[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Oct 4 19:42:15 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
b3e3960e by Salvatore Bonaccorso at 2025-10-04T20:41:49+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,283 @@
+CVE-2023-53579 [gpio: mvebu: fix irq domain leak]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/644ee70267a934be27370f9aa618b29af7290544 (6.5-rc3)
+CVE-2023-53578 [net: qrtr: Fix an uninit variable access bug in qrtr_tx_resume()]
+	- linux 6.1.25-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/6417070918de3bcdbe0646e7256dae58fd8083ba (6.3-rc7)
+CVE-2023-53577 [bpf, cpumap: Make sure kthread is running before map update returns]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/640a604585aa30f93e39b17d4d6ba69fcb1e66c9 (6.5-rc5)
+CVE-2023-53576 [null_blk: Always check queue mode setting from configfs]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/63f8793ee60513a09f110ea460a6ff2c33811cdb (6.4-rc1)
+CVE-2023-53575 [wifi: iwlwifi: mvm: fix potential array out of bounds access]
+	- linux 6.4.11-1
+	NOTE: https://git.kernel.org/linus/637452360ecde9ac972d19416e9606529576b302 (6.5-rc1)
+CVE-2023-53574 [wifi: rtw88: delete timer and free skb queue when unloading]
+	- linux 6.5.6-1
+	NOTE: https://git.kernel.org/linus/634fcbcaa4062db39aeb5ac6ed1bc1feb8dd5216 (6.6-rc1)
+CVE-2023-53573 [clk: rs9: Fix suspend/resume]
+	- linux 6.1.25-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/632e04739c8f45c2d9ca4d4c5bd18d80c2ac9296 (6.3-rc7)
+CVE-2023-53572 [clk: imx: scu: use _safe list iterator to avoid a use after free]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/632c60ecd25dbacee54d5581fe3aeb834b57010a (6.5-rc1)
+CVE-2023-53571 [drm/i915: Make intel_get_crtc_new_encoder() less oopsy]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/631420b06597a33c72b6dcef78d1c2dea17f452d (6.4-rc1)
+CVE-2023-53570 [wifi: nl80211: fix integer overflow in nl80211_parse_mbssid_elems()]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6311071a056272e1e761de8d0305e87cc566f734 (6.5-rc6)
+CVE-2023-53569 [ext2: Check block size validity during mount]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/62aeb94433fcec80241754b70d0d1836d5926b0a (6.4-rc1)
+CVE-2023-53568 [s390/zcrypt: don't leak memory if dev_set_name() fails]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/6252f47b78031979ad919f971dc8468b893488bd (6.6-rc1)
+CVE-2023-53567 [spi: qup: Don't skip cleanup in remove's error path]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/61f49171a43ab1f80c73c5c88c508770c461e0f2 (6.4-rc1)
+CVE-2023-53566 [netfilter: nft_set_rbtree: fix null deref on element insertion]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/61ae320a29b0540c16931816299eb86bf2b66c08 (6.4-rc3)
+CVE-2023-53565 [wifi: brcmfmac: Check for probe() id argument being NULL]
+	- linux 6.3.7-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/60fc756fc8e6954a5618eecac73b255d651602e4 (6.4-rc3)
+CVE-2023-53564 [ocfs2: fix defrag path triggering jbd2 ASSERT]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/60eed1e3d45045623e46944ebc7c42c30a4350f0 (6.3-rc1)
+CVE-2023-53563 [cpufreq: amd-pstate-ut: Fix kernel panic when loading the driver]
+	- linux 6.5.3-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/60dd283804479c4a52f995b713f448e2cd65b8c8 (6.6-rc1)
+CVE-2023-53562 [drm/msm: fix vram leak on bind errors]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	NOTE: https://git.kernel.org/linus/60d476af96015891c7959f30838ae7a9749932bf (6.4-rc1)
+CVE-2023-53561 [net: wwan: iosm: fix NULL pointer dereference when removing device]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/60829145f1e2650b31ebe6a0ec70a9725b38fa2c (6.4-rc3)
+CVE-2023-53560 [tracing/histograms: Add histograms to hist_vars if they have referenced variables]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/6018b585e8c6fa7d85d4b38d9ce49a5b67be7078 (6.5-rc2)
+CVE-2023-53559 [ip_vti: fix potential slab-use-after-free in decode_session6]
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/6018a266279b1a75143c7c0804dd08a5fc4c3e0b (6.5-rc7)
+CVE-2023-53558 [rcu-tasks: Avoid pr_info() with spin lock in cblist_init_generic()]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/5fc8cbe4cf0fd34ded8045c385790c3bf04f6785 (6.5-rc1)
+CVE-2023-53557 [fprobe: Release rethook after the ftrace_ops is unregistered]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5f81018753dfd4989e33ece1f0cb6b8aae498b82 (6.5-rc2)
+CVE-2023-53556 [iavf: Fix use-after-free in free_netdev]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/5f4fa1672d98fe99d2297b03add35346f1685d6b (6.5-rc3)
+CVE-2023-53555 [mm/damon/core: initialize damo_filter->list from damos_new_filter()]
+	- linux 6.4.11-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5f1fc67f2cb8d3035d3acd273b48b97835af8afd (6.5-rc6)
+CVE-2023-53554 [staging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext()]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/5f1c7031e044cb2fba82836d55cc235e2ad619dc (6.5-rc4)
+CVE-2023-53553 [HID: hyperv: avoid struct memcpy overrun warning]
+	- linux 6.4.11-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5f151364b1da6bd217632fd4ee8cc24eaf66a497 (6.5-rc2)
+CVE-2023-53552 [drm/i915: mark requests for GuC virtual engines to avoid use-after-free]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5eefc5307c983b59344a4cb89009819f580c84fa (6.6-rc1)
+CVE-2023-53551 [usb: gadget: u_serial: Add null pointer check in gserial_resume]
+	- linux 6.1.15-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/5ec63fdbca604568890c577753c6f66c5b3ef0b5 (6.3-rc1)
+CVE-2023-53550 [cpufreq: amd-pstate: fix global sysfs attribute type]
+	- linux 6.4.11-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5e720f8c8c9d959283c3908bbf32a91a01a86547 (6.5-rc6)
+CVE-2023-53549 [netfilter: ipset: Rework long task execution when adding/deleting entries]
+	- linux 6.1.7-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/5e29dc36bd5e2166b834ceb19990d9e68a734d7d (6.2-rc3)
+CVE-2023-53548 [net: usbnet: Fix WARNING in usbnet_start_xmit/usb_submit_urb]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/5e1627cb43ddf1b24b92eb26f8d958a3f5676ccb (6.5-rc3)
+CVE-2023-53547 [drm/amdgpu: Fix sdma v4 sw fini error]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	NOTE: https://git.kernel.org/linus/5e08e9c742a00384e5abe74bd40cf4dc15cb3a2e (6.4-rc1)
+CVE-2023-53546 [net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/5dd77585dd9d0e03dd1bceb95f0269a7eaf6b936 (6.5-rc5)
+CVE-2023-53545 [drm/amdgpu: unmap and remove csa_va properly]
+	- linux 6.4.13-1
+	NOTE: https://git.kernel.org/linus/5daff15cd013422bc6d1efcfe82b586800025384 (6.5-rc1)
+CVE-2023-53544 [cpufreq: davinci: Fix clk use after free]
+	- linux 6.1.20-1
+	NOTE: https://git.kernel.org/linus/5d8f384a9b4fc50f6a18405f1c08e5a87a77b5b3 (6.3-rc1)
+CVE-2023-53543 [vdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check]
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5d6ba607d6cb5c58a4ddf33381e18c83dbb4098f (6.5-rc7)
+CVE-2023-53542 [ARM: dts: exynos: Use Exynos5420 compatible for the MIPI video phy]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/5d5aa219a790d61cad2c38e1aa32058f16ad2f0b (6.3-rc1)
+CVE-2023-53541 [mtd: rawnand: brcmnand: Fix potential out-of-bounds access in oob write]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/5d53244186c9ac58cb88d76a0958ca55b83a15cd (6.6-rc1)
+CVE-2023-53540 [wifi: cfg80211: reject auth/assoc to AP with our address]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	NOTE: https://git.kernel.org/linus/5d4e04bf3a0f098bd9033de3a5291810fa14c7a6 (6.6-rc1)
+CVE-2023-53539 [RDMA/rxe: Fix incomplete state save in rxe_requester]
+	- linux 6.5.3-1
+	[bookworm] - linux 6.1.55-1
+	NOTE: https://git.kernel.org/linus/5d122db2ff80cd2aed4dcd630befb56b51ddf947 (6.6-rc1)
+CVE-2023-53538 [btrfs: insert tree mod log move in push_node_left]
+	- linux 6.4.4-1
+	NOTE: https://git.kernel.org/linus/5cead5422a0e3d13b0bcee986c0f5c4ebb94100b (6.5-rc1)
+CVE-2023-53537 [f2fs: fix to avoid use-after-free for cached IPU bio]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/5cdb422c839134273866208dad5360835ddb9794 (6.4-rc1)
+CVE-2023-53536 [blk-crypto: make blk_crypto_evict_key() more robust]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/5c7cb94452901a93e90c2230632e2c12a681bc92 (6.4-rc1)
+CVE-2023-53535 [net: bcmgenet: Add a check for oversized packets]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/5c0862c2c962052ed5055220a00ac1cefb92fbcd (6.3-rc1)
+CVE-2023-53534 [drm/mediatek: mtk_drm_crtc: Add checks for devm_kcalloc]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/5bf1e3bd7da625ccf9a22c8cb7d65271e6e47f4c (6.3-rc1)
+CVE-2023-53533 [Input: raspberrypi-ts - fix refcount leak in rpi_ts_probe]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/5bca3688bdbc3b58a2894b8671a8e2378efe28bd (6.4-rc1)
+CVE-2022-50487 [NFSD: Protect against send buffer overflow in NFSv3 READDIR]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.221-1
+	NOTE: https://git.kernel.org/linus/640f87c190e0d1b2a0fcb2ecf6d2cd53b1c41991 (6.1-rc1)
+CVE-2022-50486 [net: ethernet: ti: Fix return type of netcp_ndo_start_xmit()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/63fe6ff674a96cfcfc0fa8df1051a27aa31c70b4 (6.2-rc1)
+CVE-2022-50485 [ext4: add EXT4_IGET_BAD flag to prevent unexpected bad inode]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/63b1e9bccb71fe7d7e3ddc9877dbdc85e5d2d023 (6.2-rc1)
+CVE-2022-50484 [ALSA: usb-audio: Fix potential memory leaks]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/6382da0828995af87aa8b8bef28cc61aceb4aff3 (6.1-rc1)
+CVE-2022-50483 [net: enetc: avoid buffer leaks on xdp_do_redirect() failure]
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/628050ec952d2e2e46ec9fb6aa07e41139e030c8 (6.2-rc1)
+CVE-2022-50482 [iommu/vt-d: Clean up si_domain in the init_dmars() error path]
+	- linux 6.0.6-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/620bf9f981365c18cc2766c53d92bf8131c63f32 (6.1-rc2)
+CVE-2022-50481 [Description:]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/61c80d1c3833e196256fb060382db94f24d3d9a7 (6.2-rc1)
+CVE-2022-50480 [memory: pl353-smc: Fix refcount leak bug in pl353_smc_probe()]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/61b3c876c1cbdb1efd1f52a1f348580e6e14efb6 (6.1-rc1)
+CVE-2022-50479 [drm/amd: fix potential memory leak]
+	- linux 6.0.3-1
+	NOTE: https://git.kernel.org/linus/6160216fd2c97107e8a9ab39863b056d677fcd85 (6.1-rc1)
+CVE-2022-50478 [nilfs2: fix shift-out-of-bounds/overflow in nilfs_sb2_bad_offset()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/610a2a3d7d8be3537458a378ec69396a76c385b6 (6.2-rc1)
+CVE-2022-50477 [rtc: class: Fix potential memleak in devm_rtc_allocate_device()]
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/60da73808298ff2cfa9f165d55eb3d7aa7078601 (6.2-rc1)
+CVE-2022-50476 [ntb_netdev: Use dev_kfree_skb_any() in interrupt context]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/5f7d78b2b12a9d561f48fa00bab29b40f4616dad (6.2-rc1)
+CVE-2022-50475 [RDMA/core: Make sure "ib_port" is valid when access sysfs node]
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5e15ff29b156bbbdeadae230c8ecd5ecd8ca2477 (6.2-rc1)
+CVE-2022-50474 [macintosh: fix possible memory leak in macio_add_one_device()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/5ca86eae55a2f006e6c1edd2029b2cacb6979515 (6.2-rc1)
+CVE-2022-50473 [cpufreq: Init completion before kobject_init_and_add()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/5c51054896bcce1d33d39fead2af73fec24f40b6 (6.2-rc1)
+CVE-2022-50472 [IB/mad: Don't call to function that might sleep while in atomic context]
+	- linux 6.1.4-1
+	NOTE: https://git.kernel.org/linus/5c20311d76cbaeb7ed2ecf9c8b8322f8fc4a7ae3 (6.2-rc1)
+CVE-2022-50471 [xen/gntdev: Accommodate VMA splitting]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/5c13a4a0291b30191eff9ead8d010e1ca43a4d0c (6.1-rc1)
+CVE-2022-50470 [xhci: Remove device endpoints from bandwidth list when freeing the device]
+	- linux 6.0.7-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/5aed5b7c2430ce318a8e62f752f181e66f0d1053 (6.1-rc3)
 CVE-2025-9952 (The Trinity Audio \u2013 Text to Speech AI audio player to convert con ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2025-9886 (The Trinity Audio \u2013 Text to Speech AI audio player to convert con ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b3e3960e5ec17cd8fdd9c6f740a131e27c06dd6d

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b3e3960e5ec17cd8fdd9c6f740a131e27c06dd6d
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251004/f23e2192/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list