[Git][security-tracker-team/security-tracker][master] Sync some Linux CVEs with kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Sep 9 22:02:55 BST 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
5dde6778 by Salvatore Bonaccorso at 2025-09-09T23:01:26+02:00
Sync some Linux CVEs with kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -2101,6 +2101,7 @@ CVE-2025-38697 (In the Linux kernel, the following vulnerability has been resolv
CVE-2025-38696 (In the Linux kernel, the following vulnerability has been resolved: M ...)
- linux 6.16.3-1
[trixie] - linux 6.12.43-1
+ [bullseye] - linux <ignored> (mips* not supported in LTS)
NOTE: https://git.kernel.org/linus/e9f4a6b3421e936c3ee9d74710243897d74dbaa2 (6.17-rc1)
CVE-2025-38695 (In the Linux kernel, the following vulnerability has been resolved: s ...)
- linux 6.16.3-1
@@ -5609,6 +5610,7 @@ CVE-2025-38630 (In the Linux kernel, the following vulnerability has been resolv
- linux 6.16.3-1
[trixie] - linux 6.12.43-1
[bookworm] - linux 6.1.148-1
+ [bullseye] - linux <ignored> (armel not supported in LTS)
NOTE: https://git.kernel.org/linus/da11e6a30e0bb8e911288bdc443b3dc8f6a7cac7 (6.17-rc1)
CVE-2025-38629 (In the Linux kernel, the following vulnerability has been resolved: A ...)
- linux <not-affected> (Vulnerable code not present)
@@ -5637,11 +5639,13 @@ CVE-2025-38624 (In the Linux kernel, the following vulnerability has been resolv
- linux 6.16.3-1
[trixie] - linux 6.12.43-1
[bookworm] - linux 6.1.148-1
+ [bullseye] - linux <ignored> (ppc64el not supported in LTS)
NOTE: https://git.kernel.org/linus/4668619092554e1b95c9a5ac2941ca47ba6d548a (6.17-rc1)
CVE-2025-38623 (In the Linux kernel, the following vulnerability has been resolved: P ...)
- linux 6.16.3-1
[trixie] - linux 6.12.43-1
[bookworm] - linux 6.1.148-1
+ [bullseye] - linux <ignored> (ppc64el not supported in LTS)
NOTE: https://git.kernel.org/linus/a2a2a6fc2469524caa713036297c542746d148dc (6.17-rc1)
CVE-2025-38622 (In the Linux kernel, the following vulnerability has been resolved: n ...)
- linux 6.16.3-1
@@ -7008,6 +7012,7 @@ CVE-2025-38576 (In the Linux kernel, the following vulnerability has been resolv
- linux 6.16.3-1
[trixie] - linux 6.12.43-1
[bookworm] - linux 6.1.148-1
+ [bullseye] - linux <ignored> (ppc64el not supported in LTS)
NOTE: https://git.kernel.org/linus/1010b4c012b0d78dfb9d3132b49aa2ef024a07a7 (6.17-rc1)
CVE-2025-38574 (In the Linux kernel, the following vulnerability has been resolved: p ...)
- linux 6.16.3-1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5dde6778d1b5eb23f53ba9d3797950b2bc8871c6
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5dde6778d1b5eb23f53ba9d3797950b2bc8871c6
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250909/c911b9a7/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list