[Git][security-tracker-team/security-tracker][master] Remove some more notes from rejected CVEs from the Linux kernel CNA
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Dec 30 16:03:11 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
8a3f3ca9 by Salvatore Bonaccorso at 2025-12-30T17:02:36+01:00
Remove some more notes from rejected CVEs from the Linux kernel CNA
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -147,11 +147,8 @@ CVE-2023-54292 [RDMA/irdma: Fix data race on CQP request done]
CVE-2023-54291 [vduse: fix NULL pointer dereference]
- linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/f06cf1e1a503169280467d12d2ec89bf2c30ace7 (6.5-rc1)
-CVE-2023-54290 [thermal/drivers/mediatek: Use devm_of_iomap to avoid resource leak in mtk_thermal_probe]
- - linux 6.3.7-1
- [bookworm] - linux 6.1.37-1
- [bullseye] - linux 5.10.191-1
- NOTE: https://git.kernel.org/linus/f05c7b7d9ea9477fcc388476c6f4ade8c66d2d26 (6.4-rc1)
+CVE-2023-54290
+ REJECTED
CVE-2023-54289 [scsi: qedf: Fix NULL dereference in error handling]
- linux 6.4.4-1
[bookworm] - linux 6.1.52-1
@@ -357,11 +354,8 @@ CVE-2023-54257 [net: macb: fix a memory corruption in extended buffer descriptor
- linux 6.1.25-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/e8b74453555872851bdd7ea43a7c0ec39659834f (6.3-rc7)
-CVE-2023-54256 [usb: dwc3: don't reset device side if dwc3 was configured as host-only]
- - linux 6.4.11-1
- [bookworm] - linux 6.1.52-1
- [bullseye] - linux 5.10.191-1
- NOTE: https://git.kernel.org/linus/e835c0a4e23c38531dcee5ef77e8d1cf462658c7 (6.5-rc4)
+CVE-2023-54256
+ REJECTED
CVE-2023-54255 [sh: dma: Fix DMA channel offset calculation]
- linux 6.4.4-1
[bookworm] - linux 6.1.52-1
@@ -2208,11 +2202,8 @@ CVE-2023-54104 (In the Linux kernel, the following vulnerability has been resolv
[bookworm] - linux 6.1.52-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/c6abce60338aa2080973cd95be0aedad528bb41f (6.5-rc5)
-CVE-2023-54103 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- - linux 6.5.3-1
- [bookworm] - linux 6.1.55-1
- [bullseye] - linux 5.10.205-1
- NOTE: https://git.kernel.org/linus/c677d7ae83141d390d1253abebafa49c962afb52 (6.6-rc1)
+CVE-2023-54103
+ REJECTED
CVE-2023-54102 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
@@ -2430,11 +2421,8 @@ CVE-2023-54055 (In the Linux kernel, the following vulnerability has been resolv
- linux 6.1.25-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/b69a6979dbaa2453675fe9c71bdc2497fedb11f9 (6.3-rc7)
-CVE-2023-54054 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- - linux 6.4.11-1
- [bookworm] - linux 6.1.52-1
- [bullseye] - linux 5.10.191-1
- NOTE: https://git.kernel.org/linus/b68710a8094fdffe8dd4f7a82c82649f479bb453 (6.5-rc1)
+CVE-2023-54054
+ REJECTED
CVE-2023-54053 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8a3f3ca905da985f85ec4abf8e75fe58dd9e48ff
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8a3f3ca905da985f85ec4abf8e75fe58dd9e48ff
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251230/9a09f038/attachment.htm>
More information about the debian-security-tracker-commits
mailing list