Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
cbc2b9c5 by Salvatore Bonaccorso at 2026-04-01T15:28:58+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,76 @@
+CVE-2026-23411 [apparmor: fix race between freeing data and fs accessing it]
+       - linux 6.19.6-2
+       [trixie] - linux 6.12.74-2
+       [bookworm] - linux 6.1.164-1
+       [bullseye] - linux 5.10.251-1
+       NOTE: 
https://git.kernel.org/linus/8e135b8aee5a06c52a4347a5a6d51223c6f36ba3 (7.0-rc4)
+       NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23410 [apparmor: fix race on rawdata dereference]
+       - linux 6.19.6-2
+       [trixie] - linux 6.12.74-2
+       [bookworm] - linux 6.1.164-1
+       [bullseye] - linux 5.10.251-1
+       NOTE: 
https://git.kernel.org/linus/a0b7091c4de45a7325c8780e6934a894f92ac86b (7.0-rc4)
+       NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23409 [apparmor: fix differential encoding verification]
+       - linux 6.19.6-2
+       [trixie] - linux 6.12.74-2
+       [bookworm] - linux 6.1.164-1
+       [bullseye] - linux 5.10.251-1
+       NOTE: 
https://git.kernel.org/linus/39440b137546a3aa383cfdabc605fb73811b6093 (7.0-rc4)
+       NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23408 [apparmor: Fix double free of ns_name in aa_replace_profiles()]
+       - linux 6.19.6-2
+       [trixie] - linux 6.12.74-2
+       [bookworm] - linux 6.1.164-1
+       [bullseye] - linux 5.10.251-1
+       NOTE: 
https://git.kernel.org/linus/5df0c44e8f5f619d3beb871207aded7c78414502 (7.0-rc4)
+       NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23407 [apparmor: fix missing bounds check on DEFAULT table in 
verify_dfa()]
+       - linux 6.19.6-2
+       [trixie] - linux 6.12.74-2
+       [bookworm] - linux 6.1.164-1
+       [bullseye] - linux 5.10.251-1
+       NOTE: 
https://git.kernel.org/linus/d352873bbefa7eb39995239d0b44ccdf8aaa79a4 (7.0-rc4)
+       NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23406 [apparmor: fix side-effect bug in match_char() macro usage]
+       - linux 6.19.6-2
+       [trixie] - linux 6.12.74-2
+       [bookworm] - linux 6.1.164-1
+       [bullseye] - linux 5.10.251-1
+       NOTE: 
https://git.kernel.org/linus/8756b68edae37ff546c02091989a4ceab3f20abd (7.0-rc4)
+       NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23405 [apparmor: fix: limit the number of levels of policy namespaces]
+       - linux 6.19.6-2
+       [trixie] - linux 6.12.74-2
+       [bookworm] - linux 6.1.164-1
+       [bullseye] - linux 5.10.251-1
+       NOTE: 
https://git.kernel.org/linus/306039414932c80f8420695a24d4fe10c84ccfb2 (7.0-rc4)
+       NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23404 [apparmor: replace recursive profile removal with iterative 
approach]
+       - linux 6.19.6-2
+       [trixie] - linux 6.12.74-2
+       [bookworm] - linux 6.1.164-1
+       [bullseye] - linux 5.10.251-1
+       NOTE: 
https://git.kernel.org/linus/ab09264660f9de5d05d1ef4e225aa447c63a8747 (7.0-rc4)
+       NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23403 [apparmor: fix memory leak in verify_header]
+       - linux 6.19.6-2
+       [trixie] - linux 6.12.74-2
+       [bookworm] - linux 6.1.164-1
+       [bullseye] - linux 5.10.251-1
+       NOTE: 
https://git.kernel.org/linus/e38c55d9f834e5b848bfed0f5c586aaf45acb825 (7.0-rc4)
+       NOTE: NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23402 [KVM: x86/mmu: Only WARN in direct MMUs when overwriting 
shadow-present SPTE]
+       - linux <unfixed>
+       [trixie] - linux <not-affected> (Vulnerable code not present)
+       [bookworm] - linux <not-affected> (Vulnerable code not present)
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/df83746075778958954aa0460cca55f4b3fc9c02 (7.0-rc6)
+CVE-2026-23401 [KVM: x86/mmu: Drop/zap existing present SPTE even when 
creating an MMIO SPTE]
+       - linux <unfixed>
+       [bullseye] - linux <not-affected> (Vulnerable code not present)
+       NOTE: 
https://git.kernel.org/linus/aad885e774966e97b675dfe928da164214a71605 (7.0-rc6)
 CVE-2026-34982
        - vim <unfixed> (bug #1132450)
        NOTE: https://github.com/vim/vim/security/advisories/GHSA-8h6p-m6gr-mpw9



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cbc2b9c50d2fc79ea1c560e54503fe7858f12aa3

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cbc2b9c50d2fc79ea1c560e54503fe7858f12aa3
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to