Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: bf9206b0 by Salvatore Bonaccorso at 2025-01-19T17:22:49+01:00 Merge Linux CVEs from kernel-sec - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,201 @@ +CVE-2025-21654 [ovl: support encoding fid from inode with no alias] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/c45beebfde34aa71afbc48b2c54cdda623515037 (6.13-rc7) +CVE-2025-21653 [net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/a039e54397c6a75b713b9ce7894a62e06956aa92 (6.13-rc7) +CVE-2025-21652 [ipvlan: Fix use-after-free in ipvlan_get_iflink().] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/cb358ff94154774d031159b018adf45e17673941 (6.13-rc7) +CVE-2025-21651 [net: hns3: don't auto enable misc vector] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/98b1e3b27734139c76295754b6c317aa4df6d32e (6.13-rc7) +CVE-2025-21650 [net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of bounds issue] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/7997ddd46c54408bcba5e37fe18b4d832e45d4d4 (6.13-rc7) +CVE-2025-21649 [net: hns3: fix kernel crash when 1588 is sent on HIP08 devices] + - linux 6.12.10-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/9741e72b2286de8b38de9db685588ac421a95c87 (6.13-rc7) +CVE-2025-21648 [netfilter: conntrack: clamp maximum hashtable size to INT_MAX] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/b541ba7d1f5a5b7b3e2e22dc9e40e18a7d6dbc13 (6.13-rc7) +CVE-2025-21647 [sched: sch_cake: add bounds checks to host bulk flow fairness counts] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/737d4d91d35b5f7fa5bb442651472277318b0bfd (6.13-rc7) +CVE-2025-21646 [afs: Fix the maximum cell name length] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/8fd56ad6e7c90ac2bddb0741c6b248c8c5d56ac8 (6.13-rc7) +CVE-2025-21645 [platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it] + - linux 6.12.10-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/dd410d784402c5775f66faf8b624e85e41c38aaf (6.13-rc7) +CVE-2025-21644 [drm/xe: Fix tlb invalidation when wedging] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/9ab4981552930a9c45682d62424ba610edc3992d (6.13-rc7) +CVE-2025-21643 [netfs: Fix kernel async DIO] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/3f6bc9e3ab9b127171d39f9ac6eca1abb693b731 (6.13-rc7) +CVE-2025-21642 [mptcp: sysctl: sched: avoid using current->nsproxy] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/d38e26e36206ae3d544d496513212ae931d1da0a (6.13-rc7) +CVE-2025-21641 [mptcp: sysctl: blackhole timeout: avoid using current->nsproxy] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/92cf7a51bdae24a32c592adcdd59a773ae149289 (6.13-rc7) +CVE-2025-21640 [sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/ea62dd1383913b5999f3d16ae99d411f41b528d4 (6.13-rc7) +CVE-2025-21639 [sctp: sysctl: rto_min/max: avoid using current->nsproxy] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/9fc17b76fc70763780aa78b38fcf4742384044a5 (6.13-rc7) +CVE-2025-21638 [sctp: sysctl: auth_enable: avoid using current->nsproxy] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/15649fd5415eda664ef35780c2013adeb5d9c695 (6.13-rc7) +CVE-2025-21637 [sctp: sysctl: udp_port: avoid using current->nsproxy] + - linux 6.12.10-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/c10377bbc1972d858eaf0ab366a311b39f8ef1b6 (6.13-rc7) +CVE-2025-21636 [sctp: sysctl: plpmtud_probe_interval: avoid using current->nsproxy] + - linux 6.12.10-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/6259d2484d0ceff42245d1f09cc8cb6ee72d847a (6.13-rc7) +CVE-2025-21635 [rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/7f5611cbc4871c7fb1ad36c2e5a9edad63dca95c (6.13-rc7) +CVE-2025-21634 [cgroup/cpuset: remove kernfs active break] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/3cb97a927fffe443e1e7e8eddbfebfdb062e86ed (6.13-rc7) +CVE-2025-21633 [io_uring/sqpoll: zero sqd->thread on tctx errors] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/4b7cfa8b6c28a9fa22b86894166a1a34f6d630ba (6.13-rc7) +CVE-2025-21632 [x86/fpu: Ensure shadow stack is active before "getting" registers] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/a9d9c33132d49329ada647e4514d210d15e31d81 (6.13-rc7) +CVE-2025-21631 [block, bfq: fix waker_bfqq UAF after bfq_split_bfqq()] + - linux 6.12.10-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/fcede1f0a043ccefe9bc6ad57f12718e42f63f1d (6.13-rc7) +CVE-2024-57929 [dm array: fix releasing a faulty array block twice in dm_array_cursor_end] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/f2893c0804d86230ffb8f1c8703fdbb18648abc8 (6.13-rc7) +CVE-2024-57928 [netfs: Fix enomem handling in buffered reads] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/105549d09a539a876b7c3330ab52d8aceedad358 (6.13-rc7) +CVE-2024-57927 [nfs: Fix oops in nfs_netfs_init_request() when copying to cache] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/86ad1a58f6a9453f49e06ef957a40a8dac00a13f (6.13-rc7) +CVE-2024-57926 [drm/mediatek: Set private->all_drm_private[i]->drm to NULL if mtk_drm_bind returns err] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/36684e9d88a2e2401ae26715a2e217cb4295cea7 (6.13-rc7) +CVE-2024-57925 [ksmbd: fix a missing return value check bug] + - linux 6.12.10-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/4c16e1cadcbcaf3c82d5fc310fbd34d0f5d0db7c (6.13-rc7) +CVE-2024-57924 [fs: relax assertions on failure to encode file handles] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/974e3fe0ac61de85015bbe5a4990cf4127b304b2 (6.13-rc7) +CVE-2024-57923 [btrfs: zlib: fix avail_in bytes for s390 zlib HW compression path] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/0ee4736c003daded513de0ff112d4a1e9c85bbab (6.13-rc7) +CVE-2024-57922 [drm/amd/display: Add check for granularity in dml ceil/floor helpers] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/0881fbc4fd62e00a2b8e102725f76d10351b2ea8 (6.13-rc7) +CVE-2024-57921 [drm/amdgpu: Add a lock when accessing the buddy trim function] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/75c8b703e5bded1e33b08fb09b829e7c2c1ed50a (6.13-rc7) +CVE-2024-57920 [drm/amdkfd: wq_release signals dma_fence only when available] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/a993d319aebb7cce8a10c6e685344b7c2ad5c4c2 (6.13-rc7) +CVE-2024-57919 [drm/amd/display: fix divide error in DM plane scale calcs] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/5225fd2a26211d012533acf98a6ad3f983885817 (6.13-rc7) +CVE-2024-57918 [drm/amd/display: fix page fault due to max surface definition mismatch] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/7de8d5c90be9ad9f6575e818a674801db2ada794 (6.13-rc7) +CVE-2024-57917 [topology: Keep the cpumask unchanged when printing cpumap] + - linux 6.12.10-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/cbd399f78e23ad4492c174fc5e6b3676dba74a52 (6.13-rc7) +CVE-2024-57916 [misc: microchip: pci1xxxx: Resolve kernel panic during GPIO IRQ handling] + - linux 6.12.10-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/194f9f94a5169547d682e9bbcc5ae6d18a564735 (6.13-rc7) +CVE-2024-57915 [usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/13014969cbf07f18d62ceea40bd8ca8ec9d36cec (6.13-rc7) +CVE-2024-57914 [usb: typec: tcpci: fix NULL pointer issue on shared irq case] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/862a9c0f68487fd6ced15622d9cdcec48f8b5aaa (6.13-rc7) +CVE-2024-57913 [usb: gadget: f_fs: Remove WARN_ON in functionfs_bind] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/dfc51e48bca475bbee984e90f33fdc537ce09699 (6.13-rc7) +CVE-2024-57912 [iio: pressure: zpa2326: fix information leak in triggered buffer] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/6007d10c5262f6f71479627c1216899ea7f09073 (6.13-rc7) +CVE-2024-57911 [iio: dummy: iio_simply_dummy_buffer: fix information leak in triggered buffer] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/333be433ee908a53f283beb95585dfc14c8ffb46 (6.13-rc7) +CVE-2024-57910 [iio: light: vcnl4035: fix information leak in triggered buffer] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/47b43e53c0a0edf5578d5d12f5fc71c019649279 (6.13-rc7) +CVE-2024-57909 [iio: light: bh1745: fix information leak in triggered buffer] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/b62fbe3b8eedd3cf3c9ad0b7cb9f72c3f40815f0 (6.13-rc7) +CVE-2024-57908 [iio: imu: kmx61: fix information leak in triggered buffer] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/6ae053113f6a226a2303caa4936a4c37f3bfff7b (6.13-rc7) +CVE-2024-57907 [iio: adc: rockchip_saradc: fix information leak in triggered buffer] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/38724591364e1e3b278b4053f102b49ea06ee17c (6.13-rc7) +CVE-2024-57906 [iio: adc: ti-ads8688: fix information leak in triggered buffer] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/2a7377ccfd940cd6e9201756aff1e7852c266e69 (6.13-rc7) +CVE-2024-57905 [iio: adc: ti-ads1119: fix information leak in triggered buffer] + - linux 6.12.10-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/75f339d3ecd38cb1ce05357d647189d4a7f7ed08 (6.13-rc7) +CVE-2024-57904 [iio: adc: at91: call input_free_device() on allocated iio_dev] + - linux 6.12.10-1 + NOTE: https://git.kernel.org/linus/de6a73bad1743e9e81ea5a24c178c67429ff510b (6.13-rc7) CVE-2025-0567 (A vulnerability classified as problematic was found in Epic Games Laun ...) TODO: check CVE-2025-0566 (A vulnerability classified as critical has been found in Tenda AC15 15 ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bf9206b0f21a3856b42336cdb8b1ff31c4d747c4 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bf9206b0f21a3856b42336cdb8b1ff31c4d747c4 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits