Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 81e2b110 by Salvatore Bonaccorso at 2026-03-18T20:40:04+01:00 Merge Linux CVEs from kernel-sec - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,73 @@ +CVE-2026-23264 [Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem"] + - linux 6.18.10-1 + [trixie] - linux 6.12.73-1 + [bookworm] - linux 6.1.164-1 + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/243b467dea1735fed904c2e54d248a46fa417a2d (6.19) +CVE-2026-23263 [io_uring/zcrx: fix page array leak] + - linux 6.18.10-1 + [trixie] - linux <not-affected> (Vulnerable code not present) + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/0ae91d8ab70922fb74c22c20bedcb69459579b1c (6.19) +CVE-2026-23262 [gve: Fix stats report corruption on queue count change] + - linux 6.18.10-1 + [trixie] - linux 6.12.73-1 + [bookworm] - linux 6.1.164-1 + [bullseye] - linux 5.10.251-1 + NOTE: https://git.kernel.org/linus/7b9ebcce0296e104a0d82a6b09d68564806158ff (6.19) +CVE-2026-23258 [net: liquidio: Initialize netdev pointer before queue setup] + - linux 6.18.10-1 + [trixie] - linux 6.12.73-1 + [bookworm] - linux 6.1.164-1 + [bullseye] - linux 5.10.251-1 + NOTE: https://git.kernel.org/linus/926ede0c85e1e57c97d64d9612455267d597bb2c (6.19) +CVE-2026-23257 [net: liquidio: Fix off-by-one error in PF setup_nic_devices() cleanup] + - linux 6.18.10-1 + [trixie] - linux 6.12.73-1 + [bookworm] - linux 6.1.164-1 + [bullseye] - linux 5.10.251-1 + NOTE: https://git.kernel.org/linus/8558aef4e8a1a83049ab906d21d391093cfa7e7f (6.19) +CVE-2026-23256 [net: liquidio: Fix off-by-one error in VF setup_nic_devices() cleanup] + - linux 6.18.10-1 + [trixie] - linux 6.12.73-1 + [bookworm] - linux 6.1.164-1 + [bullseye] - linux 5.10.251-1 + NOTE: https://git.kernel.org/linus/6cbba46934aefdfb5d171e0a95aec06c24f7ca30 (6.19) +CVE-2026-23254 [net: gro: fix outer network offset] + - linux 6.18.10-1 + [trixie] - linux 6.12.73-1 + [bookworm] - linux <not-affected> (Vulnerable code not present) + [bullseye] - linux <not-affected> (Vulnerable code not present) + NOTE: https://git.kernel.org/linus/5c2c3c38be396257a6a2e55bd601a12bb9781507 (6.19) +CVE-2026-23261 [nvme-fc: release admin tagset if init fails] + - linux 6.18.10-1 + [trixie] - linux 6.12.73-1 + [bookworm] - linux 6.1.164-1 + NOTE: https://git.kernel.org/linus/d1877cc7270302081a315a81a0ee8331f19f95c8 (6.19-rc6) +CVE-2026-23260 [regmap: maple: free entry on mas_store_gfp() failure] + - linux 6.18.10-1 + [trixie] - linux 6.12.73-1 + NOTE: https://git.kernel.org/linus/f3f380ce6b3d5c9805c7e0b3d5bc28d9ec41e2e8 (6.19-rc7) +CVE-2026-23259 [io_uring/rw: free potentially allocated iovec on cache put failure] + - linux 6.18.10-1 + NOTE: https://git.kernel.org/linus/4b9748055457ac3a0710bf210c229d01ea1b01b9 (6.19-rc7) +CVE-2026-23255 [net: add proper RCU protection to /proc/net/ptype] + - linux 6.18.10-1 + NOTE: https://git.kernel.org/linus/f613e8b4afea0cd17c7168e8b00e25bc8d33175d (6.19) +CVE-2025-71270 [LoongArch: Enable exception fixup for specific ADE subcode] + - linux 6.18.10-1 + [trixie] - linux 6.12.73-1 + [bookworm] - linux 6.1.164-1 + NOTE: https://git.kernel.org/linus/9bdc1ab5e4ce6f066119018d8f69631a46f9c5a0 (6.19-rc4) +CVE-2025-71269 [btrfs: do not free data reservation in fallback from inline due to -ENOSPC] + - linux 6.18.10-1 + NOTE: https://git.kernel.org/linus/f8da41de0bff9eb1d774a7253da0c9f637c4470a (6.19-rc5) +CVE-2025-71268 [btrfs: fix reservation leak in some error paths when inserting inline extent] + - linux 6.18.10-1 + [trixie] - linux 6.12.73-1 + [bookworm] - linux 6.1.164-1 + NOTE: https://git.kernel.org/linus/c1c050f92d8f6aac4e17f7f2230160794fceef0c (6.19-rc5) CVE-2026-23253 [media: dvb-core: fix wrong reinitialization of ringbuffer on reopen] - linux 6.19.8-1 NOTE: https://git.kernel.org/linus/bfbc0b5b32a8f28ce284add619bf226716a59bc0 (7.0-rc2) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/81e2b110e236804fbbfae06352a91c75679ee86f -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/81e2b110e236804fbbfae06352a91c75679ee86f You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list [email protected] https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits
