Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
701d802d by Salvatore Bonaccorso at 2025-01-31T14:15:05+01:00
Add CVEs for Linux from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,79 @@
+CVE-2025-21683 [bpf: Fix bpf_sk_select_reuseport() memory leak]
+       - linux 6.12.11-1
+       NOTE: 
https://git.kernel.org/linus/b3af60928ab9129befa65e6df0310d27300942bf (6.13)
+CVE-2025-21682 [eth: bnxt: always recalculate features after XDP clearing, fix 
null-deref]
+       - linux 6.12.11-1
+       NOTE: 
https://git.kernel.org/linus/f0aa6a37a3dbb40b272df5fc6db93c114688adcd (6.13)
+CVE-2025-21681 [openvswitch: fix lockup on tx to unregistering netdev with 
carrier]
+       - linux 6.12.11-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/47e55e4b410f7d552e43011baa5be1aab4093990 (6.13)
+CVE-2025-21680 [pktgen: Avoid out-of-bounds access in get_imix_entries]
+       - linux 6.12.11-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/76201b5979768500bca362871db66d77cb4c225e (6.13)
+CVE-2025-21679 [btrfs: add the missing error handling inside 
get_canonical_dev_path]
+       - linux 6.12.11-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/fe4de594f7a2e9bc49407de60fbd20809fad4192 (6.13)
+CVE-2025-21678 [gtp: Destroy device along with udp socket's netns dismantle.]
+       - linux 6.12.11-1
+       NOTE: 
https://git.kernel.org/linus/eb28fd76c0a08a47b470677c6cef9dd1c60e92d1 (6.13)
+CVE-2025-21677 [pfcp: Destroy device along with udp socket's netns dismantle.]
+       - linux 6.12.11-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/ffc90e9ca61b0f619326a1417ff32efd6cc71ed2 (6.13)
+CVE-2025-21676 [net: fec: handle page_pool_dev_alloc_pages error]
+       - linux 6.12.11-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/001ba0902046cb6c352494df610718c0763e77a5 (6.13)
+CVE-2025-21675 [net/mlx5: Clear port select structure when fail to create]
+       - linux 6.12.11-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/5641e82cb55b4ecbc6366a499300917d2f3e6790 (6.13)
+CVE-2025-21674 [net/mlx5e: Fix inversion dependency warning while enabling 
IPsec tunnel]
+       - linux 6.12.11-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/2c3688090f8a1f085230aa839cc63e4a7b977df0 (6.13)
+CVE-2025-21673 [smb: client: fix double free of TCP_Server_Info::hostname]
+       - linux 6.12.11-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/fa2f9906a7b333ba757a7dbae0713d8a5396186e (6.13)
+CVE-2025-21672 [afs: Fix merge preference rule failure condition]
+       - linux 6.12.11-1
+       NOTE: 
https://git.kernel.org/linus/17a4fde81d3a7478d97d15304a6d61094a10c2e3 (6.13-rc7)
+CVE-2025-21671 [zram: fix potential UAF of zram table]
+       - linux 6.12.11-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/212fe1c0df4a150fb6298db2cfff267ceaba5402 (6.13)
+CVE-2025-21670 [vsock/bpf: return early if transport is not assigned]
+       - linux 6.12.11-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/f6abafcd32f9cfc4b1a2f820ecea70773e26d423 (6.13)
+CVE-2025-21669 [vsock/virtio: discard packets if the transport changes]
+       - linux 6.12.11-1
+       NOTE: 
https://git.kernel.org/linus/2cb7c756f605ec02ffe562fb26828e4bcc5fdfc1 (6.13)
+CVE-2025-21668 [pmdomain: imx8mp-blk-ctrl: add missing loop break condition]
+       - linux 6.12.11-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/726efa92e02b460811e8bc6990dd742f03b645ea (6.13)
+CVE-2025-21667 [iomap: avoid avoid truncating 64-bit offset to 32 bits]
+       - linux 6.12.11-1
+       NOTE: 
https://git.kernel.org/linus/c13094b894de289514d84b8db56d1f2931a0bade (6.13-rc7)
+CVE-2025-21666 [vsock: prevent null-ptr-deref in vsock_*[has_data|has_space]]
+       - linux 6.12.11-1
+       NOTE: 
https://git.kernel.org/linus/91751e248256efc111e52e15115840c35d85abaf (6.13)
+CVE-2025-21665 [filemap: avoid truncating 64-bit offset to 32 bits]
+       - linux 6.12.11-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/f505e6c91e7a22d10316665a86d79f84d9f0ba76 (6.13)
+CVE-2024-57948 [mac802154: check local interfaces before deleting sdata list]
+       - linux 6.12.11-1
+       NOTE: 
https://git.kernel.org/linus/eb09fbeb48709fe66c0d708aed81e910a577a30a (6.13-rc7)
 CVE-2025-24886 (pwn.college is an education platform to learn about, and 
practice, cor ...)
        NOT-FOR-US: pwn.college
 CVE-2025-24885 (pwn.college is an education platform to learn about, and 
practice, cor ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/701d802d4bc9a01ed992aea4c529343d75df20b3

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/701d802d4bc9a01ed992aea4c529343d75df20b3
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to