Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: f1063f92 by Salvatore Bonaccorso at 2026-01-13T20:38:41+01:00 Merge Linux CVEs from kernel-sec - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,206 @@ +CVE-2025-68812 [media: iris: Add sanity check for stop streaming] + - linux 6.18.3-1 + [trixie] - linux <not-affected> (Vulnerable code not present) + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/ad699fa78b59241c9d71a8cafb51525f3dab04d4 (6.19-rc1) +CVE-2025-68807 [block: fix race between wbt_enable_default and IO submission] + - linux 6.18.3-1 + [trixie] - linux <not-affected> (Vulnerable code not present) + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/9869d3a6fed381f3b98404e26e1afc75d680cbf9 (6.19-rc2) +CVE-2025-68805 [fuse: fix io-uring list corruption for terminated non-committed requests] + - linux 6.18.3-1 + [trixie] - linux <not-affected> (Vulnerable code not present) + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/95c39eef7c2b666026c69ab5b30471da94ea2874 (6.19-rc1) +CVE-2025-68793 [drm/amdgpu: fix a job->pasid access race in gpu recovery] + - linux 6.18.3-1 + [trixie] - linux <not-affected> (Vulnerable code not present) + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/77f73253015cbc7893fca1821ac3eae9eb4bc943 (6.19-rc2) +CVE-2025-68791 [fuse: missing copy_finish in fuse-over-io-uring argument copies] + - linux 6.18.3-1 + [trixie] - linux <not-affected> (Vulnerable code not present) + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/6e0d7f7f4a43ac8868e98c87ecf48805aa8c24dd (6.19-rc1) +CVE-2025-68790 [net/mlx5: Fix double unregister of HCA_PORTS component] + - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/6a107cfe9c99a079e578a4c5eb70038101a3599f (6.19-rc2) +CVE-2025-68779 [net/mlx5e: Avoid unregistering PSP twice] + - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/35e93736f69963337912594eb3951ab320b77521 (6.19-rc2) +CVE-2025-68823 [ublk: fix deadlock when reading partition table] + - linux 6.18.3-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/c258f5c4502c9667bccf5d76fa731ab9c96687c1 (6.19-rc2) +CVE-2025-68822 [Input: alps - fix use-after-free bugs caused by dev3_register_work] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/bf40644ef8c8a288742fa45580897ed0e0289474 (6.19-rc2) +CVE-2025-68821 [fuse: fix readahead reclaim deadlock] + - linux 6.18.3-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/bd5603eaae0aabf527bfb3ce1bb07e979ce5bd50 (6.19-rc1) +CVE-2025-68820 [ext4: xattr: fix null pointer deref in ext4_raw_inode()] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/b97cb7d6a051aa6ebd57906df0e26e9e36c26d14 (6.19-rc1) +CVE-2025-68819 [media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg()] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/b91e6aafe8d356086cc621bc03e35ba2299e4788 (6.19-rc1) +CVE-2025-68818 [scsi: Revert "scsi: qla2xxx: Perform lockless command completion in abort path"] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/b57fbc88715b6d18f379463f48a15b560b087ffe (6.19-rc1) +CVE-2025-68817 [ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/b39a1833cc4a2755b02603eec3a71a85e9dff926 (6.19-rc1) +CVE-2025-68816 [net/mlx5: fw_tracer, Validate format string parameters] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/b35966042d20b14e2d83330049f77deec5229749 (6.19-rc2) +CVE-2025-68815 [net/sched: ets: Remove drr class from the active list if it changes to strict] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/b1e125ae425aba9b45252e933ca8df52a843ec70 (6.19-rc2) +CVE-2025-68814 [io_uring: fix filename leak in __io_openat_prep()] + - linux 6.18.3-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/b14fad555302a2104948feaff70503b64c80ac01 (6.19-rc3) +CVE-2025-68813 [ipvs: fix ipv4 null-ptr-deref in route error path] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/ad891bb3d079a46a821bf2b8867854645191bab0 (6.19-rc2) +CVE-2025-68811 [svcrdma: use rc_pageoff for memcpy byte offset] + - linux 6.18.3-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/a8ee9099f30654917aa68f55d707b5627e1dbf77 (6.19-rc3) +CVE-2025-68810 [KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot] + - linux 6.18.3-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/9935df5333aa503a18de5071f53762b65c783c4c (6.19-rc2) +CVE-2025-68809 [ksmbd: vfs: fix race on m_flags in vfs_cache] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/991f8a79db99b14c48d20d2052c82d65b9186cad (6.19-rc1) +CVE-2025-68808 [media: vidtv: initialize local pointers upon transfer of memory ownership] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/98aabfe2d79f74613abc2b0b1cef08f97eaf5322 (6.19-rc1) +CVE-2025-68806 [ksmbd: fix buffer validation by including null terminator size in EA length] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/95d7a890e4b03e198836d49d699408fd1867cb55 (6.19-rc2) +CVE-2025-68804 [platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/944edca81e7aea15f83cf9a13a6ab67f711e8abd (6.19-rc1) +CVE-2025-68803 [NFSD: NFSv4 file creation neglects setting ACL] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/913f7cf77bf14c13cfea70e89bcb6d0b22239562 (6.19-rc3) +CVE-2025-68802 [drm/xe: Limit num_syncs to prevent oversized allocations] + - linux 6.18.3-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/8e461304009135270e9ccf2d7e2dfe29daec9b60 (6.19-rc2) +CVE-2025-68801 [mlxsw: spectrum_router: Fix neighbour use-after-free] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/8b0e69763ef948fb872a7767df4be665d18f5fd4 (6.19-rc2) +CVE-2025-68800 [mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/8ac1dacec458f55f871f7153242ed6ab60373b90 (6.19-rc2) +CVE-2025-68799 [caif: fix integer underflow in cffrml_receive()] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/8a11ff0948b5ad09b71896b7ccc850625f9878d1 (6.19-rc2) +CVE-2025-68798 [perf/x86/amd: Check event before enable to avoid GPF] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/866cf36bfee4fba6a492d2dcc5133f857e3446b0 (6.19-rc1) +CVE-2025-68797 [char: applicom: fix NULL pointer dereference in ac_ioctl] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/82d12088c297fa1cef670e1718b3d24f414c23f7 (6.19-rc1) +CVE-2025-68796 [f2fs: fix to avoid updating zero-sized extent in extent cache] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/7c37c79510329cd951a4dedf3f7bf7e2b18dccec (6.19-rc1) +CVE-2025-68795 [ethtool: Avoid overflowing userspace buffer on stats query] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/7b07be1ff1cb6c49869910518650e8d0abc7d25f (6.19-rc2) +CVE-2025-68794 [iomap: adjust read range correctly for non-block-aligned positions] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/7aa6bc3e8766990824f66ca76c19596ce10daf3e (6.19-rc1) +CVE-2025-68792 [tpm2-sessions: Fix out of range indexing in name_size] + - linux 6.18.3-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/6e9722e9a7bfe1bbad649937c811076acf86e1fd (6.19-rc1) +CVE-2025-68789 [hwmon: (ibmpex) fix use-after-free in high/low store] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/6946c726c3f4c36f0f049e6f97e88c510b15f65d (6.19-rc2) +CVE-2025-68788 [fsnotify: do not generate ACCESS/MODIFY events on child for special files] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/635bc4def026a24e071436f4f356ea08c0eed6ff (6.19-rc2) +CVE-2025-68787 [netrom: Fix memory leak in nr_sendmsg()] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/613d12dd794e078be8ff3cf6b62a6b9acf7f4619 (6.19-rc2) +CVE-2025-68786 [ksmbd: skip lock-range check on equal size to avoid size==0 underflow] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/5d510ac31626ed157d2182149559430350cf2104 (6.19-rc1) +CVE-2025-68785 [net: openvswitch: fix middle attribute validation in push_nsh() action] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/5ace7ef87f059d68b5f50837ef3e8a1a4870c36e (6.19-rc2) +CVE-2025-68784 [xfs: fix a UAF problem in xattr repair] + - linux 6.18.3-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/5990fd756943836978ad184aac980e2b36ab7e01 (6.19-rc2) +CVE-2025-68783 [ALSA: usb-mixer: us16x08: validate meter packet indices] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/5526c1c6ba1d0913c7dfcbbd6fe1744ea7c55f1e (6.19-rc3) +CVE-2025-68782 [scsi: target: Reset t_task_cdb pointer in error case] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/5053eab38a4c4543522d0c320c639c56a8b59908 (6.19-rc1) +CVE-2025-68781 [usb: phy: fsl-usb: Fix use-after-free in delayed work during device removal] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/41ca62e3e21e48c2903b3b45e232cf4f2ff7434f (6.19-rc3) +CVE-2025-68780 [sched/deadline: only set free_cpus for online runqueues] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/382748c05e58a9f1935f5a653c352422375566ea (6.19-rc1) +CVE-2025-68778 [btrfs: don't log conflicting inode if it's a dir moved in the current transaction] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/266273eaf4d99475f1ae57f687b3e42bc71ec6f0 (6.19-rc2) +CVE-2025-68777 [Input: ti_am335x_tsc - fix off-by-one error in wire_order validation] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/248d3a73a0167dce15ba100477c3e778c4787178 (6.19-rc2) +CVE-2025-68776 [net/hsr: fix NULL pointer dereference in prp_get_untagged_frame()] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/188e0fa5a679570ea35474575e724d8211423d17 (6.19-rc2) +CVE-2025-68775 [net/handshake: duplicate handshake cancellations leak socket] + - linux 6.18.3-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/15564bd67e2975002f2a8e9defee33e321d3183f (6.19-rc2) +CVE-2025-68774 [hfsplus: fix missing hfs_bnode_get() in __hfs_bnode_create] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/152af114287851583cf7e0abc10129941f19466a (6.19-rc1) +CVE-2025-68773 [spi: fsl-cpm: Check length parity before switching to 16 bit mode] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/1417927df8049a0194933861e9b098669a95c762 (6.19-rc2) +CVE-2025-68772 [f2fs: fix to avoid updating compression context during writeback] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/10b591e7fb7cdc8c1e53e9c000dc0ef7069aaa76 (6.19-rc1) +CVE-2025-68771 [ocfs2: fix kernel BUG in ocfs2_find_victim_chain] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/039bef30e320827bac8990c9f29d2a68cd8adb5f (6.19-rc1) +CVE-2025-68770 [bnxt_en: Fix XDP_TX path] + - linux 6.18.3-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/0373d5c387f24de749cc22e694a14b3a7c7eb515 (6.19-rc2) +CVE-2025-68769 [f2fs: fix return value of f2fs_recover_fsync_data()] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/01fba45deaddcce0d0b01c411435d1acf6feab7b (6.19-rc1) +CVE-2025-68768 [inet: frags: flush pending skbs in fqdir_pre_exit()] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/006a5035b495dec008805df249f92c22c89c3d2e (6.19-rc2) +CVE-2025-68767 [hfsplus: Verify inode mode when loading from disk] + - linux 6.18.3-1 + NOTE: https://git.kernel.org/linus/005d4b0d33f6b4a23d382b7930f7a96b95b01f39 (6.19-rc1) CVE-2026-0892 - firefox <unfixed> NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2026-01/#CVE-2026-0892 View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f1063f92a152a7ff2c999cd5fb2c919a2b943ae1 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f1063f92a152a7ff2c999cd5fb2c919a2b943ae1 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list [email protected] https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
