[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Nov 12 13:18:49 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
5fca5aff by Salvatore Bonaccorso at 2025-11-12T14:18:19+01:00
Merge Linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,221 @@
+CVE-2025-40158 [ipv6: use RCU in ip6_output()]
+ - linux 6.17.6-1
+ NOTE: https://git.kernel.org/linus/11709573cc4e48dc34c80fc7ab9ce5b159e29695 (6.18-rc1)
+CVE-2025-40157 [EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/2e6fe1bbefd9c059c3787d1c620fe67343a94dff (6.18-rc1)
+CVE-2025-40156 [PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/fc33bf0e097c6834646b98a7b3da0ae5b617f0f9 (6.18-rc1)
+CVE-2025-40155 [iommu/vt-d: debugfs: Fix legacy mode page table dump logic]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/fbe6070c73badca726e4ff7877320e6c62339917 (6.18-rc1)
+CVE-2025-40154 [ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ NOTE: https://git.kernel.org/linus/fba404e4b4af4f4f747bb0e41e9fff7d03c7bcc0 (6.18-rc1)
+CVE-2025-40153 [mm: hugetlb: avoid soft lockup when mprotect to large memory area]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ NOTE: https://git.kernel.org/linus/f52ce0ea90c83a28904c7cc203a70e6434adfecb (6.18-rc1)
+CVE-2025-40152 [drm/msm: Fix bootup splat with separate_gpu_drm modparam]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/f028bcafb6dfb4c2bb656cbff9e6a66222d3d3d7 (6.18-rc1)
+CVE-2025-40151 [LoongArch: BPF: No support of struct argument in trampoline programs]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/e82406c7cbdd368c5459b8a45e118811d2ba0794 (6.18-rc1)
+CVE-2025-40150 [f2fs: fix to avoid migrating empty section]
+ - linux 6.17.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/d625a2b08c089397d3a03bff13fa8645e4ec7a01 (6.18-rc1)
+CVE-2025-40149 [tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().]
+ - linux 6.17.6-1
+ NOTE: https://git.kernel.org/linus/c65f27b9c3be2269918e1cbad6d8884741f835c5 (6.18-rc1)
+CVE-2025-40148 [drm/amd/display: Add NULL pointer checks in dc_stream cursor attribute functions]
+ - linux 6.17.6-1
+ [trixie] - linux <not-affected> (Vulnerable code not present)
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/bf4e4b97d0fdc66f04fc19d807e24dd8421b8f11 (6.18-rc1)
+CVE-2025-40147 [blk-throttle: fix access race during throttle policy activation]
+ - linux 6.17.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/bd9fd5be6bc0836820500f68fff144609fbd85a9 (6.18-rc1)
+CVE-2025-40146 [blk-mq: fix potential deadlock while nr_requests grown]
+ - linux 6.17.6-1
+ NOTE: https://git.kernel.org/linus/b86433721f46d934940528f28d49c1dedb690df1 (6.18-rc1)
+CVE-2025-40145 [PCI/pwrctrl: Fix double cleanup on devm_add_action_or_reset() failure]
+ - linux 6.17.6-1
+ [trixie] - linux <not-affected> (Vulnerable code not present)
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/ab81f2f79c683c94bac622aafafbe8232e547159 (6.18-rc1)
+CVE-2025-40144 [nvdimm: ndtest: Return -ENOMEM if devm_kcalloc() fails in ndtest_probe()]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a9e6aa994917ee602798bbb03180a194b37865bb (6.18-rc1)
+CVE-2025-40143 [bpf: dont report verifier bug for missing bpf_scc_visit on speculative path]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a3c73d629ea1373af3c0c954d41fd1af555492e3 (6.18-rc1)
+CVE-2025-40142 [ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/9fc4a3da9a0259a0500848b5d8657918efde176b (6.18-rc1)
+CVE-2025-40141 [Bluetooth: ISO: Fix possible UAF on iso_conn_free]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/9950f095d6c875dbe0c9ebfcf972ec88fdf26fc8 (6.18-rc1)
+CVE-2025-40140 [net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ NOTE: https://git.kernel.org/linus/958baf5eaee394e5fd976979b0791a875f14a179 (6.18-rc1)
+CVE-2025-40139 [smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().]
+ - linux 6.17.6-1
+ NOTE: https://git.kernel.org/linus/935d783e5de9b64587f3adb25641dd8385e64ddb (6.18-rc1)
+CVE-2025-40138 [f2fs: fix to avoid NULL pointer dereference in f2fs_check_quota_consistency()]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/930a9a6ee8e7ffa20af4bffbfc2bbd21d83bf81c (6.18-rc1)
+CVE-2025-40137 [f2fs: fix to truncate first page in error path of f2fs_truncate()]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ NOTE: https://git.kernel.org/linus/9251a9e6e871cb03c4714a18efa8f5d4a8818450 (6.18-rc1)
+CVE-2025-40136 [crypto: hisilicon/qm - request reserved interrupt for virtual function]
+ - linux 6.17.6-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/9228facb308157ac0bdd264b873187896f7a9c7a (6.18-rc1)
+CVE-2025-40135 [ipv6: use RCU in ip6_xmit()]
+ - linux 6.17.6-1
+ NOTE: https://git.kernel.org/linus/9085e56501d93af9f2d7bd16f7fcfacdde47b99c (6.18-rc1)
+CVE-2025-40134 [dm: fix NULL pointer dereference in __dm_suspend()]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ NOTE: https://git.kernel.org/linus/8d33a030c566e1f105cd5bf27f37940b6367f3be (6.18-rc1)
+CVE-2025-40133 [mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/893c49a78d9f85e4b8081b908fb7c407d018106a (6.18-rc1)
+CVE-2025-40132 [ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/87cab86925b7fa4c1c977bc191ac549a3b23f0ea (6.18-rc1)
+CVE-2025-40131 [wifi: ath12k: Fix peer lookup in ath12k_dp_mon_rx_deliver_msdu()]
+ - linux 6.17.6-1
+ [trixie] - linux <not-affected> (Vulnerable code not present)
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/7ca61ed8b3f3fc9a7decd68039cb1d7d1238c566 (6.18-rc1)
+CVE-2025-40130 [scsi: ufs: core: Fix data race in CPU latency PM QoS request handling]
+ - linux 6.17.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/79dde5f7dc7c038eec903745dc1550cd4139980e (6.18-rc1)
+CVE-2025-40129 [sunrpc: fix null pointer dereference on zero-length checksum]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/6df164e29bd4e6505c5a2e0e5f1e1f6957a16a42 (6.18-rc1)
+CVE-2025-40128 [btrfs: fix symbolic link reading when bs > ps]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/67378b754608a3524d125bfa5744508a49fe48be (6.18-rc1)
+CVE-2025-40127 [hwrng: ks-sa - fix division by zero in ks_sa_rng_init]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ NOTE: https://git.kernel.org/linus/612b1dfeb414dfa780a6316014ceddf9a74ff5c0 (6.18-rc1)
+CVE-2025-40126 [sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ NOTE: https://git.kernel.org/linus/4fba1713001195e59cfc001ff1f2837dab877efb (6.18-rc1)
+CVE-2025-40125 [blk-mq: check kobject state_in_sysfs before deleting in blk_mq_unregister_hctx]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ NOTE: https://git.kernel.org/linus/4c7ef92f6d4d08a27d676e4c348f4e2922cab3ed (6.18-rc1)
+CVE-2025-40124 [sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC III]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ NOTE: https://git.kernel.org/linus/47b49c06eb62504075f0f2e2227aee2e2c2a58b3 (6.18-rc1)
+CVE-2025-40123 [bpf: Enforce expected_attach_type for tailcall compatibility]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ NOTE: https://git.kernel.org/linus/4540aed51b12bc13364149bf95f6ecef013197c0 (6.18-rc1)
+CVE-2025-40122 [perf/x86/intel: Fix IA32_PMC_x_CFG_B MSRs access error]
+ - linux 6.17.6-1
+ [trixie] - linux <not-affected> (Vulnerable code not present)
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/43796f30507802d93ead2dc44fc9637f34671a89 (6.18-rc1)
+CVE-2025-40121 [ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ NOTE: https://git.kernel.org/linus/4336efb59ef364e691ef829a73d9dbd4d5ed7c7b (6.18-rc1)
+CVE-2025-40120 [net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/3d3c4cd5c62f24bb3cb4511b7a95df707635e00a (6.18-rc1)
+CVE-2025-40119 [ext4: fix potential null deref in ext4_mb_init()]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/3c3fac6bc0a9c00dbe65d8dc0d3a282afe4d3188 (6.18-rc1)
+CVE-2025-40118 [scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ NOTE: https://git.kernel.org/linus/251be2f6037fb7ab399f68cd7428ff274133d693 (6.18-rc1)
+CVE-2025-40117 [misc: pci_endpoint_test: Fix array underflow in pci_endpoint_test_ioctl()]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/1ad82f9db13d85667366044acdfb02009d576c5a (6.18-rc1)
+CVE-2025-40116 [usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ NOTE: https://git.kernel.org/linus/186e8f2bdba551f3ae23396caccd452d985c23e3 (6.18-rc1)
+CVE-2025-40115 [scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ NOTE: https://git.kernel.org/linus/1703fe4f8ae50d1fb6449854e1fcaed1053e3a14 (6.18-rc1)
+CVE-2025-40113 [remoteproc: qcom: pas: Shutdown lite ADSP DTB on X1E]
+ - linux 6.17.6-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/142964960c7c35de5c5f7bdd61c32699de693630 (6.18-rc1)
+CVE-2025-40112 [sparc: fix accurate exception reporting in copy_{from_to}_user for Niagara]
+ - linux 6.17.6-1
+ [trixie] - linux 6.12.57-1
+ [bookworm] - linux 6.1.158-1
+ NOTE: https://git.kernel.org/linus/0b67c8fc10b13a9090340c5f8a37d308f4e1571c (6.18-rc1)
CVE-2025-13042
- chromium 142.0.7444.162-1
[bullseye] - chromium <end-of-life> (see #1061268)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5fca5aff9cf1a48beb8449c2b17f5316d506114b
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5fca5aff9cf1a48beb8449c2b17f5316d506114b
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251112/d9f0edec/attachment.htm>
More information about the debian-security-tracker-commits
mailing list