Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
7c1f44dc by Salvatore Bonaccorso at 2026-01-25T18:03:29+01:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,84 @@
+CVE-2026-23013 [net: octeon_ep_vf: fix free_irq dev_id mismatch in IRQ 
rollback]
+       - linux <unfixed>
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/f93fc5d12d69012788f82151bee55fce937e1432 (6.19-rc6)
+CVE-2026-23012 [mm/damon/core: remove call_control in inactive contexts]
+       - linux <unfixed>
+       [trixie] - linux <not-affected> (Vulnerable code not present)
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/f9132fbc2e83baf2c45a77043672a63a675c9394 (6.19-rc6)
+CVE-2026-23011 [ipv4: ip_gre: make ipgre_header() robust]
+       - linux <unfixed>
+       NOTE: 
https://git.kernel.org/linus/e67c577d89894811ce4dcd1a9ed29d8b63476667 (6.19-rc6)
+CVE-2026-23010 [ipv6: Fix use-after-free in inet6_addr_del().]
+       - linux <unfixed>
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/ddf96c393a33aef4887e2e406c76c2f8cda1419c (6.19-rc6)
+CVE-2026-23009 [xhci: sideband: don't dereference freed ring when removing 
sideband endpoint]
+       - linux <unfixed>
+       [trixie] - linux <not-affected> (Vulnerable code not present)
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/dd83dc1249737b837ac5d57c81f2b0977c613d9f (6.19-rc6)
+CVE-2026-23008 [drm/vmwgfx: Fix KMS with 3D on HW version 10]
+       - linux <unfixed>
+       [trixie] - linux <not-affected> (Vulnerable code not present)
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/d9186faeae6efb7d0841a5e8eb213ff4c7966614 (6.19-rc6)
+CVE-2026-23007 [block: zero non-PI portion of auto integrity buffer]
+       - linux <unfixed>
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/ca22c566b89164f6e670af56ecc45f47ef3df819 (6.19-rc6)
+CVE-2026-23006 [ASoC: tlv320adcx140: fix null pointer]
+       - linux <unfixed>
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/be7664c81d3129fc313ef62ff275fd3d33cfecd4 (6.19-rc6)
+CVE-2026-23005 [x86/fpu: Clear XSTATE_BV[i] in guest XSAVE state whenever 
XFD[i]=1]
+       - linux <unfixed>
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/b45f721775947a84996deb5c661602254ce25ce6 (6.19-rc6)
+CVE-2026-23004 [dst: fix races in rt6_uncached_list_del() and 
rt_del_uncached_list()]
+       - linux <unfixed>
+       NOTE: 
https://git.kernel.org/linus/9a6f0c4d5796ab89b5a28a890ce542344d58bd69 (6.19-rc6)
+CVE-2026-23003 [ip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv()]
+       - linux <unfixed>
+       NOTE: 
https://git.kernel.org/linus/81c734dae203757fb3c9eee6f9896386940776bd (6.19-rc6)
+CVE-2026-23002 [lib/buildid: use __kernel_read() for sleepable context]
+       - linux <unfixed>
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/777a8560fd29738350c5094d4166fe5499452409 (6.19-rc6)
+CVE-2026-23001 [macvlan: fix possible UAF in macvlan_forward_source()]
+       - linux <unfixed>
+       NOTE: 
https://git.kernel.org/linus/7470a7a63dc162f07c26dbf960e41ee1e248d80e (6.19-rc6)
+CVE-2026-23000 [net/mlx5e: Fix crash on profile change rollback failure]
+       - linux <unfixed>
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/4dadc4077e3f77d6d31e199a925fc7a705e7adeb (6.19-rc6)
+CVE-2026-22999 [net/sched: sch_qfq: do not free existing class in 
qfq_change_class()]
+       - linux <unfixed>
+       NOTE: 
https://git.kernel.org/linus/3879cffd9d07aa0377c4b8835c4f64b4fb24ac78 (6.19-rc6)
+CVE-2026-22998 [nvme-tcp: fix NULL pointer dereferences in 
nvmet_tcp_build_pdu_iovec]
+       - linux <unfixed>
+       NOTE: 
https://git.kernel.org/linus/32b63acd78f577b332d976aa06b56e70d054cbba (6.19-rc6)
+CVE-2026-22997 [net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate 
session upon receiving the second rts]
+       - linux <unfixed>
+       NOTE: 
https://git.kernel.org/linus/1809c82aa073a11b7d335ae932d81ce51a588a4a (6.19-rc6)
+CVE-2026-22996 [net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv]
+       - linux <unfixed>
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/123eda2e5b1638e298e3a66bb1e64a8da92de5e1 (6.19-rc6)
+CVE-2025-71163 [dmaengine: idxd: fix device leaks on compat bind and unbind]
+       - linux <unfixed>
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/799900f01792cf8b525a44764f065f83fcafd468 (6.19-rc6)
+CVE-2025-71162 [dmaengine: tegra-adma: Fix use-after-free]
+       - linux <unfixed>
+       NOTE: 
https://git.kernel.org/linus/2efd07a7c36949e6fa36a69183df24d368bf9e96 (6.19-rc6)
 CVE-2025-6461 (The CubeWP \u2013 All-in-One Dynamic Content Framework plugin 
for Word ...)
        NOT-FOR-US: WordPress plugin
 CVE-2026-1302 (The Meta-box GalleryMeta plugin for WordPress is vulnerable to 
Stored  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7c1f44dc9985b27617ffacce6ca057fa81ebd472

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/7c1f44dc9985b27617ffacce6ca057fa81ebd472
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to