Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-23471 (GCVE-0-2026-23471)
Vulnerability from cvelistv5 – Published: 2026-04-03 15:15 – Updated: 2026-04-13 13:26This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Show details on NVD website{
"containers": {
"cna": {
"providerMetadata": {
"dateUpdated": "2026-04-13T13:26:09.459Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"rejectedReasons": [
{
"lang": "en",
"value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"x_generator": {
"engine": "cvelib 1.8.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-23471",
"datePublished": "2026-04-03T15:15:50.233Z",
"dateRejected": "2026-04-13T13:26:09.459Z",
"dateReserved": "2026-01-13T15:37:46.022Z",
"dateUpdated": "2026-04-13T13:26:09.459Z",
"state": "REJECTED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-23471",
"date": "2026-04-13",
"epss": "0.00032",
"percentile": "0.09222"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-23471\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-04-03T16:16:34.773\",\"lastModified\":\"2026-04-13T14:16:09.590\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\"}],\"metrics\":{},\"references\":[]}}"
}
}
WID-SEC-W-2026-0985
Vulnerability from csaf_certbund - Published: 2026-04-06 22:00 - Updated: 2026-05-04 22:00{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um unter anderem einen Denial of Service-Angriff auszuf\u00fchren oder um Sicherheitsmechanismen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0985 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0985.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0985 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0985"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23412",
"url": "https://lore.kernel.org/linux-cve-announce/2026040201-CVE-2026-23412-4daa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23413",
"url": "https://lore.kernel.org/linux-cve-announce/2026040203-CVE-2026-23413-fa13@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23414",
"url": "https://lore.kernel.org/linux-cve-announce/2026040203-CVE-2026-23414-d0e3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23415",
"url": "https://lore.kernel.org/linux-cve-announce/2026040204-CVE-2026-23415-3435@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23416",
"url": "https://lore.kernel.org/linux-cve-announce/2026040204-CVE-2026-23416-2941@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23417",
"url": "https://lore.kernel.org/linux-cve-announce/2026040204-CVE-2026-23417-d6a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23418",
"url": "https://lore.kernel.org/linux-cve-announce/2026040301-CVE-2026-23418-3cf7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23419",
"url": "https://lore.kernel.org/linux-cve-announce/2026040303-CVE-2026-23419-6055@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23420",
"url": "https://lore.kernel.org/linux-cve-announce/2026040303-CVE-2026-23420-c110@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23421",
"url": "https://lore.kernel.org/linux-cve-announce/2026040304-CVE-2026-23421-dace@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23422",
"url": "https://lore.kernel.org/linux-cve-announce/2026040304-CVE-2026-23422-1e6f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23423",
"url": "https://lore.kernel.org/linux-cve-announce/2026040304-CVE-2026-23423-96fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23424",
"url": "https://lore.kernel.org/linux-cve-announce/2026040305-CVE-2026-23424-7b21@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23425",
"url": "https://lore.kernel.org/linux-cve-announce/2026040305-CVE-2026-23425-80db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23426",
"url": "https://lore.kernel.org/linux-cve-announce/2026040305-CVE-2026-23426-4c05@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23427",
"url": "https://lore.kernel.org/linux-cve-announce/2026040307-CVE-2026-23427-5456@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23428",
"url": "https://lore.kernel.org/linux-cve-announce/2026040310-CVE-2026-23428-9e4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23429",
"url": "https://lore.kernel.org/linux-cve-announce/2026040310-CVE-2026-23429-2f24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23430",
"url": "https://lore.kernel.org/linux-cve-announce/2026040310-CVE-2026-23430-8d4a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23431",
"url": "https://lore.kernel.org/linux-cve-announce/2026040311-CVE-2026-23431-3aee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23432",
"url": "https://lore.kernel.org/linux-cve-announce/2026040311-CVE-2026-23432-4aaf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23433",
"url": "https://lore.kernel.org/linux-cve-announce/2026040311-CVE-2026-23433-01be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23434",
"url": "https://lore.kernel.org/linux-cve-announce/2026040311-CVE-2026-23434-f0f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23435",
"url": "https://lore.kernel.org/linux-cve-announce/2026040312-CVE-2026-23435-e721@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23436",
"url": "https://lore.kernel.org/linux-cve-announce/2026040312-CVE-2026-23436-f1f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23437",
"url": "https://lore.kernel.org/linux-cve-announce/2026040312-CVE-2026-23437-9787@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23438",
"url": "https://lore.kernel.org/linux-cve-announce/2026040313-CVE-2026-23438-5faa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23439",
"url": "https://lore.kernel.org/linux-cve-announce/2026040313-CVE-2026-23439-ed88@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23440",
"url": "https://lore.kernel.org/linux-cve-announce/2026040313-CVE-2026-23440-9b9f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23441",
"url": "https://lore.kernel.org/linux-cve-announce/2026040313-CVE-2026-23441-b47e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23442",
"url": "https://lore.kernel.org/linux-cve-announce/2026040314-CVE-2026-23442-fe23@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23443",
"url": "https://lore.kernel.org/linux-cve-announce/2026040314-CVE-2026-23443-19e2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23444",
"url": "https://lore.kernel.org/linux-cve-announce/2026040314-CVE-2026-23444-8169@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23445",
"url": "https://lore.kernel.org/linux-cve-announce/2026040315-CVE-2026-23445-d003@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23446",
"url": "https://lore.kernel.org/linux-cve-announce/2026040315-CVE-2026-23446-65cf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23447",
"url": "https://lore.kernel.org/linux-cve-announce/2026040315-CVE-2026-23447-dd25@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23448",
"url": "https://lore.kernel.org/linux-cve-announce/2026040315-CVE-2026-23448-1d79@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23449",
"url": "https://lore.kernel.org/linux-cve-announce/2026040316-CVE-2026-23449-1717@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23450",
"url": "https://lore.kernel.org/linux-cve-announce/2026040316-CVE-2026-23450-2437@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23451",
"url": "https://lore.kernel.org/linux-cve-announce/2026040316-CVE-2026-23451-1298@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23452",
"url": "https://lore.kernel.org/linux-cve-announce/2026040317-CVE-2026-23452-4c2b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23453",
"url": "https://lore.kernel.org/linux-cve-announce/2026040317-CVE-2026-23453-c4f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23454",
"url": "https://lore.kernel.org/linux-cve-announce/2026040317-CVE-2026-23454-a999@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23455",
"url": "https://lore.kernel.org/linux-cve-announce/2026040317-CVE-2026-23455-f045@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23456",
"url": "https://lore.kernel.org/linux-cve-announce/2026040318-CVE-2026-23456-7da2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23457",
"url": "https://lore.kernel.org/linux-cve-announce/2026040318-CVE-2026-23457-e7f6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23458",
"url": "https://lore.kernel.org/linux-cve-announce/2026040318-CVE-2026-23458-5578@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23459",
"url": "https://lore.kernel.org/linux-cve-announce/2026040319-CVE-2026-23459-fcfb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23460",
"url": "https://lore.kernel.org/linux-cve-announce/2026040319-CVE-2026-23460-f1d1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23461",
"url": "https://lore.kernel.org/linux-cve-announce/2026040319-CVE-2026-23461-f03d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23462",
"url": "https://lore.kernel.org/linux-cve-announce/2026040319-CVE-2026-23462-297c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23463",
"url": "https://lore.kernel.org/linux-cve-announce/2026040320-CVE-2026-23463-e730@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23464",
"url": "https://lore.kernel.org/linux-cve-announce/2026040320-CVE-2026-23464-840f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23465",
"url": "https://lore.kernel.org/linux-cve-announce/2026040320-CVE-2026-23465-9c96@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23466",
"url": "https://lore.kernel.org/linux-cve-announce/2026040321-CVE-2026-23466-ae2c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23467",
"url": "https://lore.kernel.org/linux-cve-announce/2026040321-CVE-2026-23467-9cfe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23468",
"url": "https://lore.kernel.org/linux-cve-announce/2026040321-CVE-2026-23468-8be9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23469",
"url": "https://lore.kernel.org/linux-cve-announce/2026040322-CVE-2026-23469-fd6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23470",
"url": "https://lore.kernel.org/linux-cve-announce/2026040322-CVE-2026-23470-a491@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23471",
"url": "https://lore.kernel.org/linux-cve-announce/2026040322-CVE-2026-23471-f1bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23472",
"url": "https://lore.kernel.org/linux-cve-announce/2026040322-CVE-2026-23472-c68c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23473",
"url": "https://lore.kernel.org/linux-cve-announce/2026040323-CVE-2026-23473-ab6c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23474",
"url": "https://lore.kernel.org/linux-cve-announce/2026040323-CVE-2026-23474-e350@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23475",
"url": "https://lore.kernel.org/linux-cve-announce/2026040323-CVE-2026-23475-8bf5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31389",
"url": "https://lore.kernel.org/linux-cve-announce/2026040324-CVE-2026-31389-036b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31390",
"url": "https://lore.kernel.org/linux-cve-announce/2026040324-CVE-2026-31390-f363@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31391",
"url": "https://lore.kernel.org/linux-cve-announce/2026040324-CVE-2026-31391-4b86@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31392",
"url": "https://lore.kernel.org/linux-cve-announce/2026040324-CVE-2026-31392-7952@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31393",
"url": "https://lore.kernel.org/linux-cve-announce/2026040325-CVE-2026-31393-5e12@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31394",
"url": "https://lore.kernel.org/linux-cve-announce/2026040325-CVE-2026-31394-26ac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31395",
"url": "https://lore.kernel.org/linux-cve-announce/2026040325-CVE-2026-31395-8855@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31396",
"url": "https://lore.kernel.org/linux-cve-announce/2026040326-CVE-2026-31396-0dad@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31397",
"url": "https://lore.kernel.org/linux-cve-announce/2026040326-CVE-2026-31397-8672@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31398",
"url": "https://lore.kernel.org/linux-cve-announce/2026040326-CVE-2026-31398-babe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31399",
"url": "https://lore.kernel.org/linux-cve-announce/2026040326-CVE-2026-31399-9b84@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31400",
"url": "https://lore.kernel.org/linux-cve-announce/2026040327-CVE-2026-31400-db79@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31401",
"url": "https://lore.kernel.org/linux-cve-announce/2026040327-CVE-2026-31401-697d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31402",
"url": "https://lore.kernel.org/linux-cve-announce/2026040327-CVE-2026-31402-3e6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31403",
"url": "https://lore.kernel.org/linux-cve-announce/2026040328-CVE-2026-31403-5446@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31404",
"url": "https://lore.kernel.org/linux-cve-announce/2026040328-CVE-2026-31404-f58a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31405",
"url": "https://lore.kernel.org/linux-cve-announce/2026040603-CVE-2026-31405-8cfb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31406",
"url": "https://lore.kernel.org/linux-cve-announce/2026040628-CVE-2026-31406-e2f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31407",
"url": "https://lore.kernel.org/linux-cve-announce/2026040628-CVE-2026-31407-6abd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31408",
"url": "https://lore.kernel.org/linux-cve-announce/2026040629-CVE-2026-31408-9f0f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31409",
"url": "https://lore.kernel.org/linux-cve-announce/2026040629-CVE-2026-31409-d22c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31410",
"url": "https://lore.kernel.org/linux-cve-announce/2026040629-CVE-2026-31410-5b44@gregkh/"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2026-04-07",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "CVE-2026-23416 PoC",
"url": "https://github.com/bluedragonsecurity/CVE-2026-23416-POC"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2026-04-08",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2026-04-14",
"url": "https://docs.cloud.google.com/container-optimized-os/docs/release-notes#April_13_2026"
},
{
"category": "external",
"summary": "Microsoft Security Update Guide vom 2026-04-14",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21123-1 vom 2026-04-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025421.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21114-1 vom 2026-04-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025429.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21129-1 vom 2026-04-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025416.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21131-1 vom 2026-04-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025414.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20572-1 vom 2026-04-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/STWYWECAV6YINBQYRNTOUWNIHBOUY3YT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21237-1 vom 2026-04-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025557.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21230-1 vom 2026-04-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025560.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21255-1 vom 2026-04-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025583.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21241-1 vom 2026-04-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025595.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:10108 vom 2026-04-24",
"url": "https://access.redhat.com/errata/RHSA-2026:10108"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1573-1 vom 2026-04-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025596.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:11313 vom 2026-04-28",
"url": "https://access.redhat.com/errata/RHSA-2026:11313"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21361-1 vom 2026-04-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025743.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21352-1 vom 2026-04-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025751.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1643-1 vom 2026-04-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025762.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1661-1 vom 2026-04-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025787.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6243 vom 2026-05-04",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00154.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4561 vom 2026-05-02",
"url": "https://lists.debian.org/debian-lts-announce/2026/05/msg00005.html"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2026-05-02",
"url": "https://docs.cloud.google.com/container-optimized-os/docs/release-notes#May_01_2026"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6238 vom 2026-05-04",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00148.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:13565 vom 2026-05-04",
"url": "https://access.redhat.com/errata/RHSA-2026:13565"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:13566 vom 2026-05-05",
"url": "https://access.redhat.com/errata/RHSA-2026:13566"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:13577 vom 2026-05-05",
"url": "https://access.redhat.com/errata/RHSA-2026:13577"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:13578 vom 2026-05-05",
"url": "https://access.redhat.com/errata/RHSA-2026:13578"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-05-04T22:00:00.000+00:00",
"generator": {
"date": "2026-05-05T08:26:58.003+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0985",
"initial_release_date": "2026-04-06T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-04-06T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-04-07T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2026-04-14T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2026-04-19T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-04-21T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-04-22T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-04-23T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-04-27T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-04-28T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-05-03T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
},
{
"date": "2026-05-04T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "11"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "azl3",
"product": {
"name": "Microsoft Azure Linux azl3",
"product_id": "T049210",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_linux:azl3"
}
}
}
],
"category": "product_name",
"name": "Azure Linux"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028462",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-23412",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23412"
},
{
"cve": "CVE-2026-23413",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23413"
},
{
"cve": "CVE-2026-23414",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23414"
},
{
"cve": "CVE-2026-23415",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23415"
},
{
"cve": "CVE-2026-23416",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23416"
},
{
"cve": "CVE-2026-23417",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23417"
},
{
"cve": "CVE-2026-23418",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23418"
},
{
"cve": "CVE-2026-23419",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23419"
},
{
"cve": "CVE-2026-23420",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23420"
},
{
"cve": "CVE-2026-23421",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23421"
},
{
"cve": "CVE-2026-23422",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23422"
},
{
"cve": "CVE-2026-23423",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23423"
},
{
"cve": "CVE-2026-23424",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23424"
},
{
"cve": "CVE-2026-23425",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23425"
},
{
"cve": "CVE-2026-23426",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23426"
},
{
"cve": "CVE-2026-23427",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23427"
},
{
"cve": "CVE-2026-23428",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23428"
},
{
"cve": "CVE-2026-23429",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23429"
},
{
"cve": "CVE-2026-23430",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23430"
},
{
"cve": "CVE-2026-23431",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23431"
},
{
"cve": "CVE-2026-23432",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23432"
},
{
"cve": "CVE-2026-23433",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23433"
},
{
"cve": "CVE-2026-23434",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23434"
},
{
"cve": "CVE-2026-23435",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23435"
},
{
"cve": "CVE-2026-23436",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23436"
},
{
"cve": "CVE-2026-23437",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23437"
},
{
"cve": "CVE-2026-23438",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23438"
},
{
"cve": "CVE-2026-23439",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23439"
},
{
"cve": "CVE-2026-23440",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23440"
},
{
"cve": "CVE-2026-23441",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23441"
},
{
"cve": "CVE-2026-23442",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23442"
},
{
"cve": "CVE-2026-23443",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23443"
},
{
"cve": "CVE-2026-23444",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23444"
},
{
"cve": "CVE-2026-23445",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23445"
},
{
"cve": "CVE-2026-23446",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23446"
},
{
"cve": "CVE-2026-23447",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23447"
},
{
"cve": "CVE-2026-23448",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23448"
},
{
"cve": "CVE-2026-23449",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23449"
},
{
"cve": "CVE-2026-23450",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23450"
},
{
"cve": "CVE-2026-23451",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23451"
},
{
"cve": "CVE-2026-23452",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23452"
},
{
"cve": "CVE-2026-23453",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23453"
},
{
"cve": "CVE-2026-23454",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23454"
},
{
"cve": "CVE-2026-23455",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23455"
},
{
"cve": "CVE-2026-23456",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23456"
},
{
"cve": "CVE-2026-23457",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23457"
},
{
"cve": "CVE-2026-23458",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23458"
},
{
"cve": "CVE-2026-23459",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23459"
},
{
"cve": "CVE-2026-23460",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23460"
},
{
"cve": "CVE-2026-23461",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23461"
},
{
"cve": "CVE-2026-23462",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23462"
},
{
"cve": "CVE-2026-23463",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23463"
},
{
"cve": "CVE-2026-23464",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23464"
},
{
"cve": "CVE-2026-23465",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23465"
},
{
"cve": "CVE-2026-23466",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23466"
},
{
"cve": "CVE-2026-23467",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23467"
},
{
"cve": "CVE-2026-23468",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23468"
},
{
"cve": "CVE-2026-23469",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23469"
},
{
"cve": "CVE-2026-23470",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23470"
},
{
"cve": "CVE-2026-23471",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23471"
},
{
"cve": "CVE-2026-23472",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23472"
},
{
"cve": "CVE-2026-23473",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23473"
},
{
"cve": "CVE-2026-23474",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23474"
},
{
"cve": "CVE-2026-23475",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23475"
},
{
"cve": "CVE-2026-31389",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31389"
},
{
"cve": "CVE-2026-31390",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31390"
},
{
"cve": "CVE-2026-31391",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31391"
},
{
"cve": "CVE-2026-31392",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31392"
},
{
"cve": "CVE-2026-31393",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31393"
},
{
"cve": "CVE-2026-31394",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31394"
},
{
"cve": "CVE-2026-31395",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31395"
},
{
"cve": "CVE-2026-31396",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31396"
},
{
"cve": "CVE-2026-31397",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31397"
},
{
"cve": "CVE-2026-31398",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31398"
},
{
"cve": "CVE-2026-31399",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31399"
},
{
"cve": "CVE-2026-31400",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31400"
},
{
"cve": "CVE-2026-31401",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31401"
},
{
"cve": "CVE-2026-31402",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31402"
},
{
"cve": "CVE-2026-31403",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31403"
},
{
"cve": "CVE-2026-31404",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31404"
},
{
"cve": "CVE-2026-31405",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31405"
},
{
"cve": "CVE-2026-31406",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31406"
},
{
"cve": "CVE-2026-31407",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31407"
},
{
"cve": "CVE-2026-31408",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31408"
},
{
"cve": "CVE-2026-31409",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31409"
},
{
"cve": "CVE-2026-31410",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31410"
}
]
}
FKIE_CVE-2026-23471
Vulnerability from fkie_nvd - Published: 2026-04-03 16:16 - Updated: 2026-04-13 14:16| URL | Tags |
|---|
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"id": "CVE-2026-23471",
"lastModified": "2026-04-13T14:16:09.590",
"metrics": {},
"published": "2026-04-03T16:16:34.773",
"references": [],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Rejected"
}
GHSA-9H7X-8RRR-C9C7
Vulnerability from github – Published: 2026-04-03 18:31 – Updated: 2026-04-03 18:31In the Linux kernel, the following vulnerability has been resolved:
drm: Fix use-after-free on framebuffers and property blobs when calling drm_dev_unplug
When trying to do a rather aggressive test of igt's "xe_module_load --r reload" with a full desktop environment and game running I noticed a few OOPSes when dereferencing freed pointers, related to framebuffers and property blobs after the compositor exits.
Solve this by guarding the freeing in drm_file with drm_dev_enter/exit, and immediately put the references from struct drm_file objects during drm_dev_unplug().
Related warnings for framebuffers on the subtest: [ 739.713076] ------------[ cut here ]------------ WARN_ON(!list_empty(&dev->mode_config.fb_list)) [ 739.713079] WARNING: drivers/gpu/drm/drm_mode_config.c:584 at drm_mode_config_cleanup+0x30b/0x320 [drm], CPU#12: xe_module_load/13145 .... [ 739.713328] Call Trace: [ 739.713330] [ 739.713335] ? intel_pmdemand_destroy_state+0x11/0x20 [xe] [ 739.713574] ? intel_atomic_global_obj_cleanup+0xe4/0x1a0 [xe] [ 739.713794] intel_display_driver_remove_noirq+0x51/0xb0 [xe] [ 739.714041] xe_display_fini_early+0x33/0x50 [xe] [ 739.714284] devm_action_release+0xf/0x20 [ 739.714294] devres_release_all+0xad/0xf0 [ 739.714301] device_unbind_cleanup+0x12/0xa0 [ 739.714305] device_release_driver_internal+0x1b7/0x210 [ 739.714311] device_driver_detach+0x14/0x20 [ 739.714315] unbind_store+0xa6/0xb0 [ 739.714319] drv_attr_store+0x21/0x30 [ 739.714322] sysfs_kf_write+0x48/0x60 [ 739.714328] kernfs_fop_write_iter+0x16b/0x240 [ 739.714333] vfs_write+0x266/0x520 [ 739.714341] ksys_write+0x72/0xe0 [ 739.714345] __x64_sys_write+0x19/0x20 [ 739.714347] x64_sys_call+0xa15/0xa30 [ 739.714355] do_syscall_64+0xd8/0xab0 [ 739.714361] entry_SYSCALL_64_after_hwframe+0x4b/0x53
and
[ 739.714459] ------------[ cut here ]------------ [ 739.714461] xe 0000:67:00.0: [drm] drm_WARN_ON(!list_empty(&fb->filp_head)) [ 739.714464] WARNING: drivers/gpu/drm/drm_framebuffer.c:833 at drm_framebuffer_free+0x6c/0x90 [drm], CPU#12: xe_module_load/13145 [ 739.714715] RIP: 0010:drm_framebuffer_free+0x7a/0x90 [drm] ... [ 739.714869] Call Trace: [ 739.714871] [ 739.714876] drm_mode_config_cleanup+0x26a/0x320 [drm] [ 739.714998] ? __drm_printfn_seq_file+0x20/0x20 [drm] [ 739.715115] ? drm_mode_config_cleanup+0x207/0x320 [drm] [ 739.715235] intel_display_driver_remove_noirq+0x51/0xb0 [xe] [ 739.715576] xe_display_fini_early+0x33/0x50 [xe] [ 739.715821] devm_action_release+0xf/0x20 [ 739.715828] devres_release_all+0xad/0xf0 [ 739.715843] device_unbind_cleanup+0x12/0xa0 [ 739.715850] device_release_driver_internal+0x1b7/0x210 [ 739.715856] device_driver_detach+0x14/0x20 [ 739.715860] unbind_store+0xa6/0xb0 [ 739.715865] drv_attr_store+0x21/0x30 [ 739.715868] sysfs_kf_write+0x48/0x60 [ 739.715873] kernfs_fop_write_iter+0x16b/0x240 [ 739.715878] vfs_write+0x266/0x520 [ 739.715886] ksys_write+0x72/0xe0 [ 739.715890] __x64_sys_write+0x19/0x20 [ 739.715893] x64_sys_call+0xa15/0xa30 [ 739.715900] do_syscall_64+0xd8/0xab0 [ 739.715905] entry_SYSCALL_64_after_hwframe+0x4b/0x53
and then finally file close blows up:
[ 743.186530] Oops: general protection fault, probably for non-canonical address 0xdead000000000122: 0000 [#1] SMP [ 743.186535] CPU: 3 UID: 1000 PID: 3453 Comm: kwin_wayland Tainted: G W 7.0.0-rc1-valkyria+ #110 PREEMPT_{RT,(lazy)} [ 743.186537] Tainted: [W]=WARN [ 743.186538] Hardware name: Gigabyte Technology Co., Ltd. X299 AORUS Gaming 3/X299 AORUS Gaming 3-CF, BIOS F8n 12/06/2021 [ 743.186539] RIP: 0010:drm_framebuffer_cleanup+0x55/0xc0 [drm] [ 743.186588] Code: d8 72 73 0f b6 42 05 ff c3 39 c3 72 e8 49 8d bd 50 07 00 00 31 f6 e8 3a 80 d3 e1 49 8b 44 24 10 49 8d 7c 24 08 49 8b 54 24 08 <48> 3b 38 0f 85 95 7f 02 00 48 3b 7a 08 0f 85 8b 7f 02 00 48 89 42 [ 743.186589] RSP: 0018:ffffc900085e3cf8 EFLAGS: 00 ---truncated---
{
"affected": [],
"aliases": [
"CVE-2026-23471"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-04-03T16:16:34Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: Fix use-after-free on framebuffers and property blobs when calling drm_dev_unplug\n\nWhen trying to do a rather aggressive test of igt\u0027s \"xe_module_load\n--r reload\" with a full desktop environment and game running I noticed\na few OOPSes when dereferencing freed pointers, related to\nframebuffers and property blobs after the compositor exits.\n\nSolve this by guarding the freeing in drm_file with drm_dev_enter/exit,\nand immediately put the references from struct drm_file objects during\ndrm_dev_unplug().\n\nRelated warnings for framebuffers on the subtest:\n[ 739.713076] ------------[ cut here ]------------\n WARN_ON(!list_empty(\u0026dev-\u003emode_config.fb_list))\n[ 739.713079] WARNING: drivers/gpu/drm/drm_mode_config.c:584 at drm_mode_config_cleanup+0x30b/0x320 [drm], CPU#12: xe_module_load/13145\n....\n[ 739.713328] Call Trace:\n[ 739.713330] \u003cTASK\u003e\n[ 739.713335] ? intel_pmdemand_destroy_state+0x11/0x20 [xe]\n[ 739.713574] ? intel_atomic_global_obj_cleanup+0xe4/0x1a0 [xe]\n[ 739.713794] intel_display_driver_remove_noirq+0x51/0xb0 [xe]\n[ 739.714041] xe_display_fini_early+0x33/0x50 [xe]\n[ 739.714284] devm_action_release+0xf/0x20\n[ 739.714294] devres_release_all+0xad/0xf0\n[ 739.714301] device_unbind_cleanup+0x12/0xa0\n[ 739.714305] device_release_driver_internal+0x1b7/0x210\n[ 739.714311] device_driver_detach+0x14/0x20\n[ 739.714315] unbind_store+0xa6/0xb0\n[ 739.714319] drv_attr_store+0x21/0x30\n[ 739.714322] sysfs_kf_write+0x48/0x60\n[ 739.714328] kernfs_fop_write_iter+0x16b/0x240\n[ 739.714333] vfs_write+0x266/0x520\n[ 739.714341] ksys_write+0x72/0xe0\n[ 739.714345] __x64_sys_write+0x19/0x20\n[ 739.714347] x64_sys_call+0xa15/0xa30\n[ 739.714355] do_syscall_64+0xd8/0xab0\n[ 739.714361] entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\nand\n\n[ 739.714459] ------------[ cut here ]------------\n[ 739.714461] xe 0000:67:00.0: [drm] drm_WARN_ON(!list_empty(\u0026fb-\u003efilp_head))\n[ 739.714464] WARNING: drivers/gpu/drm/drm_framebuffer.c:833 at drm_framebuffer_free+0x6c/0x90 [drm], CPU#12: xe_module_load/13145\n[ 739.714715] RIP: 0010:drm_framebuffer_free+0x7a/0x90 [drm]\n...\n[ 739.714869] Call Trace:\n[ 739.714871] \u003cTASK\u003e\n[ 739.714876] drm_mode_config_cleanup+0x26a/0x320 [drm]\n[ 739.714998] ? __drm_printfn_seq_file+0x20/0x20 [drm]\n[ 739.715115] ? drm_mode_config_cleanup+0x207/0x320 [drm]\n[ 739.715235] intel_display_driver_remove_noirq+0x51/0xb0 [xe]\n[ 739.715576] xe_display_fini_early+0x33/0x50 [xe]\n[ 739.715821] devm_action_release+0xf/0x20\n[ 739.715828] devres_release_all+0xad/0xf0\n[ 739.715843] device_unbind_cleanup+0x12/0xa0\n[ 739.715850] device_release_driver_internal+0x1b7/0x210\n[ 739.715856] device_driver_detach+0x14/0x20\n[ 739.715860] unbind_store+0xa6/0xb0\n[ 739.715865] drv_attr_store+0x21/0x30\n[ 739.715868] sysfs_kf_write+0x48/0x60\n[ 739.715873] kernfs_fop_write_iter+0x16b/0x240\n[ 739.715878] vfs_write+0x266/0x520\n[ 739.715886] ksys_write+0x72/0xe0\n[ 739.715890] __x64_sys_write+0x19/0x20\n[ 739.715893] x64_sys_call+0xa15/0xa30\n[ 739.715900] do_syscall_64+0xd8/0xab0\n[ 739.715905] entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\nand then finally file close blows up:\n\n[ 743.186530] Oops: general protection fault, probably for non-canonical address 0xdead000000000122: 0000 [#1] SMP\n[ 743.186535] CPU: 3 UID: 1000 PID: 3453 Comm: kwin_wayland Tainted: G W 7.0.0-rc1-valkyria+ #110 PREEMPT_{RT,(lazy)}\n[ 743.186537] Tainted: [W]=WARN\n[ 743.186538] Hardware name: Gigabyte Technology Co., Ltd. X299 AORUS Gaming 3/X299 AORUS Gaming 3-CF, BIOS F8n 12/06/2021\n[ 743.186539] RIP: 0010:drm_framebuffer_cleanup+0x55/0xc0 [drm]\n[ 743.186588] Code: d8 72 73 0f b6 42 05 ff c3 39 c3 72 e8 49 8d bd 50 07 00 00 31 f6 e8 3a 80 d3 e1 49 8b 44 24 10 49 8d 7c 24 08 49 8b 54 24 08 \u003c48\u003e 3b 38 0f 85 95 7f 02 00 48 3b 7a 08 0f 85 8b 7f 02 00 48 89 42\n[ 743.186589] RSP: 0018:ffffc900085e3cf8 EFLAGS: 00\n---truncated---",
"id": "GHSA-9h7x-8rrr-c9c7",
"modified": "2026-04-03T18:31:22Z",
"published": "2026-04-03T18:31:22Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23471"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/074d06d3724ccab0c5bb779db594a82b6405e501"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/54df178324b268c62f847381e2813a1b0f971384"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/6bee098b91417654703e17eb5c1822c6dfd0c01d"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/7e3ec3bf4015156dcc5bafed13f26a587cc37f5c"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/e493c135980f90c20308d1a98f2e0d1223951e94"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/eec4d5758f33925e0bdb4a32b45d86a68afa4516"
}
],
"schema_version": "1.4.0",
"severity": []
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.