[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Sep 15 18:27:56 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
56fe1052 by Salvatore Bonaccorso at 2025-09-15T19:27:39+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,298 @@
+CVE-2023-53198 [raw: Fix NULL deref in raw_get_next().]
+	- linux 6.1.25-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0a78cf7264d29abeca098eae0b188a10aabc8a32 (6.3-rc6)
+CVE-2023-53197 [USB: uhci: fix memory leak with using debugfs_lookup()]
+	- linux 6.1.20-1
+	NOTE: https://git.kernel.org/linus/0a3f82c79c86278e7f144564b1cb6cc5c3657144 (6.3-rc1)
+CVE-2023-53196 [usb: dwc3: qcom: Fix potential memory leak]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/097fb3ee710d4de83b8d4f5589e8ee13e0f0541e (6.5-rc1)
+CVE-2023-53195 [mlxsw: minimal: fix potential memory leak in mlxsw_m_linecards_init]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/08fc75735fda3be97194bfbf3c899c87abb3d0fe (6.5-rc1)
+CVE-2023-53194 [fs/ntfs3: Add length check in indx_get_root]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.82-1
+	NOTE: https://git.kernel.org/linus/08e8cf5f2d9ec383a2e339a2711b62a54ff3fba0 (6.4-rc1)
+CVE-2023-53193 [drm/amdgpu: fix amdgpu_irq_put call trace in gmc_v10_0_hw_fini]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/08c677cb0b436a96a836792bb35a8ec5de4999c2 (6.4-rc1)
+CVE-2023-53192 [vxlan: Fix nexthop hash size]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/0756384fb1bd38adb2ebcfd1307422f433a1d772 (6.5-rc5)
+CVE-2023-53191 [irqchip/alpine-msi: Fix refcount leak in alpine_msix_init_domains]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/071d068b89e95d1b078aa6bbcb9d0961b77d6aa1 (6.3-rc1)
+CVE-2023-53190 [vxlan: Fix memory leaks in error path]
+	- linux 6.1.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/06bf62944144a92d83dd14fd1378d2a288259561 (6.2-rc3)
+CVE-2023-53189 [ipv6/addrconf: fix a potential refcount underflow for idev]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/06a0716949c22e2aefb648526580671197151acc (6.5-rc2)
+CVE-2023-53188 [net: openvswitch: fix race on port output]
+	- linux 6.1.25-1
+	[bullseye] - linux 5.10.237-1
+	NOTE: https://git.kernel.org/linus/066b86787fa3d97b7aefb5ac0a99a22dad2d15f8 (6.3-rc7)
+CVE-2023-53187 [btrfs: fix use-after-free of new block group that became unused]
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0657b20c5a76c938612f8409735a8830d257866e (6.5-rc3)
+CVE-2023-53186 [skbuff: Fix a race between coalescing and releasing SKBs]
+	- linux 6.1.25-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0646dc31ca886693274df5749cd0c8c1eaaeb5ca (6.3-rc7)
+CVE-2023-53185 [wifi: ath9k: don't allow to overwrite ENDPOINT0 attributes]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/061b0cb9327b80d7a0f63a33e7c3e2a91a71f142 (6.5-rc1)
+CVE-2023-53184 [arm64/sme: Set new vector length before reallocating]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/05d881b85b48c7ac6a7c92ce00aa916c4a84d052 (6.5-rc4)
+CVE-2023-53183 [btrfs: exit gracefully if reloc roots don't match]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/05d7ce504545f7874529701664c90814ca645c5d (6.5-rc6)
+CVE-2023-53182 [ACPICA: Avoid undefined behavior: applying zero offset to null pointer]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/05bb0167c80b8f93c6a4e0451b7da9b96db990c2 (6.4-rc1)
+CVE-2023-53181 [dma-buf/dma-resv: Stop leaking on krealloc() failure]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/05abb3be91d8788328231ee02973ab3d47f5e3d2 (6.5-rc3)
+CVE-2023-53180 [wifi: ath12k: Avoid NULL pointer access during management transmit cleanup]
+	- linux 6.4.11-1
+	NOTE: https://git.kernel.org/linus/054b5580a36e435692c203c19abdcb9f7734320e (6.5-rc1)
+CVE-2023-53179 [netfilter: ipset: add the missing IP_SET_HASH_WITH_NET0 macro for ip_set_hash_netportnet.c]
+	- linux 6.5.3-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/050d91c03b28ca479df13dfb02bcd2c60dd6a878 (6.6-rc1)
+CVE-2023-53178 [mm: fix zswap writeback race condition]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	NOTE: https://git.kernel.org/linus/04fc7816089c5a32c29a04ec94b998e219dfb946 (6.4-rc3)
+CVE-2023-53177 [media: hi846: fix usage of pm_runtime_get_if_in_use()]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/04fc06f6dc1592ed5d675311ac50d8fba5db62ab (6.5-rc1)
+CVE-2023-53176 [serial: 8250: Reinit port->pm on port specific driver unbind]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/04e82793f068d2f0ffe62fcea03d007a8cdc16a7 (6.4-rc1)
+CVE-2023-53175 [PCI: hv: Fix a crash in hv_pci_restore_msi_msg() during hibernation]
+	- linux 6.5.3-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/04bbe863241a9be7d57fb4cf217ee4a72f480e70 (6.6-rc1)
+CVE-2023-53174 [scsi: core: Fix possible memory leak if device_add() fails]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/04b5b5cb0136ce970333a9c6cec7e46adba1ea3a (6.5-rc6)
+CVE-2023-53173 [tty: pcn_uart: fix memory leak with using debugfs_lookup()]
+	- linux 6.1.20-1
+	NOTE: https://git.kernel.org/linus/04a189c720aa2b6091442113ce9b9bc93552dff8 (6.3-rc1)
+CVE-2023-53172 [fsverity: reject FS_IOC_ENABLE_VERITY on mode 3 fds]
+	- linux 6.3.7-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/04839139213cf60d4c5fc792214a08830e294ff8 (6.4-rc1)
+CVE-2023-53171 [vfio/type1: prevent underflow of locked_vm via exec()]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/046eca5018f8a5dd1dc2cedf87fb5843b9ea3026 (6.3-rc1)
+CVE-2023-53170 [net: dsa: Removed unneeded of_node_put in felix_parse_ports_node]
+	- linux 6.4.11-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/04499f28b40bfc24f20b0e2331008bb90a54a6cf (6.5-rc2)
+CVE-2023-53169 [x86/resctrl: Clear staged_config[] before and after it is used]
+	- linux 6.1.25-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0424a7dfe9129b93f29b277511a60e87f052ac6b (6.3-rc3)
+CVE-2023-53168 [usb: ucsi_acpi: Increase the command completion timeout]
+	- linux 6.1.25-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/02d210f434249a7edbc160969b75df030dc6934d (6.3-rc4)
+CVE-2023-53167 [tracing: Fix null pointer dereference in tracing_err_log_open()]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/02b0095e2fbbc060560c1065f86a211d91e27b26 (6.5-rc1)
+CVE-2023-53166 [power: supply: bq25890: Fix external_power_changed race]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/029a443b9b6424170f00f6dd5b7682e682cce92e (6.4-rc4)
+CVE-2023-53165 [udf: Fix uninitialized array access for some pathnames]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/028f6055c912588e6f72722d89c30b401bbcf013 (6.5-rc1)
+CVE-2023-53164 [irqchip/ti-sci: Fix refcount leak in ti_sci_intr_irq_domain_probe]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/02298b7bae12936ca313975b02e7f98b06670d37 (6.3-rc1)
+CVE-2023-53163 [fs/ntfs3: don't hold ni_lock when calling truncate_setsize()]
+	- linux 6.1.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0226635c304cfd5c9db9b78c259cb713819b057e (6.2-rc3)
+CVE-2023-53153 [wifi: cfg80211: Fix use after free for wext]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/015b8cc5e7c4d7bb671f1984d7b7338c310b185b (6.3-rc1)
+CVE-2023-53152 [drm/amdgpu: fix calltrace warning in amddrm_buddy_fini]
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/01382501509871d0799bab6bd412c228486af5bf (6.5-rc1)
+CVE-2023-53151 [md/raid10: prevent soft lockup while flush writes]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.85-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/010444623e7f4da6b4a4dd603a7da7469981e293 (6.5-rc1)
+CVE-2023-53150 [scsi: qla2xxx: Pointer may be dereferenced]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/00eca15319d9ce8c31cdf22f32a3467775423df4 (6.5-rc1)
+CVE-2023-53149 [ext4: avoid deadlock in fs reclaim with page writeback]
+	- linux 6.3.7-1
+	NOTE: https://git.kernel.org/linus/00d873c17e29cc32d90ca852b82685f1673acaa5 (6.4-rc2)
+CVE-2023-53148 [igb: Fix igb_down hung on surprise removal]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/004d25060c78fc31f66da0fa439c544dda1ac9d5 (6.5-rc1)
+CVE-2023-53147 [xfrm: add NULL check in xfrm_update_ae_params]
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/00374d9b6d9f932802b55181be9831aa948e5b7c (6.5-rc7)
+CVE-2022-50261 [drm/sti: Fix return type of sti_{dvo,hda,hdmi}_connector_mode_valid()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/0ad811cc08a937d875cbad0149c1bab17f84ba05 (6.2-rc1)
+CVE-2022-50260 [drm/msm: Make .remove and .shutdown HW shutdown consistent]
+	- linux 6.0.3-1
+	NOTE: https://git.kernel.org/linus/0a58d2ae572adaec8d046f8d35b40c2c32ac7468 (6.1-rc1)
+CVE-2022-50259 [bpf, sockmap: fix race in sock_map_free()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/0a182f8d607464911756b4dbef5d6cad8de22469 (6.2-rc1)
+CVE-2022-50258 [wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds()]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/0a06cadcc2a0044e4a117cc0e61436fc3a0dad69 (6.3-rc1)
+CVE-2022-50257 [xen/gntdev: Prevent leaking grants]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/0991028cd49567d7016d1b224fe0117c35059f86 (6.1-rc1)
+CVE-2022-50256 [drm/meson: remove drm bridges at aggregate driver unbind time]
+	- linux 6.0.3-1
+	NOTE: https://git.kernel.org/linus/09847723c12fc2753749cec3939a02ee92dac468 (6.1-rc1)
+CVE-2022-50255 [tracing: Fix reading strings from synthetic events]
+	- linux 6.0.3-1
+	NOTE: https://git.kernel.org/linus/0934ae9977c27133449b6dd8c6213970e7eece38 (6.1-rc1)
+CVE-2022-50254 [media: ov8865: Fix an error handling path in ov8865_probe()]
+	- linux 6.0.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/080e0b7404850406628674b07286f16cc389a892 (6.1-rc2)
+CVE-2022-50253 [bpf: make sure skb->len != 0 when redirecting to a tunneling device]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/07ec7b502800ba9f7b8b15cb01dd6556bb41aaca (6.2-rc1)
+CVE-2022-50252 [igb: Do not free q_vector unless new one was allocated]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/0668716506ca66f90d395f36ccdaebc3e0e84801 (6.2-rc1)
+CVE-2022-50251 [mmc: vub300: fix return value check of mmc_add_host()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/0613ad2401f88bdeae5594c30afe318e93b14676 (6.2-rc1)
+CVE-2022-50250 [regulator: core: fix use_count leakage when handling boot-on]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/0591b14ce0398125439c759f889647369aa616a0 (6.2-rc1)
+CVE-2022-50249 [memory: of: Fix refcount leak bug in of_get_ddr_timings()]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/05215fb32010d4afb68fbdbb4d237df6e2d4567b (6.1-rc1)
+CVE-2022-50248 [wifi: iwlwifi: mvm: fix double free on tx path.]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/0473cbae2137b963bd0eaa74336131cb1d3bc6c3 (6.2-rc1)
+CVE-2022-50247 [usb: xhci-mtk: fix leakage of shared hcd when fail to set wakeup irq]
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/03a88b0bafbe3f548729d970d8366f48718c9b19 (6.2-rc1)
+CVE-2022-50246 [usb: typec: tcpci: fix of node refcount leak in tcpci_register_port()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/0384e87e3fec735e47f1c133c796f32ef7a72a9b (6.2-rc1)
+CVE-2022-50245 [rapidio: fix possible UAF when kfifo_alloc() fails]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/02d7d89f816951e0862147d751b1150d67aaebdd (6.2-rc1)
+CVE-2022-50244 [Description:]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/02cd3032b154fa02fdf90e7467abaeed889330b2 (6.2-rc1)
+CVE-2022-50243 [sctp: handle the error returned from sctp_auth_asoc_init_active_key]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/022152aaebe116a25c39818a07e175a8cd3c1e11 (6.1-rc1)
+CVE-2022-50242 [drivers: net: qlcnic: Fix potential memory leak in qlcnic_sriov_init()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/01de1123322e4fe1bbd0fcdf0982511b55519c03 (6.2-rc1)
+CVE-2022-50241 [NFSD: fix use-after-free on source server when doing inter-server copy]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/019805fea91599b22dfa62ffb29c022f35abeb06 (6.1-rc1)
+CVE-2022-50240 [binder: fix UAF of alloc->vma in race with munmap()]
+	- linux 5.14.6-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/015ac18be7de25d17d6e5f1643cb3b60bfbe859e (5.10.154)
+	NOTE: Workaround the stable-only commit for 5.10.y: Mark the first version in
+	NOTE: unstable following the 5.10.y series as the fixed version. The issue was
+	NOTE: not affecting mainline.
+CVE-2022-50239 [cpufreq: qcom: fix writes in read-only memory region]
+	- linux 6.0.6-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/01039fb8e90c9cb684430414bff70cea9eb168c5 (6.1-rc2)
+CVE-2022-50236 [iommu/mediatek: Fix crash on isr after kexec()]
+	- linux 6.1.4-1
+	NOTE: https://git.kernel.org/linus/00ef8885a945c37551547d8ac8361cacd20c4e42 (6.2-rc1)
+CVE-2022-50235 [NFSD: Protect against send buffer overflow in NFSv2 READDIR]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.221-1
+	NOTE: https://git.kernel.org/linus/00b4492686e0497fdb924a9d4c8f6f99377e176c (6.1-rc1)
+CVE-2022-50234 [io_uring/af_unix: defer registered files gc to io_uring release]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/0091bfc81741b8d3aeb3b7ab8636f911b2de6e80 (6.1-rc1)
 CVE-2025-39804 [lib/crypto: arm64/poly1305: Fix register corruption in no-SIMD contexts]
 	- linux 6.16.5-1
 	[trixie] - linux <not-affected> (Vulnerable code not present)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/56fe1052f3ce0443888e981655a57fd7766669d6

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/56fe1052f3ce0443888e981655a57fd7766669d6
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250915/5c9350e0/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list