Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 71639163 by Salvatore Bonaccorso at 2025-10-04T21:23:20+02:00 Merge Linux CVEs from kernel-sec - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,249 @@ +CVE-2023-53616 [jfs: fix invalid free of JFS_IP(ipimap)->i_imap in diUnmount] + - linux 6.5.6-1 + [bookworm] - linux 6.1.55-1 + [bullseye] - linux 5.10.197-1 + NOTE: https://git.kernel.org/linus/6e2bda2c192d0244b5a78b787ef20aa10cb319b7 (6.6-rc1) +CVE-2023-53615 [scsi: qla2xxx: Fix deletion race condition] + - linux 6.5.6-1 + [bookworm] - linux 6.1.55-1 + [bullseye] - linux 5.10.197-1 + NOTE: https://git.kernel.org/linus/6dfe4344c168c6ca20fe7640649aacfcefcccb26 (6.6-rc1) +CVE-2023-53614 [mm/ksm: fix race with VMA iteration and mm_struct teardown] + - linux 6.1.25-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/6db504ce55bdbc575723938fc480713c9183f6a2 (6.3-rc4) +CVE-2023-53613 [dax: Fix dax_mapping_release() use after free] + - linux 6.4.4-1 + [bookworm] - linux 6.1.52-1 + [bullseye] - linux 5.10.191-1 + NOTE: https://git.kernel.org/linus/6d24b170a9db0456f577b1ab01226a2254c016a8 (6.5-rc1) +CVE-2023-53612 [hwmon: (coretemp) Simplify platform device handling] + - linux 6.1.20-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/6d03bbff456befeccdd4d663177c4d6c75d0c4ff (6.3-rc1) +CVE-2023-53611 [ipmi_si: fix a memleak in try_smi_init()] + - linux 6.5.3-1 + [bookworm] - linux 6.1.55-1 + [bullseye] - linux 5.10.197-1 + NOTE: https://git.kernel.org/linus/6cf1a126de2992b4efe1c3c4d398f8de4aed6e3f (6.6-rc1) +CVE-2023-53610 [irqchip: Fix refcount leak in platform_irqchip_probe] + - linux 6.1.20-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/6caa5a2b78f5f53c433d3a3781e53325da22f0ac (6.3-rc1) +CVE-2023-53609 [scsi: Revert "scsi: core: Do not increase scsi_device's iorequest_cnt if dispatch failed"] + - linux 6.3.7-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/6ca9818d1624e136a76ae8faedb6b6c95ca66903 (6.4-rc3) +CVE-2023-53608 [nilfs2: fix potential UAF of struct nilfs_sc_info in nilfs_segctor_thread()] + - linux 6.1.25-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/6be49d100c22ffea3287a4b19d7639d259888e33 (6.3-rc6) +CVE-2023-53607 [ALSA: ymfpci: Fix BUG_ON in probe function] + - linux 6.1.25-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/6be2e7522eb529b41c16d459f33bbdbcddbf5c15 (6.3-rc5) +CVE-2023-53606 [nfsd: clean up potential nfsd_file refcount leaks in COPY codepath] + - linux 6.1.20-1 + [bullseye] - linux 5.10.221-1 + NOTE: https://git.kernel.org/linus/6ba434cb1a8d403ea9aad1b667c3ea3ad8b3191f (6.3-rc1) +CVE-2023-53605 [drm: amd: display: Fix memory leakage] + - linux 6.1.20-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/6b8701be1f66064ca72733c5f6e13748cdbf8397 (6.3-rc1) +CVE-2023-53604 [dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path] + - linux 6.3.7-1 + [bookworm] - linux 6.1.37-1 + [bullseye] - linux 5.10.191-1 + NOTE: https://git.kernel.org/linus/6b79a428c02769f2a11f8ae76bf866226d134887 (6.4-rc1) +CVE-2023-53603 [scsi: qla2xxx: Avoid fcport pointer dereference] + - linux 6.4.11-1 + [bookworm] - linux 6.1.52-1 + NOTE: https://git.kernel.org/linus/6b504d06976fe4a61cc05dedc68b84fadb397f77 (6.5-rc1) +CVE-2023-53602 [wifi: ath11k: fix memory leak in WMI firmware stats] + - linux 6.4.11-1 + [bookworm] - linux 6.1.52-1 + NOTE: https://git.kernel.org/linus/6aafa1c2d3e3fea2ebe84c018003f2a91722e607 (6.5-rc1) +CVE-2023-53601 [bonding: do not assume skb mac_header is set] + - linux 6.4.4-1 + [bookworm] - linux 6.1.52-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/6a940abdef3162e5723f1495b8a49859d1708f79 (6.5-rc1) +CVE-2023-53600 [tunnels: fix kasan splat when generating ipv4 pmtu error] + - linux 6.4.11-1 + [bookworm] - linux 6.1.52-1 + [bullseye] - linux 5.10.191-1 + NOTE: https://git.kernel.org/linus/6a7ac3d20593865209dceb554d8b3f094c6bd940 (6.5-rc6) +CVE-2023-53599 [crypto: af_alg - Fix missing initialisation affecting gcm-aes-s390] + - linux 6.5.3-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/6a4b8aa0a916b39a39175584c07222434fa6c6ef (6.6-rc1) +CVE-2023-53598 [bus: mhi: host: Range check CHDBOFF and ERDBOFF] + - linux 6.3.7-1 + [bookworm] - linux 6.1.37-1 + [bullseye] - linux 5.10.197-1 + NOTE: https://git.kernel.org/linus/6a0c637bfee69a74c104468544d9f2a6579626d0 (6.4-rc1) +CVE-2023-53597 [cifs: fix mid leak during reconnection after timeout threshold] + - linux 6.4.11-1 + [bookworm] - linux 6.1.52-1 + NOTE: https://git.kernel.org/linus/69cba9d3c1284e0838ae408830a02c4a063104bc (6.5-rc2) +CVE-2023-53596 [drivers: base: Free devm resources when unregistering a device] + - linux 6.5.3-1 + [bookworm] - linux 6.1.55-1 + NOTE: https://git.kernel.org/linus/699fb50d99039a50e7494de644f96c889279aca3 (6.6-rc1) +CVE-2023-53595 [octeontx2-pf: mcs: Fix NULL pointer dereferences] + - linux 6.3.7-1 + [bookworm] - linux 6.1.37-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/699af748c61574125d269db260dabbe20436d74e (6.4-rc1) +CVE-2023-53594 [driver core: fix resource leak in device_add()] + - linux 6.1.20-1 + NOTE: https://git.kernel.org/linus/6977b1a5d67097eaa4d02b0c126c04cc6e8917c0 (6.3-rc1) +CVE-2023-53593 [cifs: Release folio lock on fscache read hit.] + - linux 6.4.13-1 + [bookworm] - linux 6.1.52-1 + [bullseye] - linux 5.10.197-1 + NOTE: https://git.kernel.org/linus/69513dd669e243928f7450893190915a88f84a2b (6.5-rc7) +CVE-2023-53592 [gpio: sifive: Fix refcount leak in sifive_gpio_probe] + - linux 6.1.7-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/694175cd8a1643cde3acb45c9294bca44a8e08e9 (6.2-rc3) +CVE-2023-53591 [net/mlx5e: Fix deadlock in tc route query code] + - linux 6.3.7-1 + [bookworm] - linux 6.1.37-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/691c041bf20899fc13c793f92ba61ab660fa3a30 (6.4-rc4) +CVE-2023-53590 [sctp: add a refcnt in sctp_stream_priorities to avoid a nested loop] + - linux 6.1.20-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/68ba44639537de6f91fe32783766322d41848127 (6.3-rc1) +CVE-2023-53589 [wifi: iwlwifi: mvm: don't trust firmware n_channels] + - linux 6.3.7-1 + [bookworm] - linux 6.1.37-1 + [bullseye] - linux 5.10.191-1 + NOTE: https://git.kernel.org/linus/682b6dc29d98e857e6ca4bbc077c7dc2899b7473 (6.4-rc3) +CVE-2023-53588 [wifi: mac80211: check for station first in client probe] + - linux 6.5.6-1 + [bookworm] - linux 6.1.55-1 + NOTE: https://git.kernel.org/linus/67dfa589aa8806c7959cbca2f4613b8d41c75a06 (6.6-rc1) +CVE-2023-53587 [ring-buffer: Sync IRQ works before buffer destruction] + - linux 6.3.7-1 + [bookworm] - linux 6.1.37-1 + [bullseye] - linux 5.10.191-1 + NOTE: https://git.kernel.org/linus/675751bb20634f981498c7d66161584080cc061e (6.4-rc1) +CVE-2023-53586 [scsi: target: Fix multiple LUN_RESET handling] + - linux 6.3.7-1 + [bookworm] - linux 6.1.37-1 + [bullseye] - linux 5.10.191-1 + NOTE: https://git.kernel.org/linus/673db054d7a2b5a470d7a25baf65956d005ad729 (6.4-rc1) +CVE-2023-53585 [bpf: reject unhashed sockets in bpf_sk_assign] + - linux 6.5.3-1 + [bookworm] - linux 6.1.55-1 + [bullseye] - linux 5.10.197-1 + NOTE: https://git.kernel.org/linus/67312adc96b5a585970d03b62412847afe2c6b01 (6.6-rc1) +CVE-2023-53584 [ubifs: ubifs_releasepage: Remove ubifs_assert(0) to valid this process] + - linux 6.1.20-1 + NOTE: https://git.kernel.org/linus/66f4742e93523ab2f062d9d9828b3e590bc61536 (6.3-rc1) +CVE-2023-53583 [perf: RISC-V: Remove PERF_HES_STOPPED flag checking in riscv_pmu_start()] + - linux 6.4.11-1 + [bookworm] - linux 6.1.52-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/66843b14fb71825fdd73ab12f6594f2243b402be (6.5-rc2) +CVE-2023-53582 [wifi: brcmfmac: ensure CLM version is null-terminated to prevent stack-out-of-bounds] + - linux 6.1.20-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/660145d708be52f946a82e5b633c020f58f996de (6.3-rc1) +CVE-2023-53581 [net/mlx5e: Check for NOT_READY flag state after locking] + - linux 6.4.11-1 + [bookworm] - linux 6.1.52-1 + [bullseye] - linux 5.10.191-1 + NOTE: https://git.kernel.org/linus/65e64640e97c0f223e77f9ea69b5a46186b93470 (6.5-rc2) +CVE-2023-53580 [USB: Gadget: core: Help prevent panic during UVC unconfigure] + - linux 6.4.11-1 + [bookworm] - linux 6.1.52-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/65dadb2beeb7360232b09ebc4585b54475dfee06 (6.5-rc6) +CVE-2022-50508 [wifi: mt76: mt76x0: fix oob access in mt76x0_phy_get_target_power] + - linux 6.3.7-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/6e1abc51c945663bddebfa1beb9590ff5b250eb7 (6.3-rc1) +CVE-2022-50507 [fs/ntfs3: Validate data run offset] + - linux 6.1.4-1 + NOTE: https://git.kernel.org/linus/6db620863f8528ed9a9aa5ad323b26554a17881d (6.2-rc1) +CVE-2022-50506 [drbd: only clone bio if we have a backing device] + - linux 6.0.6-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/6d42ddf7f27b6723549ee6d4c8b1b418b59bf6b5 (6.1-rc2) +CVE-2022-50505 [iommu/amd: Fix pci device refcount leak in ppr_notifier()] + - linux 6.1.4-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/6cf0981c2233f97d56938d9d61845383d6eb227c (6.2-rc1) +CVE-2022-50504 [powerpc/rtas: avoid scheduling in rtas_os_term()] + - linux 6.1.4-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/6c606e57eecc37d6b36d732b1ff7e55b7dc32dd4 (6.2-rc1) +CVE-2022-50503 [mtd: lpddr2_nvm: Fix possible null-ptr-deref] + - linux 6.1.4-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/6bdd45d795adf9e73b38ced5e7f750cd199499ff (6.2-rc1) +CVE-2022-50502 [mm: /proc/pid/smaps_rollup: fix no vma's null-deref] + - linux 5.5.13-1 + NOTE: https://git.kernel.org/linus/6bb8769326c46db3058780c0640dcc49d8187b24 (5.4.221) +CVE-2022-50501 [media: coda: Add check for dcoda_iram_alloc] + - linux 6.1.4-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/6b8082238fb8bb20f67e46388123e67a5bbc558d (6.2-rc1) +CVE-2022-50500 [netdevsim: fix memory leak in nsim_drv_probe() when nsim_dev_resources_register() failed] + - linux 6.0.7-1 + NOTE: https://git.kernel.org/linus/6b1da9f7126f05e857da6db24c6a04aa7974d644 (6.1-rc3) +CVE-2022-50499 [media: dvb-core: Fix double free in dvb_register_device()] + - linux 6.1.4-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/6b0d0477fce747d4137aa65856318b55fba72198 (6.2-rc1) +CVE-2022-50498 [eth: alx: take rtnl_lock on resume] + - linux 6.0.3-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/6ad1c94e1e7e374d88f0cfd77936dddb8339aaba (6.1-rc1) +CVE-2022-50497 [binfmt_misc: fix shift-out-of-bounds in check_special_flags] + - linux 6.1.4-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/6a46bf558803dd2b959ca7435a5c143efe837217 (6.2-rc1) +CVE-2022-50496 [dm cache: Fix UAF in destroy()] + - linux 6.1.4-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/6a459d8edbdbe7b24db42a5a9f21e6aa9e00c2aa (6.2-rc1) +CVE-2022-50495 [x86/xen: Fix memory leak in xen_smp_intr_init{_pv}()] + - linux 6.1.4-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/69143f60868b3939ddc89289b29db593b647295e (6.2-rc1) +CVE-2022-50494 [thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash] + - linux 6.0.3-1 + [bullseye] - linux 5.10.158-1 + NOTE: https://git.kernel.org/linus/68b99e94a4a2db6ba9b31fe0485e057b9354a640 (6.1-rc1) +CVE-2022-50493 [scsi: qla2xxx: Fix crash when I/O abort times out] + - linux 6.1.4-1 + NOTE: https://git.kernel.org/linus/68ad83188d782b2ecef2e41ac245d27e0710fe8e (6.2-rc1) +CVE-2022-50492 [drm/msm: fix use-after-free on probe deferral] + - linux 6.0.7-1 + NOTE: https://git.kernel.org/linus/6808abdb33bf90330e70a687d29f038507e06ebb (6.1-rc3) +CVE-2022-50491 [coresight: cti: Fix hang in cti_disable_hw()] + - linux 6.0.7-1 + [bullseye] - linux 5.10.158-1 + NOTE: https://git.kernel.org/linus/6746eae4bbaddcc16b40efb33dab79210828b3ce (6.1-rc3) +CVE-2022-50490 [bpf: Propagate error from htab_lock_bucket() to userspace] + - linux 6.0.3-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/66a7a92e4d0d091e79148a4c6ec15d1da65f4280 (6.1-rc1) +CVE-2022-50489 [drm/mipi-dsi: Detach devices when removing the host] + - linux 6.0.3-1 + [bullseye] - linux 5.10.158-1 + NOTE: https://git.kernel.org/linus/668a8f17b5290d04ef7343636a5588a0692731a1 (6.1-rc1) +CVE-2022-50488 [block, bfq: fix possible uaf for 'bfqq->bic'] + - linux 6.1.4-1 + [bullseye] - linux 5.10.178-1 + NOTE: https://git.kernel.org/linus/64dc8c732f5c2b406cc752e6aaa1bd5471159cab (6.2-rc1) CVE-2023-53579 [gpio: mvebu: fix irq domain leak] - linux 6.4.11-1 [bookworm] - linux 6.1.52-1 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7163916307c9f7889817cc6ec99ccb0488c596bc -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7163916307c9f7889817cc6ec99ccb0488c596bc You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list [email protected] https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
