Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5fca5aff by Salvatore Bonaccorso at 2025-11-12T14:18:19+01:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,221 @@
+CVE-2025-40158 [ipv6: use RCU in ip6_output()]
+       - linux 6.17.6-1
+       NOTE: 
https://git.kernel.org/linus/11709573cc4e48dc34c80fc7ab9ce5b159e29695 (6.18-rc1)
+CVE-2025-40157 [EDAC/i10nm: Skip DIMM enumeration on a disabled memory 
controller]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/2e6fe1bbefd9c059c3787d1c620fe67343a94dff (6.18-rc1)
+CVE-2025-40156 [PM / devfreq: mtk-cci: Fix potential error pointer dereference 
in probe()]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/fc33bf0e097c6834646b98a7b3da0ae5b617f0f9 (6.18-rc1)
+CVE-2025-40155 [iommu/vt-d: debugfs: Fix legacy mode page table dump logic]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/fbe6070c73badca726e4ff7877320e6c62339917 (6.18-rc1)
+CVE-2025-40154 [ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       NOTE: 
https://git.kernel.org/linus/fba404e4b4af4f4f747bb0e41e9fff7d03c7bcc0 (6.18-rc1)
+CVE-2025-40153 [mm: hugetlb: avoid soft lockup when mprotect to large memory 
area]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       NOTE: 
https://git.kernel.org/linus/f52ce0ea90c83a28904c7cc203a70e6434adfecb (6.18-rc1)
+CVE-2025-40152 [drm/msm: Fix bootup splat with separate_gpu_drm modparam]
+       - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/f028bcafb6dfb4c2bb656cbff9e6a66222d3d3d7 (6.18-rc1)
+CVE-2025-40151 [LoongArch: BPF: No support of struct argument in trampoline 
programs]
+       - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/e82406c7cbdd368c5459b8a45e118811d2ba0794 (6.18-rc1)
+CVE-2025-40150 [f2fs: fix to avoid migrating empty section]
+       - linux 6.17.6-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/d625a2b08c089397d3a03bff13fa8645e4ec7a01 (6.18-rc1)
+CVE-2025-40149 [tls: Use __sk_dst_get() and dst_dev_rcu() in 
get_netdev_for_sock().]
+       - linux 6.17.6-1
+       NOTE: 
https://git.kernel.org/linus/c65f27b9c3be2269918e1cbad6d8884741f835c5 (6.18-rc1)
+CVE-2025-40148 [drm/amd/display: Add NULL pointer checks in dc_stream cursor 
attribute functions]
+       - linux 6.17.6-1
+       [trixie] - linux <not-affected> (Vulnerable code not present)
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/bf4e4b97d0fdc66f04fc19d807e24dd8421b8f11 (6.18-rc1)
+CVE-2025-40147 [blk-throttle: fix access race during throttle policy 
activation]
+       - linux 6.17.6-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/bd9fd5be6bc0836820500f68fff144609fbd85a9 (6.18-rc1)
+CVE-2025-40146 [blk-mq: fix potential deadlock while nr_requests grown]
+       - linux 6.17.6-1
+       NOTE: 
https://git.kernel.org/linus/b86433721f46d934940528f28d49c1dedb690df1 (6.18-rc1)
+CVE-2025-40145 [PCI/pwrctrl: Fix double cleanup on devm_add_action_or_reset() 
failure]
+       - linux 6.17.6-1
+       [trixie] - linux <not-affected> (Vulnerable code not present)
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/ab81f2f79c683c94bac622aafafbe8232e547159 (6.18-rc1)
+CVE-2025-40144 [nvdimm: ndtest: Return -ENOMEM if devm_kcalloc() fails in 
ndtest_probe()]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/a9e6aa994917ee602798bbb03180a194b37865bb (6.18-rc1)
+CVE-2025-40143 [bpf: dont report verifier bug for missing bpf_scc_visit on 
speculative path]
+       - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/a3c73d629ea1373af3c0c954d41fd1af555492e3 (6.18-rc1)
+CVE-2025-40142 [ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() 
on PREEMPT_RT]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/9fc4a3da9a0259a0500848b5d8657918efde176b (6.18-rc1)
+CVE-2025-40141 [Bluetooth: ISO: Fix possible UAF on iso_conn_free]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/9950f095d6c875dbe0c9ebfcf972ec88fdf26fc8 (6.18-rc1)
+CVE-2025-40140 [net: usb: Remove disruptive netif_wake_queue in 
rtl8150_set_multicast]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       NOTE: 
https://git.kernel.org/linus/958baf5eaee394e5fd976979b0791a875f14a179 (6.18-rc1)
+CVE-2025-40139 [smc: Use __sk_dst_get() and dst_dev_rcu() in in 
smc_clc_prfx_set().]
+       - linux 6.17.6-1
+       NOTE: 
https://git.kernel.org/linus/935d783e5de9b64587f3adb25641dd8385e64ddb (6.18-rc1)
+CVE-2025-40138 [f2fs: fix to avoid NULL pointer dereference in 
f2fs_check_quota_consistency()]
+       - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/930a9a6ee8e7ffa20af4bffbfc2bbd21d83bf81c (6.18-rc1)
+CVE-2025-40137 [f2fs: fix to truncate first page in error path of 
f2fs_truncate()]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       NOTE: 
https://git.kernel.org/linus/9251a9e6e871cb03c4714a18efa8f5d4a8818450 (6.18-rc1)
+CVE-2025-40136 [crypto: hisilicon/qm - request reserved interrupt for virtual 
function]
+       - linux 6.17.6-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/9228facb308157ac0bdd264b873187896f7a9c7a (6.18-rc1)
+CVE-2025-40135 [ipv6: use RCU in ip6_xmit()]
+       - linux 6.17.6-1
+       NOTE: 
https://git.kernel.org/linus/9085e56501d93af9f2d7bd16f7fcfacdde47b99c (6.18-rc1)
+CVE-2025-40134 [dm: fix NULL pointer dereference in __dm_suspend()]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       NOTE: 
https://git.kernel.org/linus/8d33a030c566e1f105cd5bf27f37940b6367f3be (6.18-rc1)
+CVE-2025-40133 [mptcp: Use __sk_dst_get() and dst_dev_rcu() in 
mptcp_active_enable().]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/893c49a78d9f85e4b8081b908fb7c407d018106a (6.18-rc1)
+CVE-2025-40132 [ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar 
callback]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/87cab86925b7fa4c1c977bc191ac549a3b23f0ea (6.18-rc1)
+CVE-2025-40131 [wifi: ath12k: Fix peer lookup in 
ath12k_dp_mon_rx_deliver_msdu()]
+       - linux 6.17.6-1
+       [trixie] - linux <not-affected> (Vulnerable code not present)
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/7ca61ed8b3f3fc9a7decd68039cb1d7d1238c566 (6.18-rc1)
+CVE-2025-40130 [scsi: ufs: core: Fix data race in CPU latency PM QoS request 
handling]
+       - linux 6.17.6-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/79dde5f7dc7c038eec903745dc1550cd4139980e (6.18-rc1)
+CVE-2025-40129 [sunrpc: fix null pointer dereference on zero-length checksum]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/6df164e29bd4e6505c5a2e0e5f1e1f6957a16a42 (6.18-rc1)
+CVE-2025-40128 [btrfs: fix symbolic link reading when bs > ps]
+       - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/67378b754608a3524d125bfa5744508a49fe48be (6.18-rc1)
+CVE-2025-40127 [hwrng: ks-sa - fix division by zero in ks_sa_rng_init]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       NOTE: 
https://git.kernel.org/linus/612b1dfeb414dfa780a6316014ceddf9a74ff5c0 (6.18-rc1)
+CVE-2025-40126 [sparc: fix accurate exception reporting in copy_{from_to}_user 
for UltraSPARC]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       NOTE: 
https://git.kernel.org/linus/4fba1713001195e59cfc001ff1f2837dab877efb (6.18-rc1)
+CVE-2025-40125 [blk-mq: check kobject state_in_sysfs before deleting in 
blk_mq_unregister_hctx]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       NOTE: 
https://git.kernel.org/linus/4c7ef92f6d4d08a27d676e4c348f4e2922cab3ed (6.18-rc1)
+CVE-2025-40124 [sparc: fix accurate exception reporting in copy_{from_to}_user 
for UltraSPARC III]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       NOTE: 
https://git.kernel.org/linus/47b49c06eb62504075f0f2e2227aee2e2c2a58b3 (6.18-rc1)
+CVE-2025-40123 [bpf: Enforce expected_attach_type for tailcall compatibility]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       NOTE: 
https://git.kernel.org/linus/4540aed51b12bc13364149bf95f6ecef013197c0 (6.18-rc1)
+CVE-2025-40122 [perf/x86/intel: Fix IA32_PMC_x_CFG_B MSRs access error]
+       - linux 6.17.6-1
+       [trixie] - linux <not-affected> (Vulnerable code not present)
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/43796f30507802d93ead2dc44fc9637f34671a89 (6.18-rc1)
+CVE-2025-40121 [ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       NOTE: 
https://git.kernel.org/linus/4336efb59ef364e691ef829a73d9dbd4d5ed7c7b (6.18-rc1)
+CVE-2025-40120 [net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL 
deadlock]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/3d3c4cd5c62f24bb3cb4511b7a95df707635e00a (6.18-rc1)
+CVE-2025-40119 [ext4: fix potential null deref in ext4_mb_init()]
+       - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/3c3fac6bc0a9c00dbe65d8dc0d3a282afe4d3188 (6.18-rc1)
+CVE-2025-40118 [scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       NOTE: 
https://git.kernel.org/linus/251be2f6037fb7ab399f68cd7428ff274133d693 (6.18-rc1)
+CVE-2025-40117 [misc: pci_endpoint_test: Fix array underflow in 
pci_endpoint_test_ioctl()]
+       - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/1ad82f9db13d85667366044acdfb02009d576c5a (6.18-rc1)
+CVE-2025-40116 [usb: host: max3421-hcd: Fix error pointer dereference in probe 
cleanup]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       NOTE: 
https://git.kernel.org/linus/186e8f2bdba551f3ae23396caccd452d985c23e3 (6.18-rc1)
+CVE-2025-40115 [scsi: mpt3sas: Fix crash in transport port remove by using 
ioc_info()]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       NOTE: 
https://git.kernel.org/linus/1703fe4f8ae50d1fb6449854e1fcaed1053e3a14 (6.18-rc1)
+CVE-2025-40113 [remoteproc: qcom: pas: Shutdown lite ADSP DTB on X1E]
+       - linux 6.17.6-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/142964960c7c35de5c5f7bdd61c32699de693630 (6.18-rc1)
+CVE-2025-40112 [sparc: fix accurate exception reporting in copy_{from_to}_user 
for Niagara]
+       - linux 6.17.6-1
+       [trixie] - linux 6.12.57-1
+       [bookworm] - linux 6.1.158-1
+       NOTE: 
https://git.kernel.org/linus/0b67c8fc10b13a9090340c5f8a37d308f4e1571c (6.18-rc1)
 CVE-2025-13042
        - chromium 142.0.7444.162-1
        [bullseye] - chromium <end-of-life> (see #1061268)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5fca5aff9cf1a48beb8449c2b17f5316d506114b

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5fca5aff9cf1a48beb8449c2b17f5316d506114b
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to