[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sat Oct 4 20:23:52 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
71639163 by Salvatore Bonaccorso at 2025-10-04T21:23:20+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,249 @@
+CVE-2023-53616 [jfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/6e2bda2c192d0244b5a78b787ef20aa10cb319b7 (6.6-rc1)
+CVE-2023-53615 [scsi: qla2xxx: Fix deletion race condition]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/6dfe4344c168c6ca20fe7640649aacfcefcccb26 (6.6-rc1)
+CVE-2023-53614 [mm/ksm: fix race with VMA iteration and mm_struct teardown]
+	- linux 6.1.25-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6db504ce55bdbc575723938fc480713c9183f6a2 (6.3-rc4)
+CVE-2023-53613 [dax: Fix dax_mapping_release() use after free]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/6d24b170a9db0456f577b1ab01226a2254c016a8 (6.5-rc1)
+CVE-2023-53612 [hwmon: (coretemp) Simplify platform device handling]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/6d03bbff456befeccdd4d663177c4d6c75d0c4ff (6.3-rc1)
+CVE-2023-53611 [ipmi_si: fix a memleak in try_smi_init()]
+	- linux 6.5.3-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/6cf1a126de2992b4efe1c3c4d398f8de4aed6e3f (6.6-rc1)
+CVE-2023-53610 [irqchip: Fix refcount leak in platform_irqchip_probe]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/6caa5a2b78f5f53c433d3a3781e53325da22f0ac (6.3-rc1)
+CVE-2023-53609 [scsi: Revert "scsi: core: Do not increase scsi_device's iorequest_cnt if dispatch failed"]
+	- linux 6.3.7-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6ca9818d1624e136a76ae8faedb6b6c95ca66903 (6.4-rc3)
+CVE-2023-53608 [nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread()]
+	- linux 6.1.25-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/6be49d100c22ffea3287a4b19d7639d259888e33 (6.3-rc6)
+CVE-2023-53607 [ALSA: ymfpci: Fix BUG_ON in probe function]
+	- linux 6.1.25-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/6be2e7522eb529b41c16d459f33bbdbcddbf5c15 (6.3-rc5)
+CVE-2023-53606 [nfsd: clean up potential nfsd_file refcount leaks in COPY codepath]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.221-1
+	NOTE: https://git.kernel.org/linus/6ba434cb1a8d403ea9aad1b667c3ea3ad8b3191f (6.3-rc1)
+CVE-2023-53605 [drm: amd: display: Fix memory leakage]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/6b8701be1f66064ca72733c5f6e13748cdbf8397 (6.3-rc1)
+CVE-2023-53604 [dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/6b79a428c02769f2a11f8ae76bf866226d134887 (6.4-rc1)
+CVE-2023-53603 [scsi: qla2xxx: Avoid fcport pointer dereference]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/6b504d06976fe4a61cc05dedc68b84fadb397f77 (6.5-rc1)
+CVE-2023-53602 [wifi: ath11k: fix memory leak in WMI firmware stats]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/6aafa1c2d3e3fea2ebe84c018003f2a91722e607 (6.5-rc1)
+CVE-2023-53601 [bonding: do not assume skb mac_header is set]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6a940abdef3162e5723f1495b8a49859d1708f79 (6.5-rc1)
+CVE-2023-53600 [tunnels: fix kasan splat when generating ipv4 pmtu error]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/6a7ac3d20593865209dceb554d8b3f094c6bd940 (6.5-rc6)
+CVE-2023-53599 [crypto: af_alg - Fix missing initialisation affecting gcm-aes-s390]
+	- linux 6.5.3-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6a4b8aa0a916b39a39175584c07222434fa6c6ef (6.6-rc1)
+CVE-2023-53598 [bus: mhi: host: Range check CHDBOFF and ERDBOFF]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/6a0c637bfee69a74c104468544d9f2a6579626d0 (6.4-rc1)
+CVE-2023-53597 [cifs: fix mid leak during reconnection after timeout threshold]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/69cba9d3c1284e0838ae408830a02c4a063104bc (6.5-rc2)
+CVE-2023-53596 [drivers: base: Free devm resources when unregistering a device]
+	- linux 6.5.3-1
+	[bookworm] - linux 6.1.55-1
+	NOTE: https://git.kernel.org/linus/699fb50d99039a50e7494de644f96c889279aca3 (6.6-rc1)
+CVE-2023-53595 [octeontx2-pf: mcs: Fix NULL pointer dereferences]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/699af748c61574125d269db260dabbe20436d74e (6.4-rc1)
+CVE-2023-53594 [driver core: fix resource leak in device_add()]
+	- linux 6.1.20-1
+	NOTE: https://git.kernel.org/linus/6977b1a5d67097eaa4d02b0c126c04cc6e8917c0 (6.3-rc1)
+CVE-2023-53593 [cifs: Release folio lock on fscache read hit.]
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/69513dd669e243928f7450893190915a88f84a2b (6.5-rc7)
+CVE-2023-53592 [gpio: sifive: Fix refcount leak in sifive_gpio_probe]
+	- linux 6.1.7-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/694175cd8a1643cde3acb45c9294bca44a8e08e9 (6.2-rc3)
+CVE-2023-53591 [net/mlx5e: Fix deadlock in tc route query code]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/691c041bf20899fc13c793f92ba61ab660fa3a30 (6.4-rc4)
+CVE-2023-53590 [sctp: add a refcnt in sctp_stream_priorities to avoid a nested loop]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/68ba44639537de6f91fe32783766322d41848127 (6.3-rc1)
+CVE-2023-53589 [wifi: iwlwifi: mvm: don't trust firmware n_channels]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/682b6dc29d98e857e6ca4bbc077c7dc2899b7473 (6.4-rc3)
+CVE-2023-53588 [wifi: mac80211: check for station first in client probe]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	NOTE: https://git.kernel.org/linus/67dfa589aa8806c7959cbca2f4613b8d41c75a06 (6.6-rc1)
+CVE-2023-53587 [ring-buffer: Sync IRQ works before buffer destruction]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/675751bb20634f981498c7d66161584080cc061e (6.4-rc1)
+CVE-2023-53586 [scsi: target: Fix multiple LUN_RESET handling]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/673db054d7a2b5a470d7a25baf65956d005ad729 (6.4-rc1)
+CVE-2023-53585 [bpf: reject unhashed sockets in bpf_sk_assign]
+	- linux 6.5.3-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/67312adc96b5a585970d03b62412847afe2c6b01 (6.6-rc1)
+CVE-2023-53584 [ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process]
+	- linux 6.1.20-1
+	NOTE: https://git.kernel.org/linus/66f4742e93523ab2f062d9d9828b3e590bc61536 (6.3-rc1)
+CVE-2023-53583 [perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start()]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/66843b14fb71825fdd73ab12f6594f2243b402be (6.5-rc2)
+CVE-2023-53582 [wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/660145d708be52f946a82e5b633c020f58f996de (6.3-rc1)
+CVE-2023-53581 [net/mlx5e: Check for NOT_READY flag state after locking]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/65e64640e97c0f223e77f9ea69b5a46186b93470 (6.5-rc2)
+CVE-2023-53580 [USB: Gadget: core: Help prevent panic during UVC unconfigure]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/65dadb2beeb7360232b09ebc4585b54475dfee06 (6.5-rc6)
+CVE-2022-50508 [wifi: mt76: mt76x0: fix oob access in mt76x0_phy_get_target_power]
+	- linux 6.3.7-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6e1abc51c945663bddebfa1beb9590ff5b250eb7 (6.3-rc1)
+CVE-2022-50507 [fs/ntfs3: Validate data run offset]
+	- linux 6.1.4-1
+	NOTE: https://git.kernel.org/linus/6db620863f8528ed9a9aa5ad323b26554a17881d (6.2-rc1)
+CVE-2022-50506 [drbd: only clone bio if we have a backing device]
+	- linux 6.0.6-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6d42ddf7f27b6723549ee6d4c8b1b418b59bf6b5 (6.1-rc2)
+CVE-2022-50505 [iommu/amd: Fix pci device refcount leak in ppr_notifier()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/6cf0981c2233f97d56938d9d61845383d6eb227c (6.2-rc1)
+CVE-2022-50504 [powerpc/rtas: avoid scheduling in rtas_os_term()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/6c606e57eecc37d6b36d732b1ff7e55b7dc32dd4 (6.2-rc1)
+CVE-2022-50503 [mtd: lpddr2_nvm: Fix possible null-ptr-deref]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/6bdd45d795adf9e73b38ced5e7f750cd199499ff (6.2-rc1)
+CVE-2022-50502 [mm: /proc/pid/smaps_rollup: fix no vma's null-deref]
+	- linux 5.5.13-1
+	NOTE: https://git.kernel.org/linus/6bb8769326c46db3058780c0640dcc49d8187b24 (5.4.221)
+CVE-2022-50501 [media: coda: Add check for dcoda_iram_alloc]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/6b8082238fb8bb20f67e46388123e67a5bbc558d (6.2-rc1)
+CVE-2022-50500 [netdevsim: fix memory leak in nsim_drv_probe() when nsim_dev_resources_register() failed]
+	- linux 6.0.7-1
+	NOTE: https://git.kernel.org/linus/6b1da9f7126f05e857da6db24c6a04aa7974d644 (6.1-rc3)
+CVE-2022-50499 [media: dvb-core: Fix double free in dvb_register_device()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/6b0d0477fce747d4137aa65856318b55fba72198 (6.2-rc1)
+CVE-2022-50498 [eth: alx: take rtnl_lock on resume]
+	- linux 6.0.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6ad1c94e1e7e374d88f0cfd77936dddb8339aaba (6.1-rc1)
+CVE-2022-50497 [binfmt_misc: fix shift-out-of-bounds in check_special_flags]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/6a46bf558803dd2b959ca7435a5c143efe837217 (6.2-rc1)
+CVE-2022-50496 [dm cache: Fix UAF in destroy()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/6a459d8edbdbe7b24db42a5a9f21e6aa9e00c2aa (6.2-rc1)
+CVE-2022-50495 [x86/xen: Fix memory leak in xen_smp_intr_init{_pv}()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/69143f60868b3939ddc89289b29db593b647295e (6.2-rc1)
+CVE-2022-50494 [thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/68b99e94a4a2db6ba9b31fe0485e057b9354a640 (6.1-rc1)
+CVE-2022-50493 [scsi: qla2xxx: Fix crash when I/O abort times out]
+	- linux 6.1.4-1
+	NOTE: https://git.kernel.org/linus/68ad83188d782b2ecef2e41ac245d27e0710fe8e (6.2-rc1)
+CVE-2022-50492 [drm/msm: fix use-after-free on probe deferral]
+	- linux 6.0.7-1
+	NOTE: https://git.kernel.org/linus/6808abdb33bf90330e70a687d29f038507e06ebb (6.1-rc3)
+CVE-2022-50491 [coresight: cti: Fix hang in cti_disable_hw()]
+	- linux 6.0.7-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/6746eae4bbaddcc16b40efb33dab79210828b3ce (6.1-rc3)
+CVE-2022-50490 [bpf: Propagate error from htab_lock_bucket() to userspace]
+	- linux 6.0.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/66a7a92e4d0d091e79148a4c6ec15d1da65f4280 (6.1-rc1)
+CVE-2022-50489 [drm/mipi-dsi: Detach devices when removing the host]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/668a8f17b5290d04ef7343636a5588a0692731a1 (6.1-rc1)
+CVE-2022-50488 [block, bfq: fix possible uaf for 'bfqq->bic']
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/64dc8c732f5c2b406cc752e6aaa1bd5471159cab (6.2-rc1)
 CVE-2023-53579 [gpio: mvebu: fix irq domain leak]
 	- linux 6.4.11-1
 	[bookworm] - linux 6.1.52-1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7163916307c9f7889817cc6ec99ccb0488c596bc

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7163916307c9f7889817cc6ec99ccb0488c596bc
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251004/d55fe9c5/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list