[Git][security-tracker-team/security-tracker][master] Remove notes on rejected CVEs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Jun 18 15:43:32 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
5e3d7db2 by Salvatore Bonaccorso at 2025-06-18T16:42:53+02:00
Remove notes on rejected CVEs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -60,10 +60,8 @@ CVE-2022-50217 [fuse: write inode in fuse_release()]
 	- linux 6.0.2-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/035ff33cf4db101250fb980a3941bf078f37a544 (6.0-rc1)
-CVE-2022-50216 [md-raid: destroy the bitmap after destroying the thread]
-	- linux 6.0.2-1
-	[bullseye] - linux 5.10.140-1
-	NOTE: https://git.kernel.org/linus/e151db8ecfb019b7da31d076130a794574c89f6f (6.0-rc1)
+CVE-2022-50216
+	REJECTED
 CVE-2022-50215 [scsi: sg: Allow waiting for commands to complete on removed device]
 	- linux 6.0.2-1
 	[bullseye] - linux 5.10.140-1
@@ -202,10 +200,8 @@ CVE-2022-50181 [virtio-gpu: fix a missing check to avoid NULL dereference]
 	- linux 6.0.2-1
 	[bullseye] - linux 5.10.140-1
 	NOTE: https://git.kernel.org/linus/bd63f11f4c3c46afec07d821f74736161ff6e526 (6.0-rc1)
-CVE-2022-50180 [wifi: iwlegacy: 4965: fix potential off-by-one overflow in il4965_rs_fill_link_cmd()]
-	- linux 6.0.2-1
-	[bullseye] - linux 5.10.140-1
-	NOTE: https://git.kernel.org/linus/a8eb8e6f7159c7c20c0ddac428bde3d110890aa7 (6.0-rc1)
+CVE-2022-50180
+	REJECTED
 CVE-2022-50179 [ath9k: fix use-after-free in ath9k_hif_usb_rx_cb]
 	- linux 6.0.2-1
 	[bullseye] - linux 5.10.140-1
@@ -317,10 +313,8 @@ CVE-2022-50152 [usb: ohci-nxp: Fix refcount leak in ohci_hcd_nxp_probe]
 CVE-2022-50151 [usb: cdns3: fix random warning message when driver load]
 	- linux 6.0.2-1
 	NOTE: https://git.kernel.org/linus/8659ab3d936fcf0084676f98b75b317017aa8f82 (6.0-rc1)
-CVE-2022-50150 [mwifiex: fix sleep in atomic context bugs caused by dev_coredumpv]
-	- linux 6.0.2-1
-	[bullseye] - linux 5.10.140-1
-	NOTE: https://git.kernel.org/linus/a52ed4866d2b90dd5e4ae9dabd453f3ed8fa3cbc (6.0-rc1)
+CVE-2022-50150
+	REJECTED
 CVE-2022-50149 [driver core: fix potential deadlock in __driver_attach]
 	- linux 6.0.2-1
 	[bullseye] - linux 5.10.140-1
@@ -404,9 +398,8 @@ CVE-2022-50129 [RDMA/srpt: Fix a use-after-free]
 	- linux 6.0.2-1
 	[bullseye] - linux 5.10.140-1
 	NOTE: https://git.kernel.org/linus/b5605148e6ce36bb21020d49010b617693933128 (6.0-rc1)
-CVE-2022-50128 [android: binder: stop saving a pointer to the VMA]
-	- linux 6.0.2-1
-	NOTE: https://git.kernel.org/linus/a43cfc87caaf46710c8027a8c23b8a55f1078f19 (6.0-rc1)
+CVE-2022-50128
+	REJECTED
 CVE-2022-50127 [RDMA/rxe: Fix error unwind in rxe_create_qp()]
 	- linux 6.0.2-1
 	[bullseye] - linux 5.10.140-1
@@ -584,9 +577,8 @@ CVE-2022-50082 [ext4: fix warning in ext4_iomap_begin as race between bmap and w
 	- linux 6.0.2-1
 	[bullseye] - linux 5.10.140-1
 	NOTE: https://git.kernel.org/linus/51ae846cff568c8c29921b1b28eb2dfbcd4ac12d (6.0-rc1)
-CVE-2022-50081 [KVM: Unconditionally get a ref to /dev/kvm module when creating a VM]
-	- linux 6.0.2-1
-	NOTE: https://git.kernel.org/linus/405294f29faee5de8c10cb9d4a90e229c2835279 (6.0-rc2)
+CVE-2022-50081
+	REJECTED
 CVE-2022-50080 [tee: add overflow check in register_shm_helper()]
 	- linux 6.0.2-1
 	[bullseye] - linux 5.10.140-1
@@ -824,9 +816,8 @@ CVE-2022-50019 [tty: serial: Fix refcount leak bug in ucc_uart.c]
 	- linux 6.0.2-1
 	[bullseye] - linux 5.10.140-1
 	NOTE: https://git.kernel.org/linus/d24d7bb2cd947676f9b71fb944d045e09b8b282f (6.0-rc1)
-CVE-2022-50018 [ALSA: hda: Fix page fault in snd_hda_codec_shutdown()]
-	- linux 6.0.2-1
-	NOTE: https://git.kernel.org/linus/980b3a8790b402e959a6d773b38b771019682be1 (6.0-rc1)
+CVE-2022-50018
+	REJECTED
 CVE-2022-50017 [mips: cavium-octeon: Fix missing of_node_put() in octeon2_usb_clocks_start]
 	- linux 6.0.2-1
 	[bullseye] - linux 5.10.140-1
@@ -937,10 +928,8 @@ CVE-2022-49989 [xen/privcmd: fix error exit of privcmd_ioctl_dm_op()]
 	- linux 6.0.2-1
 	[bullseye] - linux 5.10.140-1
 	NOTE: https://git.kernel.org/linus/c5deb27895e017a0267de0a20d140ad5fcc55a54 (6.0-rc3)
-CVE-2022-49988 [binder_alloc: add missing mmap_lock calls when using the VMA]
-	- linux 6.0.2-1
-	[bullseye] - linux <not-affected> (Vulnerable code not present)
-	NOTE: https://git.kernel.org/linus/44e602b4e52f70f04620bbbf4fe46ecb40170bde (6.0-rc3)
+CVE-2022-49988
+	REJECTED
 CVE-2022-49987 [md: call __md_stop_writes in md_stop]
 	- linux 6.0.2-1
 	[bullseye] - linux 5.10.140-1
@@ -1119,10 +1108,8 @@ CVE-2022-49942 [wifi: mac80211: Don't finalize CSA in IBSS mode if state is disc
 	- linux 6.0.2-1
 	[bullseye] - linux 5.10.148-1
 	NOTE: https://git.kernel.org/linus/15bc8966b6d3a5b9bfe4c9facfa02f2b69b1e5f0 (6.0-rc4)
-CVE-2022-49941 [tty: n_gsm: avoid call of sleeping functions from atomic context]
-	- linux 5.19.11-1
-	[bullseye] - linux 5.10.148-1
-	NOTE: https://git.kernel.org/linus/902e02ea9385373ce4b142576eef41c642703955 (6.0-rc4)
+CVE-2022-49941
+	REJECTED
 CVE-2022-49940 [tty: n_gsm: add sanity check for gsm->receive in gsm_receive_buf()]
 	- linux 5.19.11-1
 	[bullseye] - linux 5.10.205-1
@@ -8641,11 +8628,8 @@ CVE-2025-37977 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.12.27-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f92bb7436802f8eb7ee72dc911a33c8897fde366 (6.15-rc3)
-CVE-2025-37976 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
-	- linux <unfixed>
-	[bookworm] - linux <not-affected> (Vulnerable code not present)
-	[bullseye] - linux <not-affected> (Vulnerable code not present)
-	NOTE: https://git.kernel.org/linus/0c1015493f0e3979bcbd3a12ebc0977578c87f21 (6.14.3)
+CVE-2025-37976
+	REJECTED
 CVE-2025-37975 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
 	- linux 6.12.25-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
@@ -76659,10 +76643,8 @@ CVE-2024-50033 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.11.4-1
 	[bookworm] - linux 6.1.115-1
 	NOTE: https://git.kernel.org/linus/7d3fce8cbe3a70a1c7c06c9b53696be5d5d8dd5c (6.12-rc3)
-CVE-2024-50032 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
-	- linux 6.11.4-1
-	[bullseye] - linux <not-affected> (Vulnerable code not present)
-	NOTE: https://git.kernel.org/linus/f7345ccc62a4b880cf76458db5f320725f28e400 (6.12-rc3)
+CVE-2024-50032
+	REJECTED
 CVE-2024-50031 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	{DLA-4008-1}
 	- linux 6.11.4-1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5e3d7db2658db0fc9ca146ab3e8c5ae92d6dafd4

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5e3d7db2658db0fc9ca146ab3e8c5ae92d6dafd4
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250618/bc761286/attachment.htm>


More information about the debian-security-tracker-commits mailing list