Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-23453 (GCVE-0-2026-23453)
Vulnerability from cvelistv5 – Published: 2026-04-03 15:15 – Updated: 2026-04-27 14:02{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/ti/icssg/icssg_common.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "d16d57dedcb69c1a1257e0638f8698ce1f0ccbe5",
"status": "affected",
"version": "7a64bb388df3cf091afdd047c701039a13acd3b4",
"versionType": "git"
},
{
"lessThan": "719d3e71691db7c4f1658ba5a6d1472928121594",
"status": "affected",
"version": "7a64bb388df3cf091afdd047c701039a13acd3b4",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/ti/icssg/icssg_common.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.19"
},
{
"lessThan": "6.19",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.19.*",
"status": "unaffected",
"version": "6.19.10",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "7.0",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19.10",
"versionStartIncluding": "6.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0",
"versionStartIncluding": "6.19",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ti: icssg-prueth: Fix memory leak in XDP_DROP for non-zero-copy mode\n\nPage recycling was removed from the XDP_DROP path in emac_run_xdp() to\navoid conflicts with AF_XDP zero-copy mode, which uses xsk_buff_free()\ninstead.\n\nHowever, this causes a memory leak when running XDP programs that drop\npackets in non-zero-copy mode (standard page pool mode). The pages are\nnever returned to the page pool, leading to OOM conditions.\n\nFix this by handling cleanup in the caller, emac_rx_packet().\nWhen emac_run_xdp() returns ICSSG_XDP_CONSUMED for XDP_DROP, the\ncaller now recycles the page back to the page pool. The zero-copy\npath, emac_rx_packet_zc() already handles cleanup correctly with\nxsk_buff_free()."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-27T14:02:32.584Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/d16d57dedcb69c1a1257e0638f8698ce1f0ccbe5"
},
{
"url": "https://git.kernel.org/stable/c/719d3e71691db7c4f1658ba5a6d1472928121594"
}
],
"title": "net: ti: icssg-prueth: Fix memory leak in XDP_DROP for non-zero-copy mode",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-23453",
"datePublished": "2026-04-03T15:15:35.549Z",
"dateReserved": "2026-01-13T15:37:46.020Z",
"dateUpdated": "2026-04-27T14:02:32.584Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-23453",
"date": "2026-05-07",
"epss": "0.00057",
"percentile": "0.17668"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-23453\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-04-03T16:16:31.820\",\"lastModified\":\"2026-04-27T14:16:33.833\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: ti: icssg-prueth: Fix memory leak in XDP_DROP for non-zero-copy mode\\n\\nPage recycling was removed from the XDP_DROP path in emac_run_xdp() to\\navoid conflicts with AF_XDP zero-copy mode, which uses xsk_buff_free()\\ninstead.\\n\\nHowever, this causes a memory leak when running XDP programs that drop\\npackets in non-zero-copy mode (standard page pool mode). The pages are\\nnever returned to the page pool, leading to OOM conditions.\\n\\nFix this by handling cleanup in the caller, emac_rx_packet().\\nWhen emac_run_xdp() returns ICSSG_XDP_CONSUMED for XDP_DROP, the\\ncaller now recycles the page back to the page pool. The zero-copy\\npath, emac_rx_packet_zc() already handles cleanup correctly with\\nxsk_buff_free().\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/719d3e71691db7c4f1658ba5a6d1472928121594\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d16d57dedcb69c1a1257e0638f8698ce1f0ccbe5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
FKIE_CVE-2026-23453
Vulnerability from fkie_nvd - Published: 2026-04-03 16:16 - Updated: 2026-04-27 14:16| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ti: icssg-prueth: Fix memory leak in XDP_DROP for non-zero-copy mode\n\nPage recycling was removed from the XDP_DROP path in emac_run_xdp() to\navoid conflicts with AF_XDP zero-copy mode, which uses xsk_buff_free()\ninstead.\n\nHowever, this causes a memory leak when running XDP programs that drop\npackets in non-zero-copy mode (standard page pool mode). The pages are\nnever returned to the page pool, leading to OOM conditions.\n\nFix this by handling cleanup in the caller, emac_rx_packet().\nWhen emac_run_xdp() returns ICSSG_XDP_CONSUMED for XDP_DROP, the\ncaller now recycles the page back to the page pool. The zero-copy\npath, emac_rx_packet_zc() already handles cleanup correctly with\nxsk_buff_free()."
}
],
"id": "CVE-2026-23453",
"lastModified": "2026-04-27T14:16:33.833",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"type": "Secondary"
}
]
},
"published": "2026-04-03T16:16:31.820",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/719d3e71691db7c4f1658ba5a6d1472928121594"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/d16d57dedcb69c1a1257e0638f8698ce1f0ccbe5"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
WID-SEC-W-2026-0985
Vulnerability from csaf_certbund - Published: 2026-04-06 22:00 - Updated: 2026-05-04 22:00{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um unter anderem einen Denial of Service-Angriff auszuf\u00fchren oder um Sicherheitsmechanismen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0985 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0985.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0985 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0985"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23412",
"url": "https://lore.kernel.org/linux-cve-announce/2026040201-CVE-2026-23412-4daa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23413",
"url": "https://lore.kernel.org/linux-cve-announce/2026040203-CVE-2026-23413-fa13@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23414",
"url": "https://lore.kernel.org/linux-cve-announce/2026040203-CVE-2026-23414-d0e3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23415",
"url": "https://lore.kernel.org/linux-cve-announce/2026040204-CVE-2026-23415-3435@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23416",
"url": "https://lore.kernel.org/linux-cve-announce/2026040204-CVE-2026-23416-2941@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23417",
"url": "https://lore.kernel.org/linux-cve-announce/2026040204-CVE-2026-23417-d6a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23418",
"url": "https://lore.kernel.org/linux-cve-announce/2026040301-CVE-2026-23418-3cf7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23419",
"url": "https://lore.kernel.org/linux-cve-announce/2026040303-CVE-2026-23419-6055@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23420",
"url": "https://lore.kernel.org/linux-cve-announce/2026040303-CVE-2026-23420-c110@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23421",
"url": "https://lore.kernel.org/linux-cve-announce/2026040304-CVE-2026-23421-dace@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23422",
"url": "https://lore.kernel.org/linux-cve-announce/2026040304-CVE-2026-23422-1e6f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23423",
"url": "https://lore.kernel.org/linux-cve-announce/2026040304-CVE-2026-23423-96fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23424",
"url": "https://lore.kernel.org/linux-cve-announce/2026040305-CVE-2026-23424-7b21@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23425",
"url": "https://lore.kernel.org/linux-cve-announce/2026040305-CVE-2026-23425-80db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23426",
"url": "https://lore.kernel.org/linux-cve-announce/2026040305-CVE-2026-23426-4c05@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23427",
"url": "https://lore.kernel.org/linux-cve-announce/2026040307-CVE-2026-23427-5456@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23428",
"url": "https://lore.kernel.org/linux-cve-announce/2026040310-CVE-2026-23428-9e4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23429",
"url": "https://lore.kernel.org/linux-cve-announce/2026040310-CVE-2026-23429-2f24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23430",
"url": "https://lore.kernel.org/linux-cve-announce/2026040310-CVE-2026-23430-8d4a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23431",
"url": "https://lore.kernel.org/linux-cve-announce/2026040311-CVE-2026-23431-3aee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23432",
"url": "https://lore.kernel.org/linux-cve-announce/2026040311-CVE-2026-23432-4aaf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23433",
"url": "https://lore.kernel.org/linux-cve-announce/2026040311-CVE-2026-23433-01be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23434",
"url": "https://lore.kernel.org/linux-cve-announce/2026040311-CVE-2026-23434-f0f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23435",
"url": "https://lore.kernel.org/linux-cve-announce/2026040312-CVE-2026-23435-e721@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23436",
"url": "https://lore.kernel.org/linux-cve-announce/2026040312-CVE-2026-23436-f1f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23437",
"url": "https://lore.kernel.org/linux-cve-announce/2026040312-CVE-2026-23437-9787@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23438",
"url": "https://lore.kernel.org/linux-cve-announce/2026040313-CVE-2026-23438-5faa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23439",
"url": "https://lore.kernel.org/linux-cve-announce/2026040313-CVE-2026-23439-ed88@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23440",
"url": "https://lore.kernel.org/linux-cve-announce/2026040313-CVE-2026-23440-9b9f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23441",
"url": "https://lore.kernel.org/linux-cve-announce/2026040313-CVE-2026-23441-b47e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23442",
"url": "https://lore.kernel.org/linux-cve-announce/2026040314-CVE-2026-23442-fe23@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23443",
"url": "https://lore.kernel.org/linux-cve-announce/2026040314-CVE-2026-23443-19e2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23444",
"url": "https://lore.kernel.org/linux-cve-announce/2026040314-CVE-2026-23444-8169@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23445",
"url": "https://lore.kernel.org/linux-cve-announce/2026040315-CVE-2026-23445-d003@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23446",
"url": "https://lore.kernel.org/linux-cve-announce/2026040315-CVE-2026-23446-65cf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23447",
"url": "https://lore.kernel.org/linux-cve-announce/2026040315-CVE-2026-23447-dd25@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23448",
"url": "https://lore.kernel.org/linux-cve-announce/2026040315-CVE-2026-23448-1d79@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23449",
"url": "https://lore.kernel.org/linux-cve-announce/2026040316-CVE-2026-23449-1717@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23450",
"url": "https://lore.kernel.org/linux-cve-announce/2026040316-CVE-2026-23450-2437@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23451",
"url": "https://lore.kernel.org/linux-cve-announce/2026040316-CVE-2026-23451-1298@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23452",
"url": "https://lore.kernel.org/linux-cve-announce/2026040317-CVE-2026-23452-4c2b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23453",
"url": "https://lore.kernel.org/linux-cve-announce/2026040317-CVE-2026-23453-c4f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23454",
"url": "https://lore.kernel.org/linux-cve-announce/2026040317-CVE-2026-23454-a999@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23455",
"url": "https://lore.kernel.org/linux-cve-announce/2026040317-CVE-2026-23455-f045@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23456",
"url": "https://lore.kernel.org/linux-cve-announce/2026040318-CVE-2026-23456-7da2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23457",
"url": "https://lore.kernel.org/linux-cve-announce/2026040318-CVE-2026-23457-e7f6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23458",
"url": "https://lore.kernel.org/linux-cve-announce/2026040318-CVE-2026-23458-5578@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23459",
"url": "https://lore.kernel.org/linux-cve-announce/2026040319-CVE-2026-23459-fcfb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23460",
"url": "https://lore.kernel.org/linux-cve-announce/2026040319-CVE-2026-23460-f1d1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23461",
"url": "https://lore.kernel.org/linux-cve-announce/2026040319-CVE-2026-23461-f03d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23462",
"url": "https://lore.kernel.org/linux-cve-announce/2026040319-CVE-2026-23462-297c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23463",
"url": "https://lore.kernel.org/linux-cve-announce/2026040320-CVE-2026-23463-e730@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23464",
"url": "https://lore.kernel.org/linux-cve-announce/2026040320-CVE-2026-23464-840f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23465",
"url": "https://lore.kernel.org/linux-cve-announce/2026040320-CVE-2026-23465-9c96@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23466",
"url": "https://lore.kernel.org/linux-cve-announce/2026040321-CVE-2026-23466-ae2c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23467",
"url": "https://lore.kernel.org/linux-cve-announce/2026040321-CVE-2026-23467-9cfe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23468",
"url": "https://lore.kernel.org/linux-cve-announce/2026040321-CVE-2026-23468-8be9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23469",
"url": "https://lore.kernel.org/linux-cve-announce/2026040322-CVE-2026-23469-fd6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23470",
"url": "https://lore.kernel.org/linux-cve-announce/2026040322-CVE-2026-23470-a491@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23471",
"url": "https://lore.kernel.org/linux-cve-announce/2026040322-CVE-2026-23471-f1bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23472",
"url": "https://lore.kernel.org/linux-cve-announce/2026040322-CVE-2026-23472-c68c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23473",
"url": "https://lore.kernel.org/linux-cve-announce/2026040323-CVE-2026-23473-ab6c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23474",
"url": "https://lore.kernel.org/linux-cve-announce/2026040323-CVE-2026-23474-e350@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23475",
"url": "https://lore.kernel.org/linux-cve-announce/2026040323-CVE-2026-23475-8bf5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31389",
"url": "https://lore.kernel.org/linux-cve-announce/2026040324-CVE-2026-31389-036b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31390",
"url": "https://lore.kernel.org/linux-cve-announce/2026040324-CVE-2026-31390-f363@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31391",
"url": "https://lore.kernel.org/linux-cve-announce/2026040324-CVE-2026-31391-4b86@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31392",
"url": "https://lore.kernel.org/linux-cve-announce/2026040324-CVE-2026-31392-7952@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31393",
"url": "https://lore.kernel.org/linux-cve-announce/2026040325-CVE-2026-31393-5e12@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31394",
"url": "https://lore.kernel.org/linux-cve-announce/2026040325-CVE-2026-31394-26ac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31395",
"url": "https://lore.kernel.org/linux-cve-announce/2026040325-CVE-2026-31395-8855@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31396",
"url": "https://lore.kernel.org/linux-cve-announce/2026040326-CVE-2026-31396-0dad@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31397",
"url": "https://lore.kernel.org/linux-cve-announce/2026040326-CVE-2026-31397-8672@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31398",
"url": "https://lore.kernel.org/linux-cve-announce/2026040326-CVE-2026-31398-babe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31399",
"url": "https://lore.kernel.org/linux-cve-announce/2026040326-CVE-2026-31399-9b84@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31400",
"url": "https://lore.kernel.org/linux-cve-announce/2026040327-CVE-2026-31400-db79@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31401",
"url": "https://lore.kernel.org/linux-cve-announce/2026040327-CVE-2026-31401-697d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31402",
"url": "https://lore.kernel.org/linux-cve-announce/2026040327-CVE-2026-31402-3e6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31403",
"url": "https://lore.kernel.org/linux-cve-announce/2026040328-CVE-2026-31403-5446@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31404",
"url": "https://lore.kernel.org/linux-cve-announce/2026040328-CVE-2026-31404-f58a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31405",
"url": "https://lore.kernel.org/linux-cve-announce/2026040603-CVE-2026-31405-8cfb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31406",
"url": "https://lore.kernel.org/linux-cve-announce/2026040628-CVE-2026-31406-e2f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31407",
"url": "https://lore.kernel.org/linux-cve-announce/2026040628-CVE-2026-31407-6abd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31408",
"url": "https://lore.kernel.org/linux-cve-announce/2026040629-CVE-2026-31408-9f0f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31409",
"url": "https://lore.kernel.org/linux-cve-announce/2026040629-CVE-2026-31409-d22c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31410",
"url": "https://lore.kernel.org/linux-cve-announce/2026040629-CVE-2026-31410-5b44@gregkh/"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2026-04-07",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "CVE-2026-23416 PoC",
"url": "https://github.com/bluedragonsecurity/CVE-2026-23416-POC"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2026-04-08",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2026-04-14",
"url": "https://docs.cloud.google.com/container-optimized-os/docs/release-notes#April_13_2026"
},
{
"category": "external",
"summary": "Microsoft Security Update Guide vom 2026-04-14",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21123-1 vom 2026-04-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025421.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21114-1 vom 2026-04-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025429.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21129-1 vom 2026-04-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025416.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21131-1 vom 2026-04-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025414.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20572-1 vom 2026-04-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/STWYWECAV6YINBQYRNTOUWNIHBOUY3YT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21237-1 vom 2026-04-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025557.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21230-1 vom 2026-04-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025560.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21255-1 vom 2026-04-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025583.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21241-1 vom 2026-04-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025595.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:10108 vom 2026-04-24",
"url": "https://access.redhat.com/errata/RHSA-2026:10108"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1573-1 vom 2026-04-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025596.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:11313 vom 2026-04-28",
"url": "https://access.redhat.com/errata/RHSA-2026:11313"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21361-1 vom 2026-04-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025743.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21352-1 vom 2026-04-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025751.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1643-1 vom 2026-04-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025762.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1661-1 vom 2026-04-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025787.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6243 vom 2026-05-04",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00154.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4561 vom 2026-05-02",
"url": "https://lists.debian.org/debian-lts-announce/2026/05/msg00005.html"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2026-05-02",
"url": "https://docs.cloud.google.com/container-optimized-os/docs/release-notes#May_01_2026"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6238 vom 2026-05-04",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00148.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:13565 vom 2026-05-04",
"url": "https://access.redhat.com/errata/RHSA-2026:13565"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:13566 vom 2026-05-05",
"url": "https://access.redhat.com/errata/RHSA-2026:13566"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:13577 vom 2026-05-05",
"url": "https://access.redhat.com/errata/RHSA-2026:13577"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:13578 vom 2026-05-05",
"url": "https://access.redhat.com/errata/RHSA-2026:13578"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-05-04T22:00:00.000+00:00",
"generator": {
"date": "2026-05-05T08:26:58.003+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0985",
"initial_release_date": "2026-04-06T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-04-06T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-04-07T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2026-04-14T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2026-04-19T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-04-21T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-04-22T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-04-23T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-04-27T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-04-28T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-05-03T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
},
{
"date": "2026-05-04T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "11"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "azl3",
"product": {
"name": "Microsoft Azure Linux azl3",
"product_id": "T049210",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_linux:azl3"
}
}
}
],
"category": "product_name",
"name": "Azure Linux"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028462",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-23412",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23412"
},
{
"cve": "CVE-2026-23413",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23413"
},
{
"cve": "CVE-2026-23414",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23414"
},
{
"cve": "CVE-2026-23415",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23415"
},
{
"cve": "CVE-2026-23416",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23416"
},
{
"cve": "CVE-2026-23417",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23417"
},
{
"cve": "CVE-2026-23418",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23418"
},
{
"cve": "CVE-2026-23419",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23419"
},
{
"cve": "CVE-2026-23420",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23420"
},
{
"cve": "CVE-2026-23421",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23421"
},
{
"cve": "CVE-2026-23422",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23422"
},
{
"cve": "CVE-2026-23423",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23423"
},
{
"cve": "CVE-2026-23424",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23424"
},
{
"cve": "CVE-2026-23425",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23425"
},
{
"cve": "CVE-2026-23426",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23426"
},
{
"cve": "CVE-2026-23427",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23427"
},
{
"cve": "CVE-2026-23428",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23428"
},
{
"cve": "CVE-2026-23429",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23429"
},
{
"cve": "CVE-2026-23430",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23430"
},
{
"cve": "CVE-2026-23431",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23431"
},
{
"cve": "CVE-2026-23432",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23432"
},
{
"cve": "CVE-2026-23433",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23433"
},
{
"cve": "CVE-2026-23434",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23434"
},
{
"cve": "CVE-2026-23435",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23435"
},
{
"cve": "CVE-2026-23436",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23436"
},
{
"cve": "CVE-2026-23437",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23437"
},
{
"cve": "CVE-2026-23438",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23438"
},
{
"cve": "CVE-2026-23439",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23439"
},
{
"cve": "CVE-2026-23440",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23440"
},
{
"cve": "CVE-2026-23441",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23441"
},
{
"cve": "CVE-2026-23442",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23442"
},
{
"cve": "CVE-2026-23443",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23443"
},
{
"cve": "CVE-2026-23444",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23444"
},
{
"cve": "CVE-2026-23445",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23445"
},
{
"cve": "CVE-2026-23446",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23446"
},
{
"cve": "CVE-2026-23447",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23447"
},
{
"cve": "CVE-2026-23448",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23448"
},
{
"cve": "CVE-2026-23449",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23449"
},
{
"cve": "CVE-2026-23450",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23450"
},
{
"cve": "CVE-2026-23451",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23451"
},
{
"cve": "CVE-2026-23452",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23452"
},
{
"cve": "CVE-2026-23453",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23453"
},
{
"cve": "CVE-2026-23454",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23454"
},
{
"cve": "CVE-2026-23455",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23455"
},
{
"cve": "CVE-2026-23456",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23456"
},
{
"cve": "CVE-2026-23457",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23457"
},
{
"cve": "CVE-2026-23458",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23458"
},
{
"cve": "CVE-2026-23459",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23459"
},
{
"cve": "CVE-2026-23460",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23460"
},
{
"cve": "CVE-2026-23461",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23461"
},
{
"cve": "CVE-2026-23462",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23462"
},
{
"cve": "CVE-2026-23463",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23463"
},
{
"cve": "CVE-2026-23464",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23464"
},
{
"cve": "CVE-2026-23465",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23465"
},
{
"cve": "CVE-2026-23466",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23466"
},
{
"cve": "CVE-2026-23467",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23467"
},
{
"cve": "CVE-2026-23468",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23468"
},
{
"cve": "CVE-2026-23469",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23469"
},
{
"cve": "CVE-2026-23470",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23470"
},
{
"cve": "CVE-2026-23471",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23471"
},
{
"cve": "CVE-2026-23472",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23472"
},
{
"cve": "CVE-2026-23473",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23473"
},
{
"cve": "CVE-2026-23474",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23474"
},
{
"cve": "CVE-2026-23475",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23475"
},
{
"cve": "CVE-2026-31389",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31389"
},
{
"cve": "CVE-2026-31390",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31390"
},
{
"cve": "CVE-2026-31391",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31391"
},
{
"cve": "CVE-2026-31392",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31392"
},
{
"cve": "CVE-2026-31393",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31393"
},
{
"cve": "CVE-2026-31394",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31394"
},
{
"cve": "CVE-2026-31395",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31395"
},
{
"cve": "CVE-2026-31396",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31396"
},
{
"cve": "CVE-2026-31397",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31397"
},
{
"cve": "CVE-2026-31398",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31398"
},
{
"cve": "CVE-2026-31399",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31399"
},
{
"cve": "CVE-2026-31400",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31400"
},
{
"cve": "CVE-2026-31401",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31401"
},
{
"cve": "CVE-2026-31402",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31402"
},
{
"cve": "CVE-2026-31403",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31403"
},
{
"cve": "CVE-2026-31404",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31404"
},
{
"cve": "CVE-2026-31405",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31405"
},
{
"cve": "CVE-2026-31406",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31406"
},
{
"cve": "CVE-2026-31407",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31407"
},
{
"cve": "CVE-2026-31408",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31408"
},
{
"cve": "CVE-2026-31409",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31409"
},
{
"cve": "CVE-2026-31410",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31410"
}
]
}
GHSA-H255-J2Q2-5HRG
Vulnerability from github – Published: 2026-04-03 18:31 – Updated: 2026-04-27 15:30In the Linux kernel, the following vulnerability has been resolved:
net: ti: icssg-prueth: Fix memory leak in XDP_DROP for non-zero-copy mode
Page recycling was removed from the XDP_DROP path in emac_run_xdp() to avoid conflicts with AF_XDP zero-copy mode, which uses xsk_buff_free() instead.
However, this causes a memory leak when running XDP programs that drop packets in non-zero-copy mode (standard page pool mode). The pages are never returned to the page pool, leading to OOM conditions.
Fix this by handling cleanup in the caller, emac_rx_packet(). When emac_run_xdp() returns ICSSG_XDP_CONSUMED for XDP_DROP, the caller now recycles the page back to the page pool. The zero-copy path, emac_rx_packet_zc() already handles cleanup correctly with xsk_buff_free().
{
"affected": [],
"aliases": [
"CVE-2026-23453"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-04-03T16:16:31Z",
"severity": "HIGH"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ti: icssg-prueth: Fix memory leak in XDP_DROP for non-zero-copy mode\n\nPage recycling was removed from the XDP_DROP path in emac_run_xdp() to\navoid conflicts with AF_XDP zero-copy mode, which uses xsk_buff_free()\ninstead.\n\nHowever, this causes a memory leak when running XDP programs that drop\npackets in non-zero-copy mode (standard page pool mode). The pages are\nnever returned to the page pool, leading to OOM conditions.\n\nFix this by handling cleanup in the caller, emac_rx_packet().\nWhen emac_run_xdp() returns ICSSG_XDP_CONSUMED for XDP_DROP, the\ncaller now recycles the page back to the page pool. The zero-copy\npath, emac_rx_packet_zc() already handles cleanup correctly with\nxsk_buff_free().",
"id": "GHSA-h255-j2q2-5hrg",
"modified": "2026-04-27T15:30:31Z",
"published": "2026-04-03T18:31:22Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23453"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/719d3e71691db7c4f1658ba5a6d1472928121594"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d16d57dedcb69c1a1257e0638f8698ce1f0ccbe5"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.