[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Apr 1 14:29:27 BST 2026



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
cbc2b9c5 by Salvatore Bonaccorso at 2026-04-01T15:28:58+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,76 @@
+CVE-2026-23411 [apparmor: fix race between freeing data and fs accessing it]
+	- linux 6.19.6-2
+	[trixie] - linux 6.12.74-2
+	[bookworm] - linux 6.1.164-1
+	[bullseye] - linux 5.10.251-1
+	NOTE: https://git.kernel.org/linus/8e135b8aee5a06c52a4347a5a6d51223c6f36ba3 (7.0-rc4)
+	NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23410 [apparmor: fix race on rawdata dereference]
+	- linux 6.19.6-2
+	[trixie] - linux 6.12.74-2
+	[bookworm] - linux 6.1.164-1
+	[bullseye] - linux 5.10.251-1
+	NOTE: https://git.kernel.org/linus/a0b7091c4de45a7325c8780e6934a894f92ac86b (7.0-rc4)
+	NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23409 [apparmor: fix differential encoding verification]
+	- linux 6.19.6-2
+	[trixie] - linux 6.12.74-2
+	[bookworm] - linux 6.1.164-1
+	[bullseye] - linux 5.10.251-1
+	NOTE: https://git.kernel.org/linus/39440b137546a3aa383cfdabc605fb73811b6093 (7.0-rc4)
+	NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23408 [apparmor: Fix double free of ns_name in aa_replace_profiles()]
+	- linux 6.19.6-2
+	[trixie] - linux 6.12.74-2
+	[bookworm] - linux 6.1.164-1
+	[bullseye] - linux 5.10.251-1
+	NOTE: https://git.kernel.org/linus/5df0c44e8f5f619d3beb871207aded7c78414502 (7.0-rc4)
+	NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23407 [apparmor: fix missing bounds check on DEFAULT table in verify_dfa()]
+	- linux 6.19.6-2
+	[trixie] - linux 6.12.74-2
+	[bookworm] - linux 6.1.164-1
+	[bullseye] - linux 5.10.251-1
+	NOTE: https://git.kernel.org/linus/d352873bbefa7eb39995239d0b44ccdf8aaa79a4 (7.0-rc4)
+	NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23406 [apparmor: fix side-effect bug in match_char() macro usage]
+	- linux 6.19.6-2
+	[trixie] - linux 6.12.74-2
+	[bookworm] - linux 6.1.164-1
+	[bullseye] - linux 5.10.251-1
+	NOTE: https://git.kernel.org/linus/8756b68edae37ff546c02091989a4ceab3f20abd (7.0-rc4)
+	NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23405 [apparmor: fix: limit the number of levels of policy namespaces]
+	- linux 6.19.6-2
+	[trixie] - linux 6.12.74-2
+	[bookworm] - linux 6.1.164-1
+	[bullseye] - linux 5.10.251-1
+	NOTE: https://git.kernel.org/linus/306039414932c80f8420695a24d4fe10c84ccfb2 (7.0-rc4)
+	NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23404 [apparmor: replace recursive profile removal with iterative approach]
+	- linux 6.19.6-2
+	[trixie] - linux 6.12.74-2
+	[bookworm] - linux 6.1.164-1
+	[bullseye] - linux 5.10.251-1
+	NOTE: https://git.kernel.org/linus/ab09264660f9de5d05d1ef4e225aa447c63a8747 (7.0-rc4)
+	NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23403 [apparmor: fix memory leak in verify_header]
+	- linux 6.19.6-2
+	[trixie] - linux 6.12.74-2
+	[bookworm] - linux 6.1.164-1
+	[bullseye] - linux 5.10.251-1
+	NOTE: https://git.kernel.org/linus/e38c55d9f834e5b848bfed0f5c586aaf45acb825 (7.0-rc4)
+	NOTE: NOTE: https://www.qualys.com/2026/03/10/crack-armor.txt
+CVE-2026-23402 [KVM: x86/mmu: Only WARN in direct MMUs when overwriting shadow-present SPTE]
+	- linux <unfixed>
+	[trixie] - linux <not-affected> (Vulnerable code not present)
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/df83746075778958954aa0460cca55f4b3fc9c02 (7.0-rc6)
+CVE-2026-23401 [KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE]
+	- linux <unfixed>
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/aad885e774966e97b675dfe928da164214a71605 (7.0-rc6)
 CVE-2026-34982
 	- vim <unfixed> (bug #1132450)
 	NOTE: https://github.com/vim/vim/security/advisories/GHSA-8h6p-m6gr-mpw9



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cbc2b9c50d2fc79ea1c560e54503fe7858f12aa3

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/cbc2b9c50d2fc79ea1c560e54503fe7858f12aa3
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260401/b8f03584/attachment.htm>


More information about the debian-security-tracker-commits mailing list