[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Oct 1 19:57:43 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
29727771 by Salvatore Bonaccorso at 2025-10-01T20:56:09+02:00
Merge Linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,276 @@
+CVE-2023-53487 [powerpc/rtas_flash: allow user copy to flash block cache objects]
+ - linux 6.4.13-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/4f3175979e62de3b929bfa54a0db4b87d36257a7 (6.5-rc7)
+CVE-2023-53486 [fs/ntfs3: Enhance the attribute size check]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.82-1
+ NOTE: https://git.kernel.org/linus/4f082a7531223a438c757bb20e304f4c941c67a8 (6.4-rc1)
+CVE-2023-53485 [fs: jfs: Fix UBSAN: array-index-out-of-bounds in dbAllocDmapLev]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/4e302336d5ca1767a06beee7596a72d3bdc8d983 (6.5-rc1)
+CVE-2023-53484 [lib: cpu_rmap: Avoid use after free on rmap->obj array entries]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/4e0473f1060aa49621d40a113afde24818101d37 (6.4-rc1)
+CVE-2023-53483 [ACPI: processor: Check for null return of devm_kzalloc() in fch_misc_setup()]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ NOTE: https://git.kernel.org/linus/4dea41775d951ff1f7b472a346a8ca3ae7e74455 (6.4-rc1)
+CVE-2023-53482 [iommu: Fix error unwind in iommu_group_alloc()]
+ - linux 6.1.20-1
+ NOTE: https://git.kernel.org/linus/4daa861174d56023c2068ddb03de0752f07fa199 (6.3-rc1)
+CVE-2023-53481 [ubi: ubi_wl_put_peb: Fix infinite loop when wear-leveling work failed]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/4d57a7333e26040f2b583983e1970d9d460e56b0 (6.3-rc1)
+CVE-2023-53480 [kobject: Add sanity check for kset->kobj.ktype in kset_register()]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/4d0fe8c52bb3029d83e323c961221156ab98680b (6.6-rc1)
+CVE-2023-53479 [cxl/acpi: Fix a use-after-free in cxl_parse_cfmws()]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/4cf67d3cc9994a59cf77bb9c0ccf9007fe916afe (6.5-rc4)
+CVE-2023-53478 [tracing/synthetic: Fix races on freeing last_cmd]
+ - linux 6.1.25-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/4ccf11c4e8a8e051499d53a12f502196c97a758e (6.3-rc6)
+CVE-2023-53477 [ipv6: Add lwtunnel encap size of all siblings in nexthop calculation]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/4cc59f386991ec9374cb4bc83dbe1c0b5a95033f (6.3-rc1)
+CVE-2023-53476 [iw_cxgb4: Fix potential NULL dereference in c4iw_fill_res_cm_id_entry()]
+ - linux 6.1.20-1
+ NOTE: https://git.kernel.org/linus/4ca446b127c568b59cb8d9748b6f70499624bb18 (6.3-rc1)
+CVE-2023-53475 [usb: xhci: tegra: fix sleep in atomic call]
+ - linux 6.1.25-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/4c7f9d2e413dc06a157c4e5dccde84aaf4655eb3 (6.3-rc6)
+CVE-2023-53474 [x86/MCE/AMD: Use an u64 for bank_map]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/4c1cdec319b9aadb65737c3eb1f5cb74bd6aa156 (6.4-rc1)
+CVE-2023-53473 [ext4: improve error handling from ext4_dirhash()]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ NOTE: https://git.kernel.org/linus/4b3cb1d108bfc2aebb0d7c8a52261a53cf7f5786 (6.4-rc2)
+CVE-2023-53472 [pwm: lpc32xx: Remove handling of PWM channels]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/4aae44f65827f0213a7361cf9c32cfe06114473f (6.6-rc1)
+CVE-2023-53471 [drm/amdgpu/gfx: disable gfx9 cp_ecc_error_irq only when enabling legacy gfx ras]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/4a76680311330aefe5074bed8f06afa354b85c48 (6.4-rc2)
+CVE-2023-53470 [ionic: catch failure from devlink_alloc]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ NOTE: https://git.kernel.org/linus/4a54903ff68ddb33b6463c94b4eb37fc584ef760 (6.4-rc1)
+CVE-2023-53469 [af_unix: Fix null-ptr-deref in unix_stream_sendpage().]
+ - linux 6.4.13-1
+ NOTE: https://git.kernel.org/linus/4a3fcfc3b51796e5e6974041c9a7cf7808d16f9e (6.4.12)
+CVE-2023-53468 [ubifs: Fix memory leak in alloc_wbufs()]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/4a1ff3c5d04b9079b4f768d9a71b51c4af578dd2 (6.3-rc1)
+CVE-2023-53467 [wifi: rtw89: fix potential leak in rtw89_append_probe_req_ie()]
+ - linux 6.1.20-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/4a0e218cc9c42d1903ade8b5a371dcf48cf918c5 (6.3-rc1)
+CVE-2023-53466 [wifi: mt76: mt7915: fix memory leak in mt7915_mcu_exit]
+ - linux 6.1.20-1
+ NOTE: https://git.kernel.org/linus/49bd78282e79ad177d14f37f4049f0605bf92dad (6.3-rc1)
+CVE-2023-53465 [soundwire: qcom: fix storing port config out-of-bounds]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/490937d479abe5f6584e69b96df066bc87be92e9 (6.5-rc1)
+CVE-2023-53464 [scsi: iscsi_tcp: Check that sock is valid before iscsi_set_param()]
+ - linux 6.1.25-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/48b19b79cfa37b1e50da3b5a8af529f994c08901 (6.3-rc6)
+CVE-2023-53463 [ibmvnic: Do not reset dql stats on NON_FATAL err]
+ - linux 6.4.4-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/48538ccb825b05544ec308a509e2cc9c013402db (6.5-rc1)
+CVE-2023-53462 [hsr: Fix uninit-value access in fill_frame_info()]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/484b4833c604c0adcf19eac1ca14b60b757355b5 (6.6-rc2)
+CVE-2023-53461 [io_uring: wait interruptibly for request completions on exit]
+ - linux 6.4.4-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/4826c59453b3b4677d6bf72814e7ababdea86949 (6.5-rc1)
+CVE-2023-53460 [wifi: rtw88: fix memory leak in rtw_usb_probe()]
+ - linux 6.3.7-1
+ NOTE: https://git.kernel.org/linus/48181d285623198c33bb9698992502687b258efa (6.4-rc1)
+CVE-2023-53459 [HID: mcp-2221: prevent UAF in delayed work]
+ - linux 6.3.7-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/47e91fdfa511139f2549687edb0d8649b123227b (6.3-rc1)
+CVE-2023-53458 [media: cx23885: Fix a null-ptr-deref bug in buffer_prepare() and buffer_finish()]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ NOTE: https://git.kernel.org/linus/47e8b73bc35d7c54642f78e498697692f6358996 (6.4-rc1)
+CVE-2023-53457 [FS: JFS: Fix null-ptr-deref Read in txBegin]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/47cfdc338d674d38f4b2f22b7612cc6a2763ba27 (6.5-rc1)
+CVE-2023-53456 [scsi: qla4xxx: Add length check when parsing nlattrs]
+ - linux 6.5.3-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/47cd3770e31df942e2bb925a9a855c79ed0662eb (6.6-rc1)
+CVE-2023-53455 [drm/vc4: drop all currently held locks if deadlock happens]
+ - linux 6.1.20-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/479d4f0be4237ba33bc9432787aeb62c90e30f95 (6.3-rc1)
+CVE-2023-53454 [HID: multitouch: Correct devm device reference for hidinput input_dev name]
+ - linux 6.5.3-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/4794394635293a3e74591351fff469cea7ad15a2 (6.6-rc1)
+CVE-2023-53453 [drm/radeon: free iio for atombios when driver shutdown]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/4773fadedca918faec443daaca5e4ea1c0ced144 (6.3-rc1)
+CVE-2023-53452 [wifi: rtw89: fix potential race condition between napi_init and napi_enable]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/47515664ecfbde11425dff121f298ae4499425c9 (6.4-rc1)
+CVE-2023-53451 [scsi: qla2xxx: Fix potential NULL pointer dereference]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/464ea494a40c6e3e0e8f91dd325408aaf21515ba (6.5-rc1)
+CVE-2023-53450 [ext4: remove a BUG_ON in ext4_mb_release_group_pa()]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/463808f237cf73e98a1a45ff7460c2406a150a0b (6.4-rc2)
+CVE-2023-53449 [s390/dasd: Fix potential memleak in dasd_eckd_init()]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/460e9bed82e49db1b823dcb4e421783854d86c40 (6.3-rc1)
+CVE-2023-53448 [fbdev: imxfb: Removed unneeded release_mem_region]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/45fcc058a75bf5d65cf4c32da44a252fbe873cd4 (6.5-rc3)
+CVE-2022-50444 [clk: tegra20: Fix refcount leak in tegra20_clock_init]
+ - linux 6.0.3-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/4e343bafe03ff68a62f48f8235cf98f2c685468b (6.1-rc1)
+CVE-2022-50443 [drm/rockchip: lvds: fix PM usage counter unbalance in poweron]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/4dba27f1a14592ac4cf71c3bc1cc1fd05dea8015 (6.2-rc1)
+CVE-2022-50442 [fs/ntfs3: Validate buffer length while parsing index]
+ - linux 6.1.4-1
+ NOTE: https://git.kernel.org/linus/4d42ecda239cc13738d6fd84d098a32e67b368b9 (6.2-rc1)
+CVE-2022-50441 [net/mlx5: Lag, fix failure to cancel delayed bond work]
+ - linux 6.1.7-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/4d1c1379d71777ddeda3e54f8fc26e9ecbfd1009 (6.2-rc3)
+CVE-2022-50440 [drm/vmwgfx: Validate the box size for the snooped cursor]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/4cf949c7fafe21e085a4ee386bb2dade9067316e (6.2-rc1)
+CVE-2022-50439 [ASoC: mediatek: mt8173: Enable IRQ when pdata is ready]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/4cbb264d4e9136acab2c8fd39e39ab1b1402b84b (6.2-rc1)
+CVE-2022-50438 [net: hinic: fix memory leak when reading function table]
+ - linux 6.0.7-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/4c1f602df8956bc0decdafd7e4fc7eef50c550b1 (6.1-rc3)
+CVE-2022-50437 [drm/msm/hdmi: fix memory corruption with too many bridges]
+ - linux 6.0.7-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/4c1294da6aed1f16d47a417dcfe6602833c3c95c (6.1-rc3)
+CVE-2022-50436 [ext4: don't set up encryption key during jbd2 transaction]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/4c0d5778385cb3618ff26a561ce41de2b7d9de70 (6.2-rc1)
+CVE-2022-50435 [ext4: avoid crash when inline data creation follows DIO write]
+ - linux 6.0.3-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/4bb26f2885ac6930984ee451b952c5a6042f2c0e (6.1-rc1)
+CVE-2022-50434 [blk-mq: fix possible memleak when register 'hctx' failed]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/4b7a21c57b14fbcd0e1729150189e5933f5088e9 (6.2-rc1)
+CVE-2022-50433 [efi: ssdt: Don't free memory if ACPI table was loaded successfully]
+ - linux 6.0.5-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/4b017e59f01097f19b938f6dc4dc2c4720701610 (6.1-rc2)
+CVE-2022-50432 [kernfs: fix use-after-free in __kernfs_remove]
+ - linux 6.0.7-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/4abc99652812a2ddf932f137515d5c5a04723538 (6.1-rc1)
+CVE-2022-50431 [ALSA: aoa: i2sbus: fix possible memory leak in i2sbus_add_dev()]
+ - linux 6.0.7-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/4a4c8482e370d697738a78dcd7bf2780832cb712 (6.1-rc3)
+CVE-2022-50430 [mmc: vub300: fix warning - do not call blocking ops when !TASK_RUNNING]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/4a44cd249604e29e7b90ae796d7692f5773dd348 (6.2-rc1)
+CVE-2022-50429 [memory: of: Fix refcount leak bug in of_lpddr3_get_ddr_timings()]
+ - linux 6.0.3-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/48af14fb0eaa63d9aa68f59fb0b205ec55a95636 (6.1-rc1)
+CVE-2022-50428 [ext4: fix off-by-one errors in fast-commit block filling]
+ - linux 6.1.4-1
+ NOTE: https://git.kernel.org/linus/48a6a66db82b8043d298a630f22c62d43550cae5 (6.2-rc1)
+CVE-2022-50427 [ALSA: ac97: fix possible memory leak in snd_ac97_dev_register()]
+ - linux 6.0.7-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/4881bda5ea05c8c240fc8afeaa928e2bc43f61fa (6.1-rc3)
+CVE-2022-50426 [remoteproc: imx_dsp_rproc: Add mutex protection for workqueue]
+ - linux 6.1.4-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/47e6ab07018edebf94ce873cf50a05ec76ff2dde (6.2-rc1)
+CVE-2022-50425 [x86/fpu: Fix copy_xstate_to_uabi() to copy init states correctly]
+ - linux 6.0.7-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/471f0aa7fa64e23766a1473b32d9ec3f0718895a (6.1-rc2)
+CVE-2022-50424 [wifi: mt76: mt7921: resource leaks at mt7921_check_offload_capability()]
+ - linux 6.3.7-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/47180ecf4541146836c5307c1d5526f8ac6a5a6d (6.3-rc1)
+CVE-2022-50423 [ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/470188b09e92d83c5a997f25f0e8fb8cd2bc3469 (6.2-rc1)
+CVE-2022-50422 [scsi: libsas: Fix use-after-free bug in smp_execute_task_sg()]
+ - linux 6.0.3-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/46ba53c30666717cb06c2b3c5d896301cd00d0c0 (6.1-rc1)
+CVE-2022-50421 [rpmsg: char: Avoid double destroy of default endpoint]
+ - linux 6.0.3-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/467233a4ac29b215d492843d067a9f091e6bf0c5 (6.1-rc1)
+CVE-2022-50420 [crypto: hisilicon/hpre - fix resource leak in remove process]
+ - linux 6.1.4-1
+ NOTE: https://git.kernel.org/linus/45e6319bd5f2154d8b8c9f1eaa4ac030ba0d330c (6.2-rc1)
CVE-2025-59681
- python-django <unfixed> (bug #1116979)
NOTE: https://www.djangoproject.com/weblog/2025/oct/01/security-releases/
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/29727771e57de4639392fe39bf9e06797b041c47
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/29727771e57de4639392fe39bf9e06797b041c47
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251001/0f9c5f45/attachment.htm>
More information about the debian-security-tracker-commits
mailing list