[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Feb 27 05:26:29 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
d22de043 by Salvatore Bonaccorso at 2025-02-27T06:26:07+01:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,556 @@
+CVE-2025-21797 [HID: corsair-void: Add missing delayed work cancel for headset status]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/48e487b002891eb0aeaec704c9bed51f028deff1 (6.14-rc3)
+CVE-2025-21796 [nfsd: clear acl_access/acl_default after releasing them]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/7faf14a7b0366f153284db0ad3347c457ea70136 (6.14-rc3)
+CVE-2025-21795 [NFSD: fix hang in nfsd4_shutdown_callback]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/036ac2778f7b28885814c6fbc07e156ad1624d03 (6.14-rc3)
+CVE-2025-21794 [HID: hid-thrustmaster: fix stack-out-of-bounds read in usb_check_int_endpoints()]
+	- linux 6.12.16-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0b43d98ff29be3144e86294486b1373b5df74c0e (6.14-rc3)
+CVE-2025-21793 [spi: sn-f-ospi: Fix division by zero]
+	- linux 6.12.16-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3588b1c0fde2f58d166e3f94a5a58d64b893526c (6.14-rc3)
+CVE-2025-21792 [ax25: Fix refcount leak caused by setting SO_BINDTODEVICE sockopt]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/bca0902e61731a75fc4860c8720168d9f1bae3b6 (6.14-rc3)
+CVE-2025-21791 [vrf: use RCU protection in l3mdev_l3_out()]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/6d0ce46a93135d96b7fa075a94a88fe0da8e8773 (6.14-rc3)
+CVE-2025-21790 [vxlan: check vxlan_vnigroup_init() return value]
+	- linux 6.12.16-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5805402dcc56241987bca674a1b4da79a249bab7 (6.14-rc3)
+CVE-2025-21789 [LoongArch: csum: Fix OoB access in IP checksum code for negative lengths]
+	- linux 6.12.16-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6287f1a8c16138c2ec750953e35039634018c84a (6.14-rc3)
+CVE-2025-21788 [net: ethernet: ti: am65-cpsw: fix memleak in certain XDP cases]
+	- linux 6.12.16-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5db843258de1e4e6b1ef1cbd1797923c9e3de548 (6.14-rc3)
+CVE-2025-21787 [team: better TEAM_OPTION_TYPE_STRING validation]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/5bef3ac184b5626ea62385d6b82a1992b89d7940 (6.14-rc3)
+CVE-2025-21786 [workqueue: Put the pwq after detaching the rescuer from the pool]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/e76946110137703c16423baf6ee177b751a34b7e (6.14-rc3)
+CVE-2025-21785 [arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/875d742cf5327c93cba1f11e12b08d3cce7a88d2 (6.14-rc3)
+CVE-2025-21784 [drm/amdgpu: bail out when failed to load fw in psp_init_cap_microcode()]
+	- linux 6.12.16-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/a0a455b4bc7483ad60e8b8a50330c1e05bb7bfcf (6.14-rc3)
+CVE-2025-21783 [gpiolib: Fix crash on error in gpiochip_get_ngpios()]
+	- linux 6.12.16-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/7b4aebeecbbd5b5fe73e35fad3f62ed21aa7ef44 (6.14-rc3)
+CVE-2025-21782 [orangefs: fix a oob in orangefs_debug_write]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/f7c848431632598ff9bce57a659db6af60d75b39 (6.14-rc1)
+CVE-2025-21781 [batman-adv: fix panic during interface removal]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/ccb7276a6d26d6f8416e315b43b45e15ee7f29e2 (6.14-rc3)
+CVE-2025-21780 [drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/1abb2648698bf10783d2236a6b4a7ca5e8021699 (6.14-rc3)
+CVE-2025-21779 [KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC isn't in-kernel]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/a8de7f100bb5989d9c3627d3a223ee1c863f3b69 (6.14-rc3)
+CVE-2025-21778 [tracing: Do not allow mmap() of persistent ring buffer]
+	- linux 6.12.16-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/129fe718819cc5e24ea2f489db9ccd4371f0c6f6 (6.14-rc3)
+CVE-2025-21777 [ring-buffer: Validate the persistent meta data subbuf array]
+	- linux 6.12.16-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/f5b95f1fa2ef3a03f49eeec658ba97e721412b32 (6.14-rc3)
+CVE-2025-21776 [USB: hub: Ignore non-compliant devices with too many configs or interfaces]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/2240fed37afbcdb5e8b627bc7ad986891100e05d (6.14-rc3)
+CVE-2025-21775 [can: ctucanfd: handle skb allocation failure]
+	- linux 6.12.16-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/9bd24927e3eeb85642c7baa3b28be8bea6c2a078 (6.14-rc3)
+CVE-2025-21774 [can: rockchip: rkcanfd_handle_rx_fifo_overflow_int(): bail out if skb cannot be allocated]
+	- linux 6.12.16-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/f7f0adfe64de08803990dc4cbecd2849c04e314a (6.14-rc3)
+CVE-2025-21773 [can: etas_es58x: fix potential NULL pointer dereference on udev->serial]
+	- linux 6.12.16-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/a1ad2109ce41c9e3912dadd07ad8a9c640064ffb (6.14-rc3)
+CVE-2025-21772 [partitions: mac: fix handling of bogus partition table]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/80e648042e512d5a767da251d44132553fe04ae0 (6.14-rc3)
+CVE-2025-21771 [sched_ext: Fix incorrect autogroup migration detection]
+	- linux 6.12.16-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/d6f3e7d564b2309e1f17e709a70eca78d7ca2bb8 (6.14-rc3)
+CVE-2025-21770 [iommu: Fix potential memory leak in iopf_queue_remove_device()]
+	- linux 6.12.16-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/9759ae2cee7cd42b95f1c48aa3749bd02b5ddb08 (6.14-rc3)
+CVE-2025-21769 [ptp: vmclock: Add .owner to vmclock_miscdev_fops]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/7b07b040257c1b658ef3eca86e4b6ae02d65069c (6.14-rc3)
+CVE-2025-21768 [net: ipv6: fix dst ref loops in rpl, seg6 and ioam6 lwtunnels]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/92191dd1073088753821b862b791dcc83e558e07 (6.14-rc2)
+CVE-2025-21767 [clocksource: Use migrate_disable() to avoid calling get_random_u32() in atomic context]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/6bb05a33337b2c842373857b63de5c9bf1ae2a09 (6.14-rc2)
+CVE-2025-21766 [ipv4: use RCU protection in __ip_rt_update_pmtu()]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/139512191bd06f1b496117c76372b2ce372c9a41 (6.14-rc3)
+CVE-2025-21765 [ipv6: use RCU protection in ip6_default_advmss()]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/3c8ffcd248da34fc41e52a46e51505900115fc2a (6.14-rc3)
+CVE-2025-21764 [ndisc: use RCU protection in ndisc_alloc_skb()]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/628e6d18930bbd21f2d4562228afe27694f66da9 (6.14-rc3)
+CVE-2025-21763 [neighbour: use RCU protection in __neigh_notify()]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/becbd5850c03ed33b232083dd66c6e38c0c0e569 (6.14-rc3)
+CVE-2025-21762 [arp: use RCU protection in arp_xmit()]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/a42b69f692165ec39db42d595f4f65a4c8f42e44 (6.14-rc3)
+CVE-2025-21761 [openvswitch: use RCU protection in ovs_vport_cmd_fill_info()]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/90b2f49a502fa71090d9f4fe29a2f51fe5dff76d (6.14-rc3)
+CVE-2025-21760 [ndisc: extend RCU protection in ndisc_send_skb()]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/ed6ae1f325d3c43966ec1b62ac1459e2b8e45640 (6.14-rc3)
+CVE-2025-21759 [ipv6: mcast: extend RCU protection in igmp6_send()]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/087c1faa594fa07a66933d750c0b2610aa1a2946 (6.14-rc3)
+CVE-2025-21758 [ipv6: mcast: add RCU protection to mld_newpack()]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/a527750d877fd334de87eef81f1cb5f0f0ca3373 (6.14-rc3)
+CVE-2025-21757 [net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels]
+	- linux 6.12.16-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/c71a192976ded2f2f416d03c4f595cdd4478b825 (6.14-rc2)
+CVE-2025-21756 [vsock: Keep the binding until socket destruction]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/fcdd2242c0231032fc84e1404315c245ae56322a (6.14-rc1)
+CVE-2025-21755 [vsock: Orphan socket after transport release]
+	- linux 6.12.16-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/78dafe1cf3afa02ed71084b350713b07e72a18fb (6.14-rc3)
+CVE-2025-21754 [btrfs: fix assertion failure when splitting ordered extent after transaction abort]
+	- linux 6.12.15-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/0d85f5c2dd91df6b5da454406756f463ba923b69 (6.14-rc2)
+CVE-2025-21753 [btrfs: fix use-after-free when attempting to join an aborted transaction]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/e2f0943cf37305dbdeaf9846e3c941451bcdef63 (6.14-rc2)
+CVE-2025-21752 [btrfs: don't use btrfs_set_item_key_safe on RAID stripe-extents]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/dc14ba10781bd2629835696b7cc1febf914768e9 (6.14-rc1)
+CVE-2025-21751 [net/mlx5: HWS, change error flow on matcher disconnect]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/1ce840c7a659aa53a31ef49f0271b4fd0dc10296 (6.14-rc1)
+CVE-2025-21750 [wifi: brcmfmac: Check the return value of of_property_read_string_index()]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/082d9e263af8de68f0c34f67b251818205160f6e (6.14-rc1)
+CVE-2025-21749 [net: rose: lock the socket in rose_bind()]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/a1300691aed9ee852b0a9192e29e2bdc2411a7e6 (6.14-rc2)
+CVE-2025-21748 [ksmbd: fix integer overflows on 32 bit systems]
+	- linux 6.12.15-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/aab98e2dbd648510f8f51b83fbf4721206ccae45 (6.14-rc1)
+CVE-2025-21747 [drm/ast: astdp: Fix timeout for enabling video signal]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/fd39c41bcd82d5ebaaebadb944eab5598c668a90 (6.14-rc2)
+CVE-2025-21746 [Input: synaptics - fix crash when enabling pass-through port]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/08bd5b7c9a2401faabdaa1472d45c7de0755fd7e (6.14-rc1)
+CVE-2025-21745 [blk-cgroup: Fix class @block_class's subsystem refcount leakage]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/d1248436cbef1f924c04255367ff4845ccd9025e (6.14-rc1)
+CVE-2025-21744 [wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize()]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/68abd0c4ebf24cd499841a488b97a6873d5efabb (6.14-rc1)
+CVE-2025-21743 [usbnet: ipheth: fix possible overflow in DPE length check]
+	- linux 6.12.15-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/c219427ed296f94bb4b91d08626776dc7719ee27 (6.14-rc1)
+CVE-2025-21742 [usbnet: ipheth: use static NDP16 location in URB]
+	- linux 6.12.15-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/86586dcb75cb8fd062a518aca8ee667938b91efb (6.14-rc1)
+CVE-2025-21741 [usbnet: ipheth: fix DPE OoB read]
+	- linux 6.12.15-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ee591f2b281721171896117f9946fced31441418 (6.14-rc1)
+CVE-2025-21740 [KVM: x86/mmu: Ensure NX huge page recovery thread is alive before waking]
+	- linux 6.12.15-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/43fb96ae78551d7bfa4ecca956b258f085d67c40 (6.14-rc2)
+CVE-2025-21739 [scsi: ufs: core: Fix use-after free in init error and remove paths]
+	- linux 6.12.15-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/f8fb2403ddebb5eea0033d90d9daae4c88749ada (6.14-rc2)
+CVE-2025-21738 [ata: libata-sff: Ensure that we cannot write outside the allocated buffer]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/6e74e53b34b6dec5a50e1404e2680852ec6768d2 (6.14-rc1)
+CVE-2025-21737 [ceph: fix memory leak in ceph_mds_auth_match()]
+	- linux 6.12.15-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3b7d93db450e9d8ead80d75e2a303248f1528c35 (6.14-rc1)
+CVE-2025-21736 [nilfs2: fix possible int overflows in nilfs_fiemap()]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/6438ef381c183444f7f9d1de18f22661cba1e946 (6.14-rc1)
+CVE-2025-21735 [NFC: nci: Add bounds checking in nci_hci_create_pipe()]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/110b43ef05342d5a11284cc8b21582b698b4ef1c (6.14-rc1)
+CVE-2025-21734 [misc: fastrpc: Fix copy buffer page size]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/e966eae72762ecfdbdb82627e2cda48845b9dd66 (6.14-rc1)
+CVE-2025-21733 [tracing/osnoise: Fix resetting of tracepoints]
+	- linux 6.12.15-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/e3ff4245928f948f3eb2e852aa350b870421c358 (6.14-rc1)
+CVE-2025-21732 [RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error]
+	- linux 6.12.15-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/abb604a1a9c87255c7a6f3b784410a9707baf467 (6.14-rc1)
+CVE-2025-21731 [nbd: don't allow reconnect after disconnect]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/844b8cdc681612ff24df62cdefddeab5772fadf1 (6.14-rc1)
+CVE-2025-21730 [wifi: rtw89: avoid to init mgnt_entry list twice when WoWLAN failed]
+	- linux 6.12.13-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/2f7667675df1b40b73ecc53b4b8c3189b1e5f2c1 (6.14-rc1)
+CVE-2025-21729 [wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion]
+	- linux 6.12.13-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ba4bb0402c60e945c4c396c51f0acac3c3e3ea5c (6.14-rc1)
+CVE-2025-21728 [bpf: Send signals asynchronously if !preemptible]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/87c544108b612512b254c8f79aa5c0a8546e2cc4 (6.14-rc1)
+CVE-2025-21727 [padata: fix UAF in padata_reorder]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/e01780ea4661172734118d2a5f41bc9720765668 (6.14-rc1)
+CVE-2025-21726 [padata: avoid UAF for reorder_work]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/dd7d37ccf6b11f3d95e797ebe4e9e886d0332600 (6.14-rc1)
+CVE-2025-21725 [smb: client: fix oops due to unset link speed]
+	- linux 6.12.13-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/be7a6a77669588bfa5022a470989702bbbb11e7f (6.14-rc1)
+CVE-2025-21724 [iommufd/iova_bitmap: Fix shift-out-of-bounds in iova_bitmap_offset_to_index()]
+	- linux 6.12.13-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/e24c1551059268b37f6f40639883eafb281b8b9c (6.14-rc1)
+CVE-2025-21723 [scsi: mpi3mr: Fix possible crash when setting up bsg fails]
+	- linux 6.12.13-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/295006f6e8c17212d3098811166e29627d19e05c (6.14-rc1)
+CVE-2025-21722 [nilfs2: do not force clear folio if buffer is referenced]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/ca76bb226bf47ff04c782cacbd299f12ddee1ec1 (6.14-rc1)
+CVE-2025-21721 [nilfs2: handle errors that nilfs_prepare_chunk() may return]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/ee70999a988b8abc3490609142f50ebaa8344432 (6.14-rc1)
+CVE-2025-21720 [xfrm: delete intermediate secpath entry in packet offload mode]
+	- linux 6.12.13-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/600258d555f0710b9c47fb78d2d80a4aecd608cc (6.14-rc1)
+CVE-2025-21719 [ipmr: do not call mr_mfc_uses_dev() for unres entries]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/15a901361ec3fb1c393f91880e1cbf24ec0a88bd (6.14-rc1)
+CVE-2025-21718 [net: rose: fix timer races against user threads]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/5de7665e0a0746b5ad7943554b34db8f8614a196 (6.14-rc1)
+CVE-2025-21717 [net/mlx5e: add missing cpu_to_node to kvzalloc_node in mlx5e_open_xdpredirect_sq]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/979284535aaf12a287a2f43d9d5dfcbdc1dc4cac (6.14-rc1)
+CVE-2025-21716 [vxlan: Fix uninit-value in vxlan_vnifilter_dump()]
+	- linux 6.12.13-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5066293b9b7046a906eff60e3949a887ae185a43 (6.14-rc1)
+CVE-2025-21715 [net: davicom: fix UAF in dm9000_drv_remove]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/19e65c45a1507a1a2926649d2db3583ed9d55fd9 (6.14-rc1)
+CVE-2025-21714 [RDMA/mlx5: Fix implicit ODP use after free]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/d3d930411ce390e532470194296658a960887773 (6.14-rc1)
+CVE-2025-21713 [powerpc/pseries/iommu: Don't unset window if it was never set]
+	- linux 6.12.13-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/17391cb2613b82f8c405570fea605af3255ff8d2 (6.14-rc1)
+CVE-2025-21712 [md/md-bitmap: Synchronize bitmap_get_stats() with bitmap lifetime]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/8d28d0ddb986f56920ac97ae704cc3340a699a30 (6.14-rc1)
+CVE-2025-21711 [net/rose: prevent integer overflows in rose_setsockopt()]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/d640627663bfe7d8963c7615316d7d4ef60f3b0b (6.14-rc1)
+CVE-2025-21710 [tcp: correct handling of extreme memory squeeze]
+	- linux 6.12.13-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/8c670bdfa58e48abad1d5b6ca1ee843ca91f7303 (6.14-rc1)
+CVE-2025-21709 [kernel: be more careful about dup_mmap() failures and uprobe registering]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/64c37e134b120fb462fb4a80694bfb8e7be77b14 (6.14-rc1)
+CVE-2025-21708 [net: usb: rtl8150: enable basic endpoint checking]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/90b7f2961798793275b4844348619b622f983907 (6.14-rc1)
+CVE-2025-21707 [mptcp: consolidate suboption status]
+	- linux 6.12.13-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/c86b000782daba926c627d2fa00c3f60a75e7472 (6.14-rc1)
+CVE-2025-21706 [mptcp: pm: only set fullmesh for subflow endp]
+	- linux 6.12.13-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/1bb0d1348546ad059f55c93def34e67cb2a034a6 (6.14-rc1)
+CVE-2025-21705 [mptcp: handle fastopen disconnect correctly]
+	- linux 6.12.13-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/619af16b3b57a3a4ee50b9a30add9ff155541e71 (6.14-rc1)
+CVE-2024-58021 [HID: winwing: Add NULL check in winwing_init_led()]
+	- linux 6.12.16-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/45ab5166a82d038c898985b0ad43ead69c1f9573 (6.14-rc3)
+CVE-2024-58020 [HID: multitouch: Add NULL check in mt_input_configured]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/9b8e2220d3a052a690b1d1b23019673e612494c5 (6.14-rc3)
+CVE-2024-58019 [nvkm/gsp: correctly advance the read pointer of GSP message queue]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/8d9beb4aebc02c4bd09e1d39c9c5f1c68c786dbc (6.14-rc1)
+CVE-2024-58018 [nvkm: correctly calculate the available space of the GSP cmdq buffer]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/01ed662bdd6fce4f59c1804b334610d710d79fa0 (6.14-rc1)
+CVE-2024-58017 [printk: Fix signed integer overflow when defining LOG_BUF_LEN_MAX]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/3d6f83df8ff2d5de84b50377e4f0d45e25311c7a (6.14-rc1)
+CVE-2024-58016 [safesetid: check size of policy writes]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/f09ff307c7299392f1c88f763299e24bc99811c7 (6.14-rc1)
+CVE-2024-58015 [wifi: ath12k: Fix for out-of bound access error]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/eb8c0534713865d190856f10bfc97cf0b88475b1 (6.14-rc1)
+CVE-2024-58014 [wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/3f4a0948c3524ae50f166dbc6572a3296b014e62 (6.14-rc1)
+CVE-2024-58013 [Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/26fbd3494a7dd26269cb0817c289267dbcfdec06 (6.14-rc1)
+CVE-2024-58012 [ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/569922b82ca660f8b24e705f6cf674e6b1f99cc7 (6.14-rc1)
+CVE-2024-58011 [platform/x86: int3472: Check for adev == NULL]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/cd2fd6eab480dfc247b737cf7a3d6b009c4d0f1c (6.14-rc1)
+CVE-2024-58010 [binfmt_flat: Fix integer overflow bug on 32 bit systems]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/55cf2f4b945f6a6416cc2524ba740b83cc9af25a (6.14-rc1)
+CVE-2024-58009 [Bluetooth: L2CAP: handle NULL sock pointer in l2cap_sock_alloc]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/5f397409f8ee5bc82901eeaf799e1cbc4f8edcf1 (6.14-rc1)
+CVE-2024-58008 [KEYS: trusted: dcp: fix improper sg use with CONFIG_VMAP_STACK=y]
+	- linux 6.12.15-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/e8d9fab39d1f87b52932646b2f1e7877aa3fc0f4 (6.14-rc1)
+CVE-2024-58007 [soc: qcom: socinfo: Avoid out of bounds read of serial number]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/22cf4fae6660b6e1a583a41cbf84e3046ca9ccd0 (6.14-rc1)
+CVE-2024-58006 [PCI: dwc: ep: Prevent changing BAR size/flags in pci_epc_set_bar()]
+	- linux 6.12.15-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3708acbd5f169ebafe1faa519cb28adc56295546 (6.14-rc1)
+CVE-2024-58005 [tpm: Change to kvalloc() in eventlog/acpi.c]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/a3a860bc0fd6c07332e4911cf9a238d20de90173 (6.14-rc1)
+CVE-2024-58004 [media: intel/ipu6: remove cpu latency qos request on error]
+	- linux 6.12.15-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/facb541ff0805314e0b56e508f7d3cbd07af513c (6.14-rc1)
+CVE-2024-58003 [media: i2c: ds90ub9x3: Fix extra fwnode_handle_put()]
+	- linux 6.12.15-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/60b45ece41c5632a3a3274115a401cb244180646 (6.14-rc1)
+CVE-2024-58002 [media: uvcvideo: Remove dangling pointers]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/221cd51efe4565501a3dbf04cc011b537dcce7fb (6.14-rc1)
+CVE-2024-58001 [ocfs2: handle a symlink read error correctly]
+	- linux 6.12.15-1
+	NOTE: https://git.kernel.org/linus/2b4c2094da6d84e69b843dd3317902e977bf64bd (6.14-rc1)
+CVE-2024-58000 [io_uring: prevent reg-wait speculations]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/29b95ac917927ce9f95bf38797e16333ecb489b1 (6.14-rc1)
+CVE-2024-57999 [powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW]
+	- linux 6.12.13-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/8f70caad82e9c088ed93b4fea48d941ab6441886 (6.14-rc1)
+CVE-2024-57998 [OPP: add index check to assert to avoid buffer overflow in _read_freq()]
+	- linux 6.12.13-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/d659bc68ed489022ea33342cfbda2911a81e7a0d (6.14-rc1)
+CVE-2024-57997 [wifi: wcn36xx: fix channel survey memory allocation size]
+	- linux 6.12.13-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/6200d947f050efdba4090dfefd8a01981363d954 (6.14-rc1)
+CVE-2024-57996 [net_sched: sch_sfq: don't allow 1 packet limit]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/10685681bafce6febb39770f3387621bf5d67d0b (6.14-rc1)
+CVE-2024-57995 [wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev()]
+	- linux <unfixed>
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5a10971c7645a95f5d5dc23c26fbac4bf61801d0 (6.14-rc1)
+CVE-2024-57994 [ptr_ring: do not block hard interrupts in ptr_ring_resize_multiple()]
+	- linux 6.12.13-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/a126061c80d5efb4baef4bcf346094139cd81df6 (6.14-rc1)
+CVE-2024-57993 [HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check]
+	- linux 6.12.13-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/50420d7c79c37a3efe4010ff9b1bb14bc61ebccf (6.14-rc1)
+CVE-2024-57992 [wifi: wilc1000: unregister wiphy only if it has been registered]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/1be94490b6b8a06ff14cd23fda8714e6ec37cdfb (6.14-rc1)
+CVE-2024-57991 [wifi: rtw89: chan: fix soft lockup in rtw89_entity_recalc_mgnt_roles()]
+	- linux 6.12.13-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/e4790b3e314a4814f1680a5dc552031fb199b878 (6.14-rc1)
+CVE-2024-57990 [wifi: mt76: mt7925: fix off by one in mt7925_load_clc()]
+	- linux 6.12.13-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/08fa656c91fd5fdf47ba393795b9c0d1e97539ed (6.14-rc1)
+CVE-2024-57989 [wifi: mt76: mt7925: fix NULL deref check in mt7925_change_vif_links]
+	- linux 6.12.13-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5cd0bd815c8a48862a296df9b30e0ea0da14acd3 (6.14-rc1)
+CVE-2024-57988 [Bluetooth: btbcm: Fix NULL deref in btbcm_get_board_name()]
+	- linux 6.12.13-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b88655bc6593c6a7fdc1248b212d17e581c4334e (6.14-rc1)
+CVE-2024-57987 [Bluetooth: btrtl: check for NULL in btrtl_setup_realtek()]
+	- linux 6.12.13-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3c15082f3567032d196e8760753373332508c2ca (6.14-rc1)
+CVE-2024-57986 [HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/64f2657b579343cf923aa933f08074e6258eb07b (6.14-rc1)
+CVE-2024-57985 [firmware: qcom: scm: Cleanup global '__scm' on probe failures]
+	- linux 6.12.13-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/1e76b546e6fca7eb568161f408133904ca6bcf4f (6.14-rc1)
+CVE-2024-57984 [i3c: dw: Fix use-after-free in dw_i3c_master driver due to race condition]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/b75439c945b94dd8a2b645355bdb56f948052601 (6.14-rc1)
+CVE-2024-57983 [mailbox: th1520: Fix memory corruption due to incorrect array size]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/db049866943a38bf46a34fa120d526663339d7a5 (6.14-rc1)
+CVE-2024-57982 [xfrm: state: fix out-of-bounds read during lookup]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/e952837f3ddb0ff726d5b582aa1aad9aa38d024d (6.14-rc1)
+CVE-2024-57981 [usb: xhci: Fix NULL pointer dereference on certain command aborts]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/1e0a19912adb68a4b2b74fd77001c96cd83eb073 (6.14-rc1)
+CVE-2024-57980 [media: uvcvideo: Fix double free in error path]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/c6ef3a7fa97ec823a1e1af9085cf13db9f7b3bac (6.14-rc1)
+CVE-2024-57979 [pps: Fix a use-after-free]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/c79a39dc8d060b9e64e8b0fa9d245d44befeefbe (6.14-rc1)
+CVE-2024-57978 [media: imx-jpeg: Fix potential error pointer dereference in detach_pm()]
+	- linux 6.12.13-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/1378ffec30367233152b7dbf4fa6a25ee98585d1 (6.14-rc1)
+CVE-2024-57977 [memcg: fix soft lockup in the OOM process]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/ade81479c7dda1ce3eedb215c78bc615bbd04f06 (6.14-rc1)
+CVE-2024-57976 [btrfs: do proper folio cleanup when cow_file_range() failed]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/06f364284794f149d2abc167c11d556cf20c954b (6.14-rc1)
+CVE-2024-57975 [btrfs: do proper folio cleanup when run_delalloc_nocow() failed]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/c2b47df81c8e20a8e8cd94f0d7df211137ae94ed (6.14-rc1)
+CVE-2024-57974 [udp: Deal with race between UDP socket address change and rehash]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/a502ea6fa94b1f7be72a24bcf9e3f5f6b7e6e90c (6.14-rc1)
+CVE-2024-57973 [rdma/cxgb4: Prevent potential integer overflow on 32bit]
+	- linux 6.12.13-1
+	NOTE: https://git.kernel.org/linus/bd96a3935e89486304461a21752f824fc25e0f0b (6.14-rc1)
+CVE-2024-57953 [rtc: tps6594: Fix integer overflow on 32bit systems]
+	- linux 6.12.13-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/09c4a610153286cef54d4f0c85398f4e32fc227e (6.14-rc1)
+CVE-2024-57852 [firmware: qcom: scm: smc: Handle missing SCM device]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/94f48ecf0a538019ca2025e0b0da391f8e7cc58c (6.14-rc1)
+CVE-2024-57834 [media: vidtv: Fix a null-ptr-deref in vidtv_mux_stop_thread]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/1221989555db711578a327a9367f1be46500cb48 (6.14-rc1)
+CVE-2024-54458 [scsi: ufs: bsg: Set bsg_queue to NULL after removal]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/1e95c798d8a7f70965f0f88d4657b682ff0ec75f (6.14-rc1)
+CVE-2024-54456 [NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client()]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/49fd4e34751e90e6df009b70cd0659dc839e7ca8 (6.14-rc1)
+CVE-2024-52560 [fs/ntfs3: Mark inode as bad as soon as error detected in mi_enum_attr()]
+	- linux <unfixed>
+	NOTE: https://git.kernel.org/linus/2afd4d267e6dbaec8d3ccd4f5396cb84bc67aa2e (6.14-rc1)
+CVE-2024-52559 [drm/msm/gem: prevent integer overflow in msm_ioctl_gem_submit()]
+	- linux 6.12.16-1
+	NOTE: https://git.kernel.org/linus/3a47f4b439beb98e955d501c609dfd12b7836d61 (6.14-rc1)
+CVE-2024-52557 [drm: zynqmp_dp: Fix integer overflow in zynqmp_dp_rate_get()]
+	- linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/67a615c5cb6dc33ed35492dc0d67e496cbe8de68 (6.14-rc1)
+CVE-2024-49570 [drm/xe/tracing: Fix a potential TP_printk UAF]
+	- linux 6.12.16-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/07089083a526ea19daa72a1edf9d6e209615b77c (6.14-rc1)
 CVE-2025-26925 (Cross-Site Request Forgery (CSRF) vulnerability in Required Admin Menu ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2025-26698 (Incorrect resource transfer between spheres issue exists in RevoWorks  ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d22de04388ffd4cee3da14871dcb68d1becd0870

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d22de04388ffd4cee3da14871dcb68d1becd0870
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250227/b154ee6f/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list