[Git][security-tracker-team/security-tracker][master] Remove all bookworm tagged entries for linux/6.1.139-1

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue May 20 21:07:49 BST 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
1348de10 by Salvatore Bonaccorso at 2025-05-20T22:06:26+02:00
Remove all bookworm tagged entries for linux/6.1.139-1

We will build those once the upcoming linux DSA is released including
those fixes. After the DSA release we can feed the entries back as
usual.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,10 +1,8 @@
 CVE-2025-37991 [parisc: Fix double SIGFPE crash]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/de3629baf5a33af1919dec7136d643b0662e85ef (6.15-rc5)
 CVE-2025-37990 [wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage()]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/8e089e7b585d95122c8122d732d1d5ef8f879396 (6.15-rc5)
 CVE-2025-37989 [net: phy: leds: fix memory leak]
 	- linux 6.12.27-1
@@ -86,7 +84,6 @@ CVE-2025-37973 [wifi: cfg80211: fix out-of-bounds access during multi-link eleme
 	NOTE: https://git.kernel.org/linus/023c1f2f0609218103cbcb48e0104b144d4a16dc (6.15-rc6)
 CVE-2025-37972 [Input: mtk-pmic-keys - fix possible null pointer dereference]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/11cdb506d0fbf5ac05bf55f5afcb3a215c316490 (6.15-rc6)
 CVE-2025-37971 [staging: bcm2835-camera: Initialise dev in v4l2_dev]
@@ -96,11 +93,9 @@ CVE-2025-37971 [staging: bcm2835-camera: Initialise dev in v4l2_dev]
 	NOTE: https://git.kernel.org/linus/98698ca0e58734bc5c1c24e5bbc7429f981cd186 (6.15-rc6)
 CVE-2025-37970 [iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/159ca7f18129834b6f4c7eae67de48e96c752fc9 (6.15-rc6)
 CVE-2025-37969 [iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/8114ef86e2058e2554111b793596f17bee23fa15 (6.15-rc6)
 CVE-2025-37968 [iio: light: opt3001: fix deadlock due to concurrent flag access]
 	- linux <unfixed>
@@ -120,21 +115,17 @@ CVE-2025-37965 [drm/amd/display: Fix invalid context error in dml helper]
 	NOTE: https://git.kernel.org/linus/9984db63742099ee3f3cff35cf71306d10e64356 (6.15-rc6)
 CVE-2025-37964 [x86/mm: Eliminate window where TLB flushes may be inadvertently skipped]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fea4e317f9e7e1f449ce90dedc27a2d2a95bee5a (6.15-rc6)
 CVE-2025-37963 [arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/f300769ead032513a68e4a02e806393402e626f8 (6.15-rc7)
 CVE-2025-37962 [ksmbd: fix memory leak in parse_lease_state()]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/eb4447bcce915b43b691123118893fca4f372a8f (6.15-rc6)
 CVE-2025-37961 [ipvs: fix uninit-value for saddr in do_output_route4]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/e34090d7214e0516eb8722aee295cb2507317c07 (6.15-rc6)
 CVE-2025-37960 [memblock: Accept allocated memory before use in memblock_double_array()]
 	- linux 6.12.29-1
@@ -143,7 +134,6 @@ CVE-2025-37960 [memblock: Accept allocated memory before use in memblock_double_
 	NOTE: https://git.kernel.org/linus/da8bf5daa5e55a6af2b285ecda460d6454712ff4 (6.15-rc6)
 CVE-2025-37959 [bpf: Scrub packet on bpf_redirect_peer]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/c4327229948879814229b46aa26a750718888503 (6.15-rc6)
 CVE-2025-37958 [mm/huge_memory: fix dereferencing invalid pmd migration entry]
 	- linux 6.12.29-1
@@ -165,7 +155,6 @@ CVE-2025-37954 [smb: client: Avoid race in open_cached_dir with lease breaks]
 	NOTE: https://git.kernel.org/linus/3ca02e63edccb78ef3659bebc68579c7224a6ca2 (6.15-rc6)
 CVE-2025-37953 [sch_htb: make htb_deactivate() idempotent]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3769478610135e82b262640252d90f6efb05be71 (6.15-rc6)
 CVE-2025-37952 [ksmbd: Fix UAF in __close_file_table_ids]
@@ -173,22 +162,18 @@ CVE-2025-37952 [ksmbd: Fix UAF in __close_file_table_ids]
 	NOTE: https://git.kernel.org/linus/36991c1ccde2d5a521577c448ffe07fcccfe104d (6.15-rc6)
 CVE-2025-37951 [drm/v3d: Add job to pending list if the reset was skipped]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/35e4079bf1a2570abffce6ababa631afcf8ea0e5 (6.15-rc6)
 CVE-2025-37950 [ocfs2: fix panic in failed foilio allocation]
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/31d4cd4eb2f8d9b87ebfa6a5e443a59e3b3d7b8c (6.15-rc6)
 CVE-2025-37949 [xenbus: Use kref to track req lifetime]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/1f0304dfd9d217c2f8b04a9ef4b3258a66eedd27 (6.15-rc6)
 CVE-2025-37948 [arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/0dfefc2ea2f29ced2416017d7e5b1253a54c2735 (6.15-rc7)
 CVE-2025-37947 [ksmbd: prevent out-of-bounds stream writes by validating *pos]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/0ca6df4f40cf4c32487944aaf48319cb6c25accc (6.15-rc6)
 CVE-2025-37946 [s390/pci: Fix duplicate pci_dev_put() in disable_slot() when PF has child VFs]
 	- linux 6.12.29-1
@@ -233,7 +218,6 @@ CVE-2025-37937 [objtool, media: dib8000: Prevent divide-by-zero in dib8000_set_d
 	NOTE: https://git.kernel.org/linus/e63d465f59011dede0a0f1d21718b59a64c3ff5c (6.15-rc1)
 CVE-2025-37936 [perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's value.]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/58f6217e5d0132a9f14e401e62796916aa055c1b (6.15-rc5)
 CVE-2025-37935 [net: ethernet: mtk_eth_soc: fix SER panic with 4GB+ RAM]
@@ -253,7 +237,6 @@ CVE-2025-37933 [octeon_ep: Fix host hang issue during device reboot]
 	NOTE: https://git.kernel.org/linus/34f42736b325287a7b2ce37e415838f539767bda (6.15-rc5)
 CVE-2025-37932 [sch_htb: make htb_qlen_notify() idempotent]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/5ba8b837b522d7051ef81bacf3d95383ff8edce5 (6.15-rc2)
 CVE-2025-37931 [btrfs: adjust subpage bit start based on sectorsize]
 	- linux 6.12.29-1
@@ -261,31 +244,25 @@ CVE-2025-37931 [btrfs: adjust subpage bit start based on sectorsize]
 	NOTE: https://git.kernel.org/linus/e08e49d986f82c30f42ad0ed43ebbede1e1e3739 (6.15-rc5)
 CVE-2025-37930 [drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill()]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/bbe5679f30d7690a9b6838a583b9690ea73fe0e9 (6.15-rc5)
 CVE-2025-37929 [arm64: errata: Add missing sentinels to Spectre-BHB MIDR arrays]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fee4d171451c1ad9e8aaf65fc0ab7d143a33bd72 (6.15-rc5)
 CVE-2025-37928 [dm-bufio: don't schedule in atomic context]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/a3d8f0a7f5e8b193db509c7191fefeed3533fc44 (6.15-rc5)
 CVE-2025-37927 [iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/8dee308e4c01dea48fc104d37f92d5b58c50b96c (6.15-rc5)
 CVE-2025-37926 [ksmbd: fix use-after-free in ksmbd_session_rpc_open]
 	- linux 6.12.29-1
 	NOTE: https://git.kernel.org/linus/a1f46c99d9ea411f9bf30025b912d881d36fc709 (6.15-rc5)
 CVE-2025-37924 [ksmbd: fix use-after-free in kerberos authentication]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/e86e9134e1d1c90a960dd57f59ce574d27b9a124 (6.15-rc5)
 CVE-2025-37923 [tracing: Fix oob write in trace_seq_to_buffer()]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/f5178c41bb43444a6008150fe6094497135d07cb (6.15-rc5)
 CVE-2025-37922 [book3s64/radix : Align section vmemmap start address to PAGE_SIZE]
 	- linux 6.12.29-1
@@ -294,7 +271,6 @@ CVE-2025-37922 [book3s64/radix : Align section vmemmap start address to PAGE_SIZ
 	NOTE: https://git.kernel.org/linus/9cf7e13fecbab0894f6986fc6986ab2eba8de52e (6.15-rc5)
 CVE-2025-37921 [vxlan: vnifilter: Fix unlocked deletion of default FDB entry]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/087a9eb9e5978e3ba362e1163691e41097e8ca20 (6.15-rc5)
 CVE-2025-37920 [xsk: Fix race condition in AF_XDP generic RX path]
@@ -312,7 +288,6 @@ CVE-2025-37918 [Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue(
 	NOTE: https://git.kernel.org/linus/0317b033abcd1d8dd2798f0e2de5e84543d0bd22 (6.15-rc5)
 CVE-2025-37917 [net: ethernet: mtk-star-emac: fix spinlock recursion issues on rx/tx poll]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6fe0866014486736cc3ba1c6fd4606d3dbe55c9c (6.15-rc5)
 CVE-2025-37916 [pds_core: remove write-after-free of client_id]
@@ -322,24 +297,19 @@ CVE-2025-37916 [pds_core: remove write-after-free of client_id]
 	NOTE: https://git.kernel.org/linus/dfd76010f8e821b66116dec3c7d90dd2403d1396 (6.15-rc5)
 CVE-2025-37915 [net_sched: drr: Fix double list add in class with netem as child qdisc]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/f99a3fbf023e20b626be4b0f042463d598050c9a (6.15-rc5)
 CVE-2025-37914 [net_sched: ets: Fix double list add in class with netem as child qdisc]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/1a6d0c00fa07972384b0c308c72db091d49988b6 (6.15-rc5)
 CVE-2025-37913 [net_sched: qfq: Fix double list add in class with netem as child qdisc]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/f139f37dcdf34b67f5bf92bc8e0f7f6b3ac63aa4 (6.15-rc5)
 CVE-2025-37912 [ice: Check VF VSI Pointer Value in ice_vc_add_fdir_fltr()]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/425c5f266b2edeee0ce16fedd8466410cdcfcfe3 (6.15-rc5)
 CVE-2025-37911 [bnxt_en: Fix out-of-bound memcpy() during ethtool -w]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/6b87bd94f34370bbf1dfa59352bed8efab5bf419 (6.15-rc5)
 CVE-2025-37910 [ptp: ocp: Fix NULL dereference in Adva board SMA sysfs operations]
 	- linux 6.12.29-1
@@ -348,7 +318,6 @@ CVE-2025-37910 [ptp: ocp: Fix NULL dereference in Adva board SMA sysfs operation
 	NOTE: https://git.kernel.org/linus/e98386d79a23c57cf179fe4138322e277aa3aa74 (6.15-rc5)
 CVE-2025-37909 [net: lan743x: Fix memleak issue when GSO enabled]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/2d52e2e38b85c8b7bc00dca55c2499f46f8c8198 (6.15-rc5)
 CVE-2025-37908 [mm, slab: clean up slab->obj_exts always]
 	- linux 6.12.29-1
@@ -365,7 +334,6 @@ CVE-2025-37906 [ublk: fix race between io_uring_cmd_complete_in_task and ublk_ca
 	NOTE: https://git.kernel.org/linus/f40139fde5278d81af3227444fd6e76a76b9506d (6.15-rc4)
 CVE-2025-37905 [firmware: arm_scmi: Balance device refcount when destroying devices]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/9ca67840c0ddf3f39407339624cef824a4f27599 (6.15-rc6)
 CVE-2025-37904 [btrfs: fix the inode leak in btrfs_iget()]
@@ -373,16 +341,13 @@ CVE-2025-37904 [btrfs: fix the inode leak in btrfs_iget()]
 	NOTE: https://git.kernel.org/linus/48c1d1bb525b1c44b8bdc8e7ec5629cb6c2b9fc4 (6.15-rc5)
 CVE-2025-37903 [drm/amd/display: Fix slab-use-after-free in hdcp]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	NOTE: https://git.kernel.org/linus/be593d9d91c5a3a363d456b9aceb71029aeb3f1d (6.15-rc5)
 CVE-2025-37902 [dm: fix copying after src array boundaries]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f1aff4bc199cb92c055668caed65505e3b4d2656 (6.15-rc6)
 CVE-2025-37901 [irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/38a05c0b87833f5b188ae43b428b1f792df2b384 (6.15-rc5)
 CVE-2025-37900 [iommu: Fix two issues in iommu_copy_struct_from_user()]
@@ -398,7 +363,6 @@ CVE-2025-37898 [powerpc64/ftrace: fix module loading without patchable function
 	NOTE: https://git.kernel.org/linus/534f5a8ba27863141e29766467a3e1f61bcb47ac (6.15-rc5)
 CVE-2025-37897 [wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release]
 	- linux 6.12.29-1
-	[bookworm] - linux 6.1.139-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/0fb15ae3b0a9221be01715dac0335647c79f3362 (6.15-rc5)
 CVE-2025-37896 [spi: spi-mem: Add fix to avoid divide error]



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1348de103416f42d8ee0c5815e7d3af327e69827

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1348de103416f42d8ee0c5815e7d3af327e69827
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250520/fce3a7e7/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list