[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Sep 15 20:40:25 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
fe6f3730 by Salvatore Bonaccorso at 2025-09-15T21:39:59+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,171 @@
+CVE-2023-53262 [f2fs: fix scheduling while atomic in decompression path]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/1aa161e43106d46ca8e9a86f4aa28d420258134b (6.4-rc1)
+CVE-2023-53261 [coresight: Fix memory leak in acpi_buffer->pointer]
+	- linux 6.5.3-1
+	NOTE: https://git.kernel.org/linus/1a9e02673e2550f5612099e64e8761f0c8fc0f50 (6.6-rc1)
+CVE-2023-53260 [ovl: fix null pointer dereference in ovl_permission()]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/1a73f5b8f079fd42a544c1600beface50c63af7c (6.5-rc1)
+CVE-2023-53259 [VMCI: check context->notify_page after call to get_user_pages_fast() to avoid GPF]
+	- linux 6.1.20-1
+	NOTE: https://git.kernel.org/linus/1a726cb47fd204109c767409fa9ca15a96328f14 (6.3-rc1)
+CVE-2023-53258 [drm/amd/display: Fix possible underflow for displays with large vblank]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/1a4bcdbea4319efeb26cc4b05be859a7867e02dc (6.5-rc1)
+CVE-2023-53257 [wifi: mac80211: check S1G action frame size]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	NOTE: https://git.kernel.org/linus/19e4a47ee74718a22e963e8a647c8c3bfe8bb05c (6.6-rc1)
+CVE-2023-53256 [firmware: arm_ffa: Fix FFA device names for logical partitions]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/19b8766459c41c6f318f8a548cc1c66dffd18363 (6.4-rc4)
+CVE-2023-53255 [firmware: stratix10-svc: Fix a potential resource leak in svc_create_memory_pool()]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/1995f15590ca222f91193ed11461862b450abfd6 (6.5-rc1)
+CVE-2023-53254 [cacheinfo: Fix shared_cpu_map to handle shared caches at different levels]
+	- linux 6.1.20-1
+	NOTE: https://git.kernel.org/linus/198102c9103fc78d8478495971947af77edb05c1 (6.3-rc1)
+CVE-2023-53253 [HID: nvidia-shield: Reference hid_device devm allocation of input_dev name]
+	- linux 6.5.3-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/197d3143520fec9fde89aebabc9f0d7464f08e50 (6.6-rc1)
+CVE-2023-53252 [Bluetooth: use RCU for hci_conn_params and iterate safely in hci_sync]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/195ef75e19287b4bc413da3e3e3722b030ac881e (6.5-rc3)
+CVE-2023-53251 [wifi: iwlwifi: pcie: fix NULL pointer dereference in iwl_pcie_irq_rx_msix_handler()]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/1902f1953b8ba100ee8705cb8a6f1a9795550eca (6.5-rc1)
+CVE-2023-53250 [firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle]
+	- linux 6.1.20-1
+	NOTE: https://git.kernel.org/linus/18e126e97c961f7a93823795c879d7c085fe5098 (6.3-rc1)
+CVE-2023-53249 [clk: imx: clk-imx8mn: fix memory leak in imx8mn_clocks_probe]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/188d070de9132667956f5aadd98d2bd87d3eac89 (6.5-rc1)
+CVE-2023-53248 [drm/amdgpu: install stub fence into potential unused fence pointers]
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/187916e6ed9d0c3b3abc27429f7a5f8c936bd1f0 (6.5-rc1)
+CVE-2023-53247 [btrfs: set_page_extent_mapped after read_folio in btrfs_cont_expand]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/17b17fcd6d446b95904a6929c40012ee7f0afc0c (6.5-rc3)
+CVE-2023-53246 [cifs: fix DFS traversal oops without CONFIG_CIFS_DFS_UPCALL]
+	- linux 6.1.25-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/179a88a8558bbf42991d361595281f3e45d7edfc (6.3-rc5)
+CVE-2023-53245 [scsi: storvsc: Fix handling of virtual Fibre Channel timeouts]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/175544ad48cbf56affeef2a679c6a4d4fb1e2881 (6.5-rc6)
+CVE-2023-53244 [media: pci: tw68: Fix null-ptr-deref bug in buf prepare and finish]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	NOTE: https://git.kernel.org/linus/1634b7adcc5bef645b3666fdd564e5952a9e24e0 (6.4-rc1)
+CVE-2023-53243 [btrfs: add handling for RAID1C23/DUP to btrfs_reduce_alloc_profile]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/160fe8f6fdb13da6111677be6263e5d65e875987 (6.5-rc1)
+CVE-2022-50315 [ata: ahci: Match EM_MAX_SLOTS with SATA_PMP_MAX_PORTS]
+	- linux 6.0.6-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/1e41e693f458eef2d5728207dbd327cd3b16580a (6.1-rc2)
+CVE-2022-50314 [nbd: Fix hung when signal interrupts nbd_start_device_ioctl()]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/1de7c3cf48fc41cd95adb12bd1ea9033a917798a (6.1-rc1)
+CVE-2022-50313 [erofs: fix order >= MAX_ORDER warning due to crafted negative i_size]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.234-1
+	NOTE: https://git.kernel.org/linus/1dd73601a1cba37a0ed5f89a8662c90191df5873 (6.1-rc1)
+CVE-2022-50312 [drivers: serial: jsm: fix some leaks in probe]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/1d5859ef229e381f4db38dce8ed58e4bf862006b (6.1-rc1)
+CVE-2022-50311 [cxl: Fix refcount leak in cxl_calc_capp_routing]
+	NOTE: https://git.kernel.org/linus/1d09697ff22908ae487fc8c4fbde1811732be523 (6.2-rc1)
+CVE-2022-50310 [ip6mr: fix UAF issue in ip6mr_sk_done() when addrconf_init_net() failed]
+	- linux 6.0.6-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/1ca695207ed2271ecbf8ee6c641970f621c157cc (6.1-rc2)
+CVE-2022-50309 [media: xilinx: vipp: Fix refcount leak in xvip_graph_dma_init]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/1c78f19c3a0ea312a8178a6bfd8934eb93e9b10a (6.1-rc1)
+CVE-2022-50308 [ASoC: qcom: Add checks for devm_kcalloc]
+	NOTE: https://git.kernel.org/linus/1bf5ee979076ceb121ee51c95197d890b1cee7f4 (6.2-rc1)
+CVE-2022-50307 [s390/cio: fix out-of-bounds access on cio_ignore free]
+	- linux 6.0.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/1b6074112742f65ece71b0f299ca5a6a887d2db6 (6.1-rc3)
+CVE-2022-50306 [ext4: fix potential out of bound read in ext4_fc_replay_scan()]
+	- linux 6.0.6-1
+	NOTE: https://git.kernel.org/linus/1b45cc5c7b920fd8bf72e5a888ec7abeadf41e09 (6.1-rc1)
+CVE-2022-50305 [ASoC: sof_es8336: fix possible use-after-free in sof_es8336_remove()]
+	NOTE: https://git.kernel.org/linus/1b41beaa7a58467505ec3023af8aad74f878b888 (6.2-rc1)
+CVE-2022-50304 [mtd: core: fix possible resource leak in init_mtd()]
+	NOTE: https://git.kernel.org/linus/1aadf01e5076b9ab6bf294b9622335c651314895 (6.2-rc1)
+CVE-2022-50303 [drm/amdkfd: Fix double release compute pasid]
+	- linux 6.1.7-1
+	NOTE: https://git.kernel.org/linus/1a799c4c190ea9f0e81028e3eb3037ed0ab17ff5 (6.2-rc1)
+CVE-2022-50302 [lockd: set other missing fields when unlocking files]
+	NOTE: https://git.kernel.org/linus/18ebd35b61b4693a0ddc270b6d4f18def232e770 (6.2-rc1)
+CVE-2022-50301 [iommu/omap: Fix buffer overflow in debugfs]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/184233a5202786b20220acd2d04ddf909ef18f29 (6.1-rc1)
+CVE-2022-50300 [btrfs: fix extent map use-after-free when handling missing device in read_one_chunk]
+	NOTE: https://git.kernel.org/linus/1742e1c90c3da344f3bb9b1f1309b3f47482756a (6.2-rc1)
+CVE-2022-50299 [md: Replace snprintf with scnprintf]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/1727fd5015d8f93474148f94e34cda5aa6ad4a43 (6.1-rc1)
+CVE-2022-50298 [slimbus: qcom-ngd: cleanup in probe error path]
+	- linux 6.0.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/16f14551d0df9e7cd283545d7d748829594d912f (6.1-rc1)
+CVE-2022-50297 [wifi: ath9k: verify the expected usb_endpoints are present]
+	NOTE: https://git.kernel.org/linus/16ef02bad239f11f322df8425d302be62f0443ce (6.2-rc1)
+CVE-2022-50296 [UM: cpuinfo: Fix a warning for CONFIG_CPUMASK_OFFSTACK]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/16c546e148fa6d14a019431436a6f7b4087dbccd (6.1-rc1)
+CVE-2022-50295 [io_uring/msg_ring: Fix NULL pointer dereference in io_msg_send_fd()]
+	- linux 6.0.6-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/16bbdfe5fb0e78e0acb13e45fc127e9a296913f2 (6.1-rc2)
+CVE-2022-50294 [wifi: libertas: fix memory leak in lbs_init_adapter()]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/16a03958618fb91bb1bc7077cf3211055162cc2f (6.3-rc1)
+CVE-2022-50293 [btrfs: do not BUG_ON() on ENOMEM when dropping extent items for a range]
+	NOTE: https://git.kernel.org/linus/162d053e15fe985f754ef495a96eb3db970c43ed (6.2-rc1)
+CVE-2022-50292 [drm/msm/dp: fix bridge lifetime]
+	- linux 6.0.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/16194958f888d63839042d1190f7001e5ddec47b (6.1-rc3)
+CVE-2022-50291 [kcm: annotate data-races around kcm->rx_psock]
+	- linux 6.0.7-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/15e4dabda11b0fa31d510a915d1a580f47dfc92e (6.1-rc3)
 CVE-2023-53242 [thermal/drivers/hisi: Drop second sensor hi3660]
 	- linux 6.1.20-1
 	[bullseye] - linux 5.10.178-1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fe6f373042b679faa35a43d34cfbc916be386ee0

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/fe6f373042b679faa35a43d34cfbc916be386ee0
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250915/8a0a4000/attachment.htm>


More information about the debian-security-tracker-commits mailing list