[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Jan 14 19:26:34 GMT 2026
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
91fea9e4 by Salvatore Bonaccorso at 2026-01-14T20:26:04+01:00
Merge Linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,89 @@
+CVE-2025-71124 [drm/msm/a6xx: move preempt_prepare_postamble after error check]
+ - linux 6.18.3-1
+ [trixie] - linux <not-affected> (Vulnerable code not present)
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/ef3b04091fd8bc737dc45312375df8625b8318e2 (6.19-rc3)
+CVE-2025-71110 [mm/slub: reset KASAN tag in defer_free() before accessing freed memory]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/53ca00a19d345197a37a1bf552e8d1e7b091666c (6.19-rc2)
+CVE-2025-71106 [fs: PM: Fix reverse check in filesystems_freeze_callback()]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/222047f68e8565c558728f792f6fef152a1d4d51 (6.19-rc1)
+CVE-2025-71103 [drm/msm: adreno: fix deferencing ifpc_reglist when not declared]
+ - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/129049d4fe22c998ae9fd1ec479fbb4ed5338c15 (6.19-rc3)
+CVE-2025-71126 [mptcp: avoid deadlock on fallback while reinjecting]
+ - linux 6.18.3-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/ffb8c27b0539dd90262d1021488e7817fae57c42 (6.19-rc2)
+CVE-2025-71125 [tracing: Do not register unsupported perf events]
+ - linux 6.18.3-1
+ NOTE: https://git.kernel.org/linus/ef7f38df890f5dcd2ae62f8dbde191d72f3bebae (6.19-rc2)
+CVE-2025-71123 [ext4: fix string copying in parse_apply_sb_mount_options()]
+ - linux 6.18.3-1
+ NOTE: https://git.kernel.org/linus/ee5a977b4e771cc181f39d504426dbd31ed701cc (6.19-rc1)
+CVE-2025-71122 [iommufd/selftest: Check for overflow in IOMMU_TEST_OP_ADD_RESERVED]
+ - linux 6.18.3-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/e6a973af11135439de32ece3b9cbe3bfc043bea8 (6.19-rc2)
+CVE-2025-71121 [parisc: Do not reprogram affinitiy on ASP chip]
+ - linux 6.18.3-1
+ NOTE: https://git.kernel.org/linus/dca7da244349eef4d78527cafc0bf80816b261f5 (6.19-rc1)
+CVE-2025-71120 [SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf]
+ - linux 6.18.3-1
+ NOTE: https://git.kernel.org/linus/d4b69a6186b215d2dc1ebcab965ed88e8d41768d (6.19-rc3)
+CVE-2025-71119 [powerpc/kexec: Enable SMT before waking offline CPUs]
+ - linux 6.18.3-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/c2296a1e42418556efbeb5636c4fa6aa6106713a (6.19-rc3)
+CVE-2025-71118 [ACPICA: Avoid walking the Namespace if start_node is NULL]
+ - linux 6.18.3-1
+ NOTE: https://git.kernel.org/linus/9d6c58dae8f6590c746ac5d0012ffe14a77539f0 (6.19-rc1)
+CVE-2025-71117 [block: Remove queue freezing from several sysfs store callbacks]
+ - linux 6.18.3-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/935a20d1bebf6236076785fac3ff81e3931834e9 (6.19-rc1)
+CVE-2025-71116 [libceph: make decode_pool() more resilient against corrupted osdmaps]
+ - linux 6.18.3-1
+ NOTE: https://git.kernel.org/linus/8c738512714e8c0aa18f8a10c072d5b01c83db39 (6.19-rc1)
+CVE-2025-71115 [um: init cpu_tasks[] earlier]
+ - linux 6.18.3-1
+ NOTE: https://git.kernel.org/linus/7b5d4416964c07c902163822a30a622111172b01 (6.19-rc1)
+CVE-2025-71114 [via_wdt: fix critical boot hang due to unnamed resource allocation]
+ - linux 6.18.3-1
+ NOTE: https://git.kernel.org/linus/7aa31ee9ec92915926e74731378c009c9cc04928 (6.19-rc1)
+CVE-2025-71113 [crypto: af_alg - zero initialize memory allocated via sock_kmalloc]
+ - linux 6.18.3-1
+ NOTE: https://git.kernel.org/linus/6f6e309328d53a10c0fe1f77dec2db73373179b6 (6.19-rc1)
+CVE-2025-71112 [net: hns3: add VLAN id validation before using]
+ - linux 6.18.3-1
+ NOTE: https://git.kernel.org/linus/6ef935e65902bfed53980ad2754b06a284ea8ac1 (6.19-rc2)
+CVE-2025-71111 [hwmon: (w83791d) Convert macros to functions to avoid TOCTOU]
+ - linux 6.18.3-1
+ NOTE: https://git.kernel.org/linus/670d7ef945d3a84683594429aea6ab2cdfa5ceb4 (6.19-rc1)
+CVE-2025-71109 [MIPS: ftrace: Fix memory corruption when kernel is located beyond 32 bits]
+ - linux 6.18.3-1
+ NOTE: https://git.kernel.org/linus/36dac9a3dda1f2bae343191bc16b910c603cac25 (6.19-rc1)
+CVE-2025-71108 [usb: typec: ucsi: Handle incorrect num_connectors capability]
+ - linux 6.18.3-1
+ NOTE: https://git.kernel.org/linus/30cd2cb1abf4c4acdb1ddb468c946f68939819fb (6.19-rc1)
+CVE-2025-71107 [f2fs: ensure node page reads complete before f2fs_put_super() finishes]
+ - linux 6.18.3-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/297baa4aa263ff8f5b3d246ee16a660d76aa82c4 (6.19-rc1)
+CVE-2025-71105 [f2fs: use global inline_xattr_slab instead of per-sb slab cache]
+ - linux 6.18.3-1
+ NOTE: https://git.kernel.org/linus/1f27ef42bb0b7c0740c5616ec577ec188b8a1d05 (6.19-rc1)
+CVE-2025-71104 [KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer]
+ - linux 6.18.3-1
+ NOTE: https://git.kernel.org/linus/18ab3fc8e880791aa9f7c000261320fc812b5465 (6.19-rc1)
+CVE-2025-71102 [scs: fix a wrong parameter in __scs_magic]
+ - linux 6.18.3-1
+ NOTE: https://git.kernel.org/linus/08bd4c46d5e63b78e77f2605283874bbe868ab19 (6.19-rc1)
CVE-2026-23478 (Cal.com is open-source scheduling software. From 3.1.6 to before 6.0.7 ...)
NOT-FOR-US: Cal.com
CVE-2026-22871 (GuardDog is a CLI tool to identify malicious PyPI packages. Prior to 2 ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/91fea9e44e64ff171c74c7c7a53daeb6960b0752
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/91fea9e44e64ff171c74c7c7a53daeb6960b0752
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260114/4a12120b/attachment.htm>
More information about the debian-security-tracker-commits
mailing list