[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Mon Sep 15 19:44:38 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
4a526148 by Salvatore Bonaccorso at 2025-09-15T20:44:13+02:00
Merge Linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,310 @@
+CVE-2023-53242 [thermal/drivers/hisi: Drop second sensor hi3660]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/15cc25829a97c3957e520e971868aacc84341317 (6.3-rc1)
+CVE-2023-53241 [nfsd: call op_release, even when op_func returns an error]
+ - linux 6.1.25-1
+ [bullseye] - linux 5.10.221-1
+ NOTE: https://git.kernel.org/linus/15a8b55dbb1ba154d82627547c5761cac884d810 (6.3-rc6)
+CVE-2023-53240 [xsk: check IFF_UP earlier in Tx path]
+ - linux 6.1.20-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/1596dae2f17ec5c6e8c8f0e3fec78c5ae55c1e0b (6.3-rc1)
+CVE-2023-53239 [drm/msm/mdp5: Add check for kzalloc]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/13fcfcb2a9a4787fe4e49841d728f6f2e9fa6911 (6.3-rc1)
+CVE-2023-53238 [phy: hisilicon: Fix an out of bounds check in hisi_inno_phy_probe()]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/13c088cf3657d70893d75cf116be937f1509cc0f (6.5-rc4)
+CVE-2023-53237 [drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v11_0_hw_fini]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/13af556104fa93b1945c70bbf8a0a62cd2c92879 (6.4-rc1)
+CVE-2023-53236 [iommufd: Do not corrupt the pfn list when doing batch carry]
+ - linux 6.3.7-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/13a0d1ae7ee6b438f5537711a8c60cba00554943 (6.3-rc6)
+CVE-2023-53235 [drm/tests: helpers: Avoid a driver uaf]
+ - linux 6.5.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/139a27854bf5ce93ff9805f9f7683b88c13074dc (6.6-rc2)
+CVE-2023-53234 [watchdog: Fix kmemleak in watchdog_cdev_register]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/13721a2ac66b246f5802ba1b75ad8637e53eeecc (6.3-rc1)
+CVE-2023-53233 [net/smc: fix deadlock triggered by cancel_delayed_work_syn()]
+ - linux 6.1.25-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/13085e1b5cab8ad802904d72e6a6dae85ae0cd20 (6.3-rc3)
+CVE-2023-53232 [mt76: mt7921: fix kernel panic by accessing unallocated eeprom.data]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/12db28c3ef31f719bd18fa186a40bb152e6a527c (6.4-rc1)
+CVE-2023-53231 [erofs: Fix detection of atomic context]
+ - linux 6.4.11-1
+ NOTE: https://git.kernel.org/linus/12d0a24afd9ea58e581ea64d64e066f2027b28d9 (6.5-rc1)
+CVE-2023-53230 [smb: client: fix warning in cifs_smb3_do_mount()]
+ - linux 6.4.13-1
+ [bookworm] - linux 6.1.52-1
+ NOTE: https://git.kernel.org/linus/12c30f33cc6769bf411088a2872843c4f9ea32f9 (6.5-rc1)
+CVE-2023-53229 [wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta]
+ - linux 6.1.25-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/12b220a6171faf10638ab683a975cadcf1a352d6 (6.3-rc6)
+CVE-2023-53228 [drm/amdgpu: drop redundant sched job cleanup when cs is aborted]
+ - linux 6.3.7-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/1253685f0d3eb3eab0bfc4bf15ab341a5f3da0c8 (6.4-rc1)
+CVE-2023-53227 [ubifs: dirty_cow_znode: Fix memleak in error handling path]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/122deabfe1428bffe95e2bf364ff8a5059bdf089 (6.3-rc1)
+CVE-2023-53226 [wifi: mwifiex: Fix OOB and integer underflow when rx packets]
+ - linux 6.5.3-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/11958528161731c58e105b501ed60b83a91ea941 (6.6-rc1)
+CVE-2023-53225 [spi: imx: Don't skip cleanup in remove's error path]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/11951c9e3f364d7ae3b568a0e52c8335d43066b5 (6.4-rc1)
+CVE-2023-53224 [ext4: Fix function prototype mismatch for ext4_feat_ktype]
+ - linux 6.1.15-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/118901ad1f25d2334255b3d50512fa20591531cd (6.3-rc1)
+CVE-2023-53223 [drm/msm/dsi: Add missing check for alloc_ordered_workqueue]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/115906ca7b535afb1fe7b5406c566ccd3873f82b (6.3-rc1)
+CVE-2023-53222 [jfs: jfs_dmap: Validate db_l2nbperpage while mounting]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/11509910c599cbd04585ec35a6d5e1a0053d84c1 (6.5-rc1)
+CVE-2023-53221 [bpf: Fix memleak due to fentry attach failure]
+ - linux 6.4.4-1
+ [bookworm] - linux 6.1.52-1
+ NOTE: https://git.kernel.org/linus/108598c39eefbedc9882273ac0df96127a629220 (6.5-rc1)
+CVE-2023-53220 [media: az6007: Fix null-ptr-deref in az6007_i2c_xfer()]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/1047f9343011f2cedc73c64829686206a7e9fc3f (6.6-rc1)
+CVE-2023-53219 [media: netup_unidvb: fix use-after-free at del_timer()]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/0f5bb36bf9b39a2a96e730bf4455095b50713f63 (6.4-rc3)
+CVE-2023-53218 [rxrpc: Make it so that a waiting process can be aborted]
+ - linux 6.3.7-1
+ NOTE: https://git.kernel.org/linus/0eb362d254814ce04848730bf32e75b8ee1a4d6c (6.4-rc1)
+CVE-2023-53217 [nubus: Partially revert proc_create_single_data() conversion]
+ - linux 6.4.4-1
+ [bookworm] - linux 6.1.38-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/0e96647cff9224db564a1cee6efccb13dbe11ee2 (6.5-rc1)
+CVE-2023-53216 [arm64: efi: Make efi_rt_lock a raw_spinlock]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/0e68b5517d3767562889f1d83fdb828c26adb24f (6.3-rc1)
+CVE-2023-53215 [sched/fair: Don't balance task to its current running CPU]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/0dd37d6dd33a9c23351e6115ae8cdac7863bc7de (6.5-rc1)
+CVE-2023-53214 [f2fs: fix to avoid potential memory corruption in __update_iostat_latency()]
+ - linux 6.1.20-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0dbbf0fb38d5ec5d4138d1aeaeb43d9217b9a592 (6.3-rc1)
+CVE-2023-53213 [wifi: brcmfmac: slab-out-of-bounds read in brcmf_get_assoc_ies()]
+ - linux 6.1.27-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/0da40e018fd034d87c9460123fa7f897b69fdee7 (6.4-rc1)
+CVE-2023-53212 [xenbus: check xen_domain in xenbus_probe_initcall]
+ - linux 6.4.4-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0d8f7cc8057890db08c54fe610d8a94af59da082 (6.5-rc4)
+CVE-2023-53211 [driver core: location: Free struct acpi_pld_info *pld before return false]
+ - linux 6.1.20-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0d150f967e8410e1e6712484543eec709356a65d (6.3-rc1)
+CVE-2023-53210 [md/raid5-cache: fix null-ptr-deref for r5l_flush_stripe_to_raid()]
+ - linux 6.5.3-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0d0bd28c500173bfca78aa840f8f36d261ef1765 (6.6-rc1)
+CVE-2023-53209 [wifi: mac80211_hwsim: Fix possible NULL dereference]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ NOTE: https://git.kernel.org/linus/0cc80943ef518a1c51a1111e9346d1daf11dd545 (6.5-rc1)
+CVE-2023-53208 [KVM: nSVM: Load L1's TSC multiplier based on L1 state, not L2 state]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0c94e2468491cbf0754f49a5136ab51294a96b69 (6.6-rc1)
+CVE-2023-53207 [ublk: fail to recover device if queue setup is interrupted]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0c0cbd4ebc375ceebc75c89df04b74f215fab23a (6.5-rc4)
+CVE-2023-53206 [hwmon: (pmbus_core) Fix NULL pointer dereference]
+ - linux 6.4.11-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0bd66784274a287beada2933c2c0fa3a0ddae0d7 (6.5-rc4)
+CVE-2023-53205 [KVM: s390/diag: fix racy access of physical cpu number in diag 9c handler]
+ - linux 6.4.4-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0bc380beb78aa352eadbc21d934dd9606fcee808 (6.5-rc1)
+CVE-2023-53204 [af_unix: Fix data-races around user->unix_inflight.]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/0bc36c0650b21df36fbec8136add83936eaf0607 (6.6-rc1)
+CVE-2023-53203 [wifi: mt76: mt7996: rely on mt76_connac2_mac_tx_rate_val]
+ - linux 6.3.7-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0b8e2d69467f78a7c9d87b452220e87012435e33 (6.3-rc1)
+CVE-2023-53202 [PM: domains: fix memory leak with using debugfs_lookup()]
+ - linux 6.1.20-1
+ NOTE: https://git.kernel.org/linus/0b6200e1e9f53dabdc30d0f6c51af9a5f664d32b (6.3-rc1)
+CVE-2023-53201 [RDMA/bnxt_re: wraparound mbox producer index]
+ - linux 6.4.4-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/0af91306e17ef3d18e5f100aa58aa787869118af (6.5-rc1)
+CVE-2023-53200 [netfilter: x_tables: fix percpu counter block leak on error path when creating new netns]
+ - linux 6.1.20-1
+ NOTE: https://git.kernel.org/linus/0af8c09c896810879387decfba8c942994bb61f5 (6.3-rc1)
+CVE-2023-53199 [wifi: ath9k: hif_usb: clean up skbs if ath9k_hif_usb_rx_stream() fails]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/0af54343a76263a12dbae7fafb64eb47c4a6ad38 (6.3-rc1)
+CVE-2022-50290 [wifi: mac80211: fix memory leak in ieee80211_if_add()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/13e5afd3d773c6fc6ca2b89027befaaaa1ea7293 (6.2-rc1)
+CVE-2022-50289 [ocfs2: fix memory leak in ocfs2_stack_glue_init()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/13b6269dd022aaa69ca8d1df374ab327504121cf (6.2-rc1)
+CVE-2022-50288 [qlcnic: prevent ->dcb use-after-free on qlcnic_dcb_enable() failure]
+ - linux 6.1.7-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/13a7c8964afcd8ca43c0b6001ebb0127baa95362 (6.2-rc3)
+CVE-2022-50287 [drm/i915/bios: fix a memory leak in generate_lfp_data_ptrs]
+ - linux 6.1.4-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/1382901f75a5a7dc8eac05059fd0c7816def4eae (6.2-rc1)
+CVE-2022-50286 [ext4: fix delayed allocation bug in ext4_clu_mapped for bigalloc + inline]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/131294c35ed6f777bd4e79d42af13b5c41bf2775 (6.2-rc1)
+CVE-2022-50285 [mm,hugetlb: take hugetlb_lock before decrementing h->resv_huge_pages]
+ - linux 6.0.6-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/12df140f0bdfae5dcfc81800970dd7f6f632e00c (6.1-rc2)
+CVE-2022-50284 [ipc: fix memory leak in init_mqueue_fs()]
+ - linux 6.1.4-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/12b677f2c697d61e5ddbcb6c1650050a39392f54 (6.2-rc1)
+CVE-2022-50283 [mtd: core: add missing of_node_get() in dynamic partitions code]
+ - linux 6.0.7-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/12b58961de0bd88b3c7dfa5d21f6d67f4678b780 (6.1-rc3)
+CVE-2022-50282 [chardev: fix error handling in cdev_device_add()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/11fa7fefe3d8fac7da56bc9aa3dd5fb3081ca797 (6.2-rc1)
+CVE-2022-50281 [MIPS: SGI-IP27: Fix platform-device leak in bridge_platform_create()]
+ - linux 6.0.3-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/11bec9cba4de06b3c0e9e4041453c2caaa1cbec1 (6.1-rc1)
+CVE-2022-50280 [pnode: terminate at peers of source]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/11933cf1d91d57da9e5c53822a540bbdc2656c16 (6.2-rc1)
+CVE-2022-50279 [wifi: rtlwifi: Fix global-out-of-bounds bug in _rtl8812ae_phy_set_txpower_limit()]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/117dbeda22ec5ea0918254d03b540ef8b8a64d53 (6.3-rc1)
+CVE-2022-50278 [PNP: fix name memory leak in pnp_alloc_dev()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/110d7b0325c55ff3620073ba4201845f59e22ebf (6.2-rc1)
+CVE-2022-50277 [ext4: don't allow journal inode to have encrypt flag]
+ - linux 6.1.4-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/105c78e12468413e426625831faa7db4284e1fec (6.2-rc1)
+CVE-2022-50276 [power: supply: fix null pointer dereferencing in power_supply_get_battery_info]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/104bb8a663451404a26331263ce5b96c34504049 (6.2-rc1)
+CVE-2022-50275 [drm/radeon: Add the missed acpi_put_table() to fix memory leak]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/10276a20be1115e1f76c189330da2992df980eee (6.2-rc1)
+CVE-2022-50274 [media: dvbdev: adopts refcnt to avoid UAF]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/0fc044b2b5e2d05a1fa1fb0d7f270367a7855d79 (6.2-rc1)
+CVE-2022-50273 [f2fs: fix to do sanity check on destination blkaddr during recovery]
+ - linux 6.0.3-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/0ef4ca04a3f9223ff8bc440041c524b2123e09a3 (6.1-rc1)
+CVE-2022-50272 [media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/0ed554fd769a19ea8464bb83e9ac201002ef74ad (6.2-rc1)
+CVE-2022-50271 [vhost/vsock: Use kvmalloc/kvfree for larger packets.]
+ - linux 6.0.3-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/0e3f72931fc47bb81686020cc643cde5d9cd0bb8 (6.1-rc1)
+CVE-2022-50270 [f2fs: fix the assign logic of iocb]
+ - linux 6.1.4-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0db18eec0d9a7ee525209e31e3ac2f673545b12f (6.2-rc1)
+CVE-2022-50269 [drm/vkms: Fix memory leak in vkms_init()]
+ - linux 6.1.20-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0d0b368b9d104b437e1f4850ae94bdb9a3601e89 (6.3-rc1)
+CVE-2022-50268 [mmc: moxart: fix return value check of mmc_add_host()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/0ca18d09c744fb030ae9bc5836c3e357e0237dea (6.2-rc1)
+CVE-2022-50267 [mmc: rtsx_pci: fix return value check of mmc_add_host()]
+ - linux 6.1.4-1
+ NOTE: https://git.kernel.org/linus/0c87db77423a282b3b38b8a6daf057b822680516 (6.2-rc1)
+CVE-2022-50266 [kprobes: Fix check for probe enabled in kill_kprobe()]
+ - linux 6.1.4-1
+ NOTE: https://git.kernel.org/linus/0c76ef3f26d5ef2ac2c21b47e7620cff35809fbb (6.2-rc1)
+CVE-2022-50265 [kcm: annotate data-races around kcm->rx_wait]
+ - linux 6.0.7-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/0c745b5141a45a076f1cb9772a399f7ebcb0948a (6.1-rc3)
+CVE-2022-50264 [clk: socfpga: Fix memory leak in socfpga_gate_init()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/0b8ba891ad4d1ef6bfa4c72efc83f9f9f855f68b (6.2-rc1)
+CVE-2022-50263 [vdpasim: fix memory leak when freeing IOTLBs]
+ - linux 6.1.7-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0b7a04a30eef20e6b24926a45c0ce7906ae85bd6 (6.2-rc3)
+CVE-2022-50262 [fs/ntfs3: Validate BOOT record_size]
+ - linux 6.1.4-1
+ NOTE: https://git.kernel.org/linus/0b66046266690454dc04e6307bcff4a5605b42a1 (6.2-rc1)
CVE-2023-53198 [raw: Fix NULL deref in raw_get_next().]
- linux 6.1.25-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4a526148de259557bc75d22d32c32990c4ab8130
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4a526148de259557bc75d22d32c32990c4ab8130
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250915/904ccdbf/attachment.htm>
More information about the debian-security-tracker-commits
mailing list