Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
a3fabc8d by Salvatore Bonaccorso at 2026-02-04T17:33:39+01:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,48 @@
+CVE-2026-23052 [ftrace: Do not over-allocate ftrace memory]
+       - linux 6.18.8-1
+       [trixie] - linux <not-affected> (Vulnerable code not present)
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/be55257fab181b93af38f8c4b1b3cb453a78d742 (6.19-rc6)
+CVE-2026-23051 [drm/amdgpu: fix drm panic null pointer when driver not support 
atomic]
+       - linux 6.18.8-1
+       [trixie] - linux <not-affected> (Vulnerable code not present)
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/9cb6278b44c38899961b36d303d7b18b38be2a6e (6.19-rc6)
+CVE-2026-23055 [i2c: riic: Move suspend handling to NOIRQ phase]
+       - linux 6.18.8-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/e383f0961422f983451ac4dd6aed1a3d3311f2be (6.19-rc6)
+CVE-2026-23054 [net: hv_netvsc: reject RSS hash key programming without RX 
indirection table]
+       - linux 6.18.8-1
+       NOTE: 
https://git.kernel.org/linus/d23564955811da493f34412d7de60fa268c8cb50 (6.19-rc6)
+CVE-2026-23053 [NFS: Fix a deadlock involving nfs_release_folio()]
+       - linux 6.18.8-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/cce0be6eb4971456b703aaeafd571650d314bcca (6.19-rc6)
+CVE-2026-23050 [pNFS: Fix a deadlock when returning a delegation during open()]
+       - linux 6.18.8-1
+       NOTE: 
https://git.kernel.org/linus/857bf9056291a16785ae3be1d291026b2437fc48 (6.19-rc6)
+CVE-2026-23049 [drm/panel-simple: fix connector type for DataImage 
SCF0700C48GGU18 panel]
+       - linux 6.18.8-1
+       NOTE: 
https://git.kernel.org/linus/6ab3d4353bf75005eaa375677c9fed31148154d6 (6.19-rc6)
+CVE-2025-71196 [phy: stm32-usphyc: Fix off by one in probe()]
+       - linux 6.18.8-1
+       NOTE: 
https://git.kernel.org/linus/cabd25b57216ddc132efbcc31f972baa03aad15a (6.19-rc6)
+CVE-2025-71195 [dmaengine: xilinx: xdma: Fix regmap max_register]
+       - linux 6.18.8-1
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/c7d436a6c1a274c1ac28d5fb3b8eb8f03b6d0e10 (6.19-rc6)
+CVE-2025-71194 [btrfs: fix deadlock in wait_current_trans() due to ignored 
transaction type]
+       - linux 6.18.8-1
+       NOTE: 
https://git.kernel.org/linus/5037b342825df7094a4906d1e2a9674baab50cb2 (6.19-rc5)
+CVE-2025-71193 [phy: qcom-qusb2: Fix NULL pointer dereference on early suspend]
+       - linux 6.18.8-1
+       NOTE: 
https://git.kernel.org/linus/1ca52c0983c34fca506921791202ed5bdafd5306 (6.19-rc6)
 CVE-2026-23048 [udp: call skb_orphan() before skb_attempt_defer_free()]
        - linux 6.18.8-1
        [trixie] - linux <not-affected> (Vulnerable code not present)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a3fabc8d0641b9ecefd9b6525951b9bb649ab72f

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a3fabc8d0641b9ecefd9b6525951b9bb649ab72f
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to