.org/linus/08bd4c46d5e63b78e77f2605283874bbe868ab19 (6.19-rc1)
CVE-2026-23478 (Cal.com is open-source scheduling software. From 3.1.6 to before 6.0.7 ...)
@@ -393,7 +509,8 @@ CVE-2022-50936 (WBCE CMS version 1.5.2 contains an authenticated remote code exe
NOT-FOR-US: WBCE CMS
CVE-2022-50935 (Flame II HSPA USB Modem contains an unquoted service path vulnerabilit ...)
NOT-FOR-US: Flame II HSPA USB Modem
-CVE-2022-50934 (Wing FTP Server versions 4.3.8 and below contain an authenticated remo ...)
+CVE-2022-50934
+ REJECTED
NOT-FOR-US: Wing FTP Server
CVE-2022-50933 (Cain & Abel 4.9.56 contains an unquoted service path vulnerability tha ...)
NOT-FOR-US: Cain & Abel
@@ -485,7 +602,8 @@ CVE-2022-50890 (Owlfiles File Manager 12.0.1 contains a path traversal vulnerabi
NOT-FOR-US: Owlfiles File Manager
CVE-2022-50808 (CoolerMaster MasterPlus 1.8.5 contains an unquoted service path vulner ...)
NOT-FOR-US: CoolerMaster MasterPlus
-CVE-2022-50807 (Concrete5 CMS version 9.1.3 contains an XPath injection vulnerability ...)
+CVE-2022-50807
+ REJECTED
TODO: check
CVE-2022-50806 (4images 1.9 contains a remote command execution vulnerability that all ...)
NOT-FOR-US: 4images
@@ -1663,9 +1781,9 @@ CVE-2025-52694 (Successful exploitation of the SQL injection vulnerability could
NOT-FOR-US: Advantech
CVE-2025-14579 (The Quiz Maker WordPress plugin before 6.7.0.89 does not sanitise and ...)
NOT-FOR-US: WordPress plugin
-CVE-2025-14338
+CVE-2025-14338 (Polkit authentication dis isabled by default and a race condition in t ...)
NOT-FOR-US: InputPlumber
-CVE-2025-66005
+CVE-2025-66005 (Lack of authorization of the InputManager D-Bus interface in InputPlum ...)
NOT-FOR-US: InputPlumber
CVE-2025-14525
NOT-FOR-US: KubeVirt
@@ -1872,7 +1990,7 @@ CVE-2025-65091 (XWiki Full Calendar Macro displays objects from the wiki on the
NOT-FOR-US: XWiki
CVE-2025-65090 (XWiki Full Calendar Macro displays objects from the wiki on the calend ...)
NOT-FOR-US: XWiki
-CVE-2025-62487 (### Details On October 1, 2025, Palantir discovered that images upload ...)
+CVE-2025-62487 (On October 1, 2025, Palantir discovered that images uploaded through t ...)
NOT-FOR-US: Palantir
CVE-2025-61686 (React Router is a router for React. In @react-router/node versions 7.0 ...)
NOT-FOR-US: React Router
@@ -1908,15 +2026,15 @@ CVE-2025-14943 (The Blog2Social: Social Media Auto Post & Scheduler plugin for W
NOT-FOR-US: WordPress plugin
CVE-2025-13457 (The WooCommerce Square plugin for WordPress is vulnerable to Insecure ...)
NOT-FOR-US: WordPress plugin
-CVE-2026-22198 (GestSup versions up to and including 3.2.56 contain a pre-authenticati ...)
+CVE-2026-22198 (GestSup versions prior to3.2.60 contain a pre-authentication stored cr ...)
NOT-FOR-US: GestSup
-CVE-2026-22197 (GestSup versions up to and including 3.2.56 contain multiple SQL injec ...)
+CVE-2026-22197 (GestSup versions prior to3.2.60 contain multiple SQL injection vulnera ...)
NOT-FOR-US: GestSup
-CVE-2026-22196 (GestSup versions up to and including 3.2.56 contain a SQL injection vu ...)
+CVE-2026-22196 (GestSup versions prior to3.2.60 contain a SQL injection vulnerability ...)
NOT-FOR-US: GestSup
-CVE-2026-22195 (GestSup versions up to and including 3.2.56 contain a SQL injection vu ...)
+CVE-2026-22195 (GestSup versions prior to3.2.60 contain a SQL injection vulnerability ...)
NOT-FOR-US: GestSup
-CVE-2026-22194 (GestSup versions up to and including 3.2.56 contain a cross-site reque ...)
+CVE-2026-22194 (GestSup versions up to and including 3.2.60 contain a cross-site reque ...)
NOT-FOR-US: GestSup
CVE-2026-22082 (This vulnerability exists in Tenda wireless routers (300Mbps Wireless ...)
NOT-FOR-US: Tenda
@@ -2716,7 +2834,7 @@ CVE-2025-13761 (GitLab has remediated an issue in GitLab CE/EE affecting all ver
- gitlab <not-affected> (Vulnerable code not present)
CVE-2025-9222 (GitLab has remediated an issue in GitLab CE/EE affecting all versions ...)
- gitlab <not-affected> (Vulnerable code not present)
-CVE-2025-67859
+CVE-2025-67859 (A Improper Authentication vulnerability in TLP allows local users to a ...)
- tlp 1.9.1-1 (bug #1125019)
[trixie] - tlp <not-affected> (Vulnerable code not yet present)
[bookworm] - tlp <not-affected> (Vulnerable code not yet present)
@@ -7819,6 +7937,7 @@ CVE-2025-13417 (The Plugin Organizer WordPress plugin before 10.2.4 does not san
CVE-2025-14269
NOT-FOR-US: Headlamp
CVE-2025-68973 (In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments ...)
+ {DLA-4437-1}
- gnupg2 2.4.8-5 (bug #1124221)
[trixie] - gnupg2 2.4.7-21+deb13u1
[bookworm] - gnupg2 2.2.40-1.1+deb12u2
@@ -9338,6 +9457,7 @@ CVE-2018-25128 (SOCA Access Control System 180612 contains multiple SQL injectio
CVE-2018-25127 (SOCA Access Control System 180612 contains a cross-site request forger ...)
NOT-FOR-US: SOCA Access Control System
CVE-2025-68734 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ {DLA-4436-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -10304,6 +10424,7 @@ CVE-2021-47720 (Orangescrum 1.8.0 contains an authenticated SQL injection vulner
CVE-2021-47716 (Orangescrum 1.8.0 contains multiple cross-site scripting vulnerabiliti ...)
NOT-FOR-US: OrangeScrum
CVE-2025-68343 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -10323,6 +10444,7 @@ CVE-2025-68340 (In the Linux kernel, the following vulnerability has been resolv
[trixie] - linux 6.12.63-1
NOTE: https://git.kernel.org/linus/0ae9cfc454ea5ead5f3ddbdfe2e70270d8e2c8ef (6.18)
CVE-2025-68339 (In the Linux kernel, the following vulnerability has been resolved: a ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -10496,12 +10618,14 @@ CVE-2025-68332 (In the Linux kernel, the following vulnerability has been resolv
[trixie] - linux 6.12.63-1
NOTE: https://git.kernel.org/linus/72262330f7b3ad2130e800cecf02adcce3c32c77 (6.19-rc1)
CVE-2025-68331 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux 5.10.247-1
NOTE: https://git.kernel.org/linus/26d56a9fcb2014b99e654127960aa0a48a391e3c (6.18)
CVE-2025-68330 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -10513,12 +10637,14 @@ CVE-2025-68329 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/b042fdf18e89a347177a49e795d8e5184778b5b6 (6.18)
CVE-2025-68328 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux 5.10.247-1
NOTE: https://git.kernel.org/linus/d0fcf70c680e4d1669fcb3a8632f41400b9a73c2 (6.18)
CVE-2025-68327 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12361,6 +12487,7 @@ CVE-2025-68322 (In the Linux kernel, the following vulnerability has been resolv
[trixie] - linux 6.12.63-1
NOTE: https://git.kernel.org/linus/fd9f30d1038ee1624baa17a6ff11effe5f7617cb (6.18-rc5)
CVE-2025-68321 (In the Linux kernel, the following vulnerability has been resolved: p ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12409,6 +12536,7 @@ CVE-2025-68313 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/607b9fb2ce248cc5b633c5949e0153838992c152 (6.18-rc4)
CVE-2025-68312 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12421,6 +12549,7 @@ CVE-2025-68311 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/3fc36ae6abd263a5cbf93b2f5539eccc1fc753f7 (6.18-rc1)
CVE-2025-68310 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12433,12 +12562,14 @@ CVE-2025-68309 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/0a27bdb14b028fed30a10cec2f945c38cb5ca4fa (6.18-rc1)
CVE-2025-68308 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux 5.10.247-1
NOTE: https://git.kernel.org/linus/0c73772cd2b8cc108d5f5334de89ad648d89b9ec (6.18)
CVE-2025-68307 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12460,17 +12591,20 @@ CVE-2025-68304 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/79a2d4678ba90bdba577dc3af88cc900d6dcd5ee (6.18)
CVE-2025-68303 (In the Linux kernel, the following vulnerability has been resolved: p ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/9b9c0adbc3f8a524d291baccc9d0c04097fb4869 (6.18)
CVE-2025-68302 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux 5.10.247-1
NOTE: https://git.kernel.org/linus/f5bce28f6b9125502abec4a67d68eabcd24b3b17 (6.18)
CVE-2025-68301 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12505,6 +12639,7 @@ CVE-2025-68296 (In the Linux kernel, the following vulnerability has been resolv
[trixie] - linux 6.12.63-1
NOTE: https://git.kernel.org/linus/eb76d0f5553575599561010f24c277cc5b31d003 (6.18)
CVE-2025-68295 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12534,53 +12669,62 @@ CVE-2025-68291 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/f07f4ea53e22429c84b20832fa098b5ecc0d4e35 (6.18)
CVE-2025-68290 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux 5.10.247-1
NOTE: https://git.kernel.org/linus/baadf2a5c26e802a46573eaad331b427b49aaa36 (6.18)
CVE-2025-68289 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux 5.10.247-1
NOTE: https://git.kernel.org/linus/e4f5ce990818d37930cd9fb0be29eee0553c59d9 (6.18)
CVE-2025-68288 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux 5.10.247-1
NOTE: https://git.kernel.org/linus/41e99fe2005182139b1058db71f0d241f8f0078c (6.18)
CVE-2025-68287 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux 5.10.247-1
NOTE: https://git.kernel.org/linus/e4037689a366743c4233966f0e74bc455820d316 (6.18)
CVE-2025-68286 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux 5.10.247-1
NOTE: https://git.kernel.org/linus/3ce62c189693e8ed7b3abe551802bbc67f3ace54 (6.18)
CVE-2025-68285 (In the Linux kernel, the following vulnerability has been resolved: l ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux 5.10.247-1
NOTE: https://git.kernel.org/linus/076381c261374c587700b3accf410bdd2dba334e (6.18)
CVE-2025-68284 (In the Linux kernel, the following vulnerability has been resolved: l ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/7fce830ecd0a0256590ee37eb65a39cbad3d64fc (6.18)
CVE-2025-68283 (In the Linux kernel, the following vulnerability has been resolved: l ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/ec3797f043756a94ea2d0f106022e14ac4946c02 (6.18)
CVE-2025-68282 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12691,18 +12835,21 @@ CVE-2025-68247 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/e0fd4d42e27f761e9cc82801b3f183e658dc749d (6.18-rc6)
CVE-2025-68246 (In the Linux kernel, the following vulnerability has been resolved: k ...)
+ {DLA-4436-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/98a5fd31cbf72d46bf18e50b3ab0ce86d5f319a9 (6.18-rc6)
CVE-2025-68245 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ {DLA-4436-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux 5.10.247-1
NOTE: https://git.kernel.org/linus/49c8d2c1f94cc2f4d1a108530d7ba52614b874c2 (6.18-rc6)
CVE-2025-68244 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ {DLA-4436-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12721,6 +12868,7 @@ CVE-2025-68242 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/b623390045a81fc559decb9bfeb79319721d3dfb (6.18-rc6)
CVE-2025-68241 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ {DLA-4436-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12736,12 +12884,14 @@ CVE-2025-68239 (In the Linux kernel, the following vulnerability has been resolv
- linux 6.17.9-1
NOTE: https://git.kernel.org/linus/90f601b497d76f40fa66795c3ecf625b6aced9fd (6.18-rc7)
CVE-2025-68238 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ {DLA-4436-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux 5.10.247-1
NOTE: https://git.kernel.org/linus/5c56bf214af85ca042bf97f8584aab2151035840 (6.18-rc7)
CVE-2025-68237 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ {DLA-4436-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12763,6 +12913,7 @@ CVE-2025-68234 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/46447367a52965e9d35f112f5b26fc8ff8ec443d (6.18-rc7)
CVE-2025-68233 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ {DLA-4436-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12775,6 +12926,7 @@ CVE-2025-68232 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/5442a9da69789741bfda39f34ee7f69552bf0c56 (6.18-rc7)
CVE-2025-68231 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ {DLA-4436-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12786,6 +12938,7 @@ CVE-2025-68230 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/eb6e7f520d6efa4d4ebf1671455abe4a681f7a05 (6.18-rc5)
CVE-2025-68229 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ {DLA-4436-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12798,6 +12951,7 @@ CVE-2025-68228 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/cead55e24cf9e092890cf51c0548eccd7569defa (6.18-rc7)
CVE-2025-68227 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ {DLA-4436-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12834,6 +12988,7 @@ CVE-2025-68221 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/92e239e36d600002559074994a545fcfac9afd2d (6.18-rc7)
CVE-2025-68220 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ {DLA-4436-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12845,12 +13000,14 @@ CVE-2025-68219 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/7e4d9120cfa413dd34f4f434befc5dbe6c38b2e5 (6.18-rc7)
CVE-2025-68218 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ {DLA-4436-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/6d87cd5335784351280f82c47cc8a657271929c3 (6.18-rc7)
CVE-2025-68217 (In the Linux kernel, the following vulnerability has been resolved: I ...)
+ {DLA-4436-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12869,6 +13026,7 @@ CVE-2025-68215 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/23a5b9b12de9dcd15ebae4f1abc8814ec1c51ab0 (6.18-rc7)
CVE-2025-68214 (In the Linux kernel, the following vulnerability has been resolved: t ...)
+ {DLA-4436-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12921,6 +13079,7 @@ CVE-2025-68205 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/82420bd4e17bdaba8453fbf9e10c58c9ed0c9727 (6.18-rc6)
CVE-2025-68204 (In the Linux kernel, the following vulnerability has been resolved: p ...)
+ {DLA-4436-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12940,6 +13099,7 @@ CVE-2025-68201 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/5d55ed19d4190d2c210ac05ac7a53f800a8c6fe5 (6.18-rc2)
CVE-2025-68200 (In the Linux kernel, the following vulnerability has been resolved: b ...)
+ {DLA-4436-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12970,6 +13130,7 @@ CVE-2025-68195 (In the Linux kernel, the following vulnerability has been resolv
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/f1fdffe0afea02ba783acfe815b6a60e7180df40 (6.18-rc5)
CVE-2025-68194 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -12981,12 +13142,14 @@ CVE-2025-68193 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/ee4b32220a6b41e71512e8804585325e685456ba (6.18-rc1)
CVE-2025-68192 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux 5.10.247-1
NOTE: https://git.kernel.org/linus/e120f46768d98151ece8756ebd688b0e43dc8b29 (6.18-rc5)
CVE-2025-68191 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -13019,6 +13182,7 @@ CVE-2025-68186 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/aa997d2d2a0b2e76f4df0f1f12829f02acb4fb6b (6.18-rc5)
CVE-2025-68185 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -13066,12 +13230,14 @@ CVE-2025-68178 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/5d726c4dbeeddef612e6bed27edd29733f4d13af (6.18-rc1)
CVE-2025-68177 (In the Linux kernel, the following vulnerability has been resolved: c ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux 5.10.247-1
NOTE: https://git.kernel.org/linus/592532a77b736b5153e0c2e4c74aa50af0a352ab (6.18-rc1)
CVE-2025-68176 (In the Linux kernel, the following vulnerability has been resolved: P ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -13088,6 +13254,7 @@ CVE-2025-68174 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/45da20e00d5da842e17dfc633072b127504f0d0e (6.18-rc1)
CVE-2025-68173 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -13099,6 +13266,7 @@ CVE-2025-68172 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/3c9bf72cc1ced1297b235f9422d62b613a3fdae9 (6.18-rc4)
CVE-2025-68171 (In the Linux kernel, the following vulnerability has been resolved: x ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -13117,6 +13285,7 @@ CVE-2025-68169 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/327c20c21d80e0d87834b392d83ae73c955ad8ff (6.18-rc5)
CVE-2025-68168 (In the Linux kernel, the following vulnerability has been resolved: j ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -13462,6 +13631,7 @@ CVE-2025-46295 (Apache Commons Text versions prior to 1.10.0 included interpolat
CVE-2025-46294 (To enhance security, the FileMaker Server 22.0.4 installer now include ...)
NOT-FOR-US: Apple
CVE-2025-40363 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -13476,6 +13646,7 @@ CVE-2025-40362 (In the Linux kernel, the following vulnerability has been resolv
CVE-2025-40361
REJECTED
CVE-2025-40360 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -14524,6 +14695,7 @@ CVE-2024-58299 (PCMan FTP Server 2.0 contains a buffer overflow vulnerability in
CVE-2024-14010 (Typora 1.7.4 contains a command injection vulnerability in the PDF exp ...)
NOT-FOR-US: Typora
CVE-2025-40345 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ {DLA-4436-1}
- linux 6.17.11-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -16528,7 +16700,7 @@ CVE-2025-62734 (Cross-Site Request Forgery (CSRF) vulnerability in Michael Revel
NOT-FOR-US: WordPress plugin or theme
CVE-2025-62733 (Cross-Site Request Forgery (CSRF) vulnerability in ProteusThemes Custo ...)
NOT-FOR-US: WordPress plugin or theme
-CVE-2025-62631 (An insufficient session expiration vulnerability [CWE-613] in Fortinet ...)
+CVE-2025-62631 (An insufficient session expiration vulnerability [CWE-613] vulnerabili ...)
NOT-FOR-US: Fortinet
CVE-2025-62573 (Use after free in Windows DirectX allows an authorized attacker to ele ...)
NOT-FOR-US: Microsoft
@@ -16642,7 +16814,7 @@ CVE-2025-61078 (Cross-site scripting (XSS) vulnerability in Request IP form in p
- phpipam <itp> (bug #731713)
CVE-2025-61075 (Multiple Incorrect Access Control vulnerabilities in adata Software Gm ...)
NOT-FOR-US: adata Software GmbH Mitarbeiterportal
-CVE-2025-61074 (A stored Cross Site Scripting (XSS) vulnherability in the bulletin boa ...)
+CVE-2025-61074 (A stored Cross Site Scripting (XSS) vulnerability in the bulletin boar ...)
NOT-FOR-US: adata Software GmbH Mitarbeiter Portal
CVE-2025-60024 (Multiple Improper Limitations of a Pathname to a Restricted Directory ...)
NOT-FOR-US: Fortinet
@@ -17105,17 +17277,19 @@ CVE-2025-40344 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/845f716dc5f354c719f6fda35048b6c2eca99331 (6.18-rc4)
CVE-2025-40343 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/f2537be4f8421f6495edfa0bc284d722f253841d (6.18-rc1)
CVE-2025-40342 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/891cdbb162ccdb079cd5228ae43bdeebce8597ad (6.18-rc1)
CVE-2025-40341 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -17159,7 +17333,7 @@ CVE-2025-40332 (In the Linux kernel, the following vulnerability has been resolv
[trixie] - linux 6.12.63-1
NOTE: https://git.kernel.org/linus/7574f30337e19045f03126b4c51f525b84e5049e (6.18-rc1)
CVE-2025-40331 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -18323,24 +18497,25 @@ CVE-2025-40326 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/4f76435fd517981f01608678c06ad9718a86ee98 (6.18-rc4)
CVE-2025-40324 (In the Linux kernel, the following vulnerability has been resolved: N ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/abb1f08a2121dd270193746e43b2a9373db9ad84 (6.18-rc4)
CVE-2025-40323 (In the Linux kernel, the following vulnerability has been resolved: f ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/a1f3058930745d2b938b6b4f5bd9630dc74b26b7 (6.18-rc4)
CVE-2025-40322 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/18c4ef4e765a798b47980555ed665d78b71aeadf (6.18-rc4)
CVE-2025-40321 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -18352,19 +18527,20 @@ CVE-2025-40320 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/5c76f9961c170552c1d07c830b5e145475151600 (6.18-rc4)
CVE-2025-40319 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/4e9077638301816a7d73fa1e1b4c1db4a7e3b59c (6.18-rc4)
CVE-2025-40318 (In the Linux kernel, the following vulnerability has been resolved: B ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/09b0cd1297b4dbfe736aeaa0ceeab2265f47f772 (6.18-rc4)
CVE-2025-40317 (In the Linux kernel, the following vulnerability has been resolved: r ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -18376,24 +18552,26 @@ CVE-2025-40316 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/926d002e6d7e2f1fd5c1b53cf6208153ee7d380d (6.18-rc4)
CVE-2025-40315 (In the Linux kernel, the following vulnerability has been resolved: u ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/cfd6f1a7b42f62523c96d9703ef32b0dbc495ba4 (6.18-rc1)
CVE-2025-40314 (In the Linux kernel, the following vulnerability has been resolved: u ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/87c5ff5615dc0a37167e8faf3adeeddc6f1344a3 (6.18-rc1)
CVE-2025-40313 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/4e8011ffec79717e5fdac43a7e79faf811a384b7 (6.18-rc1)
CVE-2025-40312 (In the Linux kernel, the following vulnerability has been resolved: j ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -18407,13 +18585,13 @@ CVE-2025-40310 (In the Linux kernel, the following vulnerability has been resolv
[trixie] - linux 6.12.63-1
NOTE: https://git.kernel.org/linus/99d7181bca34e96fbf61bdb6844918bdd4df2814 (6.18-rc1)
CVE-2025-40309 (In the Linux kernel, the following vulnerability has been resolved: B ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/ecb9a843be4d6fd710d7026e359f21015a062572 (6.18-rc1)
CVE-2025-40308 (In the Linux kernel, the following vulnerability has been resolved: B ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -18423,7 +18601,7 @@ CVE-2025-40307 (In the Linux kernel, the following vulnerability has been resolv
[trixie] - linux 6.12.63-1
NOTE: https://git.kernel.org/linus/79c1587b6cda74deb0c86fc7ba194b92958c793c (6.18-rc1)
CVE-2025-40306 (In the Linux kernel, the following vulnerability has been resolved: o ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -18435,7 +18613,7 @@ CVE-2025-40305 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/e8fe3f07a357c39d429e02ca34f740692d88967a (6.18-rc1)
CVE-2025-40304 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -18451,6 +18629,7 @@ CVE-2025-40302 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/27afd6e066cfd80ddbe22a4a11b99174ac89cced (6.18-rc5)
CVE-2025-40301 (In the Linux kernel, the following vulnerability has been resolved: B ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -18469,6 +18648,7 @@ CVE-2025-40298 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/329d050bbe63c2999f657cf2d3855be11a473745 (6.18-rc5)
CVE-2025-40297 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -18487,18 +18667,21 @@ CVE-2025-40295 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/1e39da974ce621ed874c6d3aaf65ad14848c9f0d (6.18-rc5)
CVE-2025-40294 (In the Linux kernel, the following vulnerability has been resolved: B ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/8d59fba49362c65332395789fd82771f1028d87e (6.18-rc5)
CVE-2025-40293 (In the Linux kernel, the following vulnerability has been resolved: i ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/cb30dfa75d55eced379a42fd67bd5fb7ec38555e (6.18-rc5)
CVE-2025-40292 (In the Linux kernel, the following vulnerability has been resolved: v ...)
+ {DLA-4436-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -18540,6 +18723,7 @@ CVE-2025-40289 (In the Linux kernel, the following vulnerability has been resolv
[trixie] - linux 6.12.63-1
NOTE: https://git.kernel.org/linus/33cc891b56b93cad1a83263eaf2e417436f70c82 (6.18-rc2)
CVE-2025-40288 (In the Linux kernel, the following vulnerability has been resolved: d ...)
+ {DLA-4436-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -18549,60 +18733,64 @@ CVE-2025-40287 (In the Linux kernel, the following vulnerability has been resolv
[trixie] - linux 6.12.63-1
NOTE: https://git.kernel.org/linus/82ebecdc74ff555daf70b811d854b1f32a296bea (6.18-rc2)
CVE-2025-40286 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ {DLA-4436-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/6fced056d2cc8d01b326e6fcfabaacb9850b71a4 (6.18-rc2)
CVE-2025-40285 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ {DLA-4436-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/379510a815cb2e64eb0a379cb62295d6ade65df0 (6.18-rc2)
CVE-2025-40284 (In the Linux kernel, the following vulnerability has been resolved: B ...)
+ {DLA-4436-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/55fb52ffdd62850d667ebed842815e072d3c9961 (6.18-rc6)
CVE-2025-40283 (In the Linux kernel, the following vulnerability has been resolved: B ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/23d22f2f71768034d6ef86168213843fc49bf550 (6.18-rc6)
CVE-2025-40282 (In the Linux kernel, the following vulnerability has been resolved: B ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/3b78f50918276ab28fb22eac9aa49401ac436a3b (6.18-rc6)
CVE-2025-40281 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/1534ff77757e44bcc4b98d0196bc5c0052fce5fa (6.18-rc6)
CVE-2025-40280 (In the Linux kernel, the following vulnerability has been resolved: t ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/0725e6afb55128be21a2ca36e9674f573ccec173 (6.18-rc6)
CVE-2025-40279 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ {DLA-4436-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/62b656e43eaeae445a39cd8021a4f47065af4389 (6.18-rc6)
CVE-2025-40278 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/ce50039be49eea9b4cd8873ca6eccded1b4a130a (6.18-rc6)
CVE-2025-40277 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -18613,7 +18801,7 @@ CVE-2025-40276 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/576c930e5e7dcb937648490611a83f1bf0171048 (6.18-rc6)
CVE-2025-40275 (In the Linux kernel, the following vulnerability has been resolved: A ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -18625,19 +18813,20 @@ CVE-2025-40274 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/ae431059e75d36170a5ae6b44cc4d06d43613215 (6.18-rc6)
CVE-2025-40273 (In the Linux kernel, the following vulnerability has been resolved: N ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/4aa17144d5abc3c756883e3a010246f0dba8b468 (6.18-rc6)
CVE-2025-40272 (In the Linux kernel, the following vulnerability has been resolved: m ...)
+ {DLA-4436-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/6f86d0534fddfbd08687fa0f01479d4226bc3c3d (6.18-rc6)
CVE-2025-40271 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -18649,7 +18838,7 @@ CVE-2025-40270 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/1c2a936edd71e133f2806e68324ec81a4eb07588 (6.18-rc6)
CVE-2025-40269 (In the Linux kernel, the following vulnerability has been resolved: A ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -19357,25 +19546,25 @@ CVE-2025-40265 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/63b5aa01da0f38cdbd97d021477258e511631497 (6.18-rc7)
CVE-2025-40264 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/7d277a7a58578dd62fd546ddaef459ec24ccae36 (6.18-rc7)
CVE-2025-40263 (In the Linux kernel, the following vulnerability has been resolved: I ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/e08969c4d65ac31297fcb4d31d4808c789152f68 (6.18-rc7)
CVE-2025-40262 (In the Linux kernel, the following vulnerability has been resolved: I ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/d83f1512758f4ef6fc5e83219fe7eeeb6b428ea4 (6.18-rc7)
CVE-2025-40261 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -19387,19 +19576,19 @@ CVE-2025-40260 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/7b6216baae751369195fa3c83d434d23bcda406a (6.18-rc7)
CVE-2025-40259 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/90449f2d1e1f020835cba5417234636937dd657e (6.18-rc7)
CVE-2025-40258 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/035bca3f017ee9dea3a5a756e77a6f7138cc6eea (6.18-rc7)
CVE-2025-40257 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -19417,18 +19606,20 @@ CVE-2025-40255 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/f796a8dec9beafcc0f6f0d3478ed685a15c5e062 (6.18-rc7)
CVE-2025-40254 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/dfe28c4167a9259fc0c372d9f9473e1ac95cff67 (6.18-rc7)
CVE-2025-40253 (In the Linux kernel, the following vulnerability has been resolved: s ...)
+ {DLA-4436-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux <ignored> (s390 not supported in LTS)
NOTE: https://git.kernel.org/linus/da02a1824884d6c84c5e5b5ac373b0c9e3288ec2 (6.18-rc7)
CVE-2025-40252 (In the Linux kernel, the following vulnerability has been resolved: n ...)
+ {DLA-4436-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -19451,7 +19642,7 @@ CVE-2025-40249 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/d4cd0902c156b2ca60fdda8cd8b5bcb4b0e9ed64 (6.18-rc7)
CVE-2025-40248 (In the Linux kernel, the following vulnerability has been resolved: v ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -19671,6 +19862,7 @@ CVE-2025-40215 (In the Linux kernel, the following vulnerability has been resolv
[trixie] - linux 6.12.63-1
NOTE: https://git.kernel.org/linus/b441cf3f8c4b8576639d20c8eb4aa32917602ecd (6.16)
CVE-2025-40214 (In the Linux kernel, the following vulnerability has been resolved: a ...)
+ {DLA-4436-1}
- linux 6.17.9-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -21970,7 +22162,7 @@ CVE-2024-14015 (The WordPress eCommerce Plugin WordPress plugin through 2.9.0 d
NOT-FOR-US: WordPress plugin
CVE-2025-54515 (The Secure Flag passed to Versal\u2122Adaptive SoC\u2019s Trusted Firm ...)
NOT-FOR-US: AMD
-CVE-2025-48507 (The security state of the calling processor into Arm\xae Trusted Firmw ...)
+CVE-2025-48507 (The security state of the calling processor into Trusted Firmware (TF- ...)
NOT-FOR-US: AMD
CVE-2025-13567 (A vulnerability was detected in itsourcecode COVID Tracking System 1.0 ...)
NOT-FOR-US: itsourcecode System
@@ -22355,7 +22547,7 @@ CVE-2025-10054 (The ELEX WordPress HelpDesk & Customer Ticketing System plugin f
CVE-2025-10039 (The ELEX WordPress HelpDesk & Customer Ticketing System plugin for Wor ...)
NOT-FOR-US: WordPress plugin
CVE-2025-40211 (In the Linux kernel, the following vulnerability has been resolved: A ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.17.8-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -23007,6 +23199,7 @@ CVE-2025-12349 (The Icegram Express - Email Subscribers, Newsletters and Marketi
CVE-2025-12174 (The Directorist: AI-Powered Business Directory Plugin with Classified ...)
NOT-FOR-US: WordPress plugin
CVE-2025-12119 (A mongoc_bulk_operation_t may read invalid memory if large options are ...)
+ {DLA-4438-1}
- mongo-c-driver 2.1.2-1
[trixie] - mongo-c-driver 1.30.4-1+deb13u1
[bookworm] - mongo-c-driver 1.23.1-1+deb12u2
@@ -23218,11 +23411,11 @@ CVE-2025-55179 (Incomplete validation of rich response messages in WhatsApp for
NOT-FOR-US: WhatsApp
CVE-2025-55074 (Mattermost versions 10.11.x <= 10.11.3, 10.5.x <= 10.5.11 fail to enfo ...)
- mattermost-server <itp> (bug #823556)
-CVE-2025-54972 (An improper neutralization of crlf sequences ('crlf injection') in For ...)
+CVE-2025-54972 (An improper neutralization of crlf sequences ('crlf injection') vulner ...)
NOT-FOR-US: Fortinet
CVE-2025-54971 (An exposure of sensitive information to an unauthorized actor vulnerab ...)
NOT-FOR-US: Fortinet
-CVE-2025-54821 (An Improper Privilege Management vulnerability [CWE-269] in Fortinet F ...)
+CVE-2025-54821 (An Improper Privilege Management vulnerability [CWE-269] vulnerability ...)
NOT-FOR-US: Fortinet
CVE-2025-54771 (A use-after-free vulnerability has been identified in the GNU GRUB (Gr ...)
- grub2 <unfixed> (bug #1120968)
@@ -24436,7 +24629,7 @@ CVE-2025-2615 (GitLab has remediated an issue in GitLab CE/EE affecting all vers
- gitlab <unfixed>
CVE-2025-11865 (An issue has been discovered in GitLab EE affecting all versions from ...)
- gitlab <not-affected> (Specific to EE)
-CVE-2025-11224
+CVE-2025-11224 (GitLab has remediated an issue in GitLab CE/EE affecting all versions ...)
- gitlab <unfixed>
CVE-2025-12818 (Integer wraparound in multiple PostgreSQL libpq client library functio ...)
{DLA-4420-1}
@@ -29275,7 +29468,7 @@ CVE-2025-40084 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/6f40e50ceb99fc8ef37e5c56e2ec1d162733fef0 (6.18-rc4)
CVE-2025-40083 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.16.3-1
[trixie] - linux 6.12.57-1
[bookworm] - linux 6.1.159-1
@@ -34339,7 +34532,7 @@ CVE-2025-54891 (Improper Neutralization of Input During Web Page Generation (XSS
NOT-FOR-US: Centreon
CVE-2025-54889 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
NOT-FOR-US: Centreon
-CVE-2025-54822 (An improper authorization vulnerability [CWE-285] in Fortinet FortiOS ...)
+CVE-2025-54822 (An improper authorization vulnerability [CWE-285] vulnerability in For ...)
NOT-FOR-US: Fortinet
CVE-2025-54603 (An incorrect OIDC authentication flow in Claroty Secure Access 3.3.0 t ...)
NOT-FOR-US: Claroty Secure Access
@@ -34381,7 +34574,7 @@ CVE-2025-50152 (Out-of-bounds read in Windows Kernel allows an authorized attack
NOT-FOR-US: Microsoft
CVE-2025-49708 (Use after free in Microsoft Graphics Component allows an authorized at ...)
NOT-FOR-US: Microsoft
-CVE-2025-49201 (A weak authentication in Fortinet FortiPAM 1.5.0, 1.4.0 through 1.4.2, ...)
+CVE-2025-49201 (A weak authentication vulnerability in Fortinet FortiPAM 1.5.0, FortiP ...)
NOT-FOR-US: Fortinet
CVE-2025-48813 (Use of a key past its expiration date in Virtual Secure Mode allows an ...)
NOT-FOR-US: Microsoft
@@ -34391,7 +34584,7 @@ CVE-2025-47989 (Improper access control in Azure Connected Machine Agent allows
NOT-FOR-US: Microsoft
CVE-2025-47979 (Insertion of sensitive information into log file in Windows Failover C ...)
NOT-FOR-US: Microsoft
-CVE-2025-47890 (An URL Redirection to Untrusted Site vulnerabilities [CWE-601] in Fort ...)
+CVE-2025-47890 (An URL Redirection to Untrusted Site vulnerabilities [CWE-601] vulnera ...)
NOT-FOR-US: Fortinet
CVE-2025-47856 (Two improper neutralization of special elements used in an OS command ...)
NOT-FOR-US: Fortinet
@@ -34568,7 +34761,7 @@ CVE-2024-50571 (A heap-based buffer overflow in Fortinet FortiOS 7.6.0 through 7
NOT-FOR-US: Fortinet
CVE-2024-48891 (An Improper Neutralization of Special Elements used in an OS Command ( ...)
NOT-FOR-US: Fortinet
-CVE-2024-47569 (A insertion of sensitive information into sent data in Fortinet FortiM ...)
+CVE-2024-47569 (A insertion of sensitive information into sent data vulnerability in F ...)
NOT-FOR-US: Fortinet
CVE-2024-44088 (Malicious script injection ('Cross-site Scripting') vulnerability in A ...)
NOT-FOR-US: Apache software not packaged in Debian
@@ -45272,7 +45465,7 @@ CVE-2025-39806 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/0379eb8691b9c4477da0277ae0832036ca4410b4 (6.17-rc4)
CVE-2025-39805 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- {DSA-6008-1}
+ {DSA-6008-1 DLA-4436-1}
- linux 6.16.5-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -51235,7 +51428,7 @@ CVE-2025-9865 (Inappropriate implementation in Toolbar in Google Chrome on Andro
CVE-2025-9864
REJECTED
CVE-2025-38678 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.16.3-1
[trixie] - linux 6.12.63-1
[bookworm] - linux 6.1.159-1
@@ -55685,6 +55878,7 @@ CVE-2025-38594 (In the Linux kernel, the following vulnerability has been resolv
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/f0b9d31c6edd50a6207489cd1bd4ddac814b9cd2 (6.17-rc1)
CVE-2025-38593 (In the Linux kernel, the following vulnerability has been resolved: B ...)
+ {DLA-4436-1}
- linux 6.16.3-1
[trixie] - linux 6.12.43-1
[bookworm] - linux 6.1.159-1
@@ -55881,7 +56075,7 @@ CVE-2025-38557 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/1bb3363da862e0464ec050eea2fb5472a36ad86b (6.17-rc1)
CVE-2025-38556 (In the Linux kernel, the following vulnerability has been resolved: H ...)
- {DSA-6008-1}
+ {DSA-6008-1 DLA-4436-1}
- linux 6.16.3-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd (6.17-rc1)
@@ -58448,7 +58642,7 @@ CVE-2024-41980 (A vulnerability has been identified in SmartClient modules Opcen
NOT-FOR-US: Siemens
CVE-2024-41979 (A vulnerability has been identified in SmartClient modules Opcenter QL ...)
NOT-FOR-US: Siemens
-CVE-2024-40588 (Multiple relative path traversal vulnerabilities [CWE-23] in Fortinet ...)
+CVE-2024-40588 (Multiple relative path traversal vulnerabilities [CWE-23] vulnerabilit ...)
NOT-FOR-US: Fortinet
CVE-2024-38805 (EDK2 contains a vulnerability in BIOS where a user may cause an Intege ...)
- edk2 2025.02-9 (bug #1111100)
@@ -58460,7 +58654,7 @@ CVE-2024-33607 (Out-of-bounds read in some Intel(R) TDX module software before v
NOT-FOR-US: Intel
CVE-2024-26009 (An authentication bypass using an alternate path or channel [CWE-288] ...)
NOT-FOR-US: Fortinet
-CVE-2023-45584 (A double free vulnerability [CWE-415] in Fortinet FortiOS version 7.4. ...)
+CVE-2023-45584 (A double free vulnerability [CWE-415] vulnerability in Fortinet FortiO ...)
NOT-FOR-US: Fortinet
CVE-2025-38500 (In the Linux kernel, the following vulnerability has been resolved: x ...)
{DSA-5975-1 DLA-4328-1}
@@ -74699,6 +74893,7 @@ CVE-2025-38058 (In the Linux kernel, the following vulnerability has been resolv
- linux 6.12.32-1
NOTE: https://git.kernel.org/linus/250cf3693060a5f803c5f1ddc082bb06b16112a9 (6.15-rc6)
CVE-2025-38057 (In the Linux kernel, the following vulnerability has been resolved: e ...)
+ {DLA-4436-1}
- linux 6.12.32-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/63c1f19a3be3169e51a5812d22a6d0c879414076 (6.15)
@@ -77183,7 +77378,7 @@ CVE-2025-22455 (A hardcoded key in Ivanti Workspace Control before version 10.19
NOT-FOR-US: Ivanti
CVE-2025-22256 (A improper handling of insufficient permissions or privileges in Forti ...)
NOT-FOR-US: Fortinet
-CVE-2025-22254 (An Improper Privilege Management vulnerability [CWE-269] affecting For ...)
+CVE-2025-22254 (An Improper Privilege Management vulnerability [CWE-269] vulnerability ...)
NOT-FOR-US: Fortinet
CVE-2025-22251 (An improper restriction of communication channel to intended endpoints ...)
NOT-FOR-US: Fortinet
@@ -82674,6 +82869,7 @@ CVE-2025-37900 (In the Linux kernel, the following vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/30a3f2f3e4bd6335b727c83c08a982d969752bc1 (6.15-rc5)
CVE-2025-37899 (In the Linux kernel, the following vulnerability has been resolved: k ...)
+ {DLA-4436-1}
- linux 6.12.29-1
[bookworm] - linux 6.1.159-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -85119,7 +85315,7 @@ CVE-2025-33024 (A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All
NOT-FOR-US: Siemens
CVE-2025-32917 (Privilege escalation in jar_signature agent plugin in Checkmk versions ...)
- check-mk <removed>
-CVE-2025-32756 (A stack-based buffer overflow vulnerability [CWE-121] in Fortinet Fort ...)
+CVE-2025-32756 (A stack-based buffer overflow vulnerability [CWE-121] vulnerability in ...)
NOT-FOR-US: Fortinet
CVE-2025-32709 (Use after free in Windows Ancillary Function Driver for WinSock allows ...)
NOT-FOR-US: Microsoft
@@ -117647,7 +117843,7 @@ CVE-2024-11771 (Path traversal in Ivanti CSA before version 5.0.5 allows a remot
NOT-FOR-US: Ivanti
CVE-2024-10644 (Code injection in Ivanti Connect Secure before version 22.7R2.4 and Iv ...)
NOT-FOR-US: Ivanti
-CVE-2023-40721 (A use of externally-controlled format string vulnerability [CWE-134] i ...)
+CVE-2023-40721 (A use of externally-controlled format string vulnerability [CWE-134] v ...)
NOT-FOR-US: FortiGuard
CVE-2023-37482 (The login functionality of the web server in affected devices does not ...)
NOT-FOR-US: Siemens
@@ -154349,7 +154545,7 @@ CVE-2024-47667 (In the Linux kernel, the following vulnerability has been resolv
[bookworm] - linux 6.1.112-1
NOTE: https://git.kernel.org/linus/86f271f22bbb6391410a07e08d6ca3757fda01fa (6.11-rc1)
CVE-2024-47666 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- {DLA-4404-1}
+ {DLA-4436-1 DLA-4404-1}
- linux 6.10.11-1
[bookworm] - linux 6.1.159-1
NOTE: https://git.kernel.org/linus/e4f949ef1516c0d74745ee54a0f4882c1f6c7aea (6.11-rc1)
@@ -161096,7 +161292,7 @@ CVE-2024-32006 (A vulnerability has been identified in SINEMA Remote Connect Cli
NOT-FOR-US: Siemens
CVE-2024-31960 (An issue was discovered in Samsung Mobile Processor Exynos 1480, Exyno ...)
NOT-FOR-US: Samsung
-CVE-2024-31490 (An exposure of sensitive information to an unauthorized actor in Forti ...)
+CVE-2024-31490 (An exposure of sensitive information to an unauthorized actor vulnerab ...)
NOT-FOR-US: Fortinet
CVE-2024-31489 (AAn improper certificate validation vulnerability [CWE-295] in FortiCl ...)
NOT-FOR-US: Fortinet
@@ -194230,7 +194426,7 @@ CVE-2024-32002 (Git is a revision control system. Prior to versions 2.45.1, 2.44
NOTE: Fixed by: https://github.com/git/git/commit/97065761333fd62db1912d81b489db938d8c991d
CVE-2024-31980 (A vulnerability has been identified in Parasolid V35.1 (All versions < ...)
NOT-FOR-US: Siemens
-CVE-2024-31491 (A client-side enforcement of server-side security in Fortinet FortiSan ...)
+CVE-2024-31491 (A client-side enforcement of server-side security vulnerability in For ...)
NOT-FOR-US: FortiGuard
CVE-2024-31488 (An improper neutralization of inputs during web page generation vulner ...)
NOT-FOR-US: FortiGuard
@@ -215484,7 +215680,7 @@ CVE-2023-42790 (A stack-based buffer overflow in Fortinet FortiOS 7.4.0 through
NOT-FOR-US: FortiGuard
CVE-2023-42789 (A out-of-bounds write in Fortinet FortiOS 7.4.0 through 7.4.1, 7.2.0 t ...)
NOT-FOR-US: FortiGuard
-CVE-2023-41842 (A use of externally-controlled format string vulnerability [CWE-134] i ...)
+CVE-2023-41842 (A use of externally-controlled format string vulnerability [CWE-134] v ...)
NOT-FOR-US: FortiGuard
CVE-2023-41313 (The authentication method in Apache Doris versions before 2.0.0 was vu ...)
NOT-FOR-US: Apache Doris
@@ -371488,7 +371684,7 @@ CVE-2022-23441 (A use of hard-coded cryptographic key vulnerability [CWE-321] in
NOT-FOR-US: Fortinet
CVE-2022-23440 (A use of hard-coded cryptographic key vulnerability [CWE-321] in the r ...)
NOT-FOR-US: Fortinet
-CVE-2022-23439 (A externally controlled reference to a resource in another sphere in F ...)
+CVE-2022-23439 (A externally controlled reference to a resource in another sphere vuln ...)
NOT-FOR-US: FortiGuard
CVE-2022-23438 (An improper neutralization of input during web page generation ('Cross ...)
NOT-FOR-US: Fortinet
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2f27744599f3109ddb93db61a6203fdaf1f03167
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/2f27744599f3109ddb93db61a6203fdaf1f03167
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260114/c84a94f4/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list