[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Sep 18 20:49:41 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
132bd81c by Salvatore Bonaccorso at 2025-09-18T21:49:15+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,203 @@
+CVE-2023-53447 [f2fs: don't reset unchangable mount option in f2fs_remount()]
+	- linux 6.4.11-1
+	NOTE: https://git.kernel.org/linus/458c15dfbce62c35fefd9ca637b20a051309c9f1 (6.5-rc1)
+CVE-2023-53446 [PCI/ASPM: Disable ASPM on MFD function removal to avoid use-after-free]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/456d8aa37d0f56fc9e985e812496e861dcd6f2f2 (6.5-rc1)
+CVE-2023-53445 [net: qrtr: Fix a refcount bug in qrtr_recvmsg()]
+	- linux 6.1.25-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/44d807320000db0d0013372ad39b53e12d52f758 (6.3-rc6)
+CVE-2023-53444 [drm/ttm: fix bulk_move corruption when adding a entry]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/4481913607e58196c48a4fef5e6f45350684ec3c (6.5-rc2)
+CVE-2023-53443 [mfd: arizona: Use pm_runtime_resume_and_get() to prevent refcnt leak]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/4414a7ab80cebf715045e3c4d465feefbad21139 (6.3-rc1)
+CVE-2023-53442 [ice: Block switchdev mode when ADQ is active and vice versa]
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/43d00e102d9ecbe2635d7e3f2e14d2e90183d6af (6.5-rc7)
+CVE-2023-53441 [bpf: cpumap: Fix memory leak in cpu_map_update_elem]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/4369016497319a9635702da010d02af1ebb1849d (6.5-rc2)
+CVE-2023-53440 [nilfs2: fix sysfs interface lifetime]
+	- linux 6.1.25-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/42560f9c92cc43dce75dbf06cc0d840dced39b12 (6.3-rc6)
+CVE-2023-53439 [net: skb_partial_csum_set() fix against transport header magic value]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/424f8416bb39936df6365442d651ee729b283460 (6.4-rc2)
+CVE-2023-53438 [x86/MCE: Always save CS register on AMD Zen IF Poison errors]
+	- linux 6.5.3-1
+	[bookworm] - linux 6.1.55-1
+	NOTE: https://git.kernel.org/linus/4240e2ebe67941ce2c4f5c866c3af4b5ac7a0c67 (6.6-rc1)
+CVE-2023-53437 [media: uvcvideo: Handle cameras with invalid descriptors]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/41ddb251c68ac75c101d3a50a68c4629c9055e4c (6.3-rc1)
+CVE-2023-53436 [scsi: snic: Fix possible memory leak if device_add() fails]
+	- linux 6.4.11-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/41320b18a0e0dfb236dba4edb9be12dba1878156 (6.5-rc6)
+CVE-2023-53435 [cassini: Fix a memory leak in the error handling path of cas_init_one()]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/412cd77a2c24b191c65ea53025222418db09817c (6.4-rc3)
+CVE-2023-53434 [remoteproc: imx_dsp_rproc: Add custom memory copy implementation for i.MX DSP Cores]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	NOTE: https://git.kernel.org/linus/408ec1ff0caa340c57eecf4cbd14ef0132036a50 (6.4-rc1)
+CVE-2023-53433 [net: add vlan_get_protocol_and_depth() helper]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/4063384ef762cc5946fc7a3f89879e76c6ec51e2 (6.4-rc2)
+CVE-2023-53432 [firewire: net: fix use after free in fwnet_finish_incoming_packet()]
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	NOTE: https://git.kernel.org/linus/3ff256751a2853e1ffaa36958ff933ccc98c6cb5 (6.5-rc1)
+CVE-2023-53431 [scsi: ses: Don't attach if enclosure has no components]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/3fe97ff3d94934649abb0652028dd7296170c8d0 (6.3-rc1)
+CVE-2023-53430 [wifi: mt76: dma: fix memory leak running mt76_dma_tx_cleanup]
+	- linux 6.3.7-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3f7dda36e0b6dfa2cd26191f754ba061ab8191f2 (6.3-rc1)
+CVE-2023-53429 [btrfs: don't check PageError in __extent_writepage]
+	- linux 6.4.11-1
+	NOTE: https://git.kernel.org/linus/3e92499e3b004baffb479d61e191b41b604ece9a (6.5-rc1)
+CVE-2023-53428 [powercap: arm_scmi: Remove recursion while parsing zones]
+	- linux 6.5.3-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3e767d6850f867cc33ac16ca097350a1d2417982 (6.6-rc1)
+CVE-2023-53427 [cifs: Fix warning and UAF when destroy the MR list]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/3e161c2791f8e661eed24a2c624087084d910215 (6.3-rc1)
+CVE-2023-53426 [xsk: Fix xsk_diag use-after-free error during socket cleanup]
+	- linux 6.5.6-1
+	[bookworm] - linux 6.1.55-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3e019d8a05a38abb5c85d4f1e85fda964610aa14 (6.6-rc1)
+CVE-2023-53425 [media: platform: mediatek: vpu: fix NULL ptr dereference]
+	- linux 6.4.13-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux 5.10.197-1
+	NOTE: https://git.kernel.org/linus/3df55cd773e8603b623425cc97b05e542854ad27 (6.5-rc1)
+CVE-2023-53424 [clk: mediatek: fix of_iomap memory leak]
+	- linux 6.4.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3db7285e044144fd88a356f5b641b9cd4b231a77 (6.5-rc1)
+CVE-2023-53423 [objtool: Fix memory leak in create_static_call_sections()]
+	- linux 6.1.20-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/3da73f102309fe29150e5c35acd20dd82063ff67 (6.3-rc1)
+CVE-2023-53422 [wifi: iwlwifi: fw: fix memory leak in debugfs]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/3d90d2f4a018fe8cfd65068bc6350b6222be4852 (6.4-rc1)
+CVE-2023-53421 [blk-cgroup: Reinit blkg_iostat_set after clearing in blkcg_reset_stats()]
+	- linux 6.4.4-1
+	NOTE: https://git.kernel.org/linus/3d2af77e31ade05ff7ccc3658c3635ec1bea0979 (6.5-rc1)
+CVE-2023-53420 [ntfs: Fix panic about slab-out-of-bounds caused by ntfs_listxattr()]
+	- linux 6.4.4-1
+	[bookworm] - linux 6.1.52-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3c675ddffb17a8b1e32efad5c983254af18b12c2 (6.5-rc1)
+CVE-2023-53419 [rcu: Protect rcu_print_task_exp_stall() ->exp_tasks access]
+	- linux 6.3.7-1
+	[bookworm] - linux 6.1.37-1
+	[bullseye] - linux 5.10.191-1
+	NOTE: https://git.kernel.org/linus/3c1566bca3f8349f12b75d0a2d5e4a20ad6262ec (6.4-rc1)
+CVE-2022-50419 [Bluetooth: hci_sysfs: Fix attempting to call device_add multiple times]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/448a496f760664d3e2e79466aa1787e6abc922b5 (6.1-rc1)
+CVE-2022-50418 [wifi: ath11k: mhi: fix potential memory leak in ath11k_mhi_register()]
+	- linux 6.0.3-1
+	NOTE: https://git.kernel.org/linus/43e7c3505ec70db3d3c6458824d5fa40f62e3e7b (6.1-rc1)
+CVE-2022-50417 [drm/panfrost: Fix GEM handle creation ref-counting]
+	- linux 6.1.7-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/4217c6ac817451d5116687f3cc6286220dc43d49 (6.2-rc3)
+CVE-2022-50416 [irqchip/wpcm450: Fix memory leak in wpcm450_aic_of_init()]
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/4208d4faf36573a507b5e5de17abe342e9276759 (6.2-rc1)
+CVE-2022-50415 [parisc: led: Fix potential null-ptr-deref in start_task()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/41f563ab3c33698bdfc3403c7c2e6c94e73681e4 (6.2-rc1)
+CVE-2022-50414 [scsi: fcoe: Fix transport not deattached when fcoe_if_init() fails]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/4155658cee394b22b24c6d64e49247bf26d95b92 (6.2-rc1)
+CVE-2022-50413 [wifi: mac80211: fix use-after-free]
+	- linux 6.0.3-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/40fb87129049ec5876dabf4a4d4aed6642b31f1a (6.1-rc1)
+CVE-2022-50412 [drm: bridge: adv7511: unregister cec i2c device after cec adapter]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.234-1
+	NOTE: https://git.kernel.org/linus/40cdb02cb9f965732eb543d47f15bef8d10f0f5f (6.1-rc1)
+CVE-2022-50411 [ACPICA: Fix error code path in acpi_ds_call_control_method()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/404ec60438add1afadaffaed34bb5fe4ddcadd40 (6.2-rc1)
+CVE-2022-50410 [NFSD: Protect against send buffer overflow in NFSv2 READ]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.221-1
+	NOTE: https://git.kernel.org/linus/401bc1f90874280a80b93f23be33a0e7e2d1f912 (6.1-rc1)
+CVE-2022-50409 [net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/3f8ef65af927db247418d4e1db49164d7a158fc5 (6.1-rc1)
+CVE-2022-50408 [wifi: brcmfmac: fix use-after-free bug in brcmf_netdev_start_xmit()]
+	- linux 6.0.3-1
+	[bullseye] - linux 5.10.158-1
+	NOTE: https://git.kernel.org/linus/3f42faf6db431e04bf942d2ebe3ae88975723478 (6.1-rc1)
+CVE-2022-50407 [crypto: hisilicon/qm - increase the memory of local variables]
+	- linux 6.1.4-1
+	NOTE: https://git.kernel.org/linus/3efe90af4c0c46c58dba1b306de142827153d9c0 (6.2-rc1)
+CVE-2022-50406 [iomap: iomap: fix memory corruption when recording errors during writeback]
+	- linux 6.0.3-1
+	NOTE: https://git.kernel.org/linus/3d5f3ba1ac28059bdf7000cae2403e4e984308d2 (6.1-rc1)
+CVE-2022-50405 [net/tunnel: wait until all sk_user_data reader finish before releasing the sock]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/3cf7203ca620682165706f70a1b12b5194607dce (6.2-rc1)
+CVE-2022-50404 [fbdev: fbcon: release buffer when fbcon_do_set_font() failed]
+	- linux 6.1.4-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3c3bfb8586f848317ceba5d777e11204ba3e5758 (6.2-rc1)
+CVE-2022-50403 [ext4: fix undefined behavior in bit shift for ext4_check_flag_values]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/3bf678a0f9c017c9ba7c581541dbc8453452a7ae (6.2-rc1)
+CVE-2022-50402 [drivers/md/md-bitmap: check the return value of md_bitmap_get_counter()]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/3bd548e5b819b8c0f2c9085de775c5c7bff9052f (6.2-rc1)
+CVE-2022-50401 [nfsd: under NFSv4.1, fix double svc_xprt_put on rpc_create failure]
+	- linux 6.1.4-1
+	[bullseye] - linux 5.10.178-1
+	NOTE: https://git.kernel.org/linus/3bc8edc98bd43540dbe648e4ef91f443d6d20a24 (6.2-rc1)
 CVE-2023-53418 [USB: gadget: lpc32xx_udc: fix memory leak with using debugfs_lookup()]
 	- linux 6.1.20-1
 	NOTE: https://git.kernel.org/linus/e3965acaf3739fde9d74ad82979b46d37c6c208f (6.3-rc1)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/132bd81c71fe79ff6f5bc2a7fd380dc36d4bc7be

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/132bd81c71fe79ff6f5bc2a7fd380dc36d4bc7be
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250918/ce28f0c5/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list