[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Oct 7 21:02:37 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
db444e63 by Salvatore Bonaccorso at 2025-10-07T22:02:11+02:00
Merge Linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,277 @@
+CVE-2023-53654 [octeontx2-af: Add validation before accessing cgx and lmac]
+ - linux 6.4.4-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/79ebb53772c95d3a6ae51b3c65f9985fdd430df6 (6.5-rc1)
+CVE-2023-53653 [media: amphion: fix REVERSE_INULL issues reported by coverity]
+ - linux 6.5.3-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/79d3bafaecc13bccab1ebbd28a15e669c5a4cdaf (6.6-rc1)
+CVE-2023-53652 [vdpa: Add features attr to vdpa_nl_policy for nlattr length check]
+ - linux 6.4.13-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/79c8651587504ba263d2fd67fd4406240fb21f69 (6.5-rc7)
+CVE-2023-53651 [Input: exc3000 - properly stop timer on shutdown]
+ - linux 6.1.20-1
+ NOTE: https://git.kernel.org/linus/79c81d137d36f9635bbcbc3916c0cccb418a61dd (6.3-rc1)
+CVE-2023-53650 [fbdev: omapfb: lcd_mipid: Fix an error handling path in mipid_spi_probe()]
+ - linux 6.4.4-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/79a3908d1ea6c35157a6d907b1a9d8ec06015e7a (6.5-rc1)
+CVE-2023-53649 [perf trace: Really free the evsel->priv area]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/7962ef13651a9163f07b530607392ea123482e8a (6.6-rc1)
+CVE-2023-53648 [ALSA: ac97: Fix possible NULL dereference in snd_ac97_mixer]
+ - linux 6.4.4-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/79597c8bf64ca99eab385115743131d260339da5 (6.5-rc1)
+CVE-2023-53647 [Drivers: hv: vmbus: Don't dereference ACPI root object handle]
+ - linux 6.5.3-1
+ [bookworm] - linux 6.1.55-1
+ NOTE: https://git.kernel.org/linus/78e04bbff849b51b56f5925b1945db2c6e128b61 (6.6-rc1)
+CVE-2023-53646 [drm/i915/perf: add sentinel to xehp_oa_b_counters]
+ - linux 6.4.11-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/785b3f667b4bf98804cad135005e964df0c750de (6.5-rc3)
+CVE-2023-53645 [bpf: Make bpf_refcount_acquire fallible for non-owning refs]
+ - linux 6.4.4-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/7793fc3babe9fea908e57f7c187ea819f9fd7e95 (6.5-rc1)
+CVE-2023-53644 [media: radio-shark: Add endpoint checks]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/76e31045ba030e94e72105c01b2e98f543d175ac (6.4-rc1)
+CVE-2023-53643 [nvme-tcp: don't access released socket during error recovery]
+ - linux 6.1.20-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/76d54bf20cdcc1ed7569a89885e09636e9a8d71d (6.3-rc1)
+CVE-2023-53642 [x86: fix clear_user_rep_good() exception handling annotation]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/76ce32682635fe907e0f8e64e039e773e5c7508f (6.1.29)
+CVE-2023-53641 [wifi: ath9k: hif_usb: fix memory leak of remain_skbs]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/7654cc03eb699297130b693ec34e25f77b17c947 (6.4-rc1)
+CVE-2023-53640 [ASoC: lpass: Fix for KASAN use_after_free out of bounds]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ NOTE: https://git.kernel.org/linus/75e5fab7db0cecb6e16b22c34608f0b40a4c7cd1 (6.4-rc4)
+CVE-2023-53639 [wifi: ath6kl: reduce WARN to dev_dbg() in callback]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/75c4a8154cb6c7239fb55d5550f481f6765fb83c (6.4-rc1)
+CVE-2023-53638 [octeon_ep: cancel queued works in probe error path]
+ - linux 6.4.13-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/758c91078165ae641b698750a72eafe7968b3756 (6.5-rc7)
+CVE-2023-53637 [media: i2c: ov772x: Fix memleak in ov772x_probe()]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/7485edb2b6ca5960205c0a49bedfd09bba30e521 (6.3-rc1)
+CVE-2023-53636 [clk: microchip: fix potential UAF in auxdev release callback]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/7455b7007b9e93bcc2bc9c1c6c73a228e3152069 (6.4-rc1)
+CVE-2023-53635 [netfilter: conntrack: fix wrong ct->timeout value]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ NOTE: https://git.kernel.org/linus/73db1b8f2bb6725b7391e85aab41fdf592b3c0c1 (6.4-rc1)
+CVE-2023-53634 [bpf, arm64: Fixed a BTI error on returning to patched function]
+ - linux 6.1.25-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/738a96c4a8c36950803fdd27e7c30aca92dccefd (6.3-rc7)
+CVE-2023-53633 [accel/qaic: Fix a leak in map_user_pages()]
+ - linux 6.4.11-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/73274c33d961f4aa0f968f763e2c9f4210b4f4a3 (6.5-rc3)
+CVE-2023-53632 [net/mlx5e: Take RTNL lock when needed before calling xdp_set_features()]
+ - linux 6.4.11-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/72cc654970658e88a1cdea08f06b11c218efa4da (6.5-rc6)
+CVE-2023-53631 [platform/x86: dell-sysman: Fix reference leak]
+ - linux 6.5.3-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/7295a996fdab7bf83dc3d4078fa8b139b8e0a1bf (6.6-rc1)
+CVE-2023-53630 [iommufd: Fix unpinning of pages when an access is present]
+ - linux 6.3.7-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/727c28c1cef2bc013d2c8bb6c50e410a3882a04e (6.3-rc6)
+CVE-2023-53629 [fs: dlm: fix use after free in midcomms commit]
+ - linux 6.1.20-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/724b6bab0d75f1dc01fdfbf7fe8d4217a5cb90ba (6.3-rc1)
+CVE-2023-53628 [drm/amdgpu: drop gfx_v11_0_cp_ecc_error_irq_funcs]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ NOTE: https://git.kernel.org/linus/720b47229a5b24061d1c2e29ddb6043a59178d79 (6.4-rc2)
+CVE-2023-53627 [scsi: hisi_sas: Grab sas_dev lock when traversing the members of sas_dev.list]
+ - linux 6.3.7-1
+ NOTE: https://git.kernel.org/linus/71fb36b5ff113a7674710b9d6063241eada84ff7 (6.4-rc1)
+CVE-2023-53626 [ext4: fix possible double unlock when moving a directory]
+ - linux 6.1.25-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/70e42feab2e20618ddd0cbfc4ab4b08628236ecd (6.3-rc3)
+CVE-2023-53625 [drm/i915/gvt: fix vgpu debugfs clean in remove]
+ - linux 6.1.7-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/704f3384f322b40ba24d958473edfb1c9750c8fd (6.2-rc3)
+CVE-2023-53624 [net/sched: sch_fq: fix integer overflow of "credit"]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/7041101ff6c3073fd8f2e99920f535b111c929cb (6.4-rc1)
+CVE-2023-53623 [mm/swap: fix swap_info_struct race between swapoff and get_swap_pages()]
+ - linux 6.1.25-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/6fe7d6b992113719e96744d974212df3fcddc76c (6.3-rc6)
+CVE-2023-53622 [gfs2: Fix possible data races in gfs2_show_options()]
+ - linux 6.4.13-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/6fa0a72cbbe45db4ed967a51f9e6f4e3afe61d20 (6.5-rc1)
+CVE-2023-53621 [memcontrol: ensure memcg acquired by id is properly set up]
+ - linux 6.5.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/6f0df8e16eb543167f2929cb756e695709a3551d (6.6-rc1)
+CVE-2023-53620 [md: fix soft lockup in status_resync]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ NOTE: https://git.kernel.org/linus/6efddf1e32e2a264694766ca485a4f5e04ee82a7 (6.4-rc1)
+CVE-2023-53619 [netfilter: conntrack: Avoid nf_ct_helper_hash uses after free]
+ - linux 6.4.4-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/6eef7a2b933885a17679eb8ed0796ddf0ee5309b (6.5-rc2)
+CVE-2023-53618 [btrfs: reject invalid reloc tree root keys with stack dump]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ NOTE: https://git.kernel.org/linus/6ebcd021c92b8e4b904552e4d87283032100796d (6.5-rc6)
+CVE-2023-53617 [soc: aspeed: socinfo: Add kfree for kstrdup]
+ - linux 6.4.13-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/6e6d847a8ce18ab2fbec4f579f682486a82d2c6b (6.5-rc7)
+CVE-2022-50534 [dm thin: Use last transaction's pmd->root when commit failed]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/7991dbff6849f67e823b7cc0c15e5a90b0549b9f (6.2-rc1)
+CVE-2022-50533 [wifi: mac80211: mlme: fix null-ptr deref on failed assoc]
+ - linux 6.1.4-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/78a6a43aaf87180ec7425a2a90468e1b4d09a1ec (6.2-rc1)
+CVE-2022-50532 [scsi: mpt3sas: Fix possible resource leaks in mpt3sas_transport_port_add()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/78316e9dfc24906dd474630928ed1d3c562b568e (6.2-rc1)
+CVE-2022-50531 [tipc: fix an information leak in tipc_topsrv_kern_subscr]
+ - linux 6.0.6-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/777ecaabd614d47c482a5c9031579e66da13989a (6.1-rc2)
+CVE-2022-50530 [blk-mq: fix null pointer dereference in blk_mq_clear_rq_mapping()]
+ - linux 6.0.6-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/76dd298094f484c6250ebd076fa53287477b2328 (6.1-rc2)
+CVE-2022-50529 [test_firmware: fix memory leak in test_firmware_init()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/7610615e8cdb3f6f5bbd9d8e7a5d8a63e3cabf2e (6.2-rc1)
+CVE-2022-50528 [drm/amdkfd: Fix memory leakage]
+ - linux 6.1.4-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/75818afff631e1ea785a82c3e8bb82eb0dee539c (6.2-rc1)
+CVE-2022-50527 [drm/amdgpu: Fix size validation for non-exclusive domains (v4)]
+ - linux 6.1.7-1
+ NOTE: https://git.kernel.org/linus/7554886daa31eacc8e7fac9e15bbce67d10b8f1f (6.2-rc1)
+CVE-2022-50526 [drm/msm/dp: fix memory corruption with too many bridges]
+ - linux 6.0.7-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/74466e46e7543c7f74f1502181e9ba93f7521374 (6.1-rc3)
+CVE-2022-50525 [iommu/fsl_pamu: Fix resource leak in fsl_pamu_probe()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/73f5fc5f884ad0c5f7d57f66303af64f9f002526 (6.2-rc1)
+CVE-2022-50524 [iommu/mediatek: Check return value after calling platform_get_resource()]
+ - linux 6.1.4-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/73b6924cdebc899de9b719e1319aa86c6bed4acf (6.2-rc1)
+CVE-2022-50523 [clk: rockchip: Fix memory leak in rockchip_clk_register_pll()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/739a6a6bbdb793bd57938cb24aa5a6df89983546 (6.2-rc1)
+CVE-2022-50522 [mcb: mcb-parse: fix error handing in chameleon_parse_gdd()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/728ac3389296caf68638628c987aeae6c8851e2d (6.2-rc1)
+CVE-2022-50521 [Description:]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/727cc0147f5066e359aca65cc6cc5e6d64cc15d8 (6.2-rc1)
+CVE-2022-50520 [drm/radeon: Fix PCI device refcount leak in radeon_atrm_get_bios()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/725a521a18734f65de05b8d353b5bd0d3ca4c37a (6.2-rc1)
+CVE-2022-50519 [nilfs2: replace WARN_ONs by nilfs_error for checkpoint acquisition failure]
+ - linux 6.0.2-1
+ [bullseye] - linux 5.10.148-1
+ NOTE: https://git.kernel.org/linus/723ac751208f6d6540191689cfbf6c77135a7a1b (6.1-rc1)
+CVE-2022-50518 [parisc: Fix locking in pdc_iodc_print() firmware call]
+ - linux 6.1.4-1
+ NOTE: https://git.kernel.org/linus/7236aae5f81f3efbd93d0601e74fc05994bc2580 (6.2-rc1)
+CVE-2022-50517 [mm/huge_memory: do not clobber swp_entry_t during THP split]
+ - linux 6.0.7-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/71e2d666ef85d51834d658830f823560c402b8b6 (6.1-rc2)
+CVE-2022-50516 [fs: dlm: fix invalid derefence of sb_lvbptr]
+ - linux 6.0.3-1
+ NOTE: https://git.kernel.org/linus/7175e131ebba47afef47e6ac4d5bab474d1e6e49 (6.1-rc1)
+CVE-2022-50515 [drm/amdgpu: Fix memory leak in hpd_rx_irq_create_workqueue()]
+ - linux 6.0.3-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/7136f956c73c4ba50bfeb61653dfd6a9669ea915 (6.1-rc1)
+CVE-2022-50514 [usb: gadget: f_hid: fix refcount leak on error path]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/70a3288a7586526315105c699b687d78cd32559a (6.2-rc1)
+CVE-2022-50513 [staging: rtl8723bs: fix a potential memory leak in rtw_init_cmd_priv()]
+ - linux 6.0.3-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/708056fba733a73d926772ea4ce9a42d240345da (6.1-rc1)
+CVE-2022-50512 [ext4: fix potential memory leak in ext4_fc_record_regions()]
+ - linux 6.0.3-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/7069d105c1f15c442b68af43f7fde784f3126739 (6.1-rc1)
+CVE-2022-50511 [lib/fonts: fix undefined behavior in bit shift for get_default_font]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/6fe888c4d2fb174408e4540bb2d5602b9f507f90 (6.2-rc1)
+CVE-2022-50510 [perf/smmuv3: Fix hotplug callback leak in arm_smmu_pmu_init()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/6f2d566b46436a50a80d6445e82879686b89588c (6.2-rc1)
+CVE-2022-50509 [media: coda: Add check for kmalloc]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/6e5e5defdb8b0186312c2f855ace175aee6daf9b (6.2-rc1)
CVE-2025-7400 (The Featured Image from URL (FIFU) plugin for WordPress is vulnerable ...)
NOT-FOR-US: WordPress plugin
CVE-2025-61774 (PyVista provides 3D plotting and mesh analysis through an interface fo ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/db444e63d3ece306c0e2921f87536afee941988a
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/db444e63d3ece306c0e2921f87536afee941988a
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251007/b936b90d/attachment.htm>
More information about the debian-security-tracker-commits
mailing list