[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Oct 22 19:49:40 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
9b1923db by Salvatore Bonaccorso at 2025-10-22T20:47:38+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,295 @@
+CVE-2023-53732 [fs/ntfs3: Fix NULL dereference in ni_write_inode]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.82-1
+	NOTE: https://git.kernel.org/linus/8dae4f6341e335a09575be60b4fdf697c732a470 (6.4-rc1)
+CVE-2023-53731 [netlink: fix potential deadlock in netlink_set_err()]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/8d61f926d42045961e6b65191c09e3678d86a9cf (6.5-rc1)
+CVE-2023-53730 [blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/8d211554679d0b23702bd32ba04aeac0c1c4f660 (6.5-rc1)
+CVE-2023-53729 [soc: qcom: qmi_encdec: Restrict string length in decode]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/8d207400fd6b79c92aeb2f33bb79f62dff904ea2 (6.6-rc1)
+CVE-2023-53728 [posix-timers: Ensure timer ID search-loop limit is valid]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.112-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/8ce8849dd1e78dadcee0ec9acbd259d239b7069f (6.5-rc1)
+CVE-2023-53727 [net/sched: fq_pie: avoid stalls in fq_pie_timer()]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/8c21ab1bae945686c602c5bfa4e3f3352c2452c5 (6.6-rc1)
+CVE-2023-53726 [arm64: csum: Fix OoB access in IP checksum code for negative lengths]
+	- linux 6.5.3-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/8bd795fedb8450ecbef18eeadbd23ed8fc7630f5 (6.6-rc1)
+CVE-2023-53725 [clocksource/drivers/cadence-ttc: Fix memory leak in ttc_timer_probe]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/8b5bf64c89c7100c921bd807ba39b2eb003061ab (6.5-rc1)
+CVE-2023-53724 [mfd: pcf50633-adc: Fix potential memleak in pcf50633_adc_async_read()]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/8b450dcff23aa254844492831a8e2b508a9d522d (6.3-rc1)
+CVE-2023-53723 [drm/amdgpu: disable sdma ecc irq only when sdma RAS is enabled in suspend]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/8b229ada2669b74fdae06c83fbfda5a5a99fc253 (6.4-rc2)
+CVE-2023-53722 [md: raid1: fix potential OOB in raid1_remove_disk()]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/8b0472b50bcf0f19a5119b00a53b63579c8e1e4d (6.6-rc1)
+CVE-2023-53721 [wifi: ath12k: Fix a NULL pointer dereference in ath12k_mac_op_hw_scan()]
+	- linux 6.5.6-1
+	NOTE: https://git.kernel.org/linus/8ad314da54c6dd223a6b6cc85019160aa842f659 (6.6-rc1)
+CVE-2023-53720 [net/mlx5e: Release the label when replacing existing ct entry]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/8ac04a28144cfa89b61be518268233742c23d88d (6.4-rc1)
+CVE-2023-53719 [serial: arc_uart: fix of_iomap leak in `arc_serial_probe`]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/8ab5fc55d7f65d58a3c3aeadf11bdf60267cd2bd (6.4-rc3)
+CVE-2023-53718 [ring-buffer: Do not swap cpu_buffer during resize process]
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/8a96c0288d0737ad77882024974c075345c72011 (6.5-rc3)
+CVE-2023-53717 [wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback()]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/8a2f35b9830692f7a616f2f627f943bc748af13a (6.3-rc1)
+CVE-2023-53716 [net: fix skb leak in __skb_tstamp_tx()]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/8a02fb71d7192ff1a9a47c9d937624966c6e09af (6.4-rc4)
+CVE-2023-53715 [wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/89b89e52153fda2733562776c7c9d9d3ebf8dd6d (6.4-rc1)
+CVE-2023-53714 [drm/stm: ltdc: fix late dereference check]
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/898a9e3f56db9860ab091d4bf41b6caa99aafc3d (6.5-rc1)
+CVE-2023-53713 [arm64: sme: Use STR P to clear FFR context field in streaming SVE mode]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/893b24181b4c4bf1fa2841b1ed192e5413a97cb1 (6.5-rc1)
+CVE-2023-53712 [ARM: 9317/1: kexec: Make smp stop calls asynchronous]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	NOTE: https://git.kernel.org/linus/8922ba71c969d2a0c01a94372a71477d879470de (6.6-rc1)
+CVE-2023-53711 [NFS: Fix a potential data corruption]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/88975a55969e11f26fe3846bf4fbf8e7dc8cbbd4 (6.6-rc1)
+CVE-2023-53710 [wifi: mt76: mt7921: fix error code of return in mt7921_acpi_read]
+	- linux 6.1.20-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/888d89034f9eaeab9b5b75f13dbe35376c7dd471 (6.3-rc1)
+CVE-2023-53709 [ring-buffer: Handle race between rb_move_tail and rb_check_pages]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/8843e06f67b14f71c044bf6267b2387784c7e198 (6.3-rc1)
+CVE-2023-53708 [ACPI: x86: s2idle: Catch multiple ACPI_TYPE_PACKAGE objects]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	NOTE: https://git.kernel.org/linus/883cf0d4cf288313b71146ddebdf5d647b76c78b (6.6-rc1)
+CVE-2023-53707 [drm/amdgpu: Fix integer overflow in amdgpu_cs_pass1]
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/87c2213e85bd81e4a9a4d0880c256568794ae388 (6.5-rc1)
+CVE-2023-53706 [mm/vmemmap/devdax: fix kernel crash when probing devdax devices]
+	- linux 6.3.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/87a7ae75d7383afa998f57656d1d14e2a730cc47 (6.4-rc1)
+CVE-2023-53705 [ipv6: Fix out-of-bounds access in ipv6_find_tlv()]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/878ecb0897f4737a4c9401f3523fd49589025671 (6.4-rc4)
+CVE-2023-53704 [clk: imx: clk-imx8mp: improve error handling in imx8mp_clocks_probe()]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/878b02d5f3b56cb090dbe2c70c89273be144087f (6.5-rc1)
+CVE-2023-53703 [HID: amd_sfh: Fix for shift-out-of-bounds]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/87854366176403438d01f368b09de3ec2234e0f5 (6.5-rc2)
+CVE-2023-53702 [s390/crypto: use vector instructions only if available for ChaCha20]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/8703dd6b238da0ec6c276e53836f8200983d3d9b (6.4-rc3)
+CVE-2023-53701 [netfilter: nf_tables: deactivate anonymous set from preparation phase]
+	- linux 6.1.27-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux 5.10.179-1
+	[buster] - linux 4.19.289-1
+	NOTE: https://git.kernel.org/linus/c1592a89942e9678f7d9c8030efa777c0d57edab (6.4-rc1)
+CVE-2023-53700 [media: max9286: Fix memleak in max9286_v4l2_register()]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/8636c5fc7658c7c6299fb8b352d24ea4b9ba99e2 (6.3-rc1)
+CVE-2023-53699 [riscv: move memblock_allow_resize() after linear mapping is ready]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/85fadc0d04119c2fe4a20287767ab904c6d21ba1 (6.5-rc1)
+CVE-2023-53698 [xsk: fix refcount underflow in error path]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/85c2c79a07302fe68a1ad5cc449458cc559e314d (6.5-rc6)
+CVE-2023-53697 [nvdimm: Fix memleak of pmu attr_groups in unregister_nvdimm_pmu()]
+	- linux 6.5.3-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/85ae42c72142346645e63c33835da947dfa008b3 (6.6-rc1)
+CVE-2023-53696 [scsi: qla2xxx: Fix memory leak in qla2x00_probe_one()]
+	- linux 6.1.25-1
+	NOTE: https://git.kernel.org/linus/85ade4010e13ef152ea925c74d94253db92e5428 (6.3-rc6)
+CVE-2023-53695 [udf: Detect system inodes linked into directory hierarchy]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/85a37983ec69cc9fcd188bc37c4de15ee326355a (6.3-rc1)
+CVE-2023-53694 [riscv: ftrace: Fixup panic by disabling preemption]
+	- linux 6.1.25-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/8547649981e6631328cd64f583667501ae385531 (6.3-rc1)
+CVE-2023-53693 [USB: gadget: Fix the memory leak in raw_gadget driver]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/83e30f2bf86ef7c38fbd476ed81a88522b620628 (6.5-rc4)
+CVE-2023-53692 [ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/835659598c67907b98cd2aa57bb951dfaf675c69 (6.4-rc1)
+CVE-2022-50582 [regulator: core: Prevent integer underflow]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/8d8e16592022c9650df8aedfe6552ed478d7135b (6.1-rc1)
+CVE-2022-50581 [hfs: fix OOB Read in __hfs_brec_find]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/8d824e69d9f3fa3121b2dda25053bae71e2460d2 (6.2-rc1)
+CVE-2022-50580 [blk-throttle: prevent overflow while calculating wait time]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/8d6bbaada2e0a65f9012ac4c2506460160e7237a (6.1-rc1)
+CVE-2022-50579 [arm64: ftrace: fix module PLTs with mcount]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/8cfb08575c6d4585f1ce0deeb189e5c824776b04 (6.1-rc1)
+CVE-2022-50578 [class: fix possible memory leak in __class_register()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/8c3e8a6bdb5253b97ad532570f8b5db5f7a06407 (6.2-rc1)
+CVE-2022-50577 [ima: Fix memory leak in __ima_inode_hash()]
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/8c1d6a050a0f16e0a9d32eaf53b965c77279c6f8 (6.2-rc1)
+CVE-2022-50576 [serial: pch: Fix PCI device refcount leak in pch_request_dma()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/8be3a7bf773700534a6e8f87f6ed2ed111254be5 (6.2-rc1)
+CVE-2022-50575 [xen/privcmd: Fix a possible warning in privcmd_ioctl_mmap_resource()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/8b997b2bb2c53b76a6db6c195930e9ab8e4b0c79 (6.2-rc1)
+CVE-2022-50574 [drm/omap: dss: Fix refcount leak bugs]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/8b42057e62120813ebe9274f508fa785b7cab33a (6.1-rc1)
+CVE-2022-50573 [wifi: mt76: mt7915: fix mt7915_rate_txpower_get() resource leaks]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/8b25301af01566f4b5a301fc1ad7c5d2b1788d7f (6.3-rc1)
+CVE-2022-50572 [ASoC: audio-graph-card: fix refcount leak of cpu_ep in __graph_for_each_link()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/8ab2d12c726f0fde0692fa5d81d8019b3dcd62d0 (6.2-rc1)
+CVE-2022-50571 [btrfs: call __btrfs_remove_free_space_cache_locked on cache load failure]
+	- linux 6.0.2-1
+	NOTE: https://git.kernel.org/linus/8a1ae2781dee9fc21ca82db682d37bea4bd074ad (6.1-rc1)
+CVE-2022-50570 [platform/chrome: fix memory corruption in ioctl]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/8a07b45fd3c2dda24fad43639be5335a4595196a (6.1-rc1)
+CVE-2022-50569 [xfrm: Update ipcomp_scratches with NULL when freed]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/8a04d2fc700f717104bfb95b0f6694e448a4537f (6.1-rc1)
+CVE-2022-50568 [usb: gadget: f_hid: fix f_hidg lifetime vs cdev]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/89ff3dfac604614287ad5aad9370c3f984ea3f4b (6.2-rc1)
+CVE-2022-50567 [fs: jfs: fix shift-out-of-bounds in dbAllocAG]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/898f706695682b9954f280d95e49fa86ffa55d08 (6.2-rc1)
+CVE-2022-50566 [mtd: Fix device name leak when register device failed in add_mtd_device()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/895d68a39481a75c680aa421546931fb11942fa6 (6.2-rc1)
+CVE-2022-50565 [wifi: plfxlc: fix potential memory leak in __lf_x_usb_enable_rx()]
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/895b3b06efc285c1245242e9638b9ae251dc13ec (6.2-rc1)
+CVE-2022-50564 [s390/netiucv: Fix return type of netiucv_tx()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/88d86d18d7cf7e9137c95f9d212bb9fff8a1b4be (6.2-rc1)
+CVE-2022-50563 [dm thin: Fix UAF in run_timer_softirq()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/88430ebcbc0ec637b710b947738839848c20feff (6.2-rc1)
+CVE-2022-50562 [tpm: acpi: Call acpi_put_table() to fix memory leak]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/8740a12ca2e2959531ad253bac99ada338b33d80 (6.2-rc1)
+CVE-2022-50561 [iio: fix memory leak in iio_device_register_eventset()]
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/86fdd15e10e404e70ecb2a3bff24d70356d42b36 (6.2-rc1)
+CVE-2022-50560 [drm/meson: explicitly remove aggregate driver at module unload time]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/8616f2a0589a80e08434212324250eb22f6a66ce (6.1-rc1)
+CVE-2022-50559 [clk: imx: scu: fix memleak on platform_device_add() fails]
+	- linux 6.0.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/855ae87a2073ebf1b395e020de54fdf9ce7d166f (6.1-rc1)
+CVE-2022-50558 [regmap-irq: Use the new num_config_regs property in regmap_add_irq_chip_fwnode]
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/84498d1fb35de6ab71bdfdb6270a464fb4a0951b (6.2-rc1)
+CVE-2022-50557 [pinctrl: thunderbay: fix possible memory leak in thunderbay_build_functions()]
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/83e1bcaf8cef26edaaf2a6098ef760f563683483 (6.2-rc1)
+CVE-2022-50556 [drm: Fix potential null-ptr-deref due to drmm_mode_config_init()]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/834c23e4f798dcdc8af251b3c428ceef94741991 (6.3-rc1)
 CVE-2025-40780 [Cache poisoning due to weak PRNG]
 	- bind9 <unfixed>
 	NOTE: https://kb.isc.org/docs/cve-2025-40780



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9b1923db28026068871c298a29c771f917259033

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9b1923db28026068871c298a29c771f917259033
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251022/fe629596/attachment.htm>


More information about the debian-security-tracker-commits mailing list