Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 95b1f565 by Salvatore Bonaccorso at 2025-09-19T21:43:00+02:00 Merge Linux CVEs from kernel-sec - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,123 @@ +CVE-2025-39866 [fs: writeback: fix use-after-free in __mark_inode_dirty()] + - linux 6.16.6-1 + NOTE: https://git.kernel.org/linus/d02d2c98d25793902f65803ab853b592c7a96b29 (6.17-rc3) +CVE-2025-39865 [tee: fix NULL pointer dereference in tee_shm_put] + - linux 6.16.6-1 + NOTE: https://git.kernel.org/linus/e4a718a3a47e89805c3be9d46a84de1949a98d5d (6.17-rc5) +CVE-2025-39864 [wifi: cfg80211: fix use-after-free in cmp_bss()] + - linux 6.16.6-1 + NOTE: https://git.kernel.org/linus/26e84445f02ce6b2fe5f3e0e28ff7add77f35e08 (6.17-rc5) +CVE-2025-39863 [wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work] + - linux 6.16.6-1 + NOTE: https://git.kernel.org/linus/9cb83d4be0b9b697eae93d321e0da999f9cdfcfc (6.17-rc5) +CVE-2025-39862 [wifi: mt76: mt7915: fix list corruption after hardware restart] + - linux 6.16.6-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/065c79df595af21d6d1b27d642860faa1d938774 (6.17-rc5) +CVE-2025-39861 [Bluetooth: vhci: Prevent use-after-free by removing debugfs files early] + - linux 6.16.6-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/28010791193a4503f054e8d69a950ef815deb539 (6.17-rc5) +CVE-2025-39860 [Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()] + - linux 6.16.6-1 + NOTE: https://git.kernel.org/linus/862c628108562d8c7a516a900034823b381d3cba (6.17-rc5) +CVE-2025-39859 [ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog] + - linux 6.16.6-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/8bf935cf789872350b04c1a6468b0a509f67afb2 (6.17-rc5) +CVE-2025-39858 [eth: mlx4: Fix IS_ERR() vs NULL check bug in mlx4_en_create_rx_ring] + - linux 6.16.6-1 + [trixie] - linux <not-affected> (Vulnerable code not present) + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/e580beaf43d563aaf457f1c7f934002355ebfe7b (6.17-rc5) +CVE-2025-39857 [net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync()] + - linux 6.16.6-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/ba1e9421cf1a8369d25c3832439702a015d6b5f9 (6.17-rc5) +CVE-2025-39856 [net: ethernet: ti: am65-cpsw-nuss: Fix null pointer dereference for ndev] + - linux 6.16.6-1 + [trixie] - linux <not-affected> (Vulnerable code not present) + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/a6099f263e1f408bcc7913c9df24b0677164fc5d (6.17-rc5) +CVE-2025-39855 [ice: fix NULL access of tx->in_use in ice_ptp_ts_irq] + - linux 6.16.6-1 + [trixie] - linux <not-affected> (Vulnerable code not present) + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/403bf043d9340196e06769065169df7444b91f7a (6.17-rc5) +CVE-2025-39854 [ice: fix NULL access of tx->in_use in ice_ll_ts_intr] + - linux 6.16.6-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/f6486338fde3f04ed0ec59fe67a69a208c32734f (6.17-rc5) +CVE-2025-39853 [i40e: Fix potential invalid access when MAC list is empty] + - linux 6.16.6-1 + NOTE: https://git.kernel.org/linus/a556f06338e1d5a85af0e32ecb46e365547f92b9 (6.17-rc5) +CVE-2025-39852 [net/tcp: Fix socket memory leak in TCP-AO failure handling for IPv6] + - linux 6.16.6-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/fa390321aba0a54d0f7ae95ee4ecde1358bb9234 (6.17-rc5) +CVE-2025-39851 [vxlan: Fix NPD when refreshing an FDB entry with a nexthop object] + - linux 6.16.6-1 + NOTE: https://git.kernel.org/linus/6ead38147ebb813f08be6ea8ef547a0e4c09559a (6.17-rc5) +CVE-2025-39850 [vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects] + - linux 6.16.6-1 + NOTE: https://git.kernel.org/linus/1f5d2fd1ca04a23c18b1bde9a43ce2fa2ffa1bce (6.17-rc5) +CVE-2025-39849 [wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()] + - linux 6.16.6-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/62b635dcd69c4fde7ce1de4992d71420a37e51e3 (6.17-rc5) +CVE-2025-39848 [ax25: properly unshare skbs in ax25_kiss_rcv()] + - linux 6.16.6-1 + NOTE: https://git.kernel.org/linus/8156210d36a43e76372312c87eb5ea3dbb405a85 (6.17-rc5) +CVE-2025-39847 [ppp: fix memory leak in pad_compress_skb] + - linux 6.16.6-1 + NOTE: https://git.kernel.org/linus/4844123fe0b853a4982c02666cb3fd863d701d50 (6.17-rc5) +CVE-2025-39846 [pcmcia: Fix a NULL pointer dereference in __iodyn_find_io_region()] + - linux 6.16.6-1 + NOTE: https://git.kernel.org/linus/44822df89e8f3386871d9cad563ece8e2fd8f0e7 (6.17-rc5) +CVE-2025-39845 [x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings()] + - linux 6.16.6-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/6659d027998083fbb6d42a165b0c90dc2e8ba989 (6.17-rc5) +CVE-2025-39844 [mm: move page table sync declarations to linux/pgtable.h] + - linux 6.16.6-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/7cc183f2e67d19b03ee5c13a6664b8c6cc37ff9d (6.17-rc5) +CVE-2025-39843 [mm: slub: avoid wake up kswapd in set_track_prepare] + - linux 6.16.6-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/850470a8413a8a78e772c4f6bd9fe81ec6bd5b0f (6.17-rc5) +CVE-2025-39842 [ocfs2: prevent release journal inode after journal shutdown] + - linux 6.16.6-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/f46e8ef8bb7b452584f2e75337b619ac51a7cadf (6.17-rc5) +CVE-2025-39841 [scsi: lpfc: Fix buffer free/clear order in deferred receive path] + - linux 6.16.6-1 + NOTE: https://git.kernel.org/linus/9dba9a45c348e8460da97c450cddf70b2056deb3 (6.17-rc5) +CVE-2025-39840 [audit: fix out-of-bounds read in audit_compare_dname_path()] + - linux 6.16.6-1 + [trixie] - linux <not-affected> (Vulnerable code not present) + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/4540f1d23e7f387880ce46d11b5cd3f27248bf8d (6.17-rc5) +CVE-2025-39839 [batman-adv: fix OOB read/write in network-coding decode] + - linux 6.16.6-1 + NOTE: https://git.kernel.org/linus/d77b6ff0ce35a6d0b0b7b9581bc3f76d041d4087 (6.17-rc5) +CVE-2025-39838 [cifs: prevent NULL pointer dereference in UTF16 conversion] + - linux 6.16.6-1 + NOTE: https://git.kernel.org/linus/70bccd9855dae56942f2b18a08ba137bb54093a0 (6.17-rc5) +CVE-2025-39837 [platform/x86: asus-wmi: Fix racy registrations] + - linux 6.16.6-1 + [trixie] - linux <not-affected> (Vulnerable code not present) + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/5549202b9c02c2ecbc8634768a3da8d9e82d548d (6.17-rc5) CVE-2025-9909 NOT-FOR-US: Red Hat Ansible Automation Platform CVE-2025-9908 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/95b1f56592d0340e199676c9c8d4be913476884e -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/95b1f56592d0340e199676c9c8d4be913476884e You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list [email protected] https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
