[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Dec 24 20:42:42 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
40d9c51b by Salvatore Bonaccorso at 2025-12-24T21:42:20+01:00
Merge Linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -435,73 +435,160 @@ CVE-2023-54078 (In the Linux kernel, the following vulnerability has been resolv
CVE-2023-54077 (In the Linux kernel, the following vulnerability has been resolved: f ...)
TODO: check
CVE-2023-54076 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- TODO: check
+ - linux 6.4.11-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/bf99f6be2d20146942bce6f9e90a0ceef12cbc1e (6.5-rc2)
CVE-2023-54075 (In the Linux kernel, the following vulnerability has been resolved: A ...)
- TODO: check
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/beed115c2ce78f990222a29abed042582df4e87c (6.4-rc1)
CVE-2023-54074 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- TODO: check
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/be071cdb167fc3e25fe81922166b3d499d23e8ac (6.4-rc4)
CVE-2023-54073 (In the Linux kernel, the following vulnerability has been resolved: t ...)
- TODO: check
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/bd8621ca1510e6e802df9855bdc35a04a3cfa932 (6.4-rc1)
CVE-2023-54072 (In the Linux kernel, the following vulnerability has been resolved: A ...)
- TODO: check
+ - linux 6.4.4-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/bd55842ed998a622ba6611fe59b3358c9f76773d (6.5-rc1)
CVE-2023-54071 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- TODO: check
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/bcafcb959a57a6890e900199690c5fc47da1a304 (6.4-rc3)
CVE-2023-54070 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- TODO: check
+ - linux 6.5.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/bc6ed2fa24b14e40e1005488bbe11268ce7108fa (6.6-rc2)
CVE-2023-54069 (In the Linux kernel, the following vulnerability has been resolved: e ...)
- TODO: check
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.64-1
+ [bullseye] - linux 5.10.205-1
+ NOTE: https://git.kernel.org/linus/bc056e7163ac7db945366de219745cf94f32a3e6 (6.6-rc1)
CVE-2023-54068 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- TODO: check
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/babedcbac164cec970872b8097401ca913a80e61 (6.4-rc1)
CVE-2023-54067 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- TODO: check
+ - linux 6.4.4-1
+ [bookworm] - linux 6.1.52-1
+ NOTE: https://git.kernel.org/linus/babebf023e661b90b1c78b2baa384fb03a226879 (6.5-rc1)
CVE-2023-54066 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- TODO: check
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/b97719a66970601cd3151a3e2020f4454a1c4ff6 (6.6-rc1)
CVE-2023-54065 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- TODO: check
+ - linux 6.1.25-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b93eb564869321d0dffaf23fcc5c88112ed62466 (6.3-rc5)
CVE-2023-54064 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- TODO: check
+ - linux 6.5.3-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/b8d72e32e1453d37ee5c8a219f24e7eeadc471ef (6.6-rc1)
CVE-2023-54063 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- TODO: check
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b8c44949044e5f7f864525fdffe8e95135ce9ce5 (6.4-rc1)
CVE-2023-54062 (In the Linux kernel, the following vulnerability has been resolved: e ...)
- TODO: check
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/b87c7cdf2bed4928b899e1ce91ef0d147017ba45 (6.4-rc2)
CVE-2023-54061 (In the Linux kernel, the following vulnerability has been resolved: x ...)
- TODO: check
+ - linux 6.3.7-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
CVE-2023-54060 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- TODO: check
+ - linux 6.4.11-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b7c822fa6b7701b17e139f1c562fc24135880ed4 (6.5-rc4)
CVE-2023-54059 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- TODO: check
+ - linux 6.1.20-1
+ NOTE: https://git.kernel.org/linus/b74952aba6c3f47e7f2c5165abaeefa44c377140 (6.3-rc1)
CVE-2023-54058 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- TODO: check
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b71b55248a580e9c9befc4ae060539f1f8e477da (6.4-rc4)
CVE-2023-54057 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- TODO: check
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/b6b26d86c61c441144c72f842f7469bb686e1211 (6.3-rc1)
CVE-2023-54056 (In the Linux kernel, the following vulnerability has been resolved: k ...)
- TODO: check
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/b69edab47f1da8edd8e7bfdf8c70f51a2a5d89fb (6.4-rc1)
CVE-2023-54055 (In the Linux kernel, the following vulnerability has been resolved: R ...)
- TODO: check
+ - linux 6.1.25-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b69a6979dbaa2453675fe9c71bdc2497fedb11f9 (6.3-rc7)
CVE-2023-54054 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- TODO: check
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/b68710a8094fdffe8dd4f7a82c82649f479bb453 (6.5-rc1)
CVE-2023-54053 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- TODO: check
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/b655b9a9f8467684cfa8906713d33b71ea8c8f54 (6.4-rc1)
CVE-2023-54052 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- TODO: check
+ - linux 6.5.3-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b642f4c5f3de0a8f47808d32b1ebd9c427a42a66 (6.6-rc1)
CVE-2023-54051 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- TODO: check
+ - linux 6.4.13-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/b616be6b97688f2f2bd7c4a47ab32f27f94fb2a9 (6.5-rc7)
CVE-2023-54050 (In the Linux kernel, the following vulnerability has been resolved: u ...)
- TODO: check
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/b5fda08ef213352ac2df7447611eb4d383cce929 (6.4-rc1)
CVE-2023-54049 (In the Linux kernel, the following vulnerability has been resolved: r ...)
- TODO: check
+ - linux 6.5.3-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/b5c9ee8296a3760760c7b5d2e305f91412adc795 (6.6-rc1)
CVE-2023-54048 (In the Linux kernel, the following vulnerability has been resolved: R ...)
- TODO: check
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ NOTE: https://git.kernel.org/linus/b5bbc6551297447d3cca55cf907079e206e9cd82 (6.5-rc4)
CVE-2023-54047 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- TODO: check
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ NOTE: https://git.kernel.org/linus/b5af48eedcb53491c02ded55d5991e03d6da6dbf (6.4-rc1)
CVE-2023-54046 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- TODO: check
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/b5a772adf45a32c68bef28e60621f12617161556 (6.3-rc1)
CVE-2023-54045 (In the Linux kernel, the following vulnerability has been resolved: a ...)
- TODO: check
+ - linux 6.5.3-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/b59bc6e37237e37eadf50cd5de369e913f524463 (6.6-rc1)
CVE-2023-54044 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- TODO: check
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/b56eef3e16d888883fefab47425036de80dd38fc (6.4-rc1)
CVE-2023-54043 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- TODO: check
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b4ff830eca097df51af10a9be29e8cc817327919 (6.3-rc1)
CVE-2023-40679 (Missing Authorization vulnerability in Jewel Theme Master Addons for E ...)
NOT-FOR-US: WordPress plugin or theme
CVE-2023-36525 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
@@ -603,55 +690,103 @@ CVE-2022-50738 (In the Linux kernel, the following vulnerability has been resolv
CVE-2022-50737 (In the Linux kernel, the following vulnerability has been resolved: f ...)
TODO: check
CVE-2022-50736 (In the Linux kernel, the following vulnerability has been resolved: R ...)
- TODO: check
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/bdf1da5df9da680589a7f74448dd0a94dd3e1446 (6.2-rc1)
CVE-2022-50735 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- TODO: check
+ - linux 6.1.4-1
+ NOTE: https://git.kernel.org/linus/bd5dac7ced5a7c9faa4dc468ac9560c3256df845 (6.2-rc1)
CVE-2022-50734 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- TODO: check
+ - linux 6.0.3-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/bd1244561fa2a4531ded40dbf09c9599084f8b29 (6.1-rc1)
CVE-2022-50733 (In the Linux kernel, the following vulnerability has been resolved: u ...)
- TODO: check
+ - linux 6.0.3-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/bce2b0539933e485d22d6f6f076c0fcd6f185c4c (6.1-rc1)
CVE-2022-50732 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- TODO: check
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/bcc5e2dcf09089b337b76fc1a589f6ff95ca19ac (6.2-rc1)
CVE-2022-50731 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- TODO: check
+ - linux 6.0.3-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/bc155c6c188c2f0c5749993b1405673d25a80389 (6.1-rc1)
CVE-2022-50730 (In the Linux kernel, the following vulnerability has been resolved: e ...)
- TODO: check
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/bc12ac98ea2e1b70adc6478c8b473a0003b659d3 (6.2-rc1)
CVE-2022-50729 (In the Linux kernel, the following vulnerability has been resolved: k ...)
- TODO: check
+ - linux 6.1.4-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/bc044414fa0326a4e5c3c509c00b1fcaf621b5f4 (6.2-rc1)
CVE-2022-50728 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- TODO: check
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/bb16db8393658e0978c3f0d30ae069e878264fa3 (6.2-rc1)
CVE-2022-50727 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- TODO: check
+ - linux 6.1.4-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/bb0cd225dd37df1f4a22e36dad59ff33178ecdfc (6.2-rc1)
CVE-2022-50726 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- TODO: check
+ - linux 6.0.7-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/bacd22df95147ed673bec4692ab2d4d585935241 (6.1-rc3)
CVE-2022-50725 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- TODO: check
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/ba8d9405935097e296bcf7a942c3a01df0edb865 (6.2-rc1)
CVE-2022-50724 (In the Linux kernel, the following vulnerability has been resolved: r ...)
- TODO: check
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/ba62319a42c50e6254e98b3f316464fac8e77968 (6.2-rc1)
CVE-2022-50723 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- TODO: check
+ - linux 6.0.6-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/ba077d683d45190afc993c1ce45bcdbfda741a40 (6.1-rc2)
CVE-2022-50722 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- TODO: check
+ - linux 6.0.6-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b9eb3ab6f30bf32f7326909f17949ccb11bab514 (6.1-rc2)
CVE-2022-50721 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- TODO: check
+ - linux 6.0.3-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b9d2140c3badf4107973ad77c5a0ec3075705c85 (6.1-rc1)
CVE-2022-50720 (In the Linux kernel, the following vulnerability has been resolved: x ...)
- TODO: check
+ - linux 6.0.3-1
+ NOTE: https://git.kernel.org/linus/b8d1d163604bd1e600b062fb00de5dc42baa355f (6.1-rc1)
CVE-2022-50719 (In the Linux kernel, the following vulnerability has been resolved: A ...)
- TODO: check
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/b8800d324abb50160560c636bfafe2c81001b66c (6.2-rc2)
CVE-2022-50718 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- TODO: check
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/b85e285e3d6352b02947fc1b72303673dfacb0aa (6.2-rc1)
CVE-2022-50717 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- TODO: check
+ - linux 6.0.3-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/b6a545ffa2c192b1e6da4a7924edac5ba9f4ea2b (6.1-rc1)
CVE-2022-50716 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- TODO: check
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/b6702a942a069c2a975478d719e98d83cdae1797 (6.2-rc1)
CVE-2022-50715 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- TODO: check
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/b611ad14006e5be2170d9e8e611bf49dff288911 (6.2-rc1)
CVE-2022-50714 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- TODO: check
+ - linux 6.0.3-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b5a62d612b7baf6e09884e4de94decb6391d6a9d (6.1-rc1)
CVE-2022-50713 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- TODO: check
+ - linux 6.1.4-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b55226f8553d255f5002c751c7c6ba9291f34bf2 (6.2-rc1)
CVE-2022-50712 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- TODO: check
+ - linux 6.1.4-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/b4cafb3d2c740f8d1b1234b43ac4a60e5291c960 (6.2-rc1)
CVE-2019-25258 (LogicalDOC Enterprise 7.7.4 contains multiple post-authentication file ...)
TODO: check
CVE-2019-25257 (LogicalDOC Enterprise 7.7.4 contains multiple authenticated OS command ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/40d9c51bb3a906a715803b390c87ea4475ccb206
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/40d9c51bb3a906a715803b390c87ea4475ccb206
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251224/d41ca4af/attachment.htm>
More information about the debian-security-tracker-commits
mailing list