[Git][security-tracker-team/security-tracker][master] Merge Linux changes from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Aug 22 18:19:13 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
80e2ca0e by Salvatore Bonaccorso at 2025-08-22T19:18:46+02:00
Merge Linux changes from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,150 @@
+CVE-2025-38660 [[ceph] parse_longname(): strrchr() expects NUL-terminated string]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/101841c38346f4ca41dc1802c867da990ffb32eb (6.17-rc1)
+CVE-2025-38659 [gfs2: No more self recovery]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/deb016c1669002e48c431d6fd32ea1c20ef41756 (6.17-rc1)
+CVE-2025-38658 [nvmet: pci-epf: Do not complete commands twice if nvmet_req_init() fails]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/746d0ac5a07d5da952ef258dd4d75f0b26c96476 (6.17-rc1)
+CVE-2025-38657 [wifi: rtw89: mcc: prevent shift wrapping in rtw89_core_mlsr_switch()]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/53cf488927a0f79968f9c03c4d1e00d2a79731c3 (6.17-rc1)
+CVE-2025-38656 [wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start()]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/cf80c02a9fdb6c5bc8508beb6a0f6a1294fc32f6 (6.17-rc1)
+CVE-2025-38655 [pinctrl: canaan: k230: add NULL check in DT parse]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/65bd0be486390fc12a84eafaad78758c5e5a55e6 (6.17-rc1)
+CVE-2025-38654 [pinctrl: canaan: k230: Fix order of DT parse and pinctrl register]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/d94a32ac688f953dc9a9f12b5b4139ecad841bbb (6.17-rc1)
+CVE-2025-38653 [proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ff7ec8dc1b646296f8d94c39339e8d3833d16c05 (6.17-rc1)
+CVE-2025-38652 [f2fs: fix to avoid out-of-boundary access in devs.path]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/5661998536af52848cc4d52a377e90368196edea (6.17-rc1)
+CVE-2025-38651 [landlock: Fix warning from KUnit tests]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/e0a69cf2c03e61bd8069becb97f66c173d0d1fa1 (6.17-rc1)
+CVE-2025-38650 [hfsplus: remove mutex_lock check in hfsplus_free_extents]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/fcb96956c921f1aae7e7b477f2435c56f77a31b4 (6.17-rc1)
+CVE-2025-38649 [arm64: dts: qcom: qcs615: fix a crash issue caused by infinite loop for Coresight]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/bd4f35786d5f0798cc1f8c187a81a7c998e6c58f (6.17-rc1)
+CVE-2025-38648 [spi: stm32: Check for cfg availability in stm32_spi_probe]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/21f1c800f6620e43f31dfd76709dbac8ebaa5a16 (6.17-rc1)
+CVE-2025-38647 [wifi: rtw89: sar: drop lockdep assertion in rtw89_set_sar_from_acpi]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6fe21445f7e801de5527d420f8e25e97b0cdd7e2 (6.17-rc1)
+CVE-2025-38646 [wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/7e04f01bb94fe61c73cc59f0495c3b6c16a83231 (6.17-rc1)
+CVE-2025-38645 [net/mlx5: Check device memory pointer before usage]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/70f238c902b8c0461ae6fbb8d1a0bbddc4350eea (6.17-rc1)
+CVE-2025-38644 [wifi: mac80211: reject TDLS operations when station is not associated]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/16ecdab5446f15a61ec88eb0d23d25d009821db0 (6.17-rc1)
+CVE-2025-38643 [wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/2c5dee15239f3f3e31aa5c8808f18996c039e2c1 (6.17-rc1)
+CVE-2025-38642 [wifi: mac80211: fix WARN_ON for monitor mode on some devices]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/c57e5b9819dfd16d709bcd6cb633301ed0829a66 (6.17-rc1)
+CVE-2025-38641 [Bluetooth: btusb: Fix potential NULL dereference on kmalloc failure]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b505902c66a282dcb01bcdc015aa1fdfaaa075db (6.17-rc1)
+CVE-2025-38640 [bpf: Disable migration in nf_hook_run_bpf().]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/17ce3e5949bc37557305ad46316f41c7875d6366 (6.17-rc1)
+CVE-2025-38639 [netfilter: xt_nfacct: don't assume acct name is null-terminated]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/bf58e667af7d96c8eb9411f926a0a0955f41ce21 (6.17-rc1)
+CVE-2025-38638 [ipv6: add a retry logic in net6_rt_notify()]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ea2f921db7a483a526058c5b5b8162edd88dabe5 (6.17-rc1)
+CVE-2025-38636 [rv: Use strings in da monitors tracepoints]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/7f904ff6e58d398c4336f3c19c42b338324451f7 (6.17-rc1)
+CVE-2025-38635 [clk: davinci: Add NULL check in davinci_lpsc_clk_register()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/13de464f445d42738fe18c9a28bab056ba3a290a (6.17-rc1)
+CVE-2025-38634 [power: supply: cpcap-charger: Fix null check for power_supply_get_by_name]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/d9fa3aae08f99493e67fb79413c0e95d30fca5e9 (6.17-rc1)
+CVE-2025-38633 [clk: spacemit: mark K1 pll1_d8 as critical]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/7554729de27daf6d54bcf8689d863bbe267828bf (6.17-rc1)
+CVE-2025-38632 [pinmux: fix race causing mux_owner NULL with active mux_usecount]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0b075c011032f88d1cfde3b45d6dcf08b44140eb (6.17-rc1)
+CVE-2025-38631 [clk: imx95-blk-ctl: Fix synchronous abort]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b08217a257215ed9130fce93d35feba66b49bf0a (6.17-rc1)
+CVE-2025-38630 [fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/da11e6a30e0bb8e911288bdc443b3dc8f6a7cac7 (6.17-rc1)
+CVE-2025-38629 [ALSA: usb: scarlett2: Fix missing NULL check]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/df485a4b2b3ee5b35c80f990beb554e38a8a5fb1 (6.17-rc1)
+CVE-2025-38628 [vdpa/mlx5: Fix release of uninitialized resources on error path]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/cc51a66815999afb7e9cd845968de4fdf07567b7 (6.17-rc1)
+CVE-2025-38627 [f2fs: compress: fix UAF of f2fs_inode_info in f2fs_free_dic]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/39868685c2a94a70762bc6d77dc81d781d05bff5 (6.17-rc1)
+CVE-2025-38626 [f2fs: fix to trigger foreground gc during f2fs_map_blocks() in lfs mode]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/1005a3ca28e90c7a64fa43023f866b960a60f791 (6.17-rc1)
+CVE-2025-38625 [vfio/pds: Fix missing detach_ioas op]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/fe24d5bc635e103a517ec201c3cb571eeab8be2f (6.17-rc1)
+CVE-2025-38624 [PCI: pnv_php: Clean up allocated IRQs on unplug]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/4668619092554e1b95c9a5ac2941ca47ba6d548a (6.17-rc1)
+CVE-2025-38623 [PCI: pnv_php: Fix surprise plug detection and recovery]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/a2a2a6fc2469524caa713036297c542746d148dc (6.17-rc1)
+CVE-2025-38622 [net: drop UFO packets in udp_rcv_segment()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/d46e51f1c78b9ab9323610feb14238d06d46d519 (6.17-rc1)
+CVE-2025-38621 [md: make rdev_addable usable for rcu mode]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/13017b427118f4311471ee47df74872372ca8482 (6.17-rc1)
+CVE-2025-38620 [zloop: fix KASAN use-after-free of tag set]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/765761851d89c772f482494d452e266795460278 (6.17-rc1)
+CVE-2025-38619 [media: ti: j721e-csi2rx: fix list_del corruption]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ae42c6fe531425ef2f47e82f96851427d24bbf6b (6.17-rc1)
 CVE-2025-38618 [vsock: Do not allow binding to VMADDR_PORT_ANY]
 	- linux <unfixed>
 	NOTE: https://git.kernel.org/linus/aba0c94f61ec05315fa7815d21aefa4c87f6a9f4 (6.17-rc2)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/80e2ca0e09340cec7e4d1907a787e9196fc7182a

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/80e2ca0e09340cec7e4d1907a787e9196fc7182a
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250822/b7dfe096/attachment.htm>


More information about the debian-security-tracker-commits mailing list