Skip to content

Commit f2dd138

Browse files
authored
Merge pull request #309 from gthao313/advisories-20251110
advisories: Add BRSA for Kernel Kit 4.4.2
2 parents 84a0425 + 834d9a0 commit f2dd138

19 files changed

+326
-0
lines changed
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
[advisory]
2+
id = "BRSA-30yaohlr5esp"
3+
title = "kernel CVE-2025-39964"
4+
cve = "CVE-2025-39964"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.12"
10+
patched-version = "6.12.53"
11+
patched-epoch = "0"
12+
13+
[updateinfo]
14+
author = "tianhg"
15+
issue-date = 2025-10-28T18:38:50Z
16+
arches = ["x86_64", "aarch64"]
17+
version = "4.4.2"
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
[advisory]
2+
id = "BRSA-8svr36iabkzs"
3+
title = "Bottlerocket Kernel 6.12 Updates"
4+
severity = "high"
5+
description = "Kernel version 6.12.53 is now available with important fixes. All users must upgrade. Advisory information for kernel is often published after new kernels become available. Bottlerocket recommends that you consume the latest kernel release for your LTS version."
6+
7+
[[advisory.products]]
8+
package-name = "kernel-6.12"
9+
patched-version = "6.12.53"
10+
patched-epoch = "0"
11+
12+
[updateinfo]
13+
author = "tianhg"
14+
issue-date = 2025-10-28T18:38:50Z
15+
arches = ["x86_64", "aarch64"]
16+
version = "4.4.2"
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
[advisory]
2+
id = "BRSA-9rxz9dndwm0v"
3+
title = "kernel CVE-2025-39965"
4+
cve = "CVE-2025-39965"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: xfrm: xfrm_alloc_spi shouldn't use 0 as SPI"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.12"
10+
patched-version = "6.12.53"
11+
patched-epoch = "0"
12+
13+
[updateinfo]
14+
author = "tianhg"
15+
issue-date = 2025-10-28T18:38:50Z
16+
arches = ["x86_64", "aarch64"]
17+
version = "4.4.2"
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
[advisory]
2+
id = "BRSA-asdyj04knyha"
3+
title = "kernel CVE-2025-39998"
4+
cve = "CVE-2025-39998"
5+
severity = "high"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: scsi: target: target_core_configfs: Add length check to avoid buffer overflow"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.1"
10+
patched-version = "6.1.156"
11+
patched-epoch = "0"
12+
13+
[[advisory.products]]
14+
package-name = "kernel-6.12"
15+
patched-version = "6.12.53"
16+
patched-epoch = "0"
17+
18+
[updateinfo]
19+
author = "tianhg"
20+
issue-date = 2025-10-28T18:38:50Z
21+
arches = ["aarch64", "x86_64"]
22+
version = "4.4.2"
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
[advisory]
2+
id = "BRSA-bw9vtgq0xn3w"
3+
title = "kernel CVE-2025-39830"
4+
cve = "CVE-2025-39830"
5+
severity = "high"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.12"
10+
patched-version = "6.12.53"
11+
patched-epoch = "0"
12+
13+
[updateinfo]
14+
author = "tianhg"
15+
issue-date = 2025-10-28T18:38:50Z
16+
arches = ["aarch64", "x86_64"]
17+
version = "4.4.2"
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
[advisory]
2+
id = "BRSA-c5mvbcbh2eha"
3+
title = "kernel CVE-2025-39816"
4+
cve = "CVE-2025-39816"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.12"
10+
patched-version = "6.12.53"
11+
patched-epoch = "0"
12+
13+
[updateinfo]
14+
author = "tianhg"
15+
issue-date = 2025-10-28T18:38:50Z
16+
arches = ["x86_64", "aarch64"]
17+
version = "4.4.2"
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
[advisory]
2+
id = "BRSA-ceygfdsmh0ff"
3+
title = "kernel CVE-2025-39956"
4+
cve = "CVE-2025-39956"
5+
severity = "high"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: igc: don't fail igc_probe() on LED setup error"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.12"
10+
patched-version = "6.12.53"
11+
patched-epoch = "0"
12+
13+
[updateinfo]
14+
author = "tianhg"
15+
issue-date = 2025-10-28T18:38:50Z
16+
arches = ["x86_64", "aarch64"]
17+
version = "4.4.2"
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
[advisory]
2+
id = "BRSA-cybqpduec2kv"
3+
title = "kernel CVE-2025-39953"
4+
cve = "CVE-2025-39953"
5+
severity = "moderate"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: cgroup: split cgroup_destroy_wq into 3 workqueues"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.12"
10+
patched-version = "6.12.53"
11+
patched-epoch = "0"
12+
13+
[updateinfo]
14+
author = "tianhg"
15+
issue-date = 2025-10-28T18:38:50Z
16+
arches = ["x86_64", "aarch64"]
17+
version = "4.4.2"
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
[advisory]
2+
id = "BRSA-f6fhsdtysulq"
3+
title = "kernel CVE-2025-39946"
4+
cve = "CVE-2025-39946"
5+
severity = "high"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: tls: make sure to abort the stream if headers are bogus"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.12"
10+
patched-version = "6.12.53"
11+
patched-epoch = "0"
12+
13+
[updateinfo]
14+
author = "tianhg"
15+
issue-date = 2025-10-28T18:38:50Z
16+
arches = ["x86_64", "aarch64"]
17+
version = "4.4.2"
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
[advisory]
2+
id = "BRSA-iaiukcad9pc0"
3+
title = "kernel CVE-2025-39947"
4+
cve = "CVE-2025-39947"
5+
severity = "high"
6+
description = "In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Harden uplink netdev access against device unbind"
7+
8+
[[advisory.products]]
9+
package-name = "kernel-6.12"
10+
patched-version = "6.12.53"
11+
patched-epoch = "0"
12+
13+
[updateinfo]
14+
author = "tianhg"
15+
issue-date = 2025-10-28T18:38:50Z
16+
arches = ["aarch64", "x86_64"]
17+
version = "4.4.2"

0 commit comments

Comments
 (0)