[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Sep 18 17:58:10 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
335f73a1 by Salvatore Bonaccorso at 2025-09-18T18:57:46+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,240 @@
+CVE-2023-53401 [mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required()]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/3b8abb3239530c423c0b97e42af7f7e856e1ee96 (6.5-rc1)
+CVE-2023-53400 [ALSA: hda: Fix Oops by 9.1 surround channel names]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/3b44ec8c5c44790a82f07e90db45643c762878c6 (6.4-rc3)
+CVE-2023-53399 [ksmbd: fix NULL pointer dereference in smb2_get_info_filesystem()]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	NOTE: https://git.kernel.org/linus/3ac00a2ab69b34189942afa9e862d5170cdcb018 (6.4-rc1)
+CVE-2023-53398 [mlx5: fix possible ptp queue fifo use-after-free]
+	- linux 6.1.20-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3a50cf1e8e5157b82268eee7e330dbe5736a0948 (6.3-rc1)
+CVE-2023-53397 [modpost: fix off by one in is_executable_section()]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/3a3f1e573a105328a2cca45a7cfbebabbf5e3192 (6.5-rc1)
+CVE-2023-53396 [ubifs: Fix memory leak in do_rename]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3a36d20e012903f45714df2731261fdefac900cb (6.4-rc1)
+CVE-2023-53395 [ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/3a21ffdbc825e0919db9da0e27ee5ff2cc8a863e (6.6-rc1)
+CVE-2023-53394 [net/mlx5e: xsk: Fix crash on regular rq reactivation]
+	- linux 6.4.11-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/39646d9bcd1a65d2396328026626859a1dab59d7 (6.5-rc5)
+CVE-2023-53393 [RDMA/mlx5: Fix mlx5_ib_get_hw_stats when used for device]
+	- linux 6.1.7-1
+	NOTE: https://git.kernel.org/linus/38b50aa44495d5eb4218f0b82fc2da76505cec53 (6.2-rc3)
+CVE-2023-53392 [HID: intel-ish-hid: Fix kernel panic during warm reset]
+	- linux 6.1.25-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/38518593ec55e897abda4b4be77b2ec8ec4447d1 (6.3-rc7)
+CVE-2023-53391 [shmem: use ramfs_kill_sb() for kill_sb method of ramfs-based tmpfs]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/36ce9d76b0a93bae799e27e4f5ac35478c676592 (6.5-rc1)
+CVE-2023-53390 [drivers: base: dd: fix memory leak with using debugfs_lookup()]
+	- linux 6.1.20-1
+	NOTE: https://git.kernel.org/linus/36c893d3a759ae7c91ee7d4871ebfc7504f08c40 (6.3-rc1)
+CVE-2023-53389 [drm/mediatek: dp: Only trigger DRM HPD events if bridge is attached]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/36b617f7e4ae663fcadd202ea061ca695ca75539 (6.4-rc1)
+CVE-2023-53388 [drm/mediatek: Clean dangling pointer on bind error path]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/36aa8c61af55675ed967900fbe5deb32d776f051 (6.3-rc1)
+CVE-2023-53387 [scsi: ufs: core: Fix device management cmd timeout flow]
+	- linux 6.1.20-1
+	NOTE: https://git.kernel.org/linus/36822124f9de200cedc2f42516301b50d386a6cd (6.3-rc1)
+CVE-2023-53386 [Bluetooth: Fix potential use-after-free when clear keys]
+	- linux 6.5.3-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/3673952cf0c6cf81b06c66a0b788abeeb02ff3ae (6.6-rc1)
+CVE-2023-53385 [media: mdp3: Fix resource leaks in of_find_device_by_node]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	NOTE: https://git.kernel.org/linus/35ca8ce495366909b4c2e701d1356570dd40c4e2 (6.6-rc1)
+CVE-2023-53384 [wifi: mwifiex: avoid possible NULL skb pointer dereference]
+	- linux 6.5.3-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/35a7a1ce7c7d61664ee54f5239a1f120ab95a87e (6.6-rc1)
+CVE-2023-53383 [irqchip/gicv3: Workaround for NVIDIA erratum T241-FABRIC-4]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	NOTE: https://git.kernel.org/linus/35727af2b15d98a2dd2811d631d3a3886111312e (6.4-rc1)
+CVE-2023-53382 [net/smc: Reset connection when trying to use SMCRv2 fails.]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/35112271672ae98f45df7875244a4e33aa215e31 (6.4-rc4)
+CVE-2023-53381 [NFSD: fix leaked reference count of nfsd4_ssc_umount_item]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.221-1
+	NOTE: https://git.kernel.org/linus/34e8f9ec4c9ac235f917747b23a200a5e0ec857b (6.3-rc1)
+CVE-2023-53380 [md/raid10: fix null-ptr-deref of mreplace in raid10_sync_request]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/34817a2441747b48e444cb0e05d84e14bc9443da (6.5-rc1)
+CVE-2023-53379 [usb: phy: phy-tahvo: fix memory leak in tahvo_usb_probe()]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/342161c11403ea00e9febc16baab1d883d589d04 (6.5-rc1)
+CVE-2023-53378 [drm/i915/dpt: Treat the DPT BO as a framebuffer]
+	- linux 6.1.25-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3413881e1ecc3cba722a2e87ec099692eed5be28 (6.3-rc5)
+CVE-2023-53377 [cifs: prevent use-after-free by freeing the cfile later]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/33f736187d08f6bc822117629f263b97d3df4165 (6.5-rc1)
+CVE-2023-53376 [scsi: mpi3mr: Use number of bits to manage bitmap sizes]
+	- linux 6.1.20-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/339e61565f81a6534afdc18fd854b2e2628bf5db (6.3-rc1)
+CVE-2023-53375 [tracing: Free error logs of tracing instances]
+	- linux 6.1.25-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/3357c6e429643231e60447b52ffbb7ac895aca22 (6.3-rc6)
+CVE-2023-53374 [Bluetooth: hci_conn: fail SCO/ISO via hci_conn_failed if ACL gone early]
+	- linux 6.5.3-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3344d318337d9dca928fd448e966557ec5063f85 (6.6-rc1)
+CVE-2023-53373 [crypto: seqiv - Handle EBUSY correctly]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/32e62025e5e52fbe4812ef044759de7010b15dbc (6.3-rc1)
+CVE-2023-53372 [sctp: fix a potential overflow in sctp_ifwdtsn_skip]
+	- linux 6.1.25-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/32832a2caf82663870126c5186cf8f86c8b2a649 (6.3-rc7)
+CVE-2023-53371 [net/mlx5e: fix memory leak in mlx5e_fs_tt_redirect_any_create]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3250affdc658557a41df9c5fb567723e421f8bf2 (6.5-rc2)
+CVE-2023-53370 [drm/amdgpu: fix memory leak in mes self test]
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/31d7c3a4fc3d312a0646990767647925d5bde540 (6.5-rc1)
+CVE-2023-53369 [net: dcb: choose correct policy to parse DCB_ATTR_BCN]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/31d49ba033095f6e8158c60f69714a500922e0c3 (6.5-rc5)
+CVE-2022-50399 [media: atomisp: prevent integer overflow in sh_css_set_black_frame()]
+	- linux 6.0.7-1
+	NOTE: https://git.kernel.org/linus/3ad290194bb06979367622e47357462836c1d3b4 (6.1-rc2)
+CVE-2022-50398 [drm/msm/dp: add atomic_check to bridge ops]
+	- linux 6.0.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3a661247967a6f3c99a95a8ba4c8073c5846ea4b (6.1-rc3)
+CVE-2022-50397 [net/ieee802154: reject zero-sized raw_sendmsg()]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/3a4d061c699bd3eedc80dc97a4b2a2e1af83c6f5 (6.1-rc1)
+CVE-2022-50396 [net: sched: fix memory leak in tcindex_set_parms]
+	- linux 6.1.7-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/399ab7fe0fa0d846881685fd4e57e9a8ef7559f7 (6.2-rc3)
+CVE-2022-50395 [integrity: Fix memory leakage in keyring allocation error path]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/39419ef7af0916cc3620ecf1ed42d29659109bf3 (6.2-rc1)
+CVE-2022-50394 [i2c: ismt: Fix an out-of-bounds bug in ismt_access()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/39244cc754829bf707dccd12e2ce37510f5b1f8d (6.2-rc1)
+CVE-2022-50393 [drm/amdgpu: SDMA update use unlocked iterator]
+	- linux 6.0.3-1
+	NOTE: https://git.kernel.org/linus/3913f0179ba366f7d7d160c506ce00de1602bbc4 (6.1-rc1)
+CVE-2022-50392 [ASoC: mediatek: mt8183: fix refcount leak in mt8183_mt6358_ts3a227_max98357_dev_probe()]
+	- linux 6.1.4-1
+	NOTE: https://git.kernel.org/linus/38eef3be38ab895959c442702864212cc3beb96c (6.2-rc1)
+CVE-2022-50391 [mm/mempolicy: fix memory leak in set_mempolicy_home_node system call]
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/38ce7c9bdfc228c14d7621ba36d3eebedd9d4f76 (6.2-rc1)
+CVE-2022-50390 [drm/ttm: fix undefined behavior in bit shift for TTM_TT_FLAG_PRIV_POPULATED]
+	- linux 6.1.4-1
+	NOTE: https://git.kernel.org/linus/387659939c00156f8d6bab0fbc55b4eaf2b6bc5b (6.2-rc1)
+CVE-2022-50389 [tpm: tpm_crb: Add the missed acpi_put_table() to fix memory leak]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/37e90c374dd11cf4919c51e847c6d6ced0abc555 (6.2-rc1)
+CVE-2022-50388 [nvme: fix multipath crash caused by flush request when blktrace is enabled]
+	- linux 6.1.7-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/3659fb5ac29a5e6102bebe494ac789fd47fb78f4 (6.2-rc2)
+CVE-2022-50387 [net: hinic: fix the issue of CMDQ memory leaks]
+	- linux 6.0.7-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/363cc87767f6ddcfb9158ad2e2afa2f8d5c4b94e (6.1-rc3)
+CVE-2022-50386 [Bluetooth: L2CAP: Fix user-after-free]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/35fcbc4243aad7e7d020b7c1dfb14bb888b20a4f (6.1-rc1)
+CVE-2022-50385 [NFS: Fix an Oops in nfs_d_automount()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/35e3b6ae84935d0d7ff76cbdaa83411b0ad5e471 (6.2-rc1)
+CVE-2022-50384 [staging: vme_user: Fix possible UAF in tsi148_dma_list_add]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/357057ee55d3c99a5de5abe8150f7bca04f8e53b (6.2-rc1)
+CVE-2022-50383 [media: mediatek: vcodec: Can't set dst buffer to done when lat decode error]
+	- linux 6.1.4-1
+	NOTE: https://git.kernel.org/linus/3568ecd3f3a6d133ab7feffbba34955c8c79bbc4 (6.2-rc1)
+CVE-2022-50382 [padata: Always leave BHs disabled when running ->parallel()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/34c3a47d20ae55b3600fed733bf96eafe9c500d5 (6.2-rc1)
+CVE-2022-50381 [md: fix a crash in mempool_free]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/341097ee53573e06ab9fc675d96a052385b851fa (6.2-rc1)
+CVE-2022-50380 [mm: /proc/pid/smaps_rollup: fix no vma's null-deref]
+	- linux 5.16.7-1
+	NOTE: https://git.kernel.org/linus/33fc9e26b7cb39f0d4219c875a2451802249c225 (5.15.76)
+CVE-2022-50379 [btrfs: fix race between quota enable and quota rescan ioctl]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/331cd9461412e103d07595a10289de90004ac890 (6.1-rc1)
+CVE-2022-50378 [drm/meson: reorder driver deinit sequence to fix use-after-free bug]
+	- linux 6.0.3-1
+	NOTE: https://git.kernel.org/linus/31c519981eb141c7ec39bfd5be25d35f02edb868 (6.1-rc1)
+CVE-2022-50377 [ext4: check and assert if marking an no_delete evicting inode dirty]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/318cdc822c63b6e2befcfdc2088378ae6fa18def (6.2-rc1)
+CVE-2022-50376 [orangefs: Fix kmemleak in orangefs_{kernel,client}_debug_init()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/31720a2b109b3080eb77e97b8f6f50a27b4ae599 (6.2-rc1)
+CVE-2022-50375 [tty: serial: fsl_lpuart: disable dma rx/tx use flags in lpuart_dma_shutdown]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/316ae95c175a7d770d1bfe4c011192712f57aa4a (6.1-rc1)
 CVE-2025-30187
 	- dnsdist <unfixed>
 	[bookworm] - dnsdist <not-affected> (Vulnerable code not present)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/335f73a1fba31f2a584ea041889e155e6b6b3209

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/335f73a1fba31f2a584ea041889e155e6b6b3209
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250918/37ed99f3/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list