Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
cffef268 by Salvatore Bonaccorso at 2025-09-16T16:20:06+02:00
Remove notes from now rejected CVEs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -88,11 +88,8 @@ CVE-2023-53284 [drm/msm/dpu: check for null return of 
devm_kzalloc() in dpu_writ
        - linux 6.1.20-1
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/21e9a838f505178e109ccb3bf19d7808eb0326f4 (6.3-rc1)
-CVE-2023-53283 [xen/virtio: Fix NULL deref when a bridge of PCI root bus has 
no parent]
-       - linux 6.4.11-1
-       [bookworm] - linux <not-affected> (Vulnerable code not present)
-       [bullseye] - linux <not-affected> (Vulnerable code not present)
-       NOTE: 
https://git.kernel.org/linus/21a235bce12361e64adfc2ef97e4ae2e51ad63d4 (6.5-rc2)
+CVE-2023-53283
+       REJECTED
 CVE-2023-53282 [scsi: lpfc: Fix use-after-free KFENCE violation during sysfs 
firmware write]
        - linux 6.1.20-1
        NOTE: 
https://git.kernel.org/linus/21681b81b9ae548c5dae7ae00d931197a27f480c (6.3-rc1)
@@ -880,10 +877,8 @@ CVE-2023-53228 (In the Linux kernel, the following 
vulnerability has been resolv
        [bookworm] - linux <not-affected> (Vulnerable code not present)
        [bullseye] - linux <not-affected> (Vulnerable code not present)
        NOTE: 
https://git.kernel.org/linus/1253685f0d3eb3eab0bfc4bf15ab341a5f3da0c8 (6.4-rc1)
-CVE-2023-53227 (In the Linux kernel, the following vulnerability has been 
resolved:  u ...)
-       - linux 6.1.20-1
-       [bullseye] - linux 5.10.178-1
-       NOTE: 
https://git.kernel.org/linus/122deabfe1428bffe95e2bf364ff8a5059bdf089 (6.3-rc1)
+CVE-2023-53227
+       REJECTED
 CVE-2023-53226 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
        - linux 6.5.3-1
        [bookworm] - linux 6.1.55-1
@@ -1006,10 +1001,8 @@ CVE-2023-53199 (In the Linux kernel, the following 
vulnerability has been resolv
        - linux 6.1.20-1
        [bullseye] - linux 5.10.178-1
        NOTE: 
https://git.kernel.org/linus/0af54343a76263a12dbae7fafb64eb47c4a6ad38 (6.3-rc1)
-CVE-2022-50290 (In the Linux kernel, the following vulnerability has been 
resolved:  w ...)
-       - linux 6.1.4-1
-       [bullseye] - linux 5.10.178-1
-       NOTE: 
https://git.kernel.org/linus/13e5afd3d773c6fc6ca2b89027befaaaa1ea7293 (6.2-rc1)
+CVE-2022-50290
+       REJECTED
 CVE-2022-50289 (In the Linux kernel, the following vulnerability has been 
resolved:  o ...)
        - linux 6.1.4-1
        [bullseye] - linux 5.10.178-1



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cffef2685ea42e012e56765ced2a3ba091a6b9b2

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cffef2685ea42e012e56765ced2a3ba091a6b9b2
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to