Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 6637cc4e by Salvatore Bonaccorso at 2025-03-27T20:09:07+01:00 Merge Linux CVEs from kernel-sec - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,94 @@ +CVE-2025-21892 [RDMA/mlx5: Fix the recovery flow of the UMR QP] + - linux 6.12.19-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/d97505baea64d93538b16baf14ce7b8c1fbad746 (6.14-rc5) +CVE-2025-21891 [ipvlan: ensure network headers are in skb linear part] + - linux 6.12.19-1 + NOTE: https://git.kernel.org/linus/27843ce6ba3d3122b65066550fe33fb8839f8aef (6.14-rc5) +CVE-2025-21890 [idpf: fix checksums set in idpf_rx_rsc()] + - linux 6.12.19-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/674fcb4f4a7e3e277417a01788cc6daae47c3804 (6.14-rc5) +CVE-2025-21889 [perf/core: Add RCU read lock protection to perf_iterate_ctx()] + - linux 6.12.19-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/0fe8813baf4b2e865d3b2c735ce1a15b86002c74 (6.14-rc5) +CVE-2025-21888 [RDMA/mlx5: Fix a WARN during dereg_mr for DM type] + - linux 6.12.19-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/abc7b3f1f056d69a8f11d6dceecc0c9549ace770 (6.14-rc5) +CVE-2025-21887 [ovl: fix UAF in ovl_dentry_update_reval by moving dput() in ovl_link_up] + - linux 6.12.19-1 + NOTE: https://git.kernel.org/linus/c84e125fff2615b4d9c259e762596134eddd2f27 (6.14-rc5) +CVE-2025-21886 [RDMA/mlx5: Fix implicit ODP hang on parent deregistration] + - linux 6.12.19-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/3d8c6f26893d55fab218ad086719de1fc9bb86ba (6.14-rc5) +CVE-2025-21885 [RDMA/bnxt_re: Fix the page details for the srq created by kernel consumers] + - linux 6.12.19-1 + NOTE: https://git.kernel.org/linus/b66535356a4834a234f99e16a97eb51f2c6c5a7d (6.14-rc5) +CVE-2025-21884 [net: better track kernel sockets lifetime] + - linux <unfixed> + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/5c70eb5c593d64d93b178905da215a9fd288a4b5 (6.14-rc5) +CVE-2025-21883 [ice: Fix deinitializing VF in error path] + - linux 6.12.19-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/79990cf5e7aded76d0c092c9f5ed31eb1c75e02c (6.14-rc5) +CVE-2025-21882 [net/mlx5: Fix vport QoS cleanup on error] + - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/7f3528f7d2f98b70e19a6bb7b130fc82c079ac54 (6.14-rc5) +CVE-2025-21881 [uprobes: Reject the shared zeropage in uprobe_write_opcode()] + - linux 6.12.19-1 + NOTE: https://git.kernel.org/linus/bddf10d26e6e5114e7415a0e442ec6f51a559468 (6.14-rc5) +CVE-2025-21880 [drm/xe/userptr: fix EFAULT handling] + - linux 6.12.19-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/a9f4fa3a7efa65615ff7db13023ac84516e99e21 (6.14-rc5) +CVE-2025-21879 [btrfs: fix use-after-free on inode when scanning root during em shrinking] + - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/59f37036bb7ab3d554c24abc856aabca01126414 (6.14-rc5) +CVE-2025-21878 [i2c: npcm: disable interrupt enable bit before devm_request_irq] + - linux 6.12.19-1 + NOTE: https://git.kernel.org/linus/dd1998e243f5fa25d348a384ba0b6c84d980f2b2 (6.14-rc5) +CVE-2025-21877 [usbnet: gl620a: fix endpoint checking in genelink_bind()] + - linux 6.12.19-1 + NOTE: https://git.kernel.org/linus/1cf9631d836b289bd5490776551961c883ae8a4f (6.14-rc5) +CVE-2025-21876 [iommu/vt-d: Fix suspicious RCU usage] + - linux 6.12.19-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/b150654f74bf0df8e6a7936d5ec51400d9ec06d8 (6.14-rc5) +CVE-2025-21875 [mptcp: always handle address removal under msk socket lock] + - linux 6.12.19-1 + NOTE: https://git.kernel.org/linus/f865c24bc55158313d5779fc81116023a6940ca3 (6.14-rc5) +CVE-2025-21874 [dm-integrity: Avoid divide by zero in table status in Inline mode] + - linux 6.12.19-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/7fb39882b20c98a9a393c244c86b56ef6933cff8 (6.14-rc5) +CVE-2025-21873 [scsi: ufs: core: bsg: Fix crash when arpmb command fails] + - linux 6.12.19-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/f27a95845b01e86d67c8b014b4f41bd3327daa63 (6.14-rc5) +CVE-2025-21872 [efi: Don't map the entire mokvar table to determine its size] + - linux 6.12.19-1 + NOTE: https://git.kernel.org/linus/2b90e7ace79774a3540ce569e000388f8d22c9e0 (6.14-rc5) +CVE-2024-58091 [drm/fbdev-dma: Add shadow buffering for deferred I/O] + - linux <unfixed> + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/3603996432997f7c88da37a97062a46cda01ac9d (6.14-rc5) +CVE-2024-58090 [sched/core: Prevent rescheduling when interrupts are disabled] + - linux 6.12.19-1 + NOTE: https://git.kernel.org/linus/82c387ef7568c0d96a918a5a78d9cad6256cfa15 (6.14-rc5) CVE-2025-21871 [tee: optee: Fix supplicant wait loop] - linux 6.12.17-1 NOTE: https://git.kernel.org/linus/70b0d6b0a199c5a3ee6c72f5e61681ed6f759612 (6.14-rc4) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6637cc4eacc42839150bfdcd186403086dd8b047 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6637cc4eacc42839150bfdcd186403086dd8b047 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list [email protected] https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
