DEBIAN-CVE-2026-23184

Source
https://security-tracker.debian.org/tracker/CVE-2026-23184
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23184.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-23184
Upstream
Published
2026-02-14T17:15:56.167Z
Modified
2026-03-19T09:00:34.602155Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: binder: fix UAF in bindernetlinkreport() Oneway transactions sent to frozen targets via binderproctransaction() return a BRTRANSACTIONPENDINGFROZEN error but they are still treated as successful since the target is expected to thaw at some point. It is then not safe to access 't' after BRTRANSACTIONPENDINGFROZEN errors as the transaction could have been consumed by the now thawed target. This is the case for bindernetlinkreport() which derreferences 't' after a pending frozen error, as pointed out by the following KASAN report: ================================================================== BUG: KASAN: slab-use-after-free in bindernetlinkreport.isra.0+0x694/0x6c8 Read of size 8 at addr ffff00000f98ba38 by task binder-util/522 CPU: 4 UID: 0 PID: 522 Comm: binder-util Not tainted 6.19.0-rc6-00015-gc03e9c42ae8f #1 PREEMPT Hardware name: linux,dummy-virt (DT) Call trace: bindernetlinkreport.isra.0+0x694/0x6c8 bindertransaction+0x66e4/0x79b8 binderthreadwrite+0xab4/0x4440 binderioctl+0x1fd4/0x2940 [...] Allocated by task 522: _kmalloccachenoprof+0x17c/0x50c bindertransaction+0x584/0x79b8 binderthreadwrite+0xab4/0x4440 binderioctl+0x1fd4/0x2940 [...] Freed by task 488: kfree+0x1d0/0x420 binderfreetransaction+0x150/0x234 binderthreadread+0x2d08/0x3ce4 binderioctl+0x488/0x2940 [...] ================================================================== Instead, make a transaction copy so the data can be safely accessed by bindernetlinkreport() after a pending frozen error. While here, add a comment about not using t->buffer in bindernetlinkreport().

References

Affected packages

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.18.10-1

Affected versions

6.*
6.12.38-1
6.12.41-1
6.12.43-1~bpo12+1
6.12.43-1
6.12.48-1
6.12.57-1~bpo12+1
6.12.57-1
6.12.63-1~bpo12+1
6.12.63-1
6.12.69-1~bpo12+1
6.12.69-1
6.12.73-1~bpo12+1
6.12.73-1
6.12.74-1
6.12.74-2~bpo12+1
6.12.74-2
6.13~rc6-1~exp1
6.13~rc7-1~exp1
6.13.2-1~exp1
6.13.3-1~exp1
6.13.4-1~exp1
6.13.5-1~exp1
6.13.6-1~exp1
6.13.7-1~exp1
6.13.8-1~exp1
6.13.9-1~exp1
6.13.10-1~exp1
6.13.11-1~exp1
6.14.3-1~exp1
6.14.5-1~exp1
6.14.6-1~exp1
6.15~rc7-1~exp1
6.15-1~exp1
6.15.1-1~exp1
6.15.2-1~exp1
6.15.3-1~exp1
6.15.4-1~exp1
6.15.5-1~exp1
6.15.6-1~exp1
6.16~rc7-1~exp1
6.16-1~exp1
6.16.1-1~exp1
6.16.3-1~bpo13+1
6.16.3-1
6.16.5-1
6.16.6-1
6.16.7-1
6.16.8-1
6.16.9-1
6.16.10-1
6.16.11-1
6.16.12-1~bpo13+1
6.16.12-1
6.16.12-2
6.17.2-1~exp1
6.17.5-1~exp1
6.17.6-1
6.17.7-1
6.17.7-2
6.17.8-1~bpo13+1
6.17.8-1
6.17.9-1
6.17.10-1
6.17.11-1
6.17.12-1
6.17.13-1~bpo13+1
6.17.13-1
6.18~rc4-1~exp1
6.18~rc4-1~exp2
6.18~rc5-1~exp1
6.18~rc6-1~exp1
6.18~rc7-1~exp1
6.18.1-1~exp1
6.18.2-1~exp1
6.18.3-1
6.18.5-1~bpo13+1
6.18.5-1
6.18.8-1
6.18.9-1~bpo13+1
6.18.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23184.json"