[Git][security-tracker-team/security-tracker][master] Add Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Fri Sep 5 20:02:54 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
3d8bd1cb by Salvatore Bonaccorso at 2025-09-05T21:02:27+02:00
Add Linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,236 @@
+CVE-2025-39724 [serial: 8250: fix panic due to PSLVERR]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/7f8fdd4dbffc05982b96caf586f77a014b2a9353 (6.17-rc1)
+CVE-2025-39723 [netfs: Fix unbuffered write error handling]
+ - linux 6.16.5-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a3de58b12ce074ec05b8741fa28d62ccb1070468 (6.17-rc3)
+CVE-2025-39722 [crypto: caam - Prevent crash on suspend with iMX8QM / iMX8ULP]
+ - linux 6.16.5-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/5ffc47feddcf8eb4d8ac7b42111a02c8e8146512 (6.17-rc1)
+CVE-2025-39721 [crypto: qat - flush misc workqueue during device shutdown]
+ - linux 6.16.5-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/3d4df408ba9bad2b205c7fb8afc1836a6a4ca88a (6.17-rc1)
+CVE-2025-39720 [ksmbd: fix refcount leak causing resource not released]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/89bb430f621124af39bb31763c4a8b504c9651e2 (6.17-rc3)
+CVE-2025-39719 [iio: imu: bno055: fix OOB access of hw_xlate array]
+ - linux 6.16.5-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/399b883ec828e436f1a721bf8551b4da8727e65b (6.17-rc1)
+CVE-2025-39718 [vsock/virtio: Validate length in packet header before skb_put()]
+ - linux 6.16.5-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0dab92484474587b82e8e0455839eaf5ac7bf894 (6.17-rc1)
+CVE-2025-39717 [open_tree_attr: do not allow id-mapping changes without OPEN_TREE_CLONE]
+ - linux 6.16.5-1
+ [trixie] - linux <not-affected> (Vulnerable code not present)
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/9308366f062129d52e0ee3f7a019f7dd41db33df (6.17-rc3)
+CVE-2025-39716 [parisc: Revise __get_user() to probe user read access]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/89f686a0fb6e473a876a9a60a13aec67a62b9a7e (6.17-rc1)
+CVE-2025-39715 [parisc: Revise gateway LWS calls to probe user read access]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/f6334f4ae9a4e962ba74b026e1d965dfdf8cbef8 (6.17-rc1)
+CVE-2025-39714 [media: usbtv: Lock resolution while streaming]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/7e40e0bb778907b2441bff68d73c3eb6b6cd319f (6.17-rc1)
+CVE-2025-39713 [media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/7af160aea26c7dc9e6734d19306128cce156ec40 (6.17-rc1)
+CVE-2025-39712 [media: mt9m114: Fix deadlock in get_frame_interval/set_frame_interval]
+ - linux 6.16.5-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/298d1471cf83d5a2a05970e41822a2403f451086 (6.17-rc1)
+CVE-2025-39711 [media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls]
+ - linux 6.16.5-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0c92c49fc688cfadacc47ae99b06a31237702e9e (6.17-rc1)
+CVE-2025-39710 [media: venus: Add a check for packet size after reading from shared memory]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/49befc830daa743e051a65468c05c2ff9e8580e6 (6.17-rc1)
+CVE-2025-39709 [media: venus: protect against spurious interrupts during probe]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/3200144a2fa4209dc084a19941b9b203b43580f0 (6.17-rc1)
+CVE-2025-39708 [media: iris: Fix NULL pointer dereference]
+ - linux 6.16.5-1
+ [trixie] - linux <not-affected> (Vulnerable code not present)
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0f837559ccdd275c5a059e6ac4d5034b03409f1d (6.17-rc1)
+CVE-2025-39707 [drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/b4a69f7f29c8a459ad6b4d8a8b72450f1d9fd288 (6.17-rc1)
+CVE-2025-39706 [drm/amdkfd: Destroy KFD debugfs after destroy KFD wq]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/2e58401a24e7b2d4ec619104e1a76590c1284a4c (6.17-rc1)
+CVE-2025-39705 [drm/amd/display: fix a Null pointer dereference vulnerability]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/1bcf63a44381691d6192872801f830ce3250e367 (6.17-rc1)
+CVE-2025-39704 [LoongArch: KVM: Fix stack protector issue in send_ipi_data()]
+ - linux 6.16.5-1
+ [trixie] - linux <not-affected> (Vulnerable code not present)
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/5c68549c81bcca70fc464e305ffeefd9af968287 (6.17-rc3)
+CVE-2025-39703 [net, hsr: reject HSR frame if skb can't hold tag]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/7af76e9d18a9fd6f8611b3313c86c190f9b6a5a7 (6.17-rc3)
+CVE-2025-39702 [ipv6: sr: Fix MAC comparison to be constant-time]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/a458b2902115b26a25d67393b12ddd57d1216aaa (6.17-rc3)
+CVE-2025-39701 [ACPI: pfr_update: Fix the driver update version check]
+ - linux 6.16.5-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/8151320c747efb22d30b035af989fed0d502176e (6.17-rc3)
+CVE-2025-39700 [mm/damon/ops-common: ignore migration request to invalid nodes]
+ - linux 6.16.5-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/7e6c3130690a01076efdf45aa02ba5d5c16849a0 (6.17-rc1)
+CVE-2025-39699 [iommu/riscv: prevent NULL deref in iova_to_phys]
+ - linux 6.16.5-1
+ [trixie] - linux <not-affected> (Vulnerable code not present)
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/99d4d1a070870aa08163af8ce0522992b7f35d8c (6.17-rc3)
+CVE-2025-39698 [io_uring/futex: ensure io_futex_wait() cleans up properly on failure]
+ - linux 6.16.5-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/508c1314b342b78591f51c4b5dadee31a88335df (6.17-rc3)
+CVE-2025-39697 [NFS: Fix a race when updating an existing write]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/76d2e3890fb169168c73f2e4f8375c7cc24a765e (6.17-rc3)
+CVE-2025-39696 [ALSA: hda: tas2781: Fix wrong reference of tasdevice_priv]
+ - linux 6.16.5-1
+ [trixie] - linux <not-affected> (Vulnerable code not present)
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/3f4422e7c9436abf81a00270be7e4d6d3760ec0e (6.17-rc3)
+CVE-2025-39695 [RDMA/rxe: Flush delayed SKBs while releasing RXE resources]
+ - linux 6.16.5-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/3c3e9a9f2972b364e8c2cfbfdeb23c6d6be4f87f (6.17-rc3)
+CVE-2025-39694 [s390/sclp: Fix SCCB present check]
+ - linux 6.16.5-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/430fa71027b6ac9bb0ce5532b8d0676777d4219a (6.17-rc3)
+CVE-2025-39693 [drm/amd/display: Avoid a NULL pointer dereference]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/07b93a5704b0b72002f0c4bd1076214af67dc661 (6.17-rc3)
+CVE-2025-39692 [smb: server: split ksmbd_rdma_stop_listening() out of ksmbd_rdma_destroy()]
+ - linux 6.16.5-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/bac7b996d42e458a94578f4227795a0d4deef6fa (6.17-rc3)
+CVE-2025-39691 [fs/buffer: fix use-after-free when call bh_read() helper]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/7375f22495e7cd1c5b3b5af9dcc4f6dffe34ce49 (6.17-rc3)
+CVE-2025-39690 [iio: accel: sca3300: fix uninitialized iio scan data]
+ - linux 6.16.5-1
+ [trixie] - linux <not-affected> (Vulnerable code not present)
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/4e5b705cc6147f0b9173c6219079f41416bdd3c0 (6.17-rc3)
+CVE-2025-39689 [ftrace: Also allocate and copy hash for reading of filter files]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/bfb336cf97df7b37b2b2edec0f69773e06d11955 (6.17-rc3)
+CVE-2025-39687 [iio: light: as73211: Ensure buffer holes are zeroed]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/433b99e922943efdfd62b9a8e3ad1604838181f2 (6.17-rc3)
+CVE-2025-39686 [comedi: Make insn_rw_emulate_bits() do insn->n samples]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/7afba9221f70d4cbce0f417c558879cba0eb5e66 (6.17-rc3)
+CVE-2025-39685 [comedi: pcl726: Prevent invalid irq number]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/96cb948408b3adb69df7e451ba7da9d21f814d00 (6.17-rc3)
+CVE-2025-39684 [comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl()]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/3cd212e895ca2d58963fdc6422502b10dd3966bb (6.17-rc3)
+CVE-2025-39683 [tracing: Limit access to parser->buffer when trace_get_user failed]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/6a909ea83f226803ea0e718f6e88613df9234d58 (6.17-rc3)
+CVE-2025-39682 [tls: fix handling of zero-length records on the rx_list]
+ - linux 6.16.5-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/62708b9452f8eb77513115b17c4f8d1a22ebf843 (6.17-rc3)
+CVE-2025-39681 [x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/d8df126349dad855cdfedd6bbf315bad2e901c2f (6.17-rc3)
+CVE-2025-39680 [i2c: rtl9300: Fix out-of-bounds bug in rtl9300_i2c_smbus_xfer]
+ - linux 6.16.5-1
+ [trixie] - linux <not-affected> (Vulnerable code not present)
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/57f312b955938fc4663f430cb57a71f2414f601b (6.17-rc3)
+CVE-2025-39679 [drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor().]
+ - linux 6.16.5-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/bb8aeaa3191b617c6faf8ae937252e059673b7ea (6.17-rc3)
+CVE-2025-39678 [platform/x86/amd/hsmp: Ensure sock->metric_tbl_addr is non-NULL]
+ - linux 6.16.5-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/2c78fb287e1f430b929f2e49786518350d15605c (6.17-rc3)
+CVE-2025-39677 [net/sched: Fix backlog accounting in qdisc_dequeue_internal]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/52bf272636bda69587952b35ae97690b8dc89941 (6.17-rc3)
+CVE-2025-39676 [scsi: qla4xxx: Prevent a potential error pointer dereference]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/9dcf111dd3e7ed5fce82bb108e3a3fc001c07225 (6.17-rc3)
+CVE-2025-39675 [drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session()]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/7a2ca2ea64b1b63c8baa94a8f5deb70b2248d119 (6.17-rc3)
+CVE-2025-39674 [scsi: ufs: ufs-qcom: Fix ESI null pointer dereference]
+ - linux 6.16.5-1
+ [trixie] - linux <not-affected> (Vulnerable code not present)
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/6300d5c5438724c0876828da2f6e2c1a661871fc (6.17-rc3)
+CVE-2025-39673 [ppp: fix race conditions in ppp_fill_forward_path]
+ - linux 6.16.5-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/0417adf367a0af11adf7ace849af4638cfb573f7 (6.17-rc3)
+CVE-2025-38737 [cifs: Fix oops due to uninitialised variable]
+ - linux 6.16.5-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/453a6d2a68e54a483d67233c6e1e24c4095ee4be (6.17-rc3)
+CVE-2025-38736 [net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization]
+ - linux 6.16.5-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/24ef2f53c07f273bad99173e27ee88d44d135b1c (6.17-rc3)
+CVE-2025-38735 [gve: prevent ethtool ops after shutdown]
+ - linux 6.16.5-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/75a9a46d67f46d608205888f9b34e315c1786345 (6.17-rc3)
+CVE-2025-38734 [net/smc: fix UAF on smcsk after smc_listen_out()]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/d9cef55ed49117bd63695446fb84b4b91815c0b4 (6.17-rc3)
+CVE-2025-38733 [s390/mm: Do not map lowcore with identity mapping]
+ - linux 6.16.5-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/93f616ff870a1fb7e84d472cad0af651b18f9f87 (6.17-rc3)
+CVE-2025-38732 [netfilter: nf_reject: don't leak dst refcount for loopback packets]
+ - linux 6.16.5-1
+ NOTE: https://git.kernel.org/linus/91a79b792204313153e1bdbbe5acbfc28903b3a5 (6.17-rc3)
+CVE-2025-38731 [drm/xe: Fix vm_bind_ioctl double free bug]
+ - linux 6.16.5-1
+ [trixie] - linux <not-affected> (Vulnerable code not present)
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/111fb43a557726079a67ce3ab51f602ddbf7097e (6.17-rc3)
CVE-2025-9990 (The WordPress Helpdesk Integration plugin for WordPress is vulnerable ...)
NOT-FOR-US: WordPress plugin
CVE-2025-8944 (The OceanWP WordPress theme before 4.1.2 is vulnerable to an option up ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3d8bd1cb0eeb2134bd7994afe8a6bf88b5b3eec6
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3d8bd1cb0eeb2134bd7994afe8a6bf88b5b3eec6
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250905/a7c6a011/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list