Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
bf9206b0 by Salvatore Bonaccorso at 2025-01-19T17:22:49+01:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,201 @@
+CVE-2025-21654 [ovl: support encoding fid from inode with no alias]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/c45beebfde34aa71afbc48b2c54cdda623515037 (6.13-rc7)
+CVE-2025-21653 [net_sched: cls_flow: validate TCA_FLOW_RSHIFT attribute]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/a039e54397c6a75b713b9ce7894a62e06956aa92 (6.13-rc7)
+CVE-2025-21652 [ipvlan: Fix use-after-free in ipvlan_get_iflink().]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/cb358ff94154774d031159b018adf45e17673941 (6.13-rc7)
+CVE-2025-21651 [net: hns3: don't auto enable misc vector]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/98b1e3b27734139c76295754b6c317aa4df6d32e (6.13-rc7)
+CVE-2025-21650 [net: hns3: fixed hclge_fetch_pf_reg accesses bar space out of 
bounds issue]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/7997ddd46c54408bcba5e37fe18b4d832e45d4d4 (6.13-rc7)
+CVE-2025-21649 [net: hns3: fix kernel crash when 1588 is sent on HIP08 devices]
+       - linux 6.12.10-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/9741e72b2286de8b38de9db685588ac421a95c87 (6.13-rc7)
+CVE-2025-21648 [netfilter: conntrack: clamp maximum hashtable size to INT_MAX]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/b541ba7d1f5a5b7b3e2e22dc9e40e18a7d6dbc13 (6.13-rc7)
+CVE-2025-21647 [sched: sch_cake: add bounds checks to host bulk flow fairness 
counts]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/737d4d91d35b5f7fa5bb442651472277318b0bfd (6.13-rc7)
+CVE-2025-21646 [afs: Fix the maximum cell name length]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/8fd56ad6e7c90ac2bddb0741c6b248c8c5d56ac8 (6.13-rc7)
+CVE-2025-21645 [platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 
actually enabled it]
+       - linux 6.12.10-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/dd410d784402c5775f66faf8b624e85e41c38aaf (6.13-rc7)
+CVE-2025-21644 [drm/xe: Fix tlb invalidation when wedging]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/9ab4981552930a9c45682d62424ba610edc3992d (6.13-rc7)
+CVE-2025-21643 [netfs: Fix kernel async DIO]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/3f6bc9e3ab9b127171d39f9ac6eca1abb693b731 (6.13-rc7)
+CVE-2025-21642 [mptcp: sysctl: sched: avoid using current->nsproxy]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/d38e26e36206ae3d544d496513212ae931d1da0a (6.13-rc7)
+CVE-2025-21641 [mptcp: sysctl: blackhole timeout: avoid using current->nsproxy]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/92cf7a51bdae24a32c592adcdd59a773ae149289 (6.13-rc7)
+CVE-2025-21640 [sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/ea62dd1383913b5999f3d16ae99d411f41b528d4 (6.13-rc7)
+CVE-2025-21639 [sctp: sysctl: rto_min/max: avoid using current->nsproxy]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/9fc17b76fc70763780aa78b38fcf4742384044a5 (6.13-rc7)
+CVE-2025-21638 [sctp: sysctl: auth_enable: avoid using current->nsproxy]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/15649fd5415eda664ef35780c2013adeb5d9c695 (6.13-rc7)
+CVE-2025-21637 [sctp: sysctl: udp_port: avoid using current->nsproxy]
+       - linux 6.12.10-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/c10377bbc1972d858eaf0ab366a311b39f8ef1b6 (6.13-rc7)
+CVE-2025-21636 [sctp: sysctl: plpmtud_probe_interval: avoid using 
current->nsproxy]
+       - linux 6.12.10-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/6259d2484d0ceff42245d1f09cc8cb6ee72d847a (6.13-rc7)
+CVE-2025-21635 [rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using 
current->nsproxy]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/7f5611cbc4871c7fb1ad36c2e5a9edad63dca95c (6.13-rc7)
+CVE-2025-21634 [cgroup/cpuset: remove kernfs active break]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/3cb97a927fffe443e1e7e8eddbfebfdb062e86ed (6.13-rc7)
+CVE-2025-21633 [io_uring/sqpoll: zero sqd->thread on tctx errors]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/4b7cfa8b6c28a9fa22b86894166a1a34f6d630ba (6.13-rc7)
+CVE-2025-21632 [x86/fpu: Ensure shadow stack is active before "getting" 
registers]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/a9d9c33132d49329ada647e4514d210d15e31d81 (6.13-rc7)
+CVE-2025-21631 [block, bfq: fix waker_bfqq UAF after bfq_split_bfqq()]
+       - linux 6.12.10-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/fcede1f0a043ccefe9bc6ad57f12718e42f63f1d (6.13-rc7)
+CVE-2024-57929 [dm array: fix releasing a faulty array block twice in 
dm_array_cursor_end]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/f2893c0804d86230ffb8f1c8703fdbb18648abc8 (6.13-rc7)
+CVE-2024-57928 [netfs: Fix enomem handling in buffered reads]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/105549d09a539a876b7c3330ab52d8aceedad358 (6.13-rc7)
+CVE-2024-57927 [nfs: Fix oops in nfs_netfs_init_request() when copying to 
cache]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/86ad1a58f6a9453f49e06ef957a40a8dac00a13f (6.13-rc7)
+CVE-2024-57926 [drm/mediatek: Set private->all_drm_private[i]->drm to NULL if 
mtk_drm_bind returns err]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/36684e9d88a2e2401ae26715a2e217cb4295cea7 (6.13-rc7)
+CVE-2024-57925 [ksmbd: fix a missing return value check bug]
+       - linux 6.12.10-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/4c16e1cadcbcaf3c82d5fc310fbd34d0f5d0db7c (6.13-rc7)
+CVE-2024-57924 [fs: relax assertions on failure to encode file handles]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/974e3fe0ac61de85015bbe5a4990cf4127b304b2 (6.13-rc7)
+CVE-2024-57923 [btrfs: zlib: fix avail_in bytes for s390 zlib HW compression 
path]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/0ee4736c003daded513de0ff112d4a1e9c85bbab (6.13-rc7)
+CVE-2024-57922 [drm/amd/display: Add check for granularity in dml ceil/floor 
helpers]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/0881fbc4fd62e00a2b8e102725f76d10351b2ea8 (6.13-rc7)
+CVE-2024-57921 [drm/amdgpu: Add a lock when accessing the buddy trim function]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/75c8b703e5bded1e33b08fb09b829e7c2c1ed50a (6.13-rc7)
+CVE-2024-57920 [drm/amdkfd: wq_release signals dma_fence only when available]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/a993d319aebb7cce8a10c6e685344b7c2ad5c4c2 (6.13-rc7)
+CVE-2024-57919 [drm/amd/display: fix divide error in DM plane scale calcs]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/5225fd2a26211d012533acf98a6ad3f983885817 (6.13-rc7)
+CVE-2024-57918 [drm/amd/display: fix page fault due to max surface definition 
mismatch]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/7de8d5c90be9ad9f6575e818a674801db2ada794 (6.13-rc7)
+CVE-2024-57917 [topology: Keep the cpumask unchanged when printing cpumap]
+       - linux 6.12.10-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/cbd399f78e23ad4492c174fc5e6b3676dba74a52 (6.13-rc7)
+CVE-2024-57916 [misc: microchip: pci1xxxx: Resolve kernel panic during GPIO 
IRQ handling]
+       - linux 6.12.10-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/194f9f94a5169547d682e9bbcc5ae6d18a564735 (6.13-rc7)
+CVE-2024-57915 [usb: gadget: u_serial: Disable ep before setting port to null 
to fix the crash caused by port being null]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/13014969cbf07f18d62ceea40bd8ca8ec9d36cec (6.13-rc7)
+CVE-2024-57914 [usb: typec: tcpci: fix NULL pointer issue on shared irq case]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/862a9c0f68487fd6ced15622d9cdcec48f8b5aaa (6.13-rc7)
+CVE-2024-57913 [usb: gadget: f_fs: Remove WARN_ON in functionfs_bind]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/dfc51e48bca475bbee984e90f33fdc537ce09699 (6.13-rc7)
+CVE-2024-57912 [iio: pressure: zpa2326: fix information leak in triggered 
buffer]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/6007d10c5262f6f71479627c1216899ea7f09073 (6.13-rc7)
+CVE-2024-57911 [iio: dummy: iio_simply_dummy_buffer: fix information leak in 
triggered buffer]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/333be433ee908a53f283beb95585dfc14c8ffb46 (6.13-rc7)
+CVE-2024-57910 [iio: light: vcnl4035: fix information leak in triggered buffer]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/47b43e53c0a0edf5578d5d12f5fc71c019649279 (6.13-rc7)
+CVE-2024-57909 [iio: light: bh1745: fix information leak in triggered buffer]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/b62fbe3b8eedd3cf3c9ad0b7cb9f72c3f40815f0 (6.13-rc7)
+CVE-2024-57908 [iio: imu: kmx61: fix information leak in triggered buffer]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/6ae053113f6a226a2303caa4936a4c37f3bfff7b (6.13-rc7)
+CVE-2024-57907 [iio: adc: rockchip_saradc: fix information leak in triggered 
buffer]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/38724591364e1e3b278b4053f102b49ea06ee17c (6.13-rc7)
+CVE-2024-57906 [iio: adc: ti-ads8688: fix information leak in triggered buffer]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/2a7377ccfd940cd6e9201756aff1e7852c266e69 (6.13-rc7)
+CVE-2024-57905 [iio: adc: ti-ads1119: fix information leak in triggered buffer]
+       - linux 6.12.10-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/75f339d3ecd38cb1ce05357d647189d4a7f7ed08 (6.13-rc7)
+CVE-2024-57904 [iio: adc: at91: call input_free_device() on allocated iio_dev]
+       - linux 6.12.10-1
+       NOTE: 
https://git.kernel.org/linus/de6a73bad1743e9e81ea5a24c178c67429ff510b (6.13-rc7)
 CVE-2025-0567 (A vulnerability classified as problematic was found in Epic 
Games Laun ...)
        TODO: check
 CVE-2025-0566 (A vulnerability classified as critical has been found in Tenda 
AC15 15 ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bf9206b0f21a3856b42336cdb8b1ff31c4d747c4

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bf9206b0f21a3856b42336cdb8b1ff31c4d747c4
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to