[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Mar 13 08:13:17 GMT 2026



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
eb4d0f60 by security tracker role at 2026-03-13T08:13:10+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,95 @@
+CVE-2026-3910 (Inappropriate implementation in V8 in Google Chrome prior to 146.0.768 ...)
+	TODO: check
+CVE-2026-3909 (Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 al ...)
+	TODO: check
+CVE-2026-3891 (The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrar ...)
+	TODO: check
+CVE-2026-3611 (The Honeywell IQ4x building management controller, exposes its full we ...)
+	TODO: check
+CVE-2026-3045 (The Appointment Booking Calendar \u2014 Simply Schedule Appointments p ...)
+	TODO: check
+CVE-2026-32612 (Statmatic is a Laravel and Git powered content management system (CMS) ...)
+	TODO: check
+CVE-2026-32598 (OneUptime is a solution for monitoring and managing online services. P ...)
+	TODO: check
+CVE-2026-32597 (PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, P ...)
+	TODO: check
+CVE-2026-32322 (soroban-sdk is a Rust SDK for Soroban contracts. Prior to 22.0.11, 23. ...)
+	TODO: check
+CVE-2026-32320 (Ella Core is a 5G core designed for private networks. Prior to 1.5.1,  ...)
+	TODO: check
+CVE-2026-32319 (Ella Core is a 5G core designed for private networks. Prior to 1.5.1,  ...)
+	TODO: check
+CVE-2026-32308 (OneUptime is a solution for monitoring and managing online services. P ...)
+	TODO: check
+CVE-2026-32306 (OneUptime is a solution for monitoring and managing online services. P ...)
+	TODO: check
+CVE-2026-32304 (Locutus brings stdlibs of other programming languages to JavaScript fo ...)
+	TODO: check
+CVE-2026-32302 (OpenClaw is a personal AI assistant. Prior to 2026.3.11, browser-origi ...)
+	TODO: check
+CVE-2026-32301 (Centrifugo is an open-source scalable real-time messaging server. Prio ...)
+	TODO: check
+CVE-2026-2890 (The Formidable Forms plugin for WordPress is vulnerable to a payment i ...)
+	TODO: check
+CVE-2026-2581 (This is an uncontrolled resource consumption vulnerability (CWE-400) t ...)
+	TODO: check
+CVE-2026-2229 (ImpactThe undici WebSocket client is vulnerable to a denial-of-service ...)
+	TODO: check
+CVE-2026-25823 (HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmwa ...)
+	TODO: check
+CVE-2026-25819 (HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmwa ...)
+	TODO: check
+CVE-2026-25818 (HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmwa ...)
+	TODO: check
+CVE-2026-25817 (HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmwa ...)
+	TODO: check
+CVE-2026-25076 (Anchore Enterprise versions before 5.25.1 contain an SQL injection vul ...)
+	TODO: check
+CVE-2026-22216 (wpDiscuz before 7.6.47 contains a missing rate limiting vulnerability  ...)
+	TODO: check
+CVE-2026-22215 (wpDiscuz before 7.6.47 contains a cross-site request forgery vulnerabi ...)
+	TODO: check
+CVE-2026-22210 (wpDiscuz before 7.6.47 contains a cross-site scripting vulnerability t ...)
+	TODO: check
+CVE-2026-22209 (wpDiscuz before 7.6.47 contains a cross-site scripting vulnerability i ...)
+	TODO: check
+CVE-2026-22204 (wpDiscuz before 7.6.47 contains an email header injection vulnerabilit ...)
+	TODO: check
+CVE-2026-22203 (wpDiscuz before 7.6.47 contains an information disclosure vulnerabilit ...)
+	TODO: check
+CVE-2026-22202 (wpDiscuz before 7.6.47 contains a cross-site request forgery vulnerabi ...)
+	TODO: check
+CVE-2026-22201 (wpDiscuz before 7.6.47 contains an IP spoofing vulnerability in the ge ...)
+	TODO: check
+CVE-2026-22199 (wpDiscuz before 7.6.47 contains a vote manipulation vulnerability that ...)
+	TODO: check
+CVE-2026-22193 (wpDiscuz before 7.6.47 contains an SQL injection vulnerability in the  ...)
+	TODO: check
+CVE-2026-22192 (wpDiscuz before 7.6.47 contains a stored cross-site scripting vulnerab ...)
+	TODO: check
+CVE-2026-22191 (wpDiscuz before 7.6.47 contains a shortcode injection vulnerability th ...)
+	TODO: check
+CVE-2026-22183 (wpDiscuz before 7.6.47 contains a stored cross-site scripting vulnerab ...)
+	TODO: check
+CVE-2026-22182 (wpDiscuz before 7.6.47 contains an unauthenticated denial of service v ...)
+	TODO: check
+CVE-2026-1704 (The Appointment Booking Calendar \u2014 Simply Schedule Appointments B ...)
+	TODO: check
+CVE-2026-1528 (ImpactA server can reply with a WebSocket frame using the 64-bit lengt ...)
+	TODO: check
+CVE-2026-1527 (ImpactWhen an application passes user-controlled input to theupgradeop ...)
+	TODO: check
+CVE-2026-1526 (The undici WebSocket client is vulnerable to a denial-of-service attac ...)
+	TODO: check
+CVE-2025-8766 (A container privilege escalation flaw was found in certain Multi-Cloud ...)
+	TODO: check
+CVE-2025-57849 (A container privilege escalation flaw was found in certain Fuse images ...)
+	TODO: check
+CVE-2025-15515 (The authentication mechanism for a specific feature in the EasyShare m ...)
+	TODO: check
+CVE-2025-13337
+	REJECTED
 CVE-2026-4045 (A flaw has been found in projectsend up to r1945. This impacts an unkn ...)
 	NOT-FOR-US: projectsend
 CVE-2026-4044 (A vulnerability was detected in projectsend up to r1945. This affects  ...)
@@ -360,90 +452,119 @@ CVE-2026-3956 (A vulnerability was detected in xierongwkhd weimai-wetapp up to 5
 CVE-2026-3955 (A security vulnerability has been detected in elecV2P up to 3.8.3. Aff ...)
 	NOT-FOR-US: elecV2P
 CVE-2026-3942 (Incorrect security UI in PictureInPicture in Google Chrome prior to 14 ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3941 (Insufficient policy enforcement in DevTools in Google Chrome prior to  ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3940 (Insufficient policy enforcement in DevTools in Google Chrome prior to  ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3939 (Insufficient policy enforcement in PDF in Google Chrome prior to 146.0 ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3938 (Insufficient policy enforcement in Clipboard in Google Chrome prior to ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3937 (Incorrect security UI in Downloads in Google Chrome on Android prior t ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3936 (Use after free in WebView in Google Chrome on Android prior to 146.0.7 ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3935 (Incorrect security UI in WebAppInstalls in Google Chrome prior to 146. ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3934 (Insufficient policy enforcement in ChromeDriver in Google Chrome prior ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3932 (Insufficient policy enforcement in PDF in Google Chrome on Android pri ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3931 (Heap buffer overflow in Skia in Google Chrome prior to 146.0.7680.71 a ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3930 (Unsafe navigation in Navigation in Google Chrome on iOS prior to 146.0 ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3929 (Side-channel information leakage in ResourceTiming in Google Chrome pr ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3928 (Insufficient policy enforcement in Extensions in Google Chrome prior t ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3927 (Incorrect security UI in PictureInPicture in Google Chrome prior to 14 ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3926 (Out of bounds read in V8 in Google Chrome prior to 146.0.7680.71 allow ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3925 (Incorrect security UI in LookalikeChecks in Google Chrome on Android p ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3924 (use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3923 (Use after free in WebMIDI in Google Chrome prior to 146.0.7680.71 allo ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3922 (Use after free in MediaStream in Google Chrome prior to 146.0.7680.71  ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3921 (Use after free in TextEncoding in Google Chrome prior to 146.0.7680.71 ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3920 (Out of bounds memory access in WebML in Google Chrome prior to 146.0.7 ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3919 (Use after free in Extensions in Google Chrome prior to 146.0.7680.71 a ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3918 (Use after free in WebMCP in Google Chrome prior to 146.0.7680.71 allow ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3917 (Use after free in Agents in Google Chrome prior to 146.0.7680.71 allow ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3916 (Out of bounds read in Web Speech in Google Chrome prior to 146.0.7680. ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3915 (Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71  ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3914 (Integer overflow in WebML in Google Chrome prior to 146.0.7680.71 allo ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3913 (Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71  ...)
+	{DSA-6164-1}
 	- chromium 146.0.7680.71-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-3657 (The My Sticky Bar plugin for WordPress is vulnerable to SQL injection  ...)
@@ -4572,29 +4693,36 @@ CVE-2019-25499 (Simple Job Script contains an SQL injection vulnerability that a
 CVE-2019-25498 (Simple Job Script contains an SQL injection vulnerability that allows  ...)
 	NOT-FOR-US: Simple Job Script
 CVE-2026-23238 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
+	{DSA-6163-1 DSA-6162-1}
 	- linux 6.18.13-1
 	NOTE: https://git.kernel.org/linus/ab7ad7abb3660c58ffffdf07ff3bb976e7e0afa0 (6.19-rc8)
 CVE-2026-23237 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
+	{DSA-6163-1 DSA-6162-1}
 	- linux 6.18.13-1
 	NOTE: https://git.kernel.org/linus/fe747d7112283f47169e9c16e751179a9b38611e (6.19)
 CVE-2026-23232 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3996b70209f145bfcf2afc7d05dd92c27b233b48 (7.0-rc1)
 CVE-2026-23236 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	{DSA-6163-1 DSA-6162-1}
 	- linux 6.18.13-1
 	NOTE: https://git.kernel.org/linus/120adae7b42faa641179270c067864544a50ab69 (7.0-rc1)
 CVE-2026-23235 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	{DSA-6163-1 DSA-6162-1}
 	- linux 6.18.13-1
 	NOTE: https://git.kernel.org/linus/98ea0039dbfdd00e5cc1b9a8afa40434476c0955 (7.0-rc1)
 CVE-2026-23234 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	{DSA-6163-1 DSA-6162-1}
 	- linux 6.18.13-1
 	NOTE: https://git.kernel.org/linus/ce2739e482bce8d2c014d76c4531c877f382aa54 (7.0-rc1)
 CVE-2026-23233 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	{DSA-6162-1}
 	- linux 6.18.13-1
 	[bookworm] - linux <not-affected> (Vulnerable code not present)
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5c145c03188bc9ba1c29e0bc4d527a5978fc47f9 (7.0-rc1)
 CVE-2025-71238 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	{DSA-6163-1 DSA-6162-1}
 	- linux 6.18.13-1
 	NOTE: https://git.kernel.org/linus/c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0 (7.0-rc1)
 CVE-2026-23231 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
@@ -10421,16 +10549,16 @@ CVE-2025-13602
 CVE-2025-11185 (The Complianz \u2013 GDPR/CCPA Cookie Consent plugin for WordPress is  ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2026-23230 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ec306600d5ba7148c9dbf8f5a8f1f5c1a044a241 (7.0-rc1)
 CVE-2026-23229 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.12-1
 	NOTE: https://git.kernel.org/linus/b505047ffc8057555900d2d3a005d033e6967382 (7.0-rc1)
 CVE-2026-23228 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/77ffbcac4e569566d0092d5f22627dfc0896b553 (7.0-rc1)
@@ -10457,27 +10585,28 @@ CVE-2026-23223 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1c253e11225bc5167217897885b85093e17c2217 (7.0-rc1)
 CVE-2026-23222 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.12-1
 	NOTE: https://git.kernel.org/linus/1562b1fb7e17c1b3addb15e125c718b2be7f5512 (7.0-rc1)
 CVE-2026-23221 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
+	{DSA-6163-1 DSA-6162-1}
 	- linux 6.18.12-1
 	NOTE: https://git.kernel.org/linus/148891e95014b5dc5878acefa57f1940c281c431 (7.0-rc1)
 CVE-2026-23220 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/010eb01ce23b34b50531448b0da391c7f05a72af (7.0-rc1)
 CVE-2025-71237 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.12-1
 	NOTE: https://git.kernel.org/linus/ed527ef0c264e4bed6c7b2a158ddf516b17f5f66 (7.0-rc1)
 CVE-2025-71236 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.12-1
 	NOTE: https://git.kernel.org/linus/b6df15aec8c3441357d4da0eaf4339eb20f5999f (7.0-rc1)
 CVE-2025-71235 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.12-1
 	NOTE: https://git.kernel.org/linus/8890bf450e0b6b283f48ac619fca5ac2f14ddd62 (7.0-rc1)
 CVE-2025-71234 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
@@ -10487,12 +10616,12 @@ CVE-2025-71234 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/86c946bcc00f6390ef65e9614ae60a9377e454f8 (7.0-rc1)
 CVE-2025-71233 (In the Linux kernel, the following vulnerability has been resolved:  P ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7c5c7d06bd1f86d2c3ebe62be903a4ba42db4d2c (7.0-rc1)
 CVE-2025-71232 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.12-1
 	NOTE: https://git.kernel.org/linus/7adbd2b7809066c75f0433e5e2a8e114b429f30f (7.0-rc1)
 CVE-2025-71231 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
@@ -10531,7 +10660,7 @@ CVE-2026-23217 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b0d7f5f0c9f05f1b6d4ee7110f15bef9c11f9df0 (6.19-rc5)
 CVE-2026-23216 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/9411a89e9e7135cc459178fa77a3f1d6191ae903 (6.19-rc7)
 CVE-2026-23215 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
@@ -11288,7 +11417,7 @@ CVE-2026-23210 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fc6f36eaaedcf4b81af6fe1a568f018ffd530660 (6.19)
 CVE-2026-23209 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/f8db6475a83649689c087a8f52486fcc53e627e9 (6.19)
 CVE-2026-23208 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
@@ -11299,12 +11428,12 @@ CVE-2026-23207 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/edf9088b6e1d6d88982db7eb5e736a0e4fbcc09e (6.19)
 CVE-2026-23206 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ed48a84a72fefb20a82dd90a7caa7807e90c6f66 (6.19)
 CVE-2026-23205 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e3a43633023e3cacaca60d4b8972d084a2b06236 (6.19)
@@ -11313,7 +11442,7 @@ CVE-2026-23204 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/cabd1a976375780dabab888784e356f574bbaed8 (6.19)
 CVE-2026-23202 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/bf4528ab28e2bf112c3a2cdef44fd13f007781cd (6.19)
@@ -11336,7 +11465,7 @@ CVE-2026-23199 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b5cbacd7f86f4f62b8813688c8e73be94e8e1951 (6.19)
 CVE-2026-23198 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/b4d37cdb77a0015f51fee083598fa227cc07aaf1 (6.19)
 CVE-2026-23196 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
@@ -11346,7 +11475,7 @@ CVE-2026-23196 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a9a917998d172ec117f9e9de1919174153c0ace4 (6.19-rc5)
 CVE-2026-23193 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/84dc6037390b8607c5551047d3970336cb51ba9a (6.19-rc7)
 CVE-2026-23191 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
@@ -11354,7 +11483,7 @@ CVE-2026-23191 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/826af7fa62e347464b1b4e0ba2fe19a92438084f (6.19)
 CVE-2026-23190 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/7f67ba5413f98d93116a756e7f17cd2c1d6c2bd6 (6.19)
 CVE-2026-23189 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
@@ -11370,12 +11499,12 @@ CVE-2026-23188 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6d06bc83a5ae8777a5f7a81c32dd75b8d9b2fe04 (6.19)
 CVE-2026-23187 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6bd8b4a92a901fae1a422e6f914801063c345e8d (6.19)
 CVE-2026-23182 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/41d9a6795b95d6ea28439ac1e9ce8c95bbca20fc (6.19)
@@ -11386,7 +11515,7 @@ CVE-2026-23181 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3f29d661e5686f3aa14e6f11537ff5c49846f2e2 (6.19-rc7)
 CVE-2026-23180 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/31a7a0bbeb006bac2d9c81a2874825025214b6d8 (6.19)
@@ -11397,7 +11526,7 @@ CVE-2026-23179 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2fa8961d3a6a1c2395d8d560ffed2c782681bade (6.19-rc6)
 CVE-2026-23178 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2497ff38c530b1af0df5130ca9f5ab22c5e92f29 (6.19-rc5)
@@ -11408,11 +11537,11 @@ CVE-2026-23177 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2030dddf95451b4e7a389f052091e7c4b7b274c6 (6.19)
 CVE-2026-23176 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/128497456756e1b952bd5a912cd073836465109d (6.19)
 CVE-2025-71224 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/ff4071c60018a668249dc6a2df7d16330543540e (6.19-rc4)
 CVE-2025-71223 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
@@ -11422,14 +11551,14 @@ CVE-2025-71223 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f416c556997aa56ec4384c6b6efd6a0e6ac70aa7 (6.19-rc4)
 CVE-2025-71222 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/e75665dd096819b1184087ba5718bd93beafff51 (6.19-rc4)
 CVE-2025-71221 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/a143545855bc2c6e1330f6f57ae375ac44af00a7 (6.19-rc6)
 CVE-2025-71220 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7c28f8eef5ac5312794d8a52918076dcd787e53b (6.19-rc4)
@@ -11588,7 +11717,7 @@ CVE-2026-23171 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e9acda52fd2ee0cdca332f996da7a95c5fd25294 (6.19-rc8)
 CVE-2026-23169 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.9-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e2a9eeb69f7d4ca4cf4c70463af77664fdb6ab1d (6.19-rc8)
@@ -12148,11 +12277,11 @@ CVE-2026-2441 (Use after free in CSS in Google Chrome prior to 145.0.7632.75 all
 	- chromium 145.0.7632.75-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-23112 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/52a0a98549344ca20ad81a4176d68d28e3c05a5c (6.19)
 CVE-2026-23111 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/f41c5d151078c5348271ffaf8e7410d96f2d82f8 (6.19)
 CVE-2026-26257
@@ -15757,6 +15886,7 @@ CVE-2026-23101 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.18.8-1
 	NOTE: https://git.kernel.org/linus/d1883cefd31752f0504b94c3bcfa1f6d511d6e87 (6.19-rc7)
 CVE-2026-23100 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
+	{DSA-6162-1}
 	- linux 6.18.8-1
 	NOTE: https://git.kernel.org/linus/ca1a47cd3f5f4c46ca188b1c9a27af87d1ab2216 (6.19-rc7)
 CVE-2026-23099 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
@@ -23746,7 +23876,7 @@ CVE-2025-13175 (Y Soft SafeQ 6 renders the Workflow Connector password field in
 CVE-2025-0647 (In certain Arm CPUs, a CPP RCTX instruction executed on one Processing ...)
 	NOT-FOR-US: Arm
 CVE-2025-71144 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
-	{DSA-6126-1}
+	{DSA-6163-1 DSA-6126-1}
 	- linux 6.18.5-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/86730ac255b0497a272704de9a1df559f5d6602e (6.19-rc4)
@@ -24818,7 +24948,7 @@ CVE-2025-71090 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8072e34e1387d03102b788677d491e2bcceef6f5 (6.19-rc4)
 CVE-2025-71089 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
-	{DSA-6126-1}
+	{DSA-6163-1 DSA-6126-1}
 	- linux 6.18.5-1
 	NOTE: https://git.kernel.org/linus/72f98ef9a4be30d2a60136dd6faee376f780d06c (6.19-rc1)
 CVE-2025-71088 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
@@ -33715,7 +33845,7 @@ CVE-2025-68357 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7fd8720dff2d9c70cf5a1a13b7513af01952ec02 (6.19-rc1)
 CVE-2025-68358 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
-	{DSA-6126-1}
+	{DSA-6163-1 DSA-6126-1}
 	- linux 6.17.13-1
 	NOTE: https://git.kernel.org/linus/38e818718c5e04961eea0fa8feff3f100ce40408 (6.19-rc1)
 CVE-2025-68359 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
@@ -43595,6 +43725,7 @@ CVE-2025-40252 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.159-1
 	NOTE: https://git.kernel.org/linus/896f1a2493b59beb2b5ccdf990503dbb16cb2256 (6.18-rc7)
 CVE-2025-40251 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
+	{DSA-6163-1}
 	- linux 6.17.10-1
 	[trixie] - linux 6.12.63-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -53675,7 +53806,7 @@ CVE-2025-12380 (Starting with Firefox 142, it was possible for a compromised chi
 CVE-2025-12103 (A flaw was found in Red Hat Openshift AI Service. The TrustyAI compone ...)
 	NOT-FOR-US: Red Hat Openshift AI Service
 CVE-2025-40082 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
-	{DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1}
 	- linux 6.17.6-1
 	NOTE: https://git.kernel.org/linus/bea3e1d4467bcf292c8e54f080353d556d355e26 (6.18-rc1)
 CVE-2025-40081 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
@@ -68131,6 +68262,7 @@ CVE-2023-53425 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux 5.10.197-1
 	NOTE: https://git.kernel.org/linus/3df55cd773e8603b623425cc97b05e542854ad27 (6.5-rc1)
 CVE-2023-53424 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
+	{DSA-6163-1}
 	- linux 6.4.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3db7285e044144fd88a356f5b641b9cd4b231a77 (6.5-rc1)
@@ -72180,6 +72312,7 @@ CVE-2025-39764 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.16.3-1
 	NOTE: https://git.kernel.org/linus/1492e3dcb2be3aa46d1963da96aa9593e4e4db5a (6.17-rc2)
 CVE-2025-39763 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
+	{DSA-6163-1}
 	- linux 6.16.3-1
 	[trixie] - linux 6.12.43-1
 	NOTE: https://git.kernel.org/linus/79a5ae3c4c5eb7e38e0ebe4d6bf602d296080060 (6.17-rc1)
@@ -78501,6 +78634,7 @@ CVE-2025-38644 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.148-1
 	NOTE: https://git.kernel.org/linus/16ecdab5446f15a61ec88eb0d23d25d009821db0 (6.17-rc1)
 CVE-2025-38643 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
+	{DSA-6163-1}
 	- linux 6.16.3-1
 	[trixie] - linux 6.12.57-1
 	NOTE: https://git.kernel.org/linus/2c5dee15239f3f3e31aa5c8808f18996c039e2c1 (6.17-rc1)
@@ -93733,6 +93867,7 @@ CVE-2025-38202 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d4965578267e2e81f67c86e2608481e77e9c8569 (6.16-rc1)
 CVE-2025-38201 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-6163-1}
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/b85e3367a5716ed3662a4fe266525190d2af76df (6.16-rc1)
 CVE-2025-38200 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
@@ -106841,6 +106976,7 @@ CVE-2025-37921 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/087a9eb9e5978e3ba362e1163691e41097e8ca20 (6.15-rc5)
 CVE-2025-37920 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
+	{DSA-6163-1}
 	- linux 6.12.29-1
 	NOTE: https://git.kernel.org/linus/a1356ac7749cafc4e27aa62c0c4604b5dca4983e (6.15-rc5)
 CVE-2025-37919 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
@@ -111009,6 +111145,7 @@ CVE-2025-37823 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.137-1
 	NOTE: https://git.kernel.org/linus/6ccbda44e2cc3d26fd22af54c650d6d5d801addf (6.15-rc4)
 CVE-2025-37822 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
+	{DSA-6163-1}
 	- linux 6.12.27-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7d1d19a11cfbfd8bae1d89cc010b2cc397cd0c48 (6.15-rc4)
@@ -113969,6 +114106,7 @@ CVE-2025-37787 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c84f6ce918a9e6f4996597cbc62536bbf2247c96 (6.15-rc3)
 CVE-2025-37786 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-6163-1}
 	- linux 6.12.25-1
 	NOTE: https://git.kernel.org/linus/8bf108d7161ffc6880ad13a0cc109de3cf631727 (6.15-rc3)
 CVE-2025-37784 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
@@ -114236,6 +114374,7 @@ CVE-2025-23156 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.135-1
 	NOTE: https://git.kernel.org/linus/9edaaa8e3e15aab1ca413ab50556de1975bcb329 (6.15-rc1)
 CVE-2025-23155 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-6163-1}
 	- linux 6.12.37-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c60d101a226f18e9a8f01bb4c6ca2b47dfcb15ef (6.15-rc1)
@@ -118519,6 +118658,7 @@ CVE-2025-22027 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.12.25-1
 	NOTE: https://git.kernel.org/linus/f656cfbc7a293a039d6a0c7100e1c846845148c1 (6.15-rc1)
 CVE-2025-22026 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
+	{DSA-6163-1}
 	- linux 6.12.25-1
 	NOTE: https://git.kernel.org/linus/930b64ca0c511521f0abdd1d57ce52b2a6e3476b (6.15-rc1)
 CVE-2025-22025 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
@@ -149117,6 +149257,7 @@ CVE-2024-57896 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.124-1
 	NOTE: https://git.kernel.org/linus/f10bef73fb355e3fc85e63a50386798be68ff486 (6.13-rc3)
 CVE-2024-57895 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
+	{DSA-6163-1}
 	- linux 6.12.9-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/21e46a79bbe6c4e1aa73b3ed998130f2ff07b128 (6.13-rc3)
@@ -227988,6 +228129,7 @@ CVE-2024-26823 (In the Linux kernel, the following vulnerability has been resolv
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8b02da04ad978827e5ccd675acf170198f747a7a (6.8-rc5)
 CVE-2024-26822 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
+	{DSA-6163-1}
 	- linux 6.7.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/eb4d0f60b27510b0a8124b26a2569464efc64eab

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/eb4d0f60b27510b0a8124b26a2569464efc64eab
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260313/cae34af0/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list