[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sat Oct 4 21:13:03 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
cc70d8c1 by security tracker role at 2025-10-04T20:12:54+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,526 +1,526 @@
-CVE-2023-53616 [jfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount]
+CVE-2023-53616 (In the Linux kernel, the following vulnerability has been resolved: j ...)
- linux 6.5.6-1
[bookworm] - linux 6.1.55-1
[bullseye] - linux 5.10.197-1
NOTE: https://git.kernel.org/linus/6e2bda2c192d0244b5a78b787ef20aa10cb319b7 (6.6-rc1)
-CVE-2023-53615 [scsi: qla2xxx: Fix deletion race condition]
+CVE-2023-53615 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.5.6-1
[bookworm] - linux 6.1.55-1
[bullseye] - linux 5.10.197-1
NOTE: https://git.kernel.org/linus/6dfe4344c168c6ca20fe7640649aacfcefcccb26 (6.6-rc1)
-CVE-2023-53614 [mm/ksm: fix race with VMA iteration and mm_struct teardown]
+CVE-2023-53614 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux 6.1.25-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/6db504ce55bdbc575723938fc480713c9183f6a2 (6.3-rc4)
-CVE-2023-53613 [dax: Fix dax_mapping_release() use after free]
+CVE-2023-53613 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.4.4-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/6d24b170a9db0456f577b1ab01226a2254c016a8 (6.5-rc1)
-CVE-2023-53612 [hwmon: (coretemp) Simplify platform device handling]
+CVE-2023-53612 (In the Linux kernel, the following vulnerability has been resolved: h ...)
- linux 6.1.20-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/6d03bbff456befeccdd4d663177c4d6c75d0c4ff (6.3-rc1)
-CVE-2023-53611 [ipmi_si: fix a memleak in try_smi_init()]
+CVE-2023-53611 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux 6.5.3-1
[bookworm] - linux 6.1.55-1
[bullseye] - linux 5.10.197-1
NOTE: https://git.kernel.org/linus/6cf1a126de2992b4efe1c3c4d398f8de4aed6e3f (6.6-rc1)
-CVE-2023-53610 [irqchip: Fix refcount leak in platform_irqchip_probe]
+CVE-2023-53610 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux 6.1.20-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/6caa5a2b78f5f53c433d3a3781e53325da22f0ac (6.3-rc1)
-CVE-2023-53609 [scsi: Revert "scsi: core: Do not increase scsi_device's iorequest_cnt if dispatch failed"]
+CVE-2023-53609 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.3.7-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/6ca9818d1624e136a76ae8faedb6b6c95ca66903 (6.4-rc3)
-CVE-2023-53608 [nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread()]
+CVE-2023-53608 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.1.25-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/6be49d100c22ffea3287a4b19d7639d259888e33 (6.3-rc6)
-CVE-2023-53607 [ALSA: ymfpci: Fix BUG_ON in probe function]
+CVE-2023-53607 (In the Linux kernel, the following vulnerability has been resolved: A ...)
- linux 6.1.25-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/6be2e7522eb529b41c16d459f33bbdbcddbf5c15 (6.3-rc5)
-CVE-2023-53606 [nfsd: clean up potential nfsd_file refcount leaks in COPY codepath]
+CVE-2023-53606 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.1.20-1
[bullseye] - linux 5.10.221-1
NOTE: https://git.kernel.org/linus/6ba434cb1a8d403ea9aad1b667c3ea3ad8b3191f (6.3-rc1)
-CVE-2023-53605 [drm: amd: display: Fix memory leakage]
+CVE-2023-53605 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.1.20-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/6b8701be1f66064ca72733c5f6e13748cdbf8397 (6.3-rc1)
-CVE-2023-53604 [dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path]
+CVE-2023-53604 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/6b79a428c02769f2a11f8ae76bf866226d134887 (6.4-rc1)
-CVE-2023-53603 [scsi: qla2xxx: Avoid fcport pointer dereference]
+CVE-2023-53603 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
NOTE: https://git.kernel.org/linus/6b504d06976fe4a61cc05dedc68b84fadb397f77 (6.5-rc1)
-CVE-2023-53602 [wifi: ath11k: fix memory leak in WMI firmware stats]
+CVE-2023-53602 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
NOTE: https://git.kernel.org/linus/6aafa1c2d3e3fea2ebe84c018003f2a91722e607 (6.5-rc1)
-CVE-2023-53601 [bonding: do not assume skb mac_header is set]
+CVE-2023-53601 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.4.4-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/6a940abdef3162e5723f1495b8a49859d1708f79 (6.5-rc1)
-CVE-2023-53600 [tunnels: fix kasan splat when generating ipv4 pmtu error]
+CVE-2023-53600 (In the Linux kernel, the following vulnerability has been resolved: t ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/6a7ac3d20593865209dceb554d8b3f094c6bd940 (6.5-rc6)
-CVE-2023-53599 [crypto: af_alg - Fix missing initialisation affecting gcm-aes-s390]
+CVE-2023-53599 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux 6.5.3-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/6a4b8aa0a916b39a39175584c07222434fa6c6ef (6.6-rc1)
-CVE-2023-53598 [bus: mhi: host: Range check CHDBOFF and ERDBOFF]
+CVE-2023-53598 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
[bullseye] - linux 5.10.197-1
NOTE: https://git.kernel.org/linus/6a0c637bfee69a74c104468544d9f2a6579626d0 (6.4-rc1)
-CVE-2023-53597 [cifs: fix mid leak during reconnection after timeout threshold]
+CVE-2023-53597 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
NOTE: https://git.kernel.org/linus/69cba9d3c1284e0838ae408830a02c4a063104bc (6.5-rc2)
-CVE-2023-53596 [drivers: base: Free devm resources when unregistering a device]
+CVE-2023-53596 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.5.3-1
[bookworm] - linux 6.1.55-1
NOTE: https://git.kernel.org/linus/699fb50d99039a50e7494de644f96c889279aca3 (6.6-rc1)
-CVE-2023-53595 [octeontx2-pf: mcs: Fix NULL pointer dereferences]
+CVE-2023-53595 (In the Linux kernel, the following vulnerability has been resolved: o ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/699af748c61574125d269db260dabbe20436d74e (6.4-rc1)
-CVE-2023-53594 [driver core: fix resource leak in device_add()]
+CVE-2023-53594 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.1.20-1
NOTE: https://git.kernel.org/linus/6977b1a5d67097eaa4d02b0c126c04cc6e8917c0 (6.3-rc1)
-CVE-2023-53593 [cifs: Release folio lock on fscache read hit.]
+CVE-2023-53593 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux 6.4.13-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux 5.10.197-1
NOTE: https://git.kernel.org/linus/69513dd669e243928f7450893190915a88f84a2b (6.5-rc7)
-CVE-2023-53592 [gpio: sifive: Fix refcount leak in sifive_gpio_probe]
+CVE-2023-53592 (In the Linux kernel, the following vulnerability has been resolved: g ...)
- linux 6.1.7-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/694175cd8a1643cde3acb45c9294bca44a8e08e9 (6.2-rc3)
-CVE-2023-53591 [net/mlx5e: Fix deadlock in tc route query code]
+CVE-2023-53591 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/691c041bf20899fc13c793f92ba61ab660fa3a30 (6.4-rc4)
-CVE-2023-53590 [sctp: add a refcnt in sctp_stream_priorities to avoid a nested loop]
+CVE-2023-53590 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.1.20-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/68ba44639537de6f91fe32783766322d41848127 (6.3-rc1)
-CVE-2023-53589 [wifi: iwlwifi: mvm: don't trust firmware n_channels]
+CVE-2023-53589 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/682b6dc29d98e857e6ca4bbc077c7dc2899b7473 (6.4-rc3)
-CVE-2023-53588 [wifi: mac80211: check for station first in client probe]
+CVE-2023-53588 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux 6.5.6-1
[bookworm] - linux 6.1.55-1
NOTE: https://git.kernel.org/linus/67dfa589aa8806c7959cbca2f4613b8d41c75a06 (6.6-rc1)
-CVE-2023-53587 [ring-buffer: Sync IRQ works before buffer destruction]
+CVE-2023-53587 (In the Linux kernel, the following vulnerability has been resolved: r ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/675751bb20634f981498c7d66161584080cc061e (6.4-rc1)
-CVE-2023-53586 [scsi: target: Fix multiple LUN_RESET handling]
+CVE-2023-53586 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/673db054d7a2b5a470d7a25baf65956d005ad729 (6.4-rc1)
-CVE-2023-53585 [bpf: reject unhashed sockets in bpf_sk_assign]
+CVE-2023-53585 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.5.3-1
[bookworm] - linux 6.1.55-1
[bullseye] - linux 5.10.197-1
NOTE: https://git.kernel.org/linus/67312adc96b5a585970d03b62412847afe2c6b01 (6.6-rc1)
-CVE-2023-53584 [ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process]
+CVE-2023-53584 (In the Linux kernel, the following vulnerability has been resolved: u ...)
- linux 6.1.20-1
NOTE: https://git.kernel.org/linus/66f4742e93523ab2f062d9d9828b3e590bc61536 (6.3-rc1)
-CVE-2023-53583 [perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start()]
+CVE-2023-53583 (In the Linux kernel, the following vulnerability has been resolved: p ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/66843b14fb71825fdd73ab12f6594f2243b402be (6.5-rc2)
-CVE-2023-53582 [wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds]
+CVE-2023-53582 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux 6.1.20-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/660145d708be52f946a82e5b633c020f58f996de (6.3-rc1)
-CVE-2023-53581 [net/mlx5e: Check for NOT_READY flag state after locking]
+CVE-2023-53581 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/65e64640e97c0f223e77f9ea69b5a46186b93470 (6.5-rc2)
-CVE-2023-53580 [USB: Gadget: core: Help prevent panic during UVC unconfigure]
+CVE-2023-53580 (In the Linux kernel, the following vulnerability has been resolved: U ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/65dadb2beeb7360232b09ebc4585b54475dfee06 (6.5-rc6)
-CVE-2022-50508 [wifi: mt76: mt76x0: fix oob access in mt76x0_phy_get_target_power]
+CVE-2022-50508 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux 6.3.7-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/6e1abc51c945663bddebfa1beb9590ff5b250eb7 (6.3-rc1)
-CVE-2022-50507 [fs/ntfs3: Validate data run offset]
+CVE-2022-50507 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- linux 6.1.4-1
NOTE: https://git.kernel.org/linus/6db620863f8528ed9a9aa5ad323b26554a17881d (6.2-rc1)
-CVE-2022-50506 [drbd: only clone bio if we have a backing device]
+CVE-2022-50506 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.0.6-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/6d42ddf7f27b6723549ee6d4c8b1b418b59bf6b5 (6.1-rc2)
-CVE-2022-50505 [iommu/amd: Fix pci device refcount leak in ppr_notifier()]
+CVE-2022-50505 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux 6.1.4-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/6cf0981c2233f97d56938d9d61845383d6eb227c (6.2-rc1)
-CVE-2022-50504 [powerpc/rtas: avoid scheduling in rtas_os_term()]
+CVE-2022-50504 (In the Linux kernel, the following vulnerability has been resolved: p ...)
- linux 6.1.4-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/6c606e57eecc37d6b36d732b1ff7e55b7dc32dd4 (6.2-rc1)
-CVE-2022-50503 [mtd: lpddr2_nvm: Fix possible null-ptr-deref]
+CVE-2022-50503 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux 6.1.4-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/6bdd45d795adf9e73b38ced5e7f750cd199499ff (6.2-rc1)
-CVE-2022-50502 [mm: /proc/pid/smaps_rollup: fix no vma's null-deref]
+CVE-2022-50502 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux 5.5.13-1
NOTE: https://git.kernel.org/linus/6bb8769326c46db3058780c0640dcc49d8187b24 (5.4.221)
-CVE-2022-50501 [media: coda: Add check for dcoda_iram_alloc]
+CVE-2022-50501 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux 6.1.4-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/6b8082238fb8bb20f67e46388123e67a5bbc558d (6.2-rc1)
-CVE-2022-50500 [netdevsim: fix memory leak in nsim_drv_probe() when nsim_dev_resources_register() failed]
+CVE-2022-50500 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.0.7-1
NOTE: https://git.kernel.org/linus/6b1da9f7126f05e857da6db24c6a04aa7974d644 (6.1-rc3)
-CVE-2022-50499 [media: dvb-core: Fix double free in dvb_register_device()]
+CVE-2022-50499 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux 6.1.4-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/6b0d0477fce747d4137aa65856318b55fba72198 (6.2-rc1)
-CVE-2022-50498 [eth: alx: take rtnl_lock on resume]
+CVE-2022-50498 (In the Linux kernel, the following vulnerability has been resolved: e ...)
- linux 6.0.3-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/6ad1c94e1e7e374d88f0cfd77936dddb8339aaba (6.1-rc1)
-CVE-2022-50497 [binfmt_misc: fix shift-out-of-bounds in check_special_flags]
+CVE-2022-50497 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.1.4-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/6a46bf558803dd2b959ca7435a5c143efe837217 (6.2-rc1)
-CVE-2022-50496 [dm cache: Fix UAF in destroy()]
+CVE-2022-50496 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.1.4-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/6a459d8edbdbe7b24db42a5a9f21e6aa9e00c2aa (6.2-rc1)
-CVE-2022-50495 [x86/xen: Fix memory leak in xen_smp_intr_init{_pv}()]
+CVE-2022-50495 (In the Linux kernel, the following vulnerability has been resolved: x ...)
- linux 6.1.4-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/69143f60868b3939ddc89289b29db593b647295e (6.2-rc1)
-CVE-2022-50494 [thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash]
+CVE-2022-50494 (In the Linux kernel, the following vulnerability has been resolved: t ...)
- linux 6.0.3-1
[bullseye] - linux 5.10.158-1
NOTE: https://git.kernel.org/linus/68b99e94a4a2db6ba9b31fe0485e057b9354a640 (6.1-rc1)
-CVE-2022-50493 [scsi: qla2xxx: Fix crash when I/O abort times out]
+CVE-2022-50493 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.1.4-1
NOTE: https://git.kernel.org/linus/68ad83188d782b2ecef2e41ac245d27e0710fe8e (6.2-rc1)
-CVE-2022-50492 [drm/msm: fix use-after-free on probe deferral]
+CVE-2022-50492 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.0.7-1
NOTE: https://git.kernel.org/linus/6808abdb33bf90330e70a687d29f038507e06ebb (6.1-rc3)
-CVE-2022-50491 [coresight: cti: Fix hang in cti_disable_hw()]
+CVE-2022-50491 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux 6.0.7-1
[bullseye] - linux 5.10.158-1
NOTE: https://git.kernel.org/linus/6746eae4bbaddcc16b40efb33dab79210828b3ce (6.1-rc3)
-CVE-2022-50490 [bpf: Propagate error from htab_lock_bucket() to userspace]
+CVE-2022-50490 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.0.3-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/66a7a92e4d0d091e79148a4c6ec15d1da65f4280 (6.1-rc1)
-CVE-2022-50489 [drm/mipi-dsi: Detach devices when removing the host]
+CVE-2022-50489 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.0.3-1
[bullseye] - linux 5.10.158-1
NOTE: https://git.kernel.org/linus/668a8f17b5290d04ef7343636a5588a0692731a1 (6.1-rc1)
-CVE-2022-50488 [block, bfq: fix possible uaf for 'bfqq->bic']
+CVE-2022-50488 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.1.4-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/64dc8c732f5c2b406cc752e6aaa1bd5471159cab (6.2-rc1)
-CVE-2023-53579 [gpio: mvebu: fix irq domain leak]
+CVE-2023-53579 (In the Linux kernel, the following vulnerability has been resolved: g ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
NOTE: https://git.kernel.org/linus/644ee70267a934be27370f9aa618b29af7290544 (6.5-rc3)
-CVE-2023-53578 [net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume()]
+CVE-2023-53578 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.1.25-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/6417070918de3bcdbe0646e7256dae58fd8083ba (6.3-rc7)
-CVE-2023-53577 [bpf, cpumap: Make sure kthread is running before map update returns]
+CVE-2023-53577 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
NOTE: https://git.kernel.org/linus/640a604585aa30f93e39b17d4d6ba69fcb1e66c9 (6.5-rc5)
-CVE-2023-53576 [null_blk: Always check queue mode setting from configfs]
+CVE-2023-53576 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/63f8793ee60513a09f110ea460a6ff2c33811cdb (6.4-rc1)
-CVE-2023-53575 [wifi: iwlwifi: mvm: fix potential array out of bounds access]
+CVE-2023-53575 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux 6.4.11-1
NOTE: https://git.kernel.org/linus/637452360ecde9ac972d19416e9606529576b302 (6.5-rc1)
-CVE-2023-53574 [wifi: rtw88: delete timer and free skb queue when unloading]
+CVE-2023-53574 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux 6.5.6-1
NOTE: https://git.kernel.org/linus/634fcbcaa4062db39aeb5ac6ed1bc1feb8dd5216 (6.6-rc1)
-CVE-2023-53573 [clk: rs9: Fix suspend/resume]
+CVE-2023-53573 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux 6.1.25-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/632e04739c8f45c2d9ca4d4c5bd18d80c2ac9296 (6.3-rc7)
-CVE-2023-53572 [clk: imx: scu: use _safe list iterator to avoid a use after free]
+CVE-2023-53572 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux 6.4.4-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/632c60ecd25dbacee54d5581fe3aeb834b57010a (6.5-rc1)
-CVE-2023-53571 [drm/i915: Make intel_get_crtc_new_encoder() less oopsy]
+CVE-2023-53571 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/631420b06597a33c72b6dcef78d1c2dea17f452d (6.4-rc1)
-CVE-2023-53570 [wifi: nl80211: fix integer overflow in nl80211_parse_mbssid_elems()]
+CVE-2023-53570 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/6311071a056272e1e761de8d0305e87cc566f734 (6.5-rc6)
-CVE-2023-53569 [ext2: Check block size validity during mount]
+CVE-2023-53569 (In the Linux kernel, the following vulnerability has been resolved: e ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/62aeb94433fcec80241754b70d0d1836d5926b0a (6.4-rc1)
-CVE-2023-53568 [s390/zcrypt: don't leak memory if dev_set_name() fails]
+CVE-2023-53568 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.5.6-1
[bookworm] - linux 6.1.55-1
[bullseye] - linux 5.10.197-1
NOTE: https://git.kernel.org/linus/6252f47b78031979ad919f971dc8468b893488bd (6.6-rc1)
-CVE-2023-53567 [spi: qup: Don't skip cleanup in remove's error path]
+CVE-2023-53567 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/61f49171a43ab1f80c73c5c88c508770c461e0f2 (6.4-rc1)
-CVE-2023-53566 [netfilter: nft_set_rbtree: fix null deref on element insertion]
+CVE-2023-53566 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/61ae320a29b0540c16931816299eb86bf2b66c08 (6.4-rc3)
-CVE-2023-53565 [wifi: brcmfmac: Check for probe() id argument being NULL]
+CVE-2023-53565 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux 6.3.7-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/60fc756fc8e6954a5618eecac73b255d651602e4 (6.4-rc3)
-CVE-2023-53564 [ocfs2: fix defrag path triggering jbd2 ASSERT]
+CVE-2023-53564 (In the Linux kernel, the following vulnerability has been resolved: o ...)
- linux 6.1.20-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/60eed1e3d45045623e46944ebc7c42c30a4350f0 (6.3-rc1)
-CVE-2023-53563 [cpufreq: amd-pstate-ut: Fix kernel panic when loading the driver]
+CVE-2023-53563 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux 6.5.3-1
[bookworm] - linux 6.1.55-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/60dd283804479c4a52f995b713f448e2cd65b8c8 (6.6-rc1)
-CVE-2023-53562 [drm/msm: fix vram leak on bind errors]
+CVE-2023-53562 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
NOTE: https://git.kernel.org/linus/60d476af96015891c7959f30838ae7a9749932bf (6.4-rc1)
-CVE-2023-53561 [net: wwan: iosm: fix NULL pointer dereference when removing device]
+CVE-2023-53561 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/60829145f1e2650b31ebe6a0ec70a9725b38fa2c (6.4-rc3)
-CVE-2023-53560 [tracing/histograms: Add histograms to hist_vars if they have referenced variables]
+CVE-2023-53560 (In the Linux kernel, the following vulnerability has been resolved: t ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/6018b585e8c6fa7d85d4b38d9ce49a5b67be7078 (6.5-rc2)
-CVE-2023-53559 [ip_vti: fix potential slab-use-after-free in decode_session6]
+CVE-2023-53559 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux 6.4.13-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux 5.10.197-1
NOTE: https://git.kernel.org/linus/6018a266279b1a75143c7c0804dd08a5fc4c3e0b (6.5-rc7)
-CVE-2023-53558 [rcu-tasks: Avoid pr_info() with spin lock in cblist_init_generic()]
+CVE-2023-53558 (In the Linux kernel, the following vulnerability has been resolved: r ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
NOTE: https://git.kernel.org/linus/5fc8cbe4cf0fd34ded8045c385790c3bf04f6785 (6.5-rc1)
-CVE-2023-53557 [fprobe: Release rethook after the ftrace_ops is unregistered]
+CVE-2023-53557 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/5f81018753dfd4989e33ece1f0cb6b8aae498b82 (6.5-rc2)
-CVE-2023-53556 [iavf: Fix use-after-free in free_netdev]
+CVE-2023-53556 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/5f4fa1672d98fe99d2297b03add35346f1685d6b (6.5-rc3)
-CVE-2023-53555 [mm/damon/core: initialize damo_filter->list from damos_new_filter()]
+CVE-2023-53555 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux 6.4.11-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/5f1fc67f2cb8d3035d3acd273b48b97835af8afd (6.5-rc6)
-CVE-2023-53554 [staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext()]
+CVE-2023-53554 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/5f1c7031e044cb2fba82836d55cc235e2ad619dc (6.5-rc4)
-CVE-2023-53553 [HID: hyperv: avoid struct memcpy overrun warning]
+CVE-2023-53553 (In the Linux kernel, the following vulnerability has been resolved: H ...)
- linux 6.4.11-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/5f151364b1da6bd217632fd4ee8cc24eaf66a497 (6.5-rc2)
-CVE-2023-53552 [drm/i915: mark requests for GuC virtual engines to avoid use-after-free]
+CVE-2023-53552 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.5.6-1
[bookworm] - linux 6.1.55-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/5eefc5307c983b59344a4cb89009819f580c84fa (6.6-rc1)
-CVE-2023-53551 [usb: gadget: u_serial: Add null pointer check in gserial_resume]
+CVE-2023-53551 (In the Linux kernel, the following vulnerability has been resolved: u ...)
- linux 6.1.15-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/5ec63fdbca604568890c577753c6f66c5b3ef0b5 (6.3-rc1)
-CVE-2023-53550 [cpufreq: amd-pstate: fix global sysfs attribute type]
+CVE-2023-53550 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux 6.4.11-1
[bookworm] - linux <not-affected> (Vulnerable code not present)
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/5e720f8c8c9d959283c3908bbf32a91a01a86547 (6.5-rc6)
-CVE-2023-53549 [netfilter: ipset: Rework long task execution when adding/deleting entries]
+CVE-2023-53549 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.1.7-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/5e29dc36bd5e2166b834ceb19990d9e68a734d7d (6.2-rc3)
-CVE-2023-53548 [net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb]
+CVE-2023-53548 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/5e1627cb43ddf1b24b92eb26f8d958a3f5676ccb (6.5-rc3)
-CVE-2023-53547 [drm/amdgpu: Fix sdma v4 sw fini error]
+CVE-2023-53547 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
NOTE: https://git.kernel.org/linus/5e08e9c742a00384e5abe74bd40cf4dc15cb3a2e (6.4-rc1)
-CVE-2023-53546 [net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx]
+CVE-2023-53546 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.4.11-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/5dd77585dd9d0e03dd1bceb95f0269a7eaf6b936 (6.5-rc5)
-CVE-2023-53545 [drm/amdgpu: unmap and remove csa_va properly]
+CVE-2023-53545 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.4.13-1
NOTE: https://git.kernel.org/linus/5daff15cd013422bc6d1efcfe82b586800025384 (6.5-rc1)
-CVE-2023-53544 [cpufreq: davinci: Fix clk use after free]
+CVE-2023-53544 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux 6.1.20-1
NOTE: https://git.kernel.org/linus/5d8f384a9b4fc50f6a18405f1c08e5a87a77b5b3 (6.3-rc1)
-CVE-2023-53543 [vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check]
+CVE-2023-53543 (In the Linux kernel, the following vulnerability has been resolved: v ...)
- linux 6.4.13-1
[bookworm] - linux 6.1.52-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/5d6ba607d6cb5c58a4ddf33381e18c83dbb4098f (6.5-rc7)
-CVE-2023-53542 [ARM: dts: exynos: Use Exynos5420 compatible for the MIPI video phy]
+CVE-2023-53542 (In the Linux kernel, the following vulnerability has been resolved: A ...)
- linux 6.1.20-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/5d5aa219a790d61cad2c38e1aa32058f16ad2f0b (6.3-rc1)
-CVE-2023-53541 [mtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write]
+CVE-2023-53541 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux 6.5.6-1
[bookworm] - linux 6.1.55-1
[bullseye] - linux 5.10.197-1
NOTE: https://git.kernel.org/linus/5d53244186c9ac58cb88d76a0958ca55b83a15cd (6.6-rc1)
-CVE-2023-53540 [wifi: cfg80211: reject auth/assoc to AP with our address]
+CVE-2023-53540 (In the Linux kernel, the following vulnerability has been resolved: w ...)
- linux 6.5.6-1
[bookworm] - linux 6.1.55-1
NOTE: https://git.kernel.org/linus/5d4e04bf3a0f098bd9033de3a5291810fa14c7a6 (6.6-rc1)
-CVE-2023-53539 [RDMA/rxe: Fix incomplete state save in rxe_requester]
+CVE-2023-53539 (In the Linux kernel, the following vulnerability has been resolved: R ...)
- linux 6.5.3-1
[bookworm] - linux 6.1.55-1
NOTE: https://git.kernel.org/linus/5d122db2ff80cd2aed4dcd630befb56b51ddf947 (6.6-rc1)
-CVE-2023-53538 [btrfs: insert tree mod log move in push_node_left]
+CVE-2023-53538 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.4.4-1
NOTE: https://git.kernel.org/linus/5cead5422a0e3d13b0bcee986c0f5c4ebb94100b (6.5-rc1)
-CVE-2023-53537 [f2fs: fix to avoid use-after-free for cached IPU bio]
+CVE-2023-53537 (In the Linux kernel, the following vulnerability has been resolved: f ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/5cdb422c839134273866208dad5360835ddb9794 (6.4-rc1)
-CVE-2023-53536 [blk-crypto: make blk_crypto_evict_key() more robust]
+CVE-2023-53536 (In the Linux kernel, the following vulnerability has been resolved: b ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/5c7cb94452901a93e90c2230632e2c12a681bc92 (6.4-rc1)
-CVE-2023-53535 [net: bcmgenet: Add a check for oversized packets]
+CVE-2023-53535 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.1.20-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/5c0862c2c962052ed5055220a00ac1cefb92fbcd (6.3-rc1)
-CVE-2023-53534 [drm/mediatek: mtk_drm_crtc: Add checks for devm_kcalloc]
+CVE-2023-53534 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.1.20-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/5bf1e3bd7da625ccf9a22c8cb7d65271e6e47f4c (6.3-rc1)
-CVE-2023-53533 [Input: raspberrypi-ts - fix refcount leak in rpi_ts_probe]
+CVE-2023-53533 (In the Linux kernel, the following vulnerability has been resolved: I ...)
- linux 6.3.7-1
[bookworm] - linux 6.1.37-1
[bullseye] - linux 5.10.191-1
NOTE: https://git.kernel.org/linus/5bca3688bdbc3b58a2894b8671a8e2378efe28bd (6.4-rc1)
-CVE-2022-50487 [NFSD: Protect against send buffer overflow in NFSv3 READDIR]
+CVE-2022-50487 (In the Linux kernel, the following vulnerability has been resolved: N ...)
- linux 6.0.3-1
[bullseye] - linux 5.10.221-1
NOTE: https://git.kernel.org/linus/640f87c190e0d1b2a0fcb2ecf6d2cd53b1c41991 (6.1-rc1)
-CVE-2022-50486 [net: ethernet: ti: Fix return type of netcp_ndo_start_xmit()]
+CVE-2022-50486 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.1.4-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/63fe6ff674a96cfcfc0fa8df1051a27aa31c70b4 (6.2-rc1)
-CVE-2022-50485 [ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode]
+CVE-2022-50485 (In the Linux kernel, the following vulnerability has been resolved: e ...)
- linux 6.1.4-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/63b1e9bccb71fe7d7e3ddc9877dbdc85e5d2d023 (6.2-rc1)
-CVE-2022-50484 [ALSA: usb-audio: Fix potential memory leaks]
+CVE-2022-50484 (In the Linux kernel, the following vulnerability has been resolved: A ...)
- linux 6.0.3-1
[bullseye] - linux 5.10.158-1
NOTE: https://git.kernel.org/linus/6382da0828995af87aa8b8bef28cc61aceb4aff3 (6.1-rc1)
-CVE-2022-50483 [net: enetc: avoid buffer leaks on xdp_do_redirect() failure]
+CVE-2022-50483 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.1.4-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/628050ec952d2e2e46ec9fb6aa07e41139e030c8 (6.2-rc1)
-CVE-2022-50482 [iommu/vt-d: Clean up si_domain in the init_dmars() error path]
+CVE-2022-50482 (In the Linux kernel, the following vulnerability has been resolved: i ...)
- linux 6.0.6-1
[bullseye] - linux 5.10.158-1
NOTE: https://git.kernel.org/linus/620bf9f981365c18cc2766c53d92bf8131c63f32 (6.1-rc2)
-CVE-2022-50481 [Description:]
+CVE-2022-50481 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux 6.1.4-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/61c80d1c3833e196256fb060382db94f24d3d9a7 (6.2-rc1)
-CVE-2022-50480 [memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe()]
+CVE-2022-50480 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux 6.0.3-1
[bullseye] - linux 5.10.158-1
NOTE: https://git.kernel.org/linus/61b3c876c1cbdb1efd1f52a1f348580e6e14efb6 (6.1-rc1)
-CVE-2022-50479 [drm/amd: fix potential memory leak]
+CVE-2022-50479 (In the Linux kernel, the following vulnerability has been resolved: d ...)
- linux 6.0.3-1
NOTE: https://git.kernel.org/linus/6160216fd2c97107e8a9ab39863b056d677fcd85 (6.1-rc1)
-CVE-2022-50478 [nilfs2: fix shift-out-of-bounds/overflow in nilfs_sb2_bad_offset()]
+CVE-2022-50478 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.1.4-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/610a2a3d7d8be3537458a378ec69396a76c385b6 (6.2-rc1)
-CVE-2022-50477 [rtc: class: Fix potential memleak in devm_rtc_allocate_device()]
+CVE-2022-50477 (In the Linux kernel, the following vulnerability has been resolved: r ...)
- linux 6.1.4-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/60da73808298ff2cfa9f165d55eb3d7aa7078601 (6.2-rc1)
-CVE-2022-50476 [ntb_netdev: Use dev_kfree_skb_any() in interrupt context]
+CVE-2022-50476 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.1.4-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/5f7d78b2b12a9d561f48fa00bab29b40f4616dad (6.2-rc1)
-CVE-2022-50475 [RDMA/core: Make sure "ib_port" is valid when access sysfs node]
+CVE-2022-50475 (In the Linux kernel, the following vulnerability has been resolved: R ...)
- linux 6.1.4-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE: https://git.kernel.org/linus/5e15ff29b156bbbdeadae230c8ecd5ecd8ca2477 (6.2-rc1)
-CVE-2022-50474 [macintosh: fix possible memory leak in macio_add_one_device()]
+CVE-2022-50474 (In the Linux kernel, the following vulnerability has been resolved: m ...)
- linux 6.1.4-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/5ca86eae55a2f006e6c1edd2029b2cacb6979515 (6.2-rc1)
-CVE-2022-50473 [cpufreq: Init completion before kobject_init_and_add()]
+CVE-2022-50473 (In the Linux kernel, the following vulnerability has been resolved: c ...)
- linux 6.1.4-1
[bullseye] - linux 5.10.178-1
NOTE: https://git.kernel.org/linus/5c51054896bcce1d33d39fead2af73fec24f40b6 (6.2-rc1)
-CVE-2022-50472 [IB/mad: Don't call to function that might sleep while in atomic context]
+CVE-2022-50472 (In the Linux kernel, the following vulnerability has been resolved: I ...)
- linux 6.1.4-1
NOTE: https://git.kernel.org/linus/5c20311d76cbaeb7ed2ecf9c8b8322f8fc4a7ae3 (6.2-rc1)
-CVE-2022-50471 [xen/gntdev: Accommodate VMA splitting]
+CVE-2022-50471 (In the Linux kernel, the following vulnerability has been resolved: x ...)
- linux 6.0.3-1
[bullseye] - linux 5.10.158-1
NOTE: https://git.kernel.org/linus/5c13a4a0291b30191eff9ead8d010e1ca43a4d0c (6.1-rc1)
-CVE-2022-50470 [xhci: Remove device endpoints from bandwidth list when freeing the device]
+CVE-2022-50470 (In the Linux kernel, the following vulnerability has been resolved: x ...)
- linux 6.0.7-1
[bullseye] - linux 5.10.158-1
NOTE: https://git.kernel.org/linus/5aed5b7c2430ce318a8e62f752f181e66f0d1053 (6.1-rc3)
@@ -982,7 +982,7 @@ CVE-2025-0616 (Improper Neutralization of Special Elements used in an SQL Comman
NOT-FOR-US: B2B Netsis Panel
CVE-2024-56804 (An SQL injection vulnerability has been reported to affect Video Stati ...)
NOT-FOR-US: QNAP
-CVE-2025-61962 [fetchmail-SA-2025-01: SMTP AUTH denial of service]
+CVE-2025-61962 (In fetchmail before 6.5.6, the SMTP client can crash when authenticati ...)
- fetchmail 6.5.6-1 (bug #1117136)
[trixie] - fetchmail <no-dsa> (Minor issue)
[bookworm] - fetchmail <no-dsa> (Minor issue)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cc70d8c18dd86cc8e4a93169f7c39909387094f0
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cc70d8c18dd86cc8e4a93169f7c39909387094f0
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251004/994dba40/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list