[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Oct 1 22:06:45 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
d2afdb90 by Salvatore Bonaccorso at 2025-10-01T23:06:19+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -133,95 +133,206 @@ CVE-2025-10538 (An authentication bypass vulnerability exists in LG Innotek came
 CVE-2024-57494 (Cross Site Scripting vulnerability in Neto E-Commerce CMS v.6.313.0 th ...)
 	TODO: check
 CVE-2023-53532 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
-	TODO: check
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5a78ac33e3cb8822da64dd1af196e83664b332b0 (6.4-rc1)
 CVE-2023-53531 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	TODO: check
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5a26e45edb4690d58406178b5a9ea4c6dcf2c105 (6.6-rc1)
 CVE-2023-53530 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	TODO: check
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.64-1
+	NOTE: https://git.kernel.org/linus/59f10a05b5c7b675256a66e3161741239889ff80 (6.6-rc2)
 CVE-2023-53529 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
-	TODO: check
+	- linux 6.3.7-1
+	NOTE: https://git.kernel.org/linus/59a3a312009723e3e5082899655fdcc420e2b47a (6.4-rc1)
 CVE-2023-53528 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
-	TODO: check
+	- linux 6.5.3-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5993b75d0bc71cd2b441d174b028fc36180f032c (6.6-rc1)
 CVE-2023-53527 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
-	TODO: check
+	- linux 6.4.11-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/596a5123cc782d458b057eb3837e66535cd0befa (6.5-rc6)
 CVE-2023-53526 (In the Linux kernel, the following vulnerability has been resolved:  j ...)
-	TODO: check
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/590a809ff743e7bd890ba5fb36bc38e20a36de53 (6.6-rc1)
 CVE-2023-53525 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
-	TODO: check
+	- linux 6.1.25-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/58e84f6b3e84e46524b7e5a916b53c1ad798bc8f (6.3-rc7)
 CVE-2023-53524 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
-	TODO: check
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/58d1b717879bfeabe09b35e41ad667c79933eb2e (6.4-rc1)
 CVE-2023-53523 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
-	TODO: check
+	- linux 6.4.11-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5886e4d5ecec3e22844efed90b2dd383ef804b3a (6.5-rc3)
 CVE-2023-53522 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
-	TODO: check
+	- linux 6.1.25-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/57dcd64c7e036299ef526b400a8d12b8a2352f26 (6.3-rc7)
 CVE-2023-53521 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	TODO: check
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/578797f0c8cbc2e3ec5fc0dab87087b4c7073686 (6.3-rc1)
 CVE-2023-53520 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
-	TODO: check
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	NOTE: https://git.kernel.org/linus/573ebae162111063eedc6c838a659ba628f66a0f (6.6-rc1)
 CVE-2023-53519 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
-	TODO: check
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/56b5c3e67b0f9af3f45cf393be048ee8d8a92694 (6.5-rc1)
 CVE-2023-53518 (In the Linux kernel, the following vulnerability has been resolved:  P ...)
-	TODO: check
+	- linux 6.5.3-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/5693d077595de721f9ddbf9d37f40e5409707dfe (6.6-rc1)
 CVE-2023-53517 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
-	TODO: check
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/56077b56cd3fb78e1c8619e29581ba25a5c55e86 (6.4-rc3)
 CVE-2023-53516 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
-	TODO: check
+	- linux 6.4.11-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/55cef78c244d0d076f5a75a35530ca63c92f4426 (6.5-rc4)
 CVE-2023-53515 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
-	TODO: check
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/55c91fedd03d7b9cf0c5199b2eb12b9b8e95281a (6.5-rc7)
 CVE-2023-53514 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
-	TODO: check
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/55879dad0f3ae8468444b42f785ad79eac05fe5b (6.4-rc1)
 CVE-2023-53513 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	TODO: check
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	NOTE: https://git.kernel.org/linus/55793ea54d77719a071b1ccc05a05056e3b5e009 (6.4-rc1)
 CVE-2023-53512 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	TODO: check
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/54dd96015e8d7a2a07359e2dfebf05b529d1780c (6.3-rc1)
 CVE-2023-53511 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
-	TODO: check
+	- linux 6.1.20-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/54aa7f2330b82884f4a1afce0220add6e8312f8b (6.3-rc1)
 CVE-2023-53510 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	TODO: check
+	- linux 6.4.4-1
+	NOTE: https://git.kernel.org/linus/549e91a9bbaa0ee480f59357868421a61d369770 (6.5-rc1)
 CVE-2023-53509 (In the Linux kernel, the following vulnerability has been resolved:  q ...)
-	TODO: check
+	- linux 6.1.7-1
+	NOTE: https://git.kernel.org/linus/5401c3e0992860b11fb4b25796e4c4f1921740df (6.2-rc3)
 CVE-2023-53508 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
-	TODO: check
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/53e7d08f6d6e214c40db1f51291bb2975c789dc2 (6.5-rc4)
 CVE-2023-53507 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	TODO: check
+	- linux 6.4.11-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/53d737dfd3d7b023fa9fa445ea3f3db0ac9da402 (6.5-rc5)
 CVE-2023-53506 (In the Linux kernel, the following vulnerability has been resolved:  u ...)
-	TODO: check
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/53cafe1d6d8ef9f93318e5bfccc0d24f27d41ced (6.3-rc1)
 CVE-2023-53505 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
-	TODO: check
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/53a06e5924c0d43c11379a08c5a78529c3e61595 (6.5-rc1)
 CVE-2023-53504 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
-	TODO: check
+	- linux 6.4.11-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5363fc488da579923edf6a2fdca3d3b651dd800b (6.5-rc6)
 CVE-2023-53503 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
-	TODO: check
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/5354b2af34064a4579be8bc0e2f15a7b70f14b5f (6.4-rc2)
 CVE-2023-53502
 	REJECTED
 CVE-2023-53501 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
-	TODO: check
+	- linux 6.5.3-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/534103bcd52ca9c1fecbc70e717b4a538dc4ded8 (6.6-rc1)
 CVE-2023-53500 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
-	TODO: check
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/53223f2ed1ef5c90dad814daaaefea4e68a933c8 (6.5-rc7)
 CVE-2023-53499 (In the Linux kernel, the following vulnerability has been resolved:  v ...)
-	TODO: check
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	NOTE: https://git.kernel.org/linus/5306623a9826aa7d63b32c6a3803c798a765474d (6.4-rc3)
 CVE-2023-53498 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	TODO: check
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	NOTE: https://git.kernel.org/linus/52f1783ff4146344342422c1cd94fcb4ce39b6fe (6.4-rc1)
 CVE-2023-53497 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
-	TODO: check
+	- linux 6.3.7-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/52d8caca3d533cc499f1255be25576ffd936ec95 (6.4-rc1)
 CVE-2023-53496 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
-	TODO: check
+	- linux 6.5.6-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5290e88ba2c742ca77c5f5b690e5af549cfd8591 (6.6-rc2)
 CVE-2023-53495 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	TODO: check
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/51fe0a470543f345e3c62b6798929de3ddcedc1d (6.6-rc2)
 CVE-2023-53494 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
-	TODO: check
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/51c082514c2dedf2711c99d93c196cc4eedceb40 (6.3-rc1)
 CVE-2023-53493 (In the Linux kernel, the following vulnerability has been resolved:  a ...)
-	TODO: check
+	- linux 6.4.11-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/51b56382ed2a2b03347372272362b3baa623ed1e (6.5-rc3)
 CVE-2023-53492 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	TODO: check
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/515ad530795c118f012539ed76d02bacfd426d89 (6.5-rc2)
 CVE-2023-53491 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	TODO: check
+	- linux 6.4.4-1
+	NOTE: https://git.kernel.org/linus/514ca14ed5444b911de59ed3381dfd195d99fe4b (6.5-rc1)
 CVE-2023-53490 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
-	TODO: check
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/511b90e39250135a7f900f1c3afbce25543018a2 (6.5-rc6)
 CVE-2023-53489 (In the Linux kernel, the following vulnerability has been resolved:  t ...)
-	TODO: check
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/50749f2dd6854a41830996ad302aef2ffaf011d8 (6.4-rc1)
 CVE-2023-53488 (In the Linux kernel, the following vulnerability has been resolved:  I ...)
-	TODO: check
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/4fdfaef71fced490835145631a795497646f4555 (6.5-rc6)
 CVE-2023-50301 (IBM Transformation Extender Advanced 10.0.1 stores potentially sensiti ...)
 	NOT-FOR-US: IBM
 CVE-2023-50300 (IBM Transformation Extender Advanced 10.0.1     could allow a local us ...)
@@ -231,57 +342,102 @@ CVE-2023-49883 (IBM Transformation Extender Advanced 10.0.1       does not requi
 CVE-2023-49881 (IBM Transformation Extender Advanced 10.0.1   does not invalidate sess ...)
 	NOT-FOR-US: IBM
 CVE-2022-50469 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	TODO: check
+	- linux 6.0.3-1
+	NOTE: https://git.kernel.org/linus/5a5aa9cce621e2c0e25a1e5d72d6be1749167cc0 (6.1-rc1)
 CVE-2022-50468 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
-	TODO: check
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/5a2d96623670155d94aca72c320c0ac27bdc6bd2 (6.2-rc1)
 CVE-2022-50467 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	TODO: check
+	- linux 6.0.3-1
+	NOTE: https://git.kernel.org/linus/59b7e210a522b836a01516c71ee85d1d92c1f075 (6.1-rc1)
 CVE-2022-50466 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
-	TODO: check
+	- linux 6.0.7-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/594d2a14f2168c09b13b114c3d457aa939403e52 (6.1-rc3)
 CVE-2022-50465 (In the Linux kernel, the following vulnerability has been resolved:  e ...)
-	TODO: check
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/594bc43b410316d70bb42aeff168837888d96810 (6.2-rc1)
 CVE-2022-50464 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
-	TODO: check
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5938196cc188ba4323bc6357f5ac55127d715888 (6.2-rc1)
 CVE-2022-50463 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
-	TODO: check
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/5836947613ef33d311b4eff6a32d019580a214f5 (6.2-rc1)
 CVE-2022-50462 (In the Linux kernel, the following vulnerability has been resolved:  M ...)
-	TODO: check
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/5822e8cc84ee37338ab0bdc3124f6eec04dc232d (6.2-rc1)
 CVE-2022-50461 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	TODO: check
+	- linux 6.1.4-1
+	NOTE: https://git.kernel.org/linus/5821504f5073983733465b8bc430049c4343bbd7 (6.2-rc1)
 CVE-2022-50460 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
-	TODO: check
+	- linux 6.0.6-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/575e079c782b9862ec2626403922d041a42e6ed6 (6.1-rc2)
 CVE-2022-50459 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	TODO: check
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/57569c37f0add1b6489e1a1563c71519daf732cf (6.1-rc1)
 CVE-2022-50458 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
-	TODO: check
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/56c78cb1f00a9dde8cd762131ce8f4c5eb046fbb (6.1-rc1)
 CVE-2022-50457 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
-	TODO: check
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/56570bdad5e31c5c538cd6efff5c4510256e1bb4 (6.2-rc1)
 CVE-2022-50456 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
-	TODO: check
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/560840afc3e63bbe5d9c5ef6b2ecf8f3589adff6 (6.2-rc3)
 CVE-2022-50455 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	TODO: check
+	- linux 6.1.4-1
+	NOTE: https://git.kernel.org/linus/5559405df652008e56eee88872126fe4c451da67 (6.2-rc1)
 CVE-2022-50454 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	TODO: check
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/540dfd188ea2940582841c1c220bd035a7db0e51 (6.1-rc1)
 CVE-2022-50453 (In the Linux kernel, the following vulnerability has been resolved:  g ...)
-	TODO: check
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/533aae7c94dbc2b14301cfd68ae7e0e90f0c8438 (6.2-rc1)
 CVE-2022-50452 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	TODO: check
+	- linux 6.0.6-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/51f9a8921ceacd7bf0d3f47fa867a64988ba1dcb (6.1-rc2)
 CVE-2022-50451 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
-	TODO: check
+	- linux 6.1.4-1
+	NOTE: https://git.kernel.org/linus/51e76a232f8c037f1d9e9922edc25b003d5f3414 (6.2-rc1)
 CVE-2022-50450 (In the Linux kernel, the following vulnerability has been resolved:  l ...)
-	TODO: check
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/51deedc9b8680953437dfe359e5268120de10e30 (6.2-rc1)
 CVE-2022-50449 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
-	TODO: check
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/5174e5b0d1b669a489524192b6adcbb3c54ebc72 (6.2-rc1)
 CVE-2022-50448 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
-	TODO: check
+	- linux 6.0.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/515778e2d790652a38a24554fdb7f21420d91efc (6.1-rc1)
 CVE-2022-50447 (In the Linux kernel, the following vulnerability has been resolved:  B ...)
-	TODO: check
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/50757a259ba78c4e938b5735e76ffec6cd0c942e (6.2-rc1)
 CVE-2022-50446 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
-	TODO: check
+	- linux 6.0.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/4fd9df10cb7a9289fbd22d669f9f98164d95a1ce (6.1-rc3)
 CVE-2022-50445 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
-	TODO: check
+	- linux 6.0.3-1
+	NOTE: https://git.kernel.org/linus/4f4920669d21e1060b7243e5118dc3b71ced1276 (6.1-rc1)
 CVE-2021-4460 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	TODO: check
+	- linux 5.10.38-1
+	NOTE: https://git.kernel.org/linus/50e2fc36e72d4ad672032ebf646cecb48656efe0 (5.13-rc1)
 CVE-2020-36852 (The Custom Searchable Data Entry System plugin for WordPress is vulner ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2025-11219



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d2afdb9070799e3573428262a99d32b3b703d723

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d2afdb9070799e3573428262a99d32b3b703d723
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251001/ede6677d/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list