Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
68681698 by security tracker role at 2026-03-13T20:13:36+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,4 +1,430 @@
-CVE-2026-4105
+CVE-2026-4111 (A flaw was identified in the RAR5 archive decompression logic 
of the l ...)
+       TODO: check
+CVE-2026-4092 (Path Traversal in Clasp impacting versions < 3.2.0 allows a 
remote att ...)
+       TODO: check
+CVE-2026-4063 (The Social Icons Widget & Block by WPZOOM plugin for WordPress 
is vuln ...)
+       TODO: check
+CVE-2026-3999 (A broken access control may allow an authenticated user to 
perform a   ...)
+       TODO: check
+CVE-2026-3986 (The Calculated Fields Form plugin for WordPress is vulnerable 
to Store ...)
+       TODO: check
+CVE-2026-3873 (Use of Hard-coded Credentials vulnerability in Avantra allows 
Accessin ...)
+       TODO: check
+CVE-2026-32746 (telnetd in GNU inetutils through 2.7 allows an out-of-bounds 
write in  ...)
+       TODO: check
+CVE-2026-32745 (In JetBrains Datalore before 2026.1 session hijacking was 
possible due ...)
+       TODO: check
+CVE-2026-32600 (xml-security is a library that implements XML signatures and 
encryptio ...)
+       TODO: check
+CVE-2026-32594 (Parse Server is an open source backend that can be deployed to 
any inf ...)
+       TODO: check
+CVE-2026-32543 (Missing Authorization vulnerability in CyberChimps Responsive 
Blocks r ...)
+       TODO: check
+CVE-2026-32487 (Missing Authorization vulnerability in raratheme Lawyer 
Landing Page l ...)
+       TODO: check
+CVE-2026-32486 (Missing Authorization vulnerability in wptravelengine Travel 
Booking t ...)
+       TODO: check
+CVE-2026-32462 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32461 (Missing Authorization vulnerability in Really Simple Plugins 
Really Si ...)
+       TODO: check
+CVE-2026-32460 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32459 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2026-32458 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2026-32457 (Missing Authorization vulnerability in Wombat Plugins Advanced 
Product ...)
+       TODO: check
+CVE-2026-32456 (Cross-Site Request Forgery (CSRF) vulnerability in Janis Elsts 
Admin M ...)
+       TODO: check
+CVE-2026-32455 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32454 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32453 (Missing Authorization vulnerability in ThemeFusion Avada Core 
fusion-c ...)
+       TODO: check
+CVE-2026-32452 (Missing Authorization vulnerability in ThemeFusion Fusion 
Builder fusi ...)
+       TODO: check
+CVE-2026-32451 (Missing Authorization vulnerability in ThemeFusion Fusion 
Builder fusi ...)
+       TODO: check
+CVE-2026-32450 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32449 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32448 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32447 (Missing Authorization vulnerability in Vito Peleg Atarim 
atarim-visual ...)
+       TODO: check
+CVE-2026-32446 (Missing Authorization vulnerability in Syed Balkhi Contact 
Form by WPF ...)
+       TODO: check
+CVE-2026-32445 (Missing Authorization vulnerability in Elementor Elementor 
Website Bui ...)
+       TODO: check
+CVE-2026-32443 (Cross-Site Request Forgery (CSRF) vulnerability in Josh 
Kohlbach Produ ...)
+       TODO: check
+CVE-2026-32442 (Missing Authorization vulnerability in E2Pdf e2pdf e2pdf 
allows Exploi ...)
+       TODO: check
+CVE-2026-32440 (Missing Authorization vulnerability in Ex-Themes WP Food 
wp-food allow ...)
+       TODO: check
+CVE-2026-32439 (Missing Authorization vulnerability in WebGeniusLab BigHearts 
bigheart ...)
+       TODO: check
+CVE-2026-32438 (Missing Authorization vulnerability in vowelweb VW School 
Education vw ...)
+       TODO: check
+CVE-2026-32437 (Missing Authorization vulnerability in vowelweb VW Portfolio 
vw-portfo ...)
+       TODO: check
+CVE-2026-32436 (Missing Authorization vulnerability in vowelweb VW Photography 
vw-phot ...)
+       TODO: check
+CVE-2026-32435 (Missing Authorization vulnerability in vowelweb VW Pet Shop 
vw-pet-sho ...)
+       TODO: check
+CVE-2026-32434 (Missing Authorization vulnerability in vowelweb VW Fitness 
vw-fitness  ...)
+       TODO: check
+CVE-2026-32433 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2026-32432 (Missing Authorization vulnerability in codepeople WP Time 
Slots Bookin ...)
+       TODO: check
+CVE-2026-32431 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32430 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32429 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32428 (Missing Authorization vulnerability in Ays Pro Popup Like box 
ays-face ...)
+       TODO: check
+CVE-2026-32427 (Missing Authorization vulnerability in vowelweb VW Education 
Lite vw-e ...)
+       TODO: check
+CVE-2026-32426 (Improper Control of Filename for Include/Require Statement in 
PHP Prog ...)
+       TODO: check
+CVE-2026-32425 (Missing Authorization vulnerability in linknacional Payment 
Gateway Pi ...)
+       TODO: check
+CVE-2026-32424 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32423 (Missing Authorization vulnerability in Bowo Admin and Site 
Enhancement ...)
+       TODO: check
+CVE-2026-32422 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2026-32421 (Missing Authorization vulnerability in Agile Logix Post 
Timeline post- ...)
+       TODO: check
+CVE-2026-32420 (Cross-Site Request Forgery (CSRF) vulnerability in Ruben 
Garcia GamiPr ...)
+       TODO: check
+CVE-2026-32419 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32418 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2026-32417 (Missing Authorization vulnerability in wppochipp Pochipp 
pochipp allow ...)
+       TODO: check
+CVE-2026-32416 (Missing Authorization vulnerability in bPlugins PDF Poster 
pdf-poster  ...)
+       TODO: check
+CVE-2026-32415 (Path Traversal: '.../...//' vulnerability in Bogdan Bendziukov 
Squeeze ...)
+       TODO: check
+CVE-2026-32414 (Improper Control of Generation of Code ('Code Injection') 
vulnerabilit ...)
+       TODO: check
+CVE-2026-32413 (Missing Authorization vulnerability in Maciej Bis Permalink 
Manager Li ...)
+       TODO: check
+CVE-2026-32412 (Server-Side Request Forgery (SSRF) vulnerability in Gift Up! 
Gift Up G ...)
+       TODO: check
+CVE-2026-32411 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32410 (Missing Authorization vulnerability in WBW Plugins WBW 
Currency Switch ...)
+       TODO: check
+CVE-2026-32409 (Missing Authorization vulnerability in WPMU DEV - Your 
All-in-One Word ...)
+       TODO: check
+CVE-2026-32408 (Missing Authorization vulnerability in themefusecom Brizy 
brizy allows ...)
+       TODO: check
+CVE-2026-32407 (Missing Authorization vulnerability in WPClever WPC Smart 
Wishlist for ...)
+       TODO: check
+CVE-2026-32406 (Missing Authorization vulnerability in WPClever WPC Product 
Bundles fo ...)
+       TODO: check
+CVE-2026-32405 (Exposure of Sensitive System Information to an Unauthorized 
Control Sp ...)
+       TODO: check
+CVE-2026-32404 (Missing Authorization vulnerability in Studio99 Studio99 WP 
Monitor st ...)
+       TODO: check
+CVE-2026-32403 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32402 (Missing Authorization vulnerability in Ays Pro Image Slider by 
Ays ays ...)
+       TODO: check
+CVE-2026-32401 (Improper Control of Filename for Include/Require Statement in 
PHP Prog ...)
+       TODO: check
+CVE-2026-32400 (Improper Control of Filename for Include/Require Statement in 
PHP Prog ...)
+       TODO: check
+CVE-2026-32399 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2026-32398 (Concurrent Execution using Shared Resource with Improper 
Synchronizati ...)
+       TODO: check
+CVE-2026-32397 (Missing Authorization vulnerability in YMC Filter & Grids 
ymc-smart-fi ...)
+       TODO: check
+CVE-2026-32396 (Missing Authorization vulnerability in RadiusTheme Team 
tlp-team allow ...)
+       TODO: check
+CVE-2026-32395 (Missing Authorization vulnerability in Xpro Xpro Addons For 
Beaver Bui ...)
+       TODO: check
+CVE-2026-32394 (Missing Authorization vulnerability in PublishPress 
PublishPress Capab ...)
+       TODO: check
+CVE-2026-32393 (Improper Control of Filename for Include/Require Statement in 
PHP Prog ...)
+       TODO: check
+CVE-2026-32392 (Improper Control of Filename for Include/Require Statement in 
PHP Prog ...)
+       TODO: check
+CVE-2026-32391 (Missing Authorization vulnerability in linethemes SmartFix 
smartfix al ...)
+       TODO: check
+CVE-2026-32390 (Missing Authorization vulnerability in linethemes Nanosoft 
nanosoft al ...)
+       TODO: check
+CVE-2026-32388 (Missing Authorization vulnerability in linethemes GLB glb 
allows Explo ...)
+       TODO: check
+CVE-2026-32387 (Missing Authorization vulnerability in Noor Alam Checkout for 
PayPal c ...)
+       TODO: check
+CVE-2026-32386 (Missing Authorization vulnerability in EnvoThemes Envo Extra 
envo-extr ...)
+       TODO: check
+CVE-2026-32385 (Missing Authorization vulnerability in Metagauss 
RegistrationMagic cus ...)
+       TODO: check
+CVE-2026-32384 (Improper Control of Filename for Include/Require Statement in 
PHP Prog ...)
+       TODO: check
+CVE-2026-32383 (Missing Authorization vulnerability in raratheme Ridhi ridhi 
allows Ex ...)
+       TODO: check
+CVE-2026-32382 (Missing Authorization vulnerability in raratheme Digital 
Download digi ...)
+       TODO: check
+CVE-2026-32381 (Missing Authorization vulnerability in raratheme App Landing 
Page app- ...)
+       TODO: check
+CVE-2026-32380 (Missing Authorization vulnerability in raratheme Numinous 
numinous all ...)
+       TODO: check
+CVE-2026-32379 (Missing Authorization vulnerability in raratheme Rara Academic 
rara-ac ...)
+       TODO: check
+CVE-2026-32378 (Missing Authorization vulnerability in raratheme Book Landing 
Page boo ...)
+       TODO: check
+CVE-2026-32377 (Missing Authorization vulnerability in raratheme Pranayama 
Yoga pranay ...)
+       TODO: check
+CVE-2026-32376 (Missing Authorization vulnerability in raratheme Kalon kalon 
allows Ex ...)
+       TODO: check
+CVE-2026-32375 (Missing Authorization vulnerability in raratheme Travel 
Diaries travel ...)
+       TODO: check
+CVE-2026-32374 (Missing Authorization vulnerability in raratheme The Minimal 
the-minim ...)
+       TODO: check
+CVE-2026-32373 (Missing Authorization vulnerability in Cozy Vision SMS Alert 
Order Not ...)
+       TODO: check
+CVE-2026-32372 (Exposure of Sensitive System Information to an Unauthorized 
Control Sp ...)
+       TODO: check
+CVE-2026-32371 (Missing Authorization vulnerability in raratheme Elegant Pink 
elegant- ...)
+       TODO: check
+CVE-2026-32370 (Missing Authorization vulnerability in raratheme Influencer 
influencer ...)
+       TODO: check
+CVE-2026-32369 (Improper Control of Filename for Include/Require Statement in 
PHP Prog ...)
+       TODO: check
+CVE-2026-32368 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2026-32367 (Improper Control of Generation of Code ('Code Injection') 
vulnerabilit ...)
+       TODO: check
+CVE-2026-32366 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2026-32365 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2026-32364 (Improper Control of Filename for Include/Require Statement in 
PHP Prog ...)
+       TODO: check
+CVE-2026-32363 (Missing Authorization vulnerability in Funlus Oy WPLifeCycle 
free-php- ...)
+       TODO: check
+CVE-2026-32362 (Missing Authorization vulnerability in activity-log.com WP 
Sessions Ti ...)
+       TODO: check
+CVE-2026-32361 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32360 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32359 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32358 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2026-32357 (Server-Side Request Forgery (SSRF) vulnerability in Katsushi 
Kawamori  ...)
+       TODO: check
+CVE-2026-32356 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32355 (Deserialization of Untrusted Data vulnerability in Crocoblock 
JetEngin ...)
+       TODO: check
+CVE-2026-32354 (Insertion of Sensitive Information Into Sent Data 
vulnerability in mag ...)
+       TODO: check
+CVE-2026-32353 (Server-Side Request Forgery (SSRF) vulnerability in 
MailerPress Team M ...)
+       TODO: check
+CVE-2026-32352 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32351 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-32350 (Missing Authorization vulnerability in wpradiant Chocolate 
House choco ...)
+       TODO: check
+CVE-2026-32349 (Server-Side Request Forgery (SSRF) vulnerability in Andy 
Fragen Embed  ...)
+       TODO: check
+CVE-2026-32348 (Missing Authorization vulnerability in MadrasThemes MAS Videos 
masvide ...)
+       TODO: check
+CVE-2026-32347 (Missing Authorization vulnerability in raratheme Restaurant 
and Cafe r ...)
+       TODO: check
+CVE-2026-32346 (Missing Authorization vulnerability in raratheme Travel Agency 
travel- ...)
+       TODO: check
+CVE-2026-32345 (Missing Authorization vulnerability in raratheme Perfect 
Portfolio per ...)
+       TODO: check
+CVE-2026-32344 (Cross-Site Request Forgery (CSRF) vulnerability in 
desertthemes Corpiv ...)
+       TODO: check
+CVE-2026-32343 (Cross-Site Request Forgery (CSRF) vulnerability in Magazine3 
Easy Tabl ...)
+       TODO: check
+CVE-2026-32342 (Cross-Site Request Forgery (CSRF) vulnerability in Ays Pro 
Quiz Maker  ...)
+       TODO: check
+CVE-2026-32341 (Missing Authorization vulnerability in raratheme Benevolent 
benevolent ...)
+       TODO: check
+CVE-2026-32340 (Missing Authorization vulnerability in raratheme Business One 
Page bus ...)
+       TODO: check
+CVE-2026-32339 (Missing Authorization vulnerability in raratheme Bakes And 
Cakes bakes ...)
+       TODO: check
+CVE-2026-32338 (Missing Authorization vulnerability in raratheme Construction 
Landing  ...)
+       TODO: check
+CVE-2026-32337 (Missing Authorization vulnerability in raratheme Preschool and 
Kinderg ...)
+       TODO: check
+CVE-2026-32336 (Missing Authorization vulnerability in raratheme Rara Business 
rara-bu ...)
+       TODO: check
+CVE-2026-32335 (Missing Authorization vulnerability in raratheme The 
Conference the-co ...)
+       TODO: check
+CVE-2026-32334 (Missing Authorization vulnerability in raratheme JobScout 
jobscout all ...)
+       TODO: check
+CVE-2026-32332 (Missing Authorization vulnerability in Ays Pro Easy Form 
easy-form all ...)
+       TODO: check
+CVE-2026-32331 (Missing Authorization vulnerability in Israpil Textmetrics 
webtexttool ...)
+       TODO: check
+CVE-2026-32330 (Cross-Site Request Forgery (CSRF) vulnerability in 10Web Photo 
Gallery ...)
+       TODO: check
+CVE-2026-32329 (Missing Authorization vulnerability in Ays Pro Advanced 
Related Posts  ...)
+       TODO: check
+CVE-2026-32328 (Cross-Site Request Forgery (CSRF) vulnerability in 
shufflehound Lemmon ...)
+       TODO: check
+CVE-2026-32314 (Yamux is a stream multiplexer over reliable, ordered 
connections such  ...)
+       TODO: check
+CVE-2026-32313 (xmlseclibs is a library written in PHP for working with XML 
Encryption ...)
+       TODO: check
+CVE-2026-31949 (LibreChat is a ChatGPT clone with additional features. Prior 
to 0.8.3- ...)
+       TODO: check
+CVE-2026-31944 (LibreChat is a ChatGPT clone with additional features. From 
0.8.2 to 0 ...)
+       TODO: check
+CVE-2026-31922 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2026-31919 (Missing Authorization vulnerability in Josh Kohlbach Advanced 
Coupons  ...)
+       TODO: check
+CVE-2026-31918 (Improper Neutralization of Input During Web Page Generation 
('Cross-si ...)
+       TODO: check
+CVE-2026-31917 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
+       TODO: check
+CVE-2026-31916 (Missing Authorization vulnerability in Iulia Cazan Latest Post 
Shortco ...)
+       TODO: check
+CVE-2026-31915 (Missing Authorization vulnerability in UX-themes Flatsome 
flatsome all ...)
+       TODO: check
+CVE-2026-31899 (CairoSVG is an SVG converter based on Cairo, a 2D graphics 
library. Pr ...)
+       TODO: check
+CVE-2026-31897 (FreeRDP is a free implementation of the Remote Desktop 
Protocol. Prior ...)
+       TODO: check
+CVE-2026-31886 (Dagu is a workflow engine with a built-in Web user interface. 
Prior to ...)
+       TODO: check
+CVE-2026-31885 (FreeRDP is a free implementation of the Remote Desktop 
Protocol. Prior ...)
+       TODO: check
+CVE-2026-31884 (FreeRDP is a free implementation of the Remote Desktop 
Protocol. Prior ...)
+       TODO: check
+CVE-2026-31883 (FreeRDP is a free implementation of the Remote Desktop 
Protocol. Prior ...)
+       TODO: check
+CVE-2026-31882 (Dagu is a workflow engine with a built-in Web user interface. 
Prior to ...)
+       TODO: check
+CVE-2026-31864 (JumpServer is an open source bastion host and an operation and 
mainten ...)
+       TODO: check
+CVE-2026-31814 (Yamux is a stream multiplexer over reliable, ordered 
connections such  ...)
+       TODO: check
+CVE-2026-31806 (FreeRDP is a free implementation of the Remote Desktop 
Protocol. Prior ...)
+       TODO: check
+CVE-2026-31798 (JumpServer is an open source bastion host and an operation and 
mainten ...)
+       TODO: check
+CVE-2026-30961 (Gokapi is a self-hosted file sharing server with automatic 
expiration  ...)
+       TODO: check
+CVE-2026-30955 (Gokapi is a self-hosted file sharing server with automatic 
expiration  ...)
+       TODO: check
+CVE-2026-30943 (Gokapi is a self-hosted file sharing server with automatic 
expiration  ...)
+       TODO: check
+CVE-2026-30915 (SFTPGo is an open source, event-driven file transfer solution. 
SFTPGo  ...)
+       TODO: check
+CVE-2026-30914 (SFTPGo is an open source, event-driven file transfer solution. 
In SFTP ...)
+       TODO: check
+CVE-2026-30853 (calibre is a cross-platform e-book manager for viewing, 
converting, ed ...)
+       TODO: check
+CVE-2026-2888 (The Formidable Forms plugin for WordPress is vulnerable to an 
authoriz ...)
+       TODO: check
+CVE-2026-2879 (The GetGenie plugin for WordPress is vulnerable to Insecure 
Direct Obj ...)
+       TODO: check
+CVE-2026-2859 (Improper permission enforcement in Checkmk versions 2.4.0 
before 2.4.0 ...)
+       TODO: check
+CVE-2026-2257 (The GetGenie plugin for WordPress is vulnerable to Insecure 
Direct Obj ...)
+       TODO: check
+CVE-2026-29776 (FreeRDP is a free implementation of the Remote Desktop 
Protocol. Prior ...)
+       TODO: check
+CVE-2026-29775 (FreeRDP is a free implementation of the Remote Desktop 
Protocol. Prior ...)
+       TODO: check
+CVE-2026-29774 (FreeRDP is a free implementation of the Remote Desktop 
Protocol. Prior ...)
+       TODO: check
+CVE-2026-29079 (Lexbor is a web browser engine library. Prior to 2.7.0, a 
type\u2011co ...)
+       TODO: check
+CVE-2026-29078 (Lexbor is a web browser engine library. Prior to 2.7.0, the 
ISO\u20112 ...)
+       TODO: check
+CVE-2026-26954 (SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, 
it is p ...)
+       TODO: check
+CVE-2026-24097 (Improper permission enforcement in Checkmk versions 2.4.0 
before 2.4.0 ...)
+       TODO: check
+CVE-2026-23943 (Improper Handling of Highly Compressed Data (Compression Bomb) 
vulnera ...)
+       TODO: check
+CVE-2026-23942 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2026-23941 (Inconsistent Interpretation of HTTP Requests ('HTTP Request 
Smuggling' ...)
+       TODO: check
+CVE-2026-23940 (Uncontrolled Resource Consumption vulnerability in hexpm 
hexpm/hexpm a ...)
+       TODO: check
+CVE-2026-1668 (The web interface on multiple Omada switches does not 
adequately valid ...)
+       TODO: check
+CVE-2026-0957 (There is a memory corruption vulnerability due to an 
out-of-bounds wri ...)
+       TODO: check
+CVE-2026-0956 (There is a memory corruption vulnerability due to an 
out-of-bounds rea ...)
+       TODO: check
+CVE-2026-0955 (There is a memory corruption vulnerability due to an 
out-of-bounds rea ...)
+       TODO: check
+CVE-2026-0954 (There is a memory corruption vulnerability due to an 
out-of-bounds wri ...)
+       TODO: check
+CVE-2026-0835 (IBM Sterling B2B Integrator and IBM Sterling File Gateway 
6.1.0.0 thro ...)
+       TODO: check
+CVE-2025-71263 (In UNIX Fourth Research Edition (v4), the su command is 
vulnerable to  ...)
+       TODO: check
+CVE-2025-66249 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2025-60012 (Malicious configuration can lead to unauthorized file access 
in Apache ...)
+       TODO: check
+CVE-2025-36368 (IBM Sterling B2B Integrator and IBM Sterling File Gateway 
6.1.0.0 thro ...)
+       TODO: check
+CVE-2025-14811 (IBM Sterling Partner Engagement Manager 6.2.3.0 through 
6.2.3.5 and 6. ...)
+       TODO: check
+CVE-2025-14504 (IBM Sterling B2B Integrator and IBM Sterling File Gateway 
6.1.0.0 thro ...)
+       TODO: check
+CVE-2025-14483 (IBM Sterling B2B Integratorand IBM Sterling File 
Gateway6.1.0.0 throug ...)
+       TODO: check
+CVE-2025-13779 (Missing authentication for critical function vulnerability in 
ABB AWIN ...)
+       TODO: check
+CVE-2025-13778 (Missing authentication for critical function vulnerability in 
ABB AWIN ...)
+       TODO: check
+CVE-2025-13777 (Authentication bypass by capture-replay vulnerability in ABB 
AWIN GW10 ...)
+       TODO: check
+CVE-2025-13726 (IBM Sterling Partner Engagement Manager 6.2.3.0 through 
6.2.3.5 and 6. ...)
+       TODO: check
+CVE-2025-13723 (IBM Sterling Partner Engagement Manager 6.2.3.0 through 
6.2.3.5 and 6. ...)
+       TODO: check
+CVE-2025-13718 (IBM Sterling Partner Engagement Manager 6.2.3.0 through 
6.2.3.5 and 6. ...)
+       TODO: check
+CVE-2025-13702 (IBM Sterling Partner Engagement Manager 6.2.3.0 through 
6.2.3.5 and 6. ...)
+       TODO: check
+CVE-2025-13460 (IBM Aspera Console 3.3.0 through 3.4.8 could allow an attacker 
to enum ...)
+       TODO: check
+CVE-2025-13459 (IBM Aspera Console 3.3.0 through 3.4.8 could allow a 
privileged user t ...)
+       TODO: check
+CVE-2025-13212 (IBM Aspera Console 3.3.0 through 3.4.8 could allow an 
authenticated us ...)
+       TODO: check
+CVE-2025-12455 (Observable response discrepancy vulnerability in 
OpenText\u2122 Vertic ...)
+       TODO: check
+CVE-2025-12454 (Improper neutralization of input during web page generation 
('cross-si ...)
+       TODO: check
+CVE-2025-12453 (Improper neutralization of input during web page generation 
('cross-si ...)
+       TODO: check
+CVE-2023-40693 (IBM Sterling B2B Integratorand IBM Sterling File 
Gateway6.1.0.0 throug ...)
+       TODO: check
+CVE-2026-4105 (A flaw was found in systemd. The systemd-machined service 
contains an  ...)
        - systemd 260~rc3-1
        [trixie] - systemd <no-dsa> (Only exloitable with custom polkit policy 
that allows register-machine access)
        [bookworm] - systemd <no-dsa> (Only exloitable with custom polkit 
policy that allows register-machine access)
@@ -6,7 +432,7 @@ CVE-2026-4105
        NOTE: Introduced with: 
https://github.com/systemd/systemd/commit/fbe550738d03b178bb004a1390e74115e904118a
 (v225)
        NOTE: Fixed by: 
https://github.com/systemd/systemd/commit/6df5f80bd374be1b45c52d740e88f0236da922c7
 (v260-rc3)
        NOTE: Fixed by: 
https://github.com/systemd/systemd/commit/497d0172416cbb5b70f96b95399d041407c223bd
 (v259.4)
-CVE-2026-2673 [openssl: Fix group tuple handling in DEFAULT expansion]
+CVE-2026-2673 (Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate 
the exp ...)
        - openssl <unfixed>
        [trixie] - openssl <no-dsa> (Minor issue)
        [bookworm] - openssl <not-affected> (Only affects 3.5 and later)
@@ -26,7 +452,7 @@ CVE-2026-3611 (The Honeywell IQ4x building management 
controller, exposes its fu
        NOT-FOR-US: Honeywell
 CVE-2026-3045 (The Appointment Booking Calendar \u2014 Simply Schedule 
Appointments p ...)
        NOT-FOR-US: WordPress plugin
-CVE-2026-32612 (Statmatic is a Laravel and Git powered content management 
system (CMS) ...)
+CVE-2026-32612 (Statamic is a Laravel and Git powered content management 
system (CMS). ...)
        NOT-FOR-US: Statmatic CMS
 CVE-2026-32598 (OneUptime is a solution for monitoring and managing online 
services. P ...)
        NOT-FOR-US: OneUptime
@@ -4740,26 +5166,26 @@ CVE-2019-25499 (Simple Job Script contains an SQL 
injection vulnerability that a
 CVE-2019-25498 (Simple Job Script contains an SQL injection vulnerability that 
allows  ...)
        NOT-FOR-US: Simple Job Script
 CVE-2026-23238 (In the Linux kernel, the following vulnerability has been 
resolved:  r ...)
-       {DSA-6163-1 DSA-6162-1}
+       {DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.13-1
        NOTE: 
https://git.kernel.org/linus/ab7ad7abb3660c58ffffdf07ff3bb976e7e0afa0 (6.19-rc8)
 CVE-2026-23237 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
-       {DSA-6163-1 DSA-6162-1}
+       {DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.13-1
        NOTE: 
https://git.kernel.org/linus/fe747d7112283f47169e9c16e751179a9b38611e (6.19)
 CVE-2026-23232 (In the Linux kernel, the following vulnerability has been 
resolved:  R ...)
        - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/3996b70209f145bfcf2afc7d05dd92c27b233b48 (7.0-rc1)
 CVE-2026-23236 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
-       {DSA-6163-1 DSA-6162-1}
+       {DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.13-1
        NOTE: 
https://git.kernel.org/linus/120adae7b42faa641179270c067864544a50ab69 (7.0-rc1)
 CVE-2026-23235 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
-       {DSA-6163-1 DSA-6162-1}
+       {DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.13-1
        NOTE: 
https://git.kernel.org/linus/98ea0039dbfdd00e5cc1b9a8afa40434476c0955 (7.0-rc1)
 CVE-2026-23234 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
-       {DSA-6163-1 DSA-6162-1}
+       {DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.13-1
        NOTE: 
https://git.kernel.org/linus/ce2739e482bce8d2c014d76c4531c877f382aa54 (7.0-rc1)
 CVE-2026-23233 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
@@ -4769,7 +5195,7 @@ CVE-2026-23233 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/5c145c03188bc9ba1c29e0bc4d527a5978fc47f9 (7.0-rc1)
 CVE-2025-71238 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
-       {DSA-6163-1 DSA-6162-1}
+       {DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.13-1
        NOTE: 
https://git.kernel.org/linus/c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0 (7.0-rc1)
 CVE-2026-23231 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
@@ -10596,16 +11022,16 @@ CVE-2025-13602
 CVE-2025-11185 (The Complianz \u2013 GDPR/CCPA Cookie Consent plugin for 
WordPress is  ...)
        NOT-FOR-US: WordPress plugin
 CVE-2026-23230 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1}
        - linux 6.18.12-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/ec306600d5ba7148c9dbf8f5a8f1f5c1a044a241 (7.0-rc1)
 CVE-2026-23229 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.12-1
        NOTE: 
https://git.kernel.org/linus/b505047ffc8057555900d2d3a005d033e6967382 (7.0-rc1)
 CVE-2026-23228 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1}
        - linux 6.18.12-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/77ffbcac4e569566d0092d5f22627dfc0896b553 (7.0-rc1)
@@ -10632,28 +11058,28 @@ CVE-2026-23223 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/1c253e11225bc5167217897885b85093e17c2217 (7.0-rc1)
 CVE-2026-23222 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.12-1
        NOTE: 
https://git.kernel.org/linus/1562b1fb7e17c1b3addb15e125c718b2be7f5512 (7.0-rc1)
 CVE-2026-23221 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
-       {DSA-6163-1 DSA-6162-1}
+       {DSA-6163-1 DSA-6162-1 DLA-4499-1}
        - linux 6.18.12-1
        NOTE: 
https://git.kernel.org/linus/148891e95014b5dc5878acefa57f1940c281c431 (7.0-rc1)
 CVE-2026-23220 (In the Linux kernel, the following vulnerability has been 
resolved:  k ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1}
        - linux 6.18.12-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/010eb01ce23b34b50531448b0da391c7f05a72af (7.0-rc1)
 CVE-2025-71237 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.12-1
        NOTE: 
https://git.kernel.org/linus/ed527ef0c264e4bed6c7b2a158ddf516b17f5f66 (7.0-rc1)
 CVE-2025-71236 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.12-1
        NOTE: 
https://git.kernel.org/linus/b6df15aec8c3441357d4da0eaf4339eb20f5999f (7.0-rc1)
 CVE-2025-71235 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.12-1
        NOTE: 
https://git.kernel.org/linus/8890bf450e0b6b283f48ac619fca5ac2f14ddd62 (7.0-rc1)
 CVE-2025-71234 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
@@ -10663,12 +11089,12 @@ CVE-2025-71234 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/86c946bcc00f6390ef65e9614ae60a9377e454f8 (7.0-rc1)
 CVE-2025-71233 (In the Linux kernel, the following vulnerability has been 
resolved:  P ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1}
        - linux 6.18.12-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/7c5c7d06bd1f86d2c3ebe62be903a4ba42db4d2c (7.0-rc1)
 CVE-2025-71232 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.12-1
        NOTE: 
https://git.kernel.org/linus/7adbd2b7809066c75f0433e5e2a8e114b429f30f (7.0-rc1)
 CVE-2025-71231 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
@@ -10707,7 +11133,7 @@ CVE-2026-23217 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/b0d7f5f0c9f05f1b6d4ee7110f15bef9c11f9df0 (6.19-rc5)
 CVE-2026-23216 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.10-1
        NOTE: 
https://git.kernel.org/linus/9411a89e9e7135cc459178fa77a3f1d6191ae903 (6.19-rc7)
 CVE-2026-23215 (In the Linux kernel, the following vulnerability has been 
resolved:  x ...)
@@ -11464,7 +11890,7 @@ CVE-2026-23210 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/fc6f36eaaedcf4b81af6fe1a568f018ffd530660 (6.19)
 CVE-2026-23209 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.10-1
        NOTE: 
https://git.kernel.org/linus/f8db6475a83649689c087a8f52486fcc53e627e9 (6.19)
 CVE-2026-23208 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
@@ -11475,12 +11901,12 @@ CVE-2026-23207 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/edf9088b6e1d6d88982db7eb5e736a0e4fbcc09e (6.19)
 CVE-2026-23206 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1}
        - linux 6.18.10-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/ed48a84a72fefb20a82dd90a7caa7807e90c6f66 (6.19)
 CVE-2026-23205 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1}
        - linux 6.18.10-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/e3a43633023e3cacaca60d4b8972d084a2b06236 (6.19)
@@ -11489,7 +11915,7 @@ CVE-2026-23204 (In the Linux kernel, the following 
vulnerability has been resolv
        - linux 6.18.10-1
        NOTE: 
https://git.kernel.org/linus/cabd1a976375780dabab888784e356f574bbaed8 (6.19)
 CVE-2026-23202 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1}
        - linux 6.18.10-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/bf4528ab28e2bf112c3a2cdef44fd13f007781cd (6.19)
@@ -11512,7 +11938,7 @@ CVE-2026-23199 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/b5cbacd7f86f4f62b8813688c8e73be94e8e1951 (6.19)
 CVE-2026-23198 (In the Linux kernel, the following vulnerability has been 
resolved:  K ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.10-1
        NOTE: 
https://git.kernel.org/linus/b4d37cdb77a0015f51fee083598fa227cc07aaf1 (6.19)
 CVE-2026-23196 (In the Linux kernel, the following vulnerability has been 
resolved:  H ...)
@@ -11522,7 +11948,7 @@ CVE-2026-23196 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/a9a917998d172ec117f9e9de1919174153c0ace4 (6.19-rc5)
 CVE-2026-23193 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.10-1
        NOTE: 
https://git.kernel.org/linus/84dc6037390b8607c5551047d3970336cb51ba9a (6.19-rc7)
 CVE-2026-23191 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
@@ -11530,7 +11956,7 @@ CVE-2026-23191 (In the Linux kernel, the following 
vulnerability has been resolv
        - linux 6.18.10-1
        NOTE: 
https://git.kernel.org/linus/826af7fa62e347464b1b4e0ba2fe19a92438084f (6.19)
 CVE-2026-23190 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.10-1
        NOTE: 
https://git.kernel.org/linus/7f67ba5413f98d93116a756e7f17cd2c1d6c2bd6 (6.19)
 CVE-2026-23189 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
@@ -11546,12 +11972,12 @@ CVE-2026-23188 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/6d06bc83a5ae8777a5f7a81c32dd75b8d9b2fe04 (6.19)
 CVE-2026-23187 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1}
        - linux 6.18.10-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/6bd8b4a92a901fae1a422e6f914801063c345e8d (6.19)
 CVE-2026-23182 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1}
        - linux 6.18.10-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/41d9a6795b95d6ea28439ac1e9ce8c95bbca20fc (6.19)
@@ -11562,7 +11988,7 @@ CVE-2026-23181 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/3f29d661e5686f3aa14e6f11537ff5c49846f2e2 (6.19-rc7)
 CVE-2026-23180 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1}
        - linux 6.18.10-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/31a7a0bbeb006bac2d9c81a2874825025214b6d8 (6.19)
@@ -11573,7 +11999,7 @@ CVE-2026-23179 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/2fa8961d3a6a1c2395d8d560ffed2c782681bade (6.19-rc6)
 CVE-2026-23178 (In the Linux kernel, the following vulnerability has been 
resolved:  H ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1}
        - linux 6.18.10-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/2497ff38c530b1af0df5130ca9f5ab22c5e92f29 (6.19-rc5)
@@ -11584,11 +12010,11 @@ CVE-2026-23177 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/2030dddf95451b4e7a389f052091e7c4b7b274c6 (6.19)
 CVE-2026-23176 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.10-1
        NOTE: 
https://git.kernel.org/linus/128497456756e1b952bd5a912cd073836465109d (6.19)
 CVE-2025-71224 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.10-1
        NOTE: 
https://git.kernel.org/linus/ff4071c60018a668249dc6a2df7d16330543540e (6.19-rc4)
 CVE-2025-71223 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
@@ -11598,14 +12024,14 @@ CVE-2025-71223 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/f416c556997aa56ec4384c6b6efd6a0e6ac70aa7 (6.19-rc4)
 CVE-2025-71222 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.10-1
        NOTE: 
https://git.kernel.org/linus/e75665dd096819b1184087ba5718bd93beafff51 (6.19-rc4)
 CVE-2025-71221 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
        - linux 6.18.10-1
        NOTE: 
https://git.kernel.org/linus/a143545855bc2c6e1330f6f57ae375ac44af00a7 (6.19-rc6)
 CVE-2025-71220 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1}
        - linux 6.18.10-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/7c28f8eef5ac5312794d8a52918076dcd787e53b (6.19-rc4)
@@ -11764,7 +12190,7 @@ CVE-2026-23171 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/e9acda52fd2ee0cdca332f996da7a95c5fd25294 (6.19-rc8)
 CVE-2026-23169 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1}
        - linux 6.18.9-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/e2a9eeb69f7d4ca4cf4c70463af77664fdb6ab1d (6.19-rc8)
@@ -12324,11 +12750,11 @@ CVE-2026-2441 (Use after free in CSS in Google Chrome 
prior to 145.0.7632.75 all
        - chromium 145.0.7632.75-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-23112 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
        - linux 6.18.10-1
        NOTE: 
https://git.kernel.org/linus/52a0a98549344ca20ad81a4176d68d28e3c05a5c (6.19)
 CVE-2026-23111 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1}
        - linux 6.18.10-1
        NOTE: 
https://git.kernel.org/linus/f41c5d151078c5348271ffaf8e7410d96f2d82f8 (6.19)
 CVE-2026-26257
@@ -13815,11 +14241,11 @@ CVE-2026-1603 (An authentication bypass in Ivanti 
Endpoint Manager before versio
        NOT-FOR-US: Ivanti
 CVE-2026-1602 (SQL injection in Ivanti Endpoint Manager before version 2024 
SU5 allow ...)
        NOT-FOR-US: Ivanti
-CVE-2026-0653 (On TP-Link Tapo C260 v1, aguest\u2011level authenticated user 
can bypa ...)
+CVE-2026-0653 (On TP-Link Tapo C260 v1 and D235 v1, aguest\u2011level 
authenticated u ...)
        NOT-FOR-US: TP-Link
 CVE-2026-0652 (On TP-Link Tapo C260 v1, command injection vulnerability exists 
due to ...)
        NOT-FOR-US: TP-Link
-CVE-2026-0651 (On TP-Link Tapo C260 v1, path traversal is possible due to 
improper ha ...)
+CVE-2026-0651 (On TP-Link Tapo C260 v1 and D235 v1, path traversal is possible 
due to ...)
        NOT-FOR-US: TP-Link
 CVE-2025-7636 (Improper Neutralization of Special Elements used in an SQL 
Command ('S ...)
        NOT-FOR-US: ZEUS PDKS
@@ -23923,7 +24349,7 @@ CVE-2025-13175 (Y Soft SafeQ 6 renders the Workflow 
Connector password field in
 CVE-2025-0647 (In certain Arm CPUs, a CPP RCTX instruction executed on one 
Processing ...)
        NOT-FOR-US: Arm
 CVE-2025-71144 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
-       {DSA-6163-1 DSA-6126-1}
+       {DSA-6163-1 DSA-6126-1 DLA-4499-1}
        - linux 6.18.5-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/86730ac255b0497a272704de9a1df559f5d6602e (6.19-rc4)
@@ -24995,7 +25421,7 @@ CVE-2025-71090 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/8072e34e1387d03102b788677d491e2bcceef6f5 (6.19-rc4)
 CVE-2025-71089 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
-       {DSA-6163-1 DSA-6126-1}
+       {DSA-6163-1 DSA-6126-1 DLA-4499-1}
        - linux 6.18.5-1
        NOTE: 
https://git.kernel.org/linus/72f98ef9a4be30d2a60136dd6faee376f780d06c (6.19-rc1)
 CVE-2025-71088 (In the Linux kernel, the following vulnerability has been 
resolved:  m ...)
@@ -33892,7 +34318,7 @@ CVE-2025-68357 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/7fd8720dff2d9c70cf5a1a13b7513af01952ec02 (6.19-rc1)
 CVE-2025-68358 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
-       {DSA-6163-1 DSA-6126-1}
+       {DSA-6163-1 DSA-6126-1 DLA-4499-1}
        - linux 6.17.13-1
        NOTE: 
https://git.kernel.org/linus/38e818718c5e04961eea0fa8feff3f100ce40408 (6.19-rc1)
 CVE-2025-68359 (In the Linux kernel, the following vulnerability has been 
resolved:  b ...)
@@ -43772,7 +44198,7 @@ CVE-2025-40252 (In the Linux kernel, the following 
vulnerability has been resolv
        [bookworm] - linux 6.1.159-1
        NOTE: 
https://git.kernel.org/linus/896f1a2493b59beb2b5ccdf990503dbb16cb2256 (6.18-rc7)
 CVE-2025-40251 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
-       {DSA-6163-1}
+       {DSA-6163-1 DLA-4499-1}
        - linux 6.17.10-1
        [trixie] - linux 6.12.63-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -53853,7 +54279,7 @@ CVE-2025-12380 (Starting with Firefox 142, it was 
possible for a compromised chi
 CVE-2025-12103 (A flaw was found in Red Hat Openshift AI Service. The TrustyAI 
compone ...)
        NOT-FOR-US: Red Hat Openshift AI Service
 CVE-2025-40082 (In the Linux kernel, the following vulnerability has been 
resolved:  h ...)
-       {DSA-6163-1 DSA-6141-1}
+       {DSA-6163-1 DSA-6141-1 DLA-4499-1}
        - linux 6.17.6-1
        NOTE: 
https://git.kernel.org/linus/bea3e1d4467bcf292c8e54f080353d556d355e26 (6.18-rc1)
 CVE-2025-40081 (In the Linux kernel, the following vulnerability has been 
resolved:  p ...)
@@ -61478,6 +61904,7 @@ CVE-2022-50517 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/71e2d666ef85d51834d658830f823560c402b8b6 (6.1-rc2)
 CVE-2022-50516 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
+       {DLA-4498-1}
        - linux 6.0.3-1
        NOTE: 
https://git.kernel.org/linus/7175e131ebba47afef47e6ac4d5bab474d1e6e49 (6.1-rc1)
 CVE-2022-50515 (In the Linux kernel, the following vulnerability has been 
resolved:  d ...)
@@ -68309,7 +68736,7 @@ CVE-2023-53425 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux 5.10.197-1
        NOTE: 
https://git.kernel.org/linus/3df55cd773e8603b623425cc97b05e542854ad27 (6.5-rc1)
 CVE-2023-53424 (In the Linux kernel, the following vulnerability has been 
resolved:  c ...)
-       {DSA-6163-1}
+       {DSA-6163-1 DLA-4499-1}
        - linux 6.4.4-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/3db7285e044144fd88a356f5b641b9cd4b231a77 (6.5-rc1)
@@ -72359,7 +72786,7 @@ CVE-2025-39764 (In the Linux kernel, the following 
vulnerability has been resolv
        - linux 6.16.3-1
        NOTE: 
https://git.kernel.org/linus/1492e3dcb2be3aa46d1963da96aa9593e4e4db5a (6.17-rc2)
 CVE-2025-39763 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
-       {DSA-6163-1}
+       {DSA-6163-1 DLA-4499-1}
        - linux 6.16.3-1
        [trixie] - linux 6.12.43-1
        NOTE: 
https://git.kernel.org/linus/79a5ae3c4c5eb7e38e0ebe4d6bf602d296080060 (6.17-rc1)
@@ -78681,7 +79108,7 @@ CVE-2025-38644 (In the Linux kernel, the following 
vulnerability has been resolv
        [bookworm] - linux 6.1.148-1
        NOTE: 
https://git.kernel.org/linus/16ecdab5446f15a61ec88eb0d23d25d009821db0 (6.17-rc1)
 CVE-2025-38643 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
-       {DSA-6163-1}
+       {DSA-6163-1 DLA-4499-1}
        - linux 6.16.3-1
        [trixie] - linux 6.12.57-1
        NOTE: 
https://git.kernel.org/linus/2c5dee15239f3f3e31aa5c8808f18996c039e2c1 (6.17-rc1)
@@ -93914,7 +94341,7 @@ CVE-2025-38202 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/d4965578267e2e81f67c86e2608481e77e9c8569 (6.16-rc1)
 CVE-2025-38201 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
-       {DSA-6163-1}
+       {DSA-6163-1 DLA-4499-1 DLA-4498-1}
        - linux 6.12.35-1
        NOTE: 
https://git.kernel.org/linus/b85e3367a5716ed3662a4fe266525190d2af76df (6.16-rc1)
 CVE-2025-38200 (In the Linux kernel, the following vulnerability has been 
resolved:  i ...)
@@ -107023,7 +107450,7 @@ CVE-2025-37921 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/087a9eb9e5978e3ba362e1163691e41097e8ca20 (6.15-rc5)
 CVE-2025-37920 (In the Linux kernel, the following vulnerability has been 
resolved:  x ...)
-       {DSA-6163-1}
+       {DSA-6163-1 DLA-4499-1}
        - linux 6.12.29-1
        NOTE: 
https://git.kernel.org/linus/a1356ac7749cafc4e27aa62c0c4604b5dca4983e (6.15-rc5)
 CVE-2025-37919 (In the Linux kernel, the following vulnerability has been 
resolved:  A ...)
@@ -111192,7 +111619,7 @@ CVE-2025-37823 (In the Linux kernel, the following 
vulnerability has been resolv
        [bookworm] - linux 6.1.137-1
        NOTE: 
https://git.kernel.org/linus/6ccbda44e2cc3d26fd22af54c650d6d5d801addf (6.15-rc4)
 CVE-2025-37822 (In the Linux kernel, the following vulnerability has been 
resolved:  r ...)
-       {DSA-6163-1}
+       {DSA-6163-1 DLA-4499-1}
        - linux 6.12.27-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/7d1d19a11cfbfd8bae1d89cc010b2cc397cd0c48 (6.15-rc4)
@@ -114153,7 +114580,7 @@ CVE-2025-37787 (In the Linux kernel, the following 
vulnerability has been resolv
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/c84f6ce918a9e6f4996597cbc62536bbf2247c96 (6.15-rc3)
 CVE-2025-37786 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
-       {DSA-6163-1}
+       {DSA-6163-1 DLA-4499-1}
        - linux 6.12.25-1
        NOTE: 
https://git.kernel.org/linus/8bf108d7161ffc6880ad13a0cc109de3cf631727 (6.15-rc3)
 CVE-2025-37784 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
@@ -114421,7 +114848,7 @@ CVE-2025-23156 (In the Linux kernel, the following 
vulnerability has been resolv
        [bookworm] - linux 6.1.135-1
        NOTE: 
https://git.kernel.org/linus/9edaaa8e3e15aab1ca413ab50556de1975bcb329 (6.15-rc1)
 CVE-2025-23155 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
-       {DSA-6163-1}
+       {DSA-6163-1 DLA-4499-1}
        - linux 6.12.37-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/c60d101a226f18e9a8f01bb4c6ca2b47dfcb15ef (6.15-rc1)
@@ -118705,7 +119132,7 @@ CVE-2025-22027 (In the Linux kernel, the following 
vulnerability has been resolv
        - linux 6.12.25-1
        NOTE: 
https://git.kernel.org/linus/f656cfbc7a293a039d6a0c7100e1c846845148c1 (6.15-rc1)
 CVE-2025-22026 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
-       {DSA-6163-1}
+       {DSA-6163-1 DLA-4499-1}
        - linux 6.12.25-1
        NOTE: 
https://git.kernel.org/linus/930b64ca0c511521f0abdd1d57ce52b2a6e3476b (6.15-rc1)
 CVE-2025-22025 (In the Linux kernel, the following vulnerability has been 
resolved:  n ...)
@@ -149304,7 +149731,7 @@ CVE-2024-57896 (In the Linux kernel, the following 
vulnerability has been resolv
        [bookworm] - linux 6.1.124-1
        NOTE: 
https://git.kernel.org/linus/f10bef73fb355e3fc85e63a50386798be68ff486 (6.13-rc3)
 CVE-2024-57895 (In the Linux kernel, the following vulnerability has been 
resolved:  k ...)
-       {DSA-6163-1}
+       {DSA-6163-1 DLA-4499-1}
        - linux 6.12.9-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/21e46a79bbe6c4e1aa73b3ed998130f2ff07b128 (6.13-rc3)
@@ -228176,7 +228603,7 @@ CVE-2024-26823 (In the Linux kernel, the following 
vulnerability has been resolv
        [buster] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/8b02da04ad978827e5ccd675acf170198f747a7a (6.8-rc5)
 CVE-2024-26822 (In the Linux kernel, the following vulnerability has been 
resolved:  s ...)
-       {DSA-6163-1}
+       {DSA-6163-1 DLA-4499-1}
        - linux 6.7.7-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        [buster] - linux <not-affected> (Vulnerable code not present)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/68681698b24becb63c5e7c63a897364fcd827e03

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/68681698b24becb63c5e7c63a897364fcd827e03
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to