@@ -444,15 +444,8 @@ vulnerabilities:
444444 purls :
445445 - " pkg:golang/stdlib@v1.24.9"
446446 expired_at : 2026-06-01
447- - id : CVE-2024-35870
448- statement : " kernel: smb: client: fix UAF in smb2_reconnect_server()"
449- purls :
450- - " pkg:deb/ubuntu/linux-libc-dev@5.15.0-168.178?arch=amd64\u0026 distro=ubuntu-22.04"
451- expired_at : 2026-06-01
452447 - id : CVE-2024-53179
453448 statement : " kernel: smb: client: fix use-after-free of signing key"
454- purls :
455- - " pkg:deb/ubuntu/linux-libc-dev@5.15.0-168.178?arch=amd64\u0026 distro=ubuntu-22.04"
456449 expired_at : 2026-06-01
457450 - id : CVE-2025-21780
458451 statement : " kernel: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()"
@@ -461,42 +454,27 @@ vulnerabilities:
461454 expired_at : 2026-06-01
462455 - id : CVE-2025-37899
463456 statement : " kernel: ksmbd: fix use-after-free in session logoff"
464- purls :
465- - " pkg:deb/ubuntu/linux-libc-dev@5.15.0-168.178?arch=amd64\u0026 distro=ubuntu-22.04"
466- expired_at : 2026-06-01
467- - id : CVE-2025-38118
468- statement : " kernel: Linux kernel: Bluetooth MGMT use-after-free vulnerability allows privilege escalation"
469- purls :
470- - " pkg:deb/ubuntu/linux-libc-dev@5.15.0-168.178?arch=amd64\u0026 distro=ubuntu-22.04"
471457 expired_at : 2026-06-01
472458 - id : CVE-2024-35870
473459 statement : " kernel: smb: client: fix UAF in smb2_reconnect_server()"
474- purls :
475- - " pkg:deb/ubuntu/linux-libc-dev@5.15.0-168.178?arch=arm64\u0026 distro=ubuntu-22.04"
476- expired_at : 2026-06-01
477- - id : CVE-2024-53179
478- statement : " kernel: smb: client: fix use-after-free of signing key"
479- purls :
480- - " pkg:deb/ubuntu/linux-libc-dev@5.15.0-168.178?arch=arm64\u0026 distro=ubuntu-22.04"
481460 expired_at : 2026-06-01
482461 - id : CVE-2025-21780
483462 statement : " kernel: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() "
484463 purls :
485464 - " pkg:deb/ubuntu/linux-libc-dev@5.15.0-168.178?arch=arm64\u0026 distro=ubuntu-22.04"
486465 expired_at : 2026-06-01
487- - id : CVE-2025-37899
488- statement : " kernel: ksmbd: fix use-after-free in session logoff"
489- purls :
490- - " pkg:deb/ubuntu/linux-libc-dev@5.15.0-168.178?arch=arm64\u0026 distro=ubuntu-22.04"
491- expired_at : 2026-06-01
492466 - id : CVE-2025-38118
493467 statement : " kernel: Linux kernel: Bluetooth MGMT use-after-free vulnerability allows privilege escalation"
494- purls :
495- - " pkg:deb/ubuntu/linux-libc-dev@5.15.0-168.178?arch=arm64\u0026 distro=ubuntu-22.04"
496468 expired_at : 2026-06-01
497469 - id : CVE-2025-68121
498470 statement : " CHANGE ME"
499471 expired_at : 2026-06-01
500472 - id : CVE-2025-61730
501473 statement : " CHANGE ME"
502474 expired_at : 2026-06-01
475+ - id : CVE-2025-37849
476+ statement : " CHANGE ME"
477+ expired_at : 2026-06-01
478+ - id : CVE-2026-26007
479+ statement : " CHANGE ME"
480+ expired_at : 2026-06-01
0 commit comments