[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Mar 18 11:40:34 GMT 2026
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
9229bf27 by Salvatore Bonaccorso at 2026-03-18T12:40:10+01:00
Merge Linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,37 @@
+CVE-2026-23248 [perf/core: Fix refcount bug and potential UAF in perf_mmap]
+ - linux 6.19.8-1
+ NOTE: https://git.kernel.org/linus/77de62ad3de3967818c3dbe656b7336ebee461d2 (7.0-rc2)
+CVE-2026-23247 [tcp: secure_seq: add back ports to TS offset]
+ - linux 6.19.8-1
+ NOTE: https://git.kernel.org/linus/165573e41f2f66ef98940cf65f838b2cb575d9d1 (7.0-rc3)
+CVE-2026-23246 [wifi: mac80211: bounds-check link_id in ieee80211_ml_reconfiguration]
+ - linux 6.19.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/162d331d833dc73a3e905a24c44dd33732af1fc5 (7.0-rc2)
+CVE-2026-23245 [net/sched: act_gate: snapshot parameters with RCU on replace]
+ - linux 6.19.8-1
+ NOTE: https://git.kernel.org/linus/62413a9c3cb183afb9bb6e94dd68caf4e4145f4c (7.0-rc3)
+CVE-2026-23244 [nvme: fix memory allocation in nvme_pr_read_keys()]
+ - linux 6.19.8-1
+ [bookworm] - linux <not-affected> (Vulnerable code not present)
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/c3320153769f05fd7fe9d840cb555dd3080ae424 (7.0-rc3)
+CVE-2026-23243 [RDMA/umad: Reject negative data_len in ib_umad_write]
+ - linux 6.18.14-1
+ NOTE: https://git.kernel.org/linus/5551b02fdbfd85a325bb857f3a8f9c9f33397ed2 (7.0-rc1)
+CVE-2026-23242 [RDMA/siw: Fix potential NULL pointer dereference in header processing]
+ - linux 6.18.14-1
+ NOTE: https://git.kernel.org/linus/14ab3da122bd18920ad57428f6cf4fade8385142 (7.0-rc1)
+CVE-2025-71267 [fs: ntfs3: fix infinite loop triggered by zero-sized ATTR_LIST]
+ - linux 6.19.6-1
+ NOTE: https://git.kernel.org/linus/06909b2549d631a47fcda249d34be26f7ca1711d (7.0-rc1)
+CVE-2025-71266 [fs: ntfs3: check return value of indx_find to avoid infinite loop]
+ - linux 6.19.6-1
+ NOTE: https://git.kernel.org/linus/1732053c8a6b360e2d5afb1b34fe9779398b072c (7.0-rc1)
+CVE-2025-71265 [fs: ntfs3: fix infinite loop in attr_load_runs_range on inconsistent metadata]
+ - linux 6.19.6-1
+ NOTE: https://git.kernel.org/linus/4b90f16e4bb5607fb35e7802eb67874038da4640 (7.0-rc1)
CVE-2026-4366 (A flaw was identified in Keycloak, an identity and access management s ...)
- keycloak <itp> (bug #1088287)
CVE-2026-4356 (A flaw has been found in itsourcecode University Management System 1.0 ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9229bf27c826271b896bafc0a04bda17b1fdc4f6
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/9229bf27c826271b896bafc0a04bda17b1fdc4f6
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260318/beccda96/attachment.htm>
More information about the debian-security-tracker-commits
mailing list