[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sat Aug 16 12:48:27 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
bb8a360d by Salvatore Bonaccorso at 2025-08-16T13:47:59+02:00
Merge Linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,93 @@
+CVE-2025-38521 [drm/imagination: Fix kernel crash when hard resetting the GPU]
+ - linux <unfixed>
+ [trixie] - linux 6.12.41-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/d38376b3ee48d073c64e75e150510d7e6b4b04f7 (6.16-rc6)
+CVE-2025-38520 [drm/amdkfd: Don't call mmput from MMU notifier callback]
+ - linux <unfixed>
+ [trixie] - linux 6.12.41-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/cf234231fcbc7d391e2135b9518613218cc5347f (6.16-rc5)
+CVE-2025-38519 [mm/damon: fix divide by zero in damon_get_intervals_score()]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/bd225b9591442065beb876da72656f4a2d627d03 (6.16-rc6)
+CVE-2025-38518 [x86/CPU/AMD: Disable INVLPGB on Zen2]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a74bb5f202dabddfea96abc1328fcedae8aa140a (6.16-rc6)
+CVE-2025-38517 [lib/alloc_tag: do not acquire non-existent lock in alloc_tag_top_users()]
+ - linux <unfixed>
+ [trixie] - linux 6.12.41-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/99af22cd34688cc0d535a1919e0bea4cbc6c1ea1 (6.16-rc6)
+CVE-2025-38516 [pinctrl: qcom: msm: mark certain pins as invalid for interrupts]
+ - linux <unfixed>
+ [trixie] - linux 6.12.41-1
+ [bookworm] - linux 6.1.147-1
+ NOTE: https://git.kernel.org/linus/93712205ce2f1fb047739494c0399a26ea4f0890 (6.16-rc6)
+CVE-2025-38515 [drm/sched: Increment job count before swapping tail spsc queue]
+ - linux <unfixed>
+ [trixie] - linux 6.12.41-1
+ [bookworm] - linux 6.1.147-1
+ NOTE: https://git.kernel.org/linus/8af39ec5cf2be522c8eb43a3d8005ed59e4daaee (6.16-rc5)
+CVE-2025-38514 [rxrpc: Fix oops due to non-existence of prealloc backlog struct]
+ - linux <unfixed>
+ [trixie] - linux 6.12.41-1
+ [bookworm] - linux 6.1.147-1
+ NOTE: https://git.kernel.org/linus/880a88f318cf1d2a0f4c0a7ff7b07e2062b434a4 (6.16-rc6)
+CVE-2025-38513 [wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev()]
+ - linux <unfixed>
+ [trixie] - linux 6.12.41-1
+ [bookworm] - linux 6.1.147-1
+ NOTE: https://git.kernel.org/linus/74b1ec9f5d627d2bdd5e5b6f3f81c23317657023 (6.16-rc6)
+CVE-2025-38512 [wifi: prevent A-MSDU attacks in mesh networks]
+ - linux <unfixed>
+ [trixie] - linux 6.12.41-1
+ [bookworm] - linux 6.1.147-1
+ NOTE: https://git.kernel.org/linus/737bb912ebbe4571195c56eba557c4d7315b26fb (6.16-rc6)
+CVE-2025-38511 [drm/xe/pf: Clear all LMTT pages on alloc]
+ - linux <unfixed>
+ [trixie] - linux 6.12.41-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/705a412a367f383430fa34bada387af2e52eb043 (6.16-rc6)
+CVE-2025-38510 [kasan: remove kasan_find_vm_area() to prevent possible deadlock]
+ - linux <unfixed>
+ [trixie] - linux 6.12.41-1
+ [bookworm] - linux 6.1.147-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/6ee9b3d84775944fb8c8a447961cd01274ac671c (6.16-rc6)
+CVE-2025-38509 [wifi: mac80211: reject VHT opmode for unsupported channel widths]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/58fcb1b4287ce38850402bb2bb16d09bf77b91d9 (6.16-rc6)
+CVE-2025-38508 [x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/52e1a03e6cf61ae165f59f41c44394a653a0a788 (6.16-rc5)
+CVE-2025-38507 [HID: nintendo: avoid bluetooth suspend/resume stalls]
+ - linux <unfixed>
+ [trixie] - linux 6.12.41-1
+ NOTE: https://git.kernel.org/linus/4a0381080397e77792a5168069f174d3e56175ff (6.16-rc4)
+CVE-2025-38506 [KVM: Allow CPU to reschedule while setting per-page memory attributes]
+ - linux <unfixed>
+ [trixie] - linux 6.12.41-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/47bb584237cc285e3a860b70c01f7bda9dcfb05b (6.16-rc6)
+CVE-2025-38505 [wifi: mwifiex: discard erroneous disassoc frames on STA interface]
+ - linux <unfixed>
+ [trixie] - linux 6.12.41-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/3b602ddc0df723992721b0d286c90c9bdd755b34 (6.16-rc6)
+CVE-2025-38504 [io_uring/zcrx: fix pp destruction warnings]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/203817de269539c062724d97dfa5af3cdf77a3ec (6.16-rc6)
+CVE-2025-38503 [btrfs: fix assertion when building free space tree]
+ - linux <unfixed>
+ [trixie] - linux 6.12.41-1
+ [bookworm] - linux 6.1.147-1
+ NOTE: https://git.kernel.org/linus/1961d20f6fa8903266ed9bd77c691924c22c8f02 (6.16-rc4)
CVE-2025-38502 [bpf: Fix oob access in cgroup local storage]
- linux <unfixed>
NOTE: https://git.kernel.org/linus/abad3d0bad72a52137e0c350c59542d75ae4f513 (6.17-rc1)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bb8a360d12d135de5804eb5a167cb3728958a56a
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bb8a360d12d135de5804eb5a167cb3728958a56a
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250816/ea1e07b7/attachment.htm>
More information about the debian-security-tracker-commits
mailing list