Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-23440 (GCVE-0-2026-23440)
Vulnerability from cvelistv5 – Published: 2026-04-03 15:15 – Updated: 2026-04-27 14:02| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
fef06678931ff67b158d337b581e5cf5ca40a3a3 , < 3dffc083292e6872787bd7e34b957627622f9af4
(git)
Affected: fef06678931ff67b158d337b581e5cf5ca40a3a3 , < 2051c709dce92da3550040aa7949cd5a9c89b14e (git) Affected: fef06678931ff67b158d337b581e5cf5ca40a3a3 , < 96c9c25b74686ac2de15921c9ad30c5ef13af8cd (git) Affected: fef06678931ff67b158d337b581e5cf5ca40a3a3 , < 8d625c15471fb8780125eaef682983a96af77bdc (git) Affected: fef06678931ff67b158d337b581e5cf5ca40a3a3 , < beb6e2e5976a128b0cccf10d158124422210c5ef (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec_offload.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "3dffc083292e6872787bd7e34b957627622f9af4",
"status": "affected",
"version": "fef06678931ff67b158d337b581e5cf5ca40a3a3",
"versionType": "git"
},
{
"lessThan": "2051c709dce92da3550040aa7949cd5a9c89b14e",
"status": "affected",
"version": "fef06678931ff67b158d337b581e5cf5ca40a3a3",
"versionType": "git"
},
{
"lessThan": "96c9c25b74686ac2de15921c9ad30c5ef13af8cd",
"status": "affected",
"version": "fef06678931ff67b158d337b581e5cf5ca40a3a3",
"versionType": "git"
},
{
"lessThan": "8d625c15471fb8780125eaef682983a96af77bdc",
"status": "affected",
"version": "fef06678931ff67b158d337b581e5cf5ca40a3a3",
"versionType": "git"
},
{
"lessThan": "beb6e2e5976a128b0cccf10d158124422210c5ef",
"status": "affected",
"version": "fef06678931ff67b158d337b581e5cf5ca40a3a3",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/mellanox/mlx5/core/en_accel/ipsec_offload.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.4"
},
{
"lessThan": "6.4",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.130",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.78",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.20",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.19.*",
"status": "unaffected",
"version": "6.19.10",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "7.0",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.130",
"versionStartIncluding": "6.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.78",
"versionStartIncluding": "6.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.20",
"versionStartIncluding": "6.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19.10",
"versionStartIncluding": "6.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0",
"versionStartIncluding": "6.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix race condition during IPSec ESN update\n\nIn IPSec full offload mode, the device reports an ESN (Extended\nSequence Number) wrap event to the driver. The driver validates this\nevent by querying the IPSec ASO and checking that the esn_event_arm\nfield is 0x0, which indicates an event has occurred. After handling\nthe event, the driver must re-arm the context by setting esn_event_arm\nback to 0x1.\n\nA race condition exists in this handling path. After validating the\nevent, the driver calls mlx5_accel_esp_modify_xfrm() to update the\nkernel\u0027s xfrm state. This function temporarily releases and\nre-acquires the xfrm state lock.\n\nSo, need to acknowledge the event first by setting esn_event_arm to\n0x1. This prevents the driver from reprocessing the same ESN update if\nthe hardware sends events for other reason. Since the next ESN update\nonly occurs after nearly 2^31 packets are received, there\u0027s no risk of\nmissing an update, as it will happen long after this handling has\nfinished.\n\nProcessing the event twice causes the ESN high-order bits (esn_msb) to\nbe incremented incorrectly. The driver then programs the hardware with\nthis invalid ESN state, which leads to anti-replay failures and a\ncomplete halt of IPSec traffic.\n\nFix this by re-arming the ESN event immediately after it is validated,\nbefore calling mlx5_accel_esp_modify_xfrm(). This ensures that any\nspurious, duplicate events are correctly ignored, closing the race\nwindow."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-27T14:02:25.212Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/3dffc083292e6872787bd7e34b957627622f9af4"
},
{
"url": "https://git.kernel.org/stable/c/2051c709dce92da3550040aa7949cd5a9c89b14e"
},
{
"url": "https://git.kernel.org/stable/c/96c9c25b74686ac2de15921c9ad30c5ef13af8cd"
},
{
"url": "https://git.kernel.org/stable/c/8d625c15471fb8780125eaef682983a96af77bdc"
},
{
"url": "https://git.kernel.org/stable/c/beb6e2e5976a128b0cccf10d158124422210c5ef"
}
],
"title": "net/mlx5e: Fix race condition during IPSec ESN update",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-23440",
"datePublished": "2026-04-03T15:15:24.596Z",
"dateReserved": "2026-01-13T15:37:46.017Z",
"dateUpdated": "2026-04-27T14:02:25.212Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-23440",
"date": "2026-05-07",
"epss": "0.00034",
"percentile": "0.10101"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-23440\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-04-03T16:16:26.020\",\"lastModified\":\"2026-04-27T14:16:32.883\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet/mlx5e: Fix race condition during IPSec ESN update\\n\\nIn IPSec full offload mode, the device reports an ESN (Extended\\nSequence Number) wrap event to the driver. The driver validates this\\nevent by querying the IPSec ASO and checking that the esn_event_arm\\nfield is 0x0, which indicates an event has occurred. After handling\\nthe event, the driver must re-arm the context by setting esn_event_arm\\nback to 0x1.\\n\\nA race condition exists in this handling path. After validating the\\nevent, the driver calls mlx5_accel_esp_modify_xfrm() to update the\\nkernel\u0027s xfrm state. This function temporarily releases and\\nre-acquires the xfrm state lock.\\n\\nSo, need to acknowledge the event first by setting esn_event_arm to\\n0x1. This prevents the driver from reprocessing the same ESN update if\\nthe hardware sends events for other reason. Since the next ESN update\\nonly occurs after nearly 2^31 packets are received, there\u0027s no risk of\\nmissing an update, as it will happen long after this handling has\\nfinished.\\n\\nProcessing the event twice causes the ESN high-order bits (esn_msb) to\\nbe incremented incorrectly. The driver then programs the hardware with\\nthis invalid ESN state, which leads to anti-replay failures and a\\ncomplete halt of IPSec traffic.\\n\\nFix this by re-arming the ESN event immediately after it is validated,\\nbefore calling mlx5_accel_esp_modify_xfrm(). This ensures that any\\nspurious, duplicate events are correctly ignored, closing the race\\nwindow.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.4.1\",\"versionEndExcluding\":\"6.6.130\",\"matchCriteriaId\":\"5ED2C179-5F1F-4BB1-9DEA-A21F23BC569B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.12.78\",\"matchCriteriaId\":\"28D591F5-B196-4CC9-905C-DC80F116E7A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.13\",\"versionEndExcluding\":\"6.18.20\",\"matchCriteriaId\":\"E5571059-6552-48E7-9BEF-3E358C387171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.19\",\"versionEndExcluding\":\"6.19.10\",\"matchCriteriaId\":\"96D34333-38BE-4414-9E79-6EB764329581\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE0B0BF6-0EEF-4FAD-927D-7A0DD77BEE75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F253B622-8837-4245-BCE5-A7BF8FC76A16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AE85AD8-4641-4E7C-A2F4-305E2CD9EE64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F666C8D8-6538-46D4-B318-87610DE64C34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"02259FDA-961B-47BC-AE7F-93D7EC6E90C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"58A9FEFF-C040-420D-8F0A-BFDAAA1DF258\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D2315C0-D46F-4F85-9754-F9E5E11374A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"512EE3A8-A590-4501-9A94-5D4B268D6138\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/2051c709dce92da3550040aa7949cd5a9c89b14e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/3dffc083292e6872787bd7e34b957627622f9af4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/8d625c15471fb8780125eaef682983a96af77bdc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/96c9c25b74686ac2de15921c9ad30c5ef13af8cd\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/beb6e2e5976a128b0cccf10d158124422210c5ef\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
FKIE_CVE-2026-23440
Vulnerability from fkie_nvd - Published: 2026-04-03 16:16 - Updated: 2026-04-27 14:164.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.4 | |
| linux | linux_kernel | 7.0 | |
| linux | linux_kernel | 7.0 | |
| linux | linux_kernel | 7.0 | |
| linux | linux_kernel | 7.0 | |
| linux | linux_kernel | 7.0 | |
| linux | linux_kernel | 7.0 | |
| linux | linux_kernel | 7.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5ED2C179-5F1F-4BB1-9DEA-A21F23BC569B",
"versionEndExcluding": "6.6.130",
"versionStartIncluding": "6.4.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28D591F5-B196-4CC9-905C-DC80F116E7A8",
"versionEndExcluding": "6.12.78",
"versionStartIncluding": "6.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5571059-6552-48E7-9BEF-3E358C387171",
"versionEndExcluding": "6.18.20",
"versionStartIncluding": "6.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96D34333-38BE-4414-9E79-6EB764329581",
"versionEndExcluding": "6.19.10",
"versionStartIncluding": "6.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.4:-:*:*:*:*:*:*",
"matchCriteriaId": "DE0B0BF6-0EEF-4FAD-927D-7A0DD77BEE75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F253B622-8837-4245-BCE5-A7BF8FC76A16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4AE85AD8-4641-4E7C-A2F4-305E2CD9EE64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F666C8D8-6538-46D4-B318-87610DE64C34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "02259FDA-961B-47BC-AE7F-93D7EC6E90C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*",
"matchCriteriaId": "58A9FEFF-C040-420D-8F0A-BFDAAA1DF258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1D2315C0-D46F-4F85-9754-F9E5E11374A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*",
"matchCriteriaId": "512EE3A8-A590-4501-9A94-5D4B268D6138",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix race condition during IPSec ESN update\n\nIn IPSec full offload mode, the device reports an ESN (Extended\nSequence Number) wrap event to the driver. The driver validates this\nevent by querying the IPSec ASO and checking that the esn_event_arm\nfield is 0x0, which indicates an event has occurred. After handling\nthe event, the driver must re-arm the context by setting esn_event_arm\nback to 0x1.\n\nA race condition exists in this handling path. After validating the\nevent, the driver calls mlx5_accel_esp_modify_xfrm() to update the\nkernel\u0027s xfrm state. This function temporarily releases and\nre-acquires the xfrm state lock.\n\nSo, need to acknowledge the event first by setting esn_event_arm to\n0x1. This prevents the driver from reprocessing the same ESN update if\nthe hardware sends events for other reason. Since the next ESN update\nonly occurs after nearly 2^31 packets are received, there\u0027s no risk of\nmissing an update, as it will happen long after this handling has\nfinished.\n\nProcessing the event twice causes the ESN high-order bits (esn_msb) to\nbe incremented incorrectly. The driver then programs the hardware with\nthis invalid ESN state, which leads to anti-replay failures and a\ncomplete halt of IPSec traffic.\n\nFix this by re-arming the ESN event immediately after it is validated,\nbefore calling mlx5_accel_esp_modify_xfrm(). This ensures that any\nspurious, duplicate events are correctly ignored, closing the race\nwindow."
}
],
"id": "CVE-2026-23440",
"lastModified": "2026-04-27T14:16:32.883",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-04-03T16:16:26.020",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/2051c709dce92da3550040aa7949cd5a9c89b14e"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/3dffc083292e6872787bd7e34b957627622f9af4"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/8d625c15471fb8780125eaef682983a96af77bdc"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/96c9c25b74686ac2de15921c9ad30c5ef13af8cd"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/beb6e2e5976a128b0cccf10d158124422210c5ef"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
WID-SEC-W-2026-0985
Vulnerability from csaf_certbund - Published: 2026-04-06 22:00 - Updated: 2026-05-04 22:00{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um unter anderem einen Denial of Service-Angriff auszuf\u00fchren oder um Sicherheitsmechanismen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0985 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0985.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0985 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0985"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23412",
"url": "https://lore.kernel.org/linux-cve-announce/2026040201-CVE-2026-23412-4daa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23413",
"url": "https://lore.kernel.org/linux-cve-announce/2026040203-CVE-2026-23413-fa13@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23414",
"url": "https://lore.kernel.org/linux-cve-announce/2026040203-CVE-2026-23414-d0e3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23415",
"url": "https://lore.kernel.org/linux-cve-announce/2026040204-CVE-2026-23415-3435@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23416",
"url": "https://lore.kernel.org/linux-cve-announce/2026040204-CVE-2026-23416-2941@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23417",
"url": "https://lore.kernel.org/linux-cve-announce/2026040204-CVE-2026-23417-d6a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23418",
"url": "https://lore.kernel.org/linux-cve-announce/2026040301-CVE-2026-23418-3cf7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23419",
"url": "https://lore.kernel.org/linux-cve-announce/2026040303-CVE-2026-23419-6055@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23420",
"url": "https://lore.kernel.org/linux-cve-announce/2026040303-CVE-2026-23420-c110@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23421",
"url": "https://lore.kernel.org/linux-cve-announce/2026040304-CVE-2026-23421-dace@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23422",
"url": "https://lore.kernel.org/linux-cve-announce/2026040304-CVE-2026-23422-1e6f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23423",
"url": "https://lore.kernel.org/linux-cve-announce/2026040304-CVE-2026-23423-96fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23424",
"url": "https://lore.kernel.org/linux-cve-announce/2026040305-CVE-2026-23424-7b21@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23425",
"url": "https://lore.kernel.org/linux-cve-announce/2026040305-CVE-2026-23425-80db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23426",
"url": "https://lore.kernel.org/linux-cve-announce/2026040305-CVE-2026-23426-4c05@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23427",
"url": "https://lore.kernel.org/linux-cve-announce/2026040307-CVE-2026-23427-5456@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23428",
"url": "https://lore.kernel.org/linux-cve-announce/2026040310-CVE-2026-23428-9e4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23429",
"url": "https://lore.kernel.org/linux-cve-announce/2026040310-CVE-2026-23429-2f24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23430",
"url": "https://lore.kernel.org/linux-cve-announce/2026040310-CVE-2026-23430-8d4a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23431",
"url": "https://lore.kernel.org/linux-cve-announce/2026040311-CVE-2026-23431-3aee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23432",
"url": "https://lore.kernel.org/linux-cve-announce/2026040311-CVE-2026-23432-4aaf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23433",
"url": "https://lore.kernel.org/linux-cve-announce/2026040311-CVE-2026-23433-01be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23434",
"url": "https://lore.kernel.org/linux-cve-announce/2026040311-CVE-2026-23434-f0f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23435",
"url": "https://lore.kernel.org/linux-cve-announce/2026040312-CVE-2026-23435-e721@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23436",
"url": "https://lore.kernel.org/linux-cve-announce/2026040312-CVE-2026-23436-f1f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23437",
"url": "https://lore.kernel.org/linux-cve-announce/2026040312-CVE-2026-23437-9787@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23438",
"url": "https://lore.kernel.org/linux-cve-announce/2026040313-CVE-2026-23438-5faa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23439",
"url": "https://lore.kernel.org/linux-cve-announce/2026040313-CVE-2026-23439-ed88@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23440",
"url": "https://lore.kernel.org/linux-cve-announce/2026040313-CVE-2026-23440-9b9f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23441",
"url": "https://lore.kernel.org/linux-cve-announce/2026040313-CVE-2026-23441-b47e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23442",
"url": "https://lore.kernel.org/linux-cve-announce/2026040314-CVE-2026-23442-fe23@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23443",
"url": "https://lore.kernel.org/linux-cve-announce/2026040314-CVE-2026-23443-19e2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23444",
"url": "https://lore.kernel.org/linux-cve-announce/2026040314-CVE-2026-23444-8169@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23445",
"url": "https://lore.kernel.org/linux-cve-announce/2026040315-CVE-2026-23445-d003@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23446",
"url": "https://lore.kernel.org/linux-cve-announce/2026040315-CVE-2026-23446-65cf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23447",
"url": "https://lore.kernel.org/linux-cve-announce/2026040315-CVE-2026-23447-dd25@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23448",
"url": "https://lore.kernel.org/linux-cve-announce/2026040315-CVE-2026-23448-1d79@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23449",
"url": "https://lore.kernel.org/linux-cve-announce/2026040316-CVE-2026-23449-1717@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23450",
"url": "https://lore.kernel.org/linux-cve-announce/2026040316-CVE-2026-23450-2437@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23451",
"url": "https://lore.kernel.org/linux-cve-announce/2026040316-CVE-2026-23451-1298@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23452",
"url": "https://lore.kernel.org/linux-cve-announce/2026040317-CVE-2026-23452-4c2b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23453",
"url": "https://lore.kernel.org/linux-cve-announce/2026040317-CVE-2026-23453-c4f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23454",
"url": "https://lore.kernel.org/linux-cve-announce/2026040317-CVE-2026-23454-a999@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23455",
"url": "https://lore.kernel.org/linux-cve-announce/2026040317-CVE-2026-23455-f045@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23456",
"url": "https://lore.kernel.org/linux-cve-announce/2026040318-CVE-2026-23456-7da2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23457",
"url": "https://lore.kernel.org/linux-cve-announce/2026040318-CVE-2026-23457-e7f6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23458",
"url": "https://lore.kernel.org/linux-cve-announce/2026040318-CVE-2026-23458-5578@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23459",
"url": "https://lore.kernel.org/linux-cve-announce/2026040319-CVE-2026-23459-fcfb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23460",
"url": "https://lore.kernel.org/linux-cve-announce/2026040319-CVE-2026-23460-f1d1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23461",
"url": "https://lore.kernel.org/linux-cve-announce/2026040319-CVE-2026-23461-f03d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23462",
"url": "https://lore.kernel.org/linux-cve-announce/2026040319-CVE-2026-23462-297c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23463",
"url": "https://lore.kernel.org/linux-cve-announce/2026040320-CVE-2026-23463-e730@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23464",
"url": "https://lore.kernel.org/linux-cve-announce/2026040320-CVE-2026-23464-840f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23465",
"url": "https://lore.kernel.org/linux-cve-announce/2026040320-CVE-2026-23465-9c96@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23466",
"url": "https://lore.kernel.org/linux-cve-announce/2026040321-CVE-2026-23466-ae2c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23467",
"url": "https://lore.kernel.org/linux-cve-announce/2026040321-CVE-2026-23467-9cfe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23468",
"url": "https://lore.kernel.org/linux-cve-announce/2026040321-CVE-2026-23468-8be9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23469",
"url": "https://lore.kernel.org/linux-cve-announce/2026040322-CVE-2026-23469-fd6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23470",
"url": "https://lore.kernel.org/linux-cve-announce/2026040322-CVE-2026-23470-a491@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23471",
"url": "https://lore.kernel.org/linux-cve-announce/2026040322-CVE-2026-23471-f1bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23472",
"url": "https://lore.kernel.org/linux-cve-announce/2026040322-CVE-2026-23472-c68c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23473",
"url": "https://lore.kernel.org/linux-cve-announce/2026040323-CVE-2026-23473-ab6c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23474",
"url": "https://lore.kernel.org/linux-cve-announce/2026040323-CVE-2026-23474-e350@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23475",
"url": "https://lore.kernel.org/linux-cve-announce/2026040323-CVE-2026-23475-8bf5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31389",
"url": "https://lore.kernel.org/linux-cve-announce/2026040324-CVE-2026-31389-036b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31390",
"url": "https://lore.kernel.org/linux-cve-announce/2026040324-CVE-2026-31390-f363@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31391",
"url": "https://lore.kernel.org/linux-cve-announce/2026040324-CVE-2026-31391-4b86@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31392",
"url": "https://lore.kernel.org/linux-cve-announce/2026040324-CVE-2026-31392-7952@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31393",
"url": "https://lore.kernel.org/linux-cve-announce/2026040325-CVE-2026-31393-5e12@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31394",
"url": "https://lore.kernel.org/linux-cve-announce/2026040325-CVE-2026-31394-26ac@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31395",
"url": "https://lore.kernel.org/linux-cve-announce/2026040325-CVE-2026-31395-8855@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31396",
"url": "https://lore.kernel.org/linux-cve-announce/2026040326-CVE-2026-31396-0dad@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31397",
"url": "https://lore.kernel.org/linux-cve-announce/2026040326-CVE-2026-31397-8672@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31398",
"url": "https://lore.kernel.org/linux-cve-announce/2026040326-CVE-2026-31398-babe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31399",
"url": "https://lore.kernel.org/linux-cve-announce/2026040326-CVE-2026-31399-9b84@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31400",
"url": "https://lore.kernel.org/linux-cve-announce/2026040327-CVE-2026-31400-db79@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31401",
"url": "https://lore.kernel.org/linux-cve-announce/2026040327-CVE-2026-31401-697d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31402",
"url": "https://lore.kernel.org/linux-cve-announce/2026040327-CVE-2026-31402-3e6a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31403",
"url": "https://lore.kernel.org/linux-cve-announce/2026040328-CVE-2026-31403-5446@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31404",
"url": "https://lore.kernel.org/linux-cve-announce/2026040328-CVE-2026-31404-f58a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31405",
"url": "https://lore.kernel.org/linux-cve-announce/2026040603-CVE-2026-31405-8cfb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31406",
"url": "https://lore.kernel.org/linux-cve-announce/2026040628-CVE-2026-31406-e2f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31407",
"url": "https://lore.kernel.org/linux-cve-announce/2026040628-CVE-2026-31407-6abd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31408",
"url": "https://lore.kernel.org/linux-cve-announce/2026040629-CVE-2026-31408-9f0f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31409",
"url": "https://lore.kernel.org/linux-cve-announce/2026040629-CVE-2026-31409-d22c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31410",
"url": "https://lore.kernel.org/linux-cve-announce/2026040629-CVE-2026-31410-5b44@gregkh/"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2026-04-07",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "CVE-2026-23416 PoC",
"url": "https://github.com/bluedragonsecurity/CVE-2026-23416-POC"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2026-04-08",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2026-04-14",
"url": "https://docs.cloud.google.com/container-optimized-os/docs/release-notes#April_13_2026"
},
{
"category": "external",
"summary": "Microsoft Security Update Guide vom 2026-04-14",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21123-1 vom 2026-04-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025421.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21114-1 vom 2026-04-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025429.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21129-1 vom 2026-04-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025416.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21131-1 vom 2026-04-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025414.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20572-1 vom 2026-04-21",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/STWYWECAV6YINBQYRNTOUWNIHBOUY3YT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21237-1 vom 2026-04-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025557.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21230-1 vom 2026-04-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025560.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21255-1 vom 2026-04-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025583.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21241-1 vom 2026-04-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025595.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:10108 vom 2026-04-24",
"url": "https://access.redhat.com/errata/RHSA-2026:10108"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1573-1 vom 2026-04-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025596.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:11313 vom 2026-04-28",
"url": "https://access.redhat.com/errata/RHSA-2026:11313"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21361-1 vom 2026-04-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025743.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:21352-1 vom 2026-04-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025751.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1643-1 vom 2026-04-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025762.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1661-1 vom 2026-04-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025787.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6243 vom 2026-05-04",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00154.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4561 vom 2026-05-02",
"url": "https://lists.debian.org/debian-lts-announce/2026/05/msg00005.html"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2026-05-02",
"url": "https://docs.cloud.google.com/container-optimized-os/docs/release-notes#May_01_2026"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6238 vom 2026-05-04",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00148.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:13565 vom 2026-05-04",
"url": "https://access.redhat.com/errata/RHSA-2026:13565"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:13566 vom 2026-05-05",
"url": "https://access.redhat.com/errata/RHSA-2026:13566"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:13577 vom 2026-05-05",
"url": "https://access.redhat.com/errata/RHSA-2026:13577"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:13578 vom 2026-05-05",
"url": "https://access.redhat.com/errata/RHSA-2026:13578"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-05-04T22:00:00.000+00:00",
"generator": {
"date": "2026-05-05T08:26:58.003+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0985",
"initial_release_date": "2026-04-06T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-04-06T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-04-07T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2026-04-14T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2026-04-19T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-04-21T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-04-22T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-04-23T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-04-27T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-04-28T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-05-03T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE und Debian aufgenommen"
},
{
"date": "2026-05-04T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "11"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "azl3",
"product": {
"name": "Microsoft Azure Linux azl3",
"product_id": "T049210",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_linux:azl3"
}
}
}
],
"category": "product_name",
"name": "Azure Linux"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028462",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-23412",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23412"
},
{
"cve": "CVE-2026-23413",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23413"
},
{
"cve": "CVE-2026-23414",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23414"
},
{
"cve": "CVE-2026-23415",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23415"
},
{
"cve": "CVE-2026-23416",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23416"
},
{
"cve": "CVE-2026-23417",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23417"
},
{
"cve": "CVE-2026-23418",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23418"
},
{
"cve": "CVE-2026-23419",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23419"
},
{
"cve": "CVE-2026-23420",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23420"
},
{
"cve": "CVE-2026-23421",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23421"
},
{
"cve": "CVE-2026-23422",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23422"
},
{
"cve": "CVE-2026-23423",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23423"
},
{
"cve": "CVE-2026-23424",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23424"
},
{
"cve": "CVE-2026-23425",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23425"
},
{
"cve": "CVE-2026-23426",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23426"
},
{
"cve": "CVE-2026-23427",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23427"
},
{
"cve": "CVE-2026-23428",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23428"
},
{
"cve": "CVE-2026-23429",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23429"
},
{
"cve": "CVE-2026-23430",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23430"
},
{
"cve": "CVE-2026-23431",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23431"
},
{
"cve": "CVE-2026-23432",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23432"
},
{
"cve": "CVE-2026-23433",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23433"
},
{
"cve": "CVE-2026-23434",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23434"
},
{
"cve": "CVE-2026-23435",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23435"
},
{
"cve": "CVE-2026-23436",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23436"
},
{
"cve": "CVE-2026-23437",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23437"
},
{
"cve": "CVE-2026-23438",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23438"
},
{
"cve": "CVE-2026-23439",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23439"
},
{
"cve": "CVE-2026-23440",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23440"
},
{
"cve": "CVE-2026-23441",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23441"
},
{
"cve": "CVE-2026-23442",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23442"
},
{
"cve": "CVE-2026-23443",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23443"
},
{
"cve": "CVE-2026-23444",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23444"
},
{
"cve": "CVE-2026-23445",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23445"
},
{
"cve": "CVE-2026-23446",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23446"
},
{
"cve": "CVE-2026-23447",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23447"
},
{
"cve": "CVE-2026-23448",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23448"
},
{
"cve": "CVE-2026-23449",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23449"
},
{
"cve": "CVE-2026-23450",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23450"
},
{
"cve": "CVE-2026-23451",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23451"
},
{
"cve": "CVE-2026-23452",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23452"
},
{
"cve": "CVE-2026-23453",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23453"
},
{
"cve": "CVE-2026-23454",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23454"
},
{
"cve": "CVE-2026-23455",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23455"
},
{
"cve": "CVE-2026-23456",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23456"
},
{
"cve": "CVE-2026-23457",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23457"
},
{
"cve": "CVE-2026-23458",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23458"
},
{
"cve": "CVE-2026-23459",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23459"
},
{
"cve": "CVE-2026-23460",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23460"
},
{
"cve": "CVE-2026-23461",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23461"
},
{
"cve": "CVE-2026-23462",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23462"
},
{
"cve": "CVE-2026-23463",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23463"
},
{
"cve": "CVE-2026-23464",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23464"
},
{
"cve": "CVE-2026-23465",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23465"
},
{
"cve": "CVE-2026-23466",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23466"
},
{
"cve": "CVE-2026-23467",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23467"
},
{
"cve": "CVE-2026-23468",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23468"
},
{
"cve": "CVE-2026-23469",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23469"
},
{
"cve": "CVE-2026-23470",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23470"
},
{
"cve": "CVE-2026-23471",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23471"
},
{
"cve": "CVE-2026-23472",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23472"
},
{
"cve": "CVE-2026-23473",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23473"
},
{
"cve": "CVE-2026-23474",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23474"
},
{
"cve": "CVE-2026-23475",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-23475"
},
{
"cve": "CVE-2026-31389",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31389"
},
{
"cve": "CVE-2026-31390",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31390"
},
{
"cve": "CVE-2026-31391",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31391"
},
{
"cve": "CVE-2026-31392",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31392"
},
{
"cve": "CVE-2026-31393",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31393"
},
{
"cve": "CVE-2026-31394",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31394"
},
{
"cve": "CVE-2026-31395",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31395"
},
{
"cve": "CVE-2026-31396",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31396"
},
{
"cve": "CVE-2026-31397",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31397"
},
{
"cve": "CVE-2026-31398",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31398"
},
{
"cve": "CVE-2026-31399",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31399"
},
{
"cve": "CVE-2026-31400",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31400"
},
{
"cve": "CVE-2026-31401",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31401"
},
{
"cve": "CVE-2026-31402",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31402"
},
{
"cve": "CVE-2026-31403",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31403"
},
{
"cve": "CVE-2026-31404",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31404"
},
{
"cve": "CVE-2026-31405",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31405"
},
{
"cve": "CVE-2026-31406",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31406"
},
{
"cve": "CVE-2026-31407",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31407"
},
{
"cve": "CVE-2026-31408",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31408"
},
{
"cve": "CVE-2026-31409",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31409"
},
{
"cve": "CVE-2026-31410",
"product_status": {
"known_affected": [
"T028462",
"2951",
"T002207",
"67646",
"T027843",
"T049210",
"1607324"
]
},
"release_date": "2026-04-06T22:00:00.000+00:00",
"title": "CVE-2026-31410"
}
]
}
GHSA-255W-8G7G-QMG6
Vulnerability from github – Published: 2026-04-03 18:31 – Updated: 2026-04-23 21:31In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Fix race condition during IPSec ESN update
In IPSec full offload mode, the device reports an ESN (Extended Sequence Number) wrap event to the driver. The driver validates this event by querying the IPSec ASO and checking that the esn_event_arm field is 0x0, which indicates an event has occurred. After handling the event, the driver must re-arm the context by setting esn_event_arm back to 0x1.
A race condition exists in this handling path. After validating the event, the driver calls mlx5_accel_esp_modify_xfrm() to update the kernel's xfrm state. This function temporarily releases and re-acquires the xfrm state lock.
So, need to acknowledge the event first by setting esn_event_arm to 0x1. This prevents the driver from reprocessing the same ESN update if the hardware sends events for other reason. Since the next ESN update only occurs after nearly 2^31 packets are received, there's no risk of missing an update, as it will happen long after this handling has finished.
Processing the event twice causes the ESN high-order bits (esn_msb) to be incremented incorrectly. The driver then programs the hardware with this invalid ESN state, which leads to anti-replay failures and a complete halt of IPSec traffic.
Fix this by re-arming the ESN event immediately after it is validated, before calling mlx5_accel_esp_modify_xfrm(). This ensures that any spurious, duplicate events are correctly ignored, closing the race window.
{
"affected": [],
"aliases": [
"CVE-2026-23440"
],
"database_specific": {
"cwe_ids": [
"CWE-362"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-04-03T16:16:26Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix race condition during IPSec ESN update\n\nIn IPSec full offload mode, the device reports an ESN (Extended\nSequence Number) wrap event to the driver. The driver validates this\nevent by querying the IPSec ASO and checking that the esn_event_arm\nfield is 0x0, which indicates an event has occurred. After handling\nthe event, the driver must re-arm the context by setting esn_event_arm\nback to 0x1.\n\nA race condition exists in this handling path. After validating the\nevent, the driver calls mlx5_accel_esp_modify_xfrm() to update the\nkernel\u0027s xfrm state. This function temporarily releases and\nre-acquires the xfrm state lock.\n\nSo, need to acknowledge the event first by setting esn_event_arm to\n0x1. This prevents the driver from reprocessing the same ESN update if\nthe hardware sends events for other reason. Since the next ESN update\nonly occurs after nearly 2^31 packets are received, there\u0027s no risk of\nmissing an update, as it will happen long after this handling has\nfinished.\n\nProcessing the event twice causes the ESN high-order bits (esn_msb) to\nbe incremented incorrectly. The driver then programs the hardware with\nthis invalid ESN state, which leads to anti-replay failures and a\ncomplete halt of IPSec traffic.\n\nFix this by re-arming the ESN event immediately after it is validated,\nbefore calling mlx5_accel_esp_modify_xfrm(). This ensures that any\nspurious, duplicate events are correctly ignored, closing the race\nwindow.",
"id": "GHSA-255w-8g7g-qmg6",
"modified": "2026-04-23T21:31:18Z",
"published": "2026-04-03T18:31:21Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23440"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/2051c709dce92da3550040aa7949cd5a9c89b14e"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/3dffc083292e6872787bd7e34b957627622f9af4"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/8d625c15471fb8780125eaef682983a96af77bdc"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/96c9c25b74686ac2de15921c9ad30c5ef13af8cd"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/beb6e2e5976a128b0cccf10d158124422210c5ef"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
CERTFR-2026-AVI-0548
Vulnerability from certfr_avis - Published: 2026-05-07 - Updated: 2026-05-07
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian trixie versions ant\u00e9rieures \u00e0 6.12.85-1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian trixie versions ant\u00e9rieures \u00e0 version 6.1.170-1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-31559",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31559"
},
{
"name": "CVE-2026-31623",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31623"
},
{
"name": "CVE-2026-31483",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31483"
},
{
"name": "CVE-2026-31409",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31409"
},
{
"name": "CVE-2026-31522",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31522"
},
{
"name": "CVE-2026-31770",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31770"
},
{
"name": "CVE-2026-23447",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23447"
},
{
"name": "CVE-2026-31582",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31582"
},
{
"name": "CVE-2026-23387",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23387"
},
{
"name": "CVE-2026-31619",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31619"
},
{
"name": "CVE-2026-31658",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31658"
},
{
"name": "CVE-2026-31618",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31618"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2026-31756",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31756"
},
{
"name": "CVE-2026-31467",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31467"
},
{
"name": "CVE-2026-23318",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23318"
},
{
"name": "CVE-2026-23368",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23368"
},
{
"name": "CVE-2026-31485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31485"
},
{
"name": "CVE-2026-23475",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23475"
},
{
"name": "CVE-2026-31578",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31578"
},
{
"name": "CVE-2025-40147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40147"
},
{
"name": "CVE-2026-31754",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31754"
},
{
"name": "CVE-2026-31402",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31402"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2026-23426",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23426"
},
{
"name": "CVE-2026-31758",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31758"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2025-71265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71265"
},
{
"name": "CVE-2026-23450",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23450"
},
{
"name": "CVE-2026-23281",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23281"
},
{
"name": "CVE-2026-31530",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31530"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2026-31685",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31685"
},
{
"name": "CVE-2026-31416",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31416"
},
{
"name": "CVE-2026-31656",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31656"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2026-31453",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31453"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2026-31593",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31593"
},
{
"name": "CVE-2026-23438",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23438"
},
{
"name": "CVE-2026-23293",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23293"
},
{
"name": "CVE-2026-23463",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23463"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2026-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23454"
},
{
"name": "CVE-2026-31405",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31405"
},
{
"name": "CVE-2026-43054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43054"
},
{
"name": "CVE-2026-23465",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23465"
},
{
"name": "CVE-2026-31664",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31664"
},
{
"name": "CVE-2026-31542",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31542"
},
{
"name": "CVE-2026-31473",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31473"
},
{
"name": "CVE-2026-23297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23297"
},
{
"name": "CVE-2026-31556",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31556"
},
{
"name": "CVE-2026-31528",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31528"
},
{
"name": "CVE-2026-31448",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31448"
},
{
"name": "CVE-2026-31597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31597"
},
{
"name": "CVE-2025-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21709"
},
{
"name": "CVE-2026-22981",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22981"
},
{
"name": "CVE-2026-31550",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31550"
},
{
"name": "CVE-2026-31487",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31487"
},
{
"name": "CVE-2026-23290",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23290"
},
{
"name": "CVE-2026-31549",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31549"
},
{
"name": "CVE-2026-31752",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31752"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2026-31787",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31787"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2026-23303",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23303"
},
{
"name": "CVE-2026-43011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43011"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2026-31396",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31396"
},
{
"name": "CVE-2026-23461",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23461"
},
{
"name": "CVE-2026-31680",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31680"
},
{
"name": "CVE-2026-31586",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31586"
},
{
"name": "CVE-2026-23340",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23340"
},
{
"name": "CVE-2026-43046",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43046"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2026-31738",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31738"
},
{
"name": "CVE-2026-23441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23441"
},
{
"name": "CVE-2026-23210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23210"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2026-31751",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31751"
},
{
"name": "CVE-2026-23380",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23380"
},
{
"name": "CVE-2026-23383",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23383"
},
{
"name": "CVE-2026-31462",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31462"
},
{
"name": "CVE-2026-23412",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23412"
},
{
"name": "CVE-2026-23439",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23439"
},
{
"name": "CVE-2026-23253",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23253"
},
{
"name": "CVE-2026-43025",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43025"
},
{
"name": "CVE-2026-31581",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31581"
},
{
"name": "CVE-2026-31721",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31721"
},
{
"name": "CVE-2026-31617",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31617"
},
{
"name": "CVE-2026-23271",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23271"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2026-23434",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23434"
},
{
"name": "CVE-2026-31655",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31655"
},
{
"name": "CVE-2026-31611",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31611"
},
{
"name": "CVE-2026-31502",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31502"
},
{
"name": "CVE-2026-31531",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31531"
},
{
"name": "CVE-2026-43018",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43018"
},
{
"name": "CVE-2026-43014",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43014"
},
{
"name": "CVE-2026-31447",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31447"
},
{
"name": "CVE-2025-22116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22116"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2026-23285",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23285"
},
{
"name": "CVE-2026-31431",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31431"
},
{
"name": "CVE-2026-31645",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31645"
},
{
"name": "CVE-2026-23470",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23470"
},
{
"name": "CVE-2026-31599",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31599"
},
{
"name": "CVE-2026-43028",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43028"
},
{
"name": "CVE-2026-31511",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31511"
},
{
"name": "CVE-2026-31614",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31614"
},
{
"name": "CVE-2026-23422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23422"
},
{
"name": "CVE-2026-31482",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31482"
},
{
"name": "CVE-2026-31548",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31548"
},
{
"name": "CVE-2026-23304",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23304"
},
{
"name": "CVE-2026-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31683"
},
{
"name": "CVE-2026-23357",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23357"
},
{
"name": "CVE-2026-31408",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31408"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2026-31524",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31524"
},
{
"name": "CVE-2026-31505",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31505"
},
{
"name": "CVE-2026-31668",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31668"
},
{
"name": "CVE-2026-23250",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23250"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2026-31478",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31478"
},
{
"name": "CVE-2026-31546",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31546"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2026-31583",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31583"
},
{
"name": "CVE-2025-22117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22117"
},
{
"name": "CVE-2026-31605",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31605"
},
{
"name": "CVE-2026-23324",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23324"
},
{
"name": "CVE-2026-23347",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23347"
},
{
"name": "CVE-2026-23373",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23373"
},
{
"name": "CVE-2026-31516",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31516"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2026-23317",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23317"
},
{
"name": "CVE-2026-43047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43047"
},
{
"name": "CVE-2026-31389",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31389"
},
{
"name": "CVE-2026-31394",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31394"
},
{
"name": "CVE-2026-31786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31786"
},
{
"name": "CVE-2026-31545",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31545"
},
{
"name": "CVE-2026-31681",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31681"
},
{
"name": "CVE-2026-31598",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31598"
},
{
"name": "CVE-2026-23456",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23456"
},
{
"name": "CVE-2026-43033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43033"
},
{
"name": "CVE-2026-43023",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43023"
},
{
"name": "CVE-2026-23287",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23287"
},
{
"name": "CVE-2026-31510",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31510"
},
{
"name": "CVE-2026-31622",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31622"
},
{
"name": "CVE-2026-23457",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23457"
},
{
"name": "CVE-2026-31595",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31595"
},
{
"name": "CVE-2026-31496",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31496"
},
{
"name": "CVE-2026-31642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31642"
},
{
"name": "CVE-2026-23399",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23399"
},
{
"name": "CVE-2026-23334",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23334"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2026-31659",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31659"
},
{
"name": "CVE-2026-23401",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23401"
},
{
"name": "CVE-2025-71239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71239"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2026-43057",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43057"
},
{
"name": "CVE-2026-43030",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43030"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2026-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31525"
},
{
"name": "CVE-2026-31638",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31638"
},
{
"name": "CVE-2026-31588",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31588"
},
{
"name": "CVE-2026-23391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23391"
},
{
"name": "CVE-2026-31415",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31415"
},
{
"name": "CVE-2026-31647",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31647"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2026-23462",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23462"
},
{
"name": "CVE-2026-31563",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31563"
},
{
"name": "CVE-2026-23273",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23273"
},
{
"name": "CVE-2026-23372",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23372"
},
{
"name": "CVE-2026-31693",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31693"
},
{
"name": "CVE-2026-31689",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31689"
},
{
"name": "CVE-2026-23319",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23319"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2026-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31566"
},
{
"name": "CVE-2026-31494",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31494"
},
{
"name": "CVE-2026-31565",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31565"
},
{
"name": "CVE-2026-23270",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23270"
},
{
"name": "CVE-2026-31763",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31763"
},
{
"name": "CVE-2026-23279",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23279"
},
{
"name": "CVE-2026-23466",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23466"
},
{
"name": "CVE-2026-31616",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31616"
},
{
"name": "CVE-2026-31670",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31670"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2026-23244",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23244"
},
{
"name": "CVE-2026-23246",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23246"
},
{
"name": "CVE-2026-31422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31422"
},
{
"name": "CVE-2026-23286",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23286"
},
{
"name": "CVE-2026-23359",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23359"
},
{
"name": "CVE-2026-31533",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31533"
},
{
"name": "CVE-2026-23298",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23298"
},
{
"name": "CVE-2026-31469",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31469"
},
{
"name": "CVE-2026-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31498"
},
{
"name": "CVE-2026-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31615"
},
{
"name": "CVE-2026-31520",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31520"
},
{
"name": "CVE-2026-31449",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31449"
},
{
"name": "CVE-2026-31418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31418"
},
{
"name": "CVE-2026-23296",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23296"
},
{
"name": "CVE-2026-31427",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31427"
},
{
"name": "CVE-2026-31555",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31555"
},
{
"name": "CVE-2026-31594",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31594"
},
{
"name": "CVE-2026-31392",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31392"
},
{
"name": "CVE-2026-23360",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23360"
},
{
"name": "CVE-2025-40150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40150"
},
{
"name": "CVE-2026-31580",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31580"
},
{
"name": "CVE-2026-31515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31515"
},
{
"name": "CVE-2026-31661",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31661"
},
{
"name": "CVE-2026-31737",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31737"
},
{
"name": "CVE-2025-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38627"
},
{
"name": "CVE-2026-31606",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31606"
},
{
"name": "CVE-2026-43017",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43017"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-71267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71267"
},
{
"name": "CVE-2026-43043",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43043"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2026-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23308"
},
{
"name": "CVE-2026-31684",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31684"
},
{
"name": "CVE-2026-23396",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23396"
},
{
"name": "CVE-2026-31423",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31423"
},
{
"name": "CVE-2026-31625",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31625"
},
{
"name": "CVE-2026-43051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43051"
},
{
"name": "CVE-2026-31759",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31759"
},
{
"name": "CVE-2026-31432",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31432"
},
{
"name": "CVE-2026-23370",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23370"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2026-23302",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23302"
},
{
"name": "CVE-2026-23414",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23414"
},
{
"name": "CVE-2026-31781",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31781"
},
{
"name": "CVE-2026-23315",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23315"
},
{
"name": "CVE-2026-31523",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31523"
},
{
"name": "CVE-2026-31669",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31669"
},
{
"name": "CVE-2026-31450",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31450"
},
{
"name": "CVE-2026-31671",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31671"
},
{
"name": "CVE-2026-31749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31749"
},
{
"name": "CVE-2026-43024",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43024"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2026-23352",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23352"
},
{
"name": "CVE-2026-31720",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31720"
},
{
"name": "CVE-2026-31554",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31554"
},
{
"name": "CVE-2026-31748",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31748"
},
{
"name": "CVE-2026-23367",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23367"
},
{
"name": "CVE-2026-31628",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31628"
},
{
"name": "CVE-2026-23427",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23427"
},
{
"name": "CVE-2026-31662",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31662"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2026-31768",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31768"
},
{
"name": "CVE-2026-43026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43026"
},
{
"name": "CVE-2026-31480",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31480"
},
{
"name": "CVE-2026-23255",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23255"
},
{
"name": "CVE-2026-23446",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23446"
},
{
"name": "CVE-2026-23417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23417"
},
{
"name": "CVE-2026-43035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43035"
},
{
"name": "CVE-2026-31561",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31561"
},
{
"name": "CVE-2026-31627",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31627"
},
{
"name": "CVE-2025-71269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71269"
},
{
"name": "CVE-2026-31429",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31429"
},
{
"name": "CVE-2026-31665",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31665"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2026-23300",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23300"
},
{
"name": "CVE-2026-23444",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23444"
},
{
"name": "CVE-2026-31391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31391"
},
{
"name": "CVE-2026-31406",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31406"
},
{
"name": "CVE-2026-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31672"
},
{
"name": "CVE-2026-31401",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31401"
},
{
"name": "CVE-2026-31780",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31780"
},
{
"name": "CVE-2026-23243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23243"
},
{
"name": "CVE-2026-31479",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31479"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2026-31675",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31675"
},
{
"name": "CVE-2026-31521",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31521"
},
{
"name": "CVE-2026-23363",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23363"
},
{
"name": "CVE-2026-31626",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31626"
},
{
"name": "CVE-2026-23445",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23445"
},
{
"name": "CVE-2026-31634",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31634"
},
{
"name": "CVE-2026-31610",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31610"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2026-31412",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31412"
},
{
"name": "CVE-2026-43032",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43032"
},
{
"name": "CVE-2026-23362",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23362"
},
{
"name": "CVE-2026-23379",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23379"
},
{
"name": "CVE-2026-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31648"
},
{
"name": "CVE-2026-31421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31421"
},
{
"name": "CVE-2026-31677",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31677"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2026-23381",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23381"
},
{
"name": "CVE-2026-31518",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31518"
},
{
"name": "CVE-2026-31470",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31470"
},
{
"name": "CVE-2026-31686",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31686"
},
{
"name": "CVE-2026-31660",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31660"
},
{
"name": "CVE-2026-23392",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23392"
},
{
"name": "CVE-2026-23245",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23245"
},
{
"name": "CVE-2026-31728",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31728"
},
{
"name": "CVE-2024-49998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49998"
},
{
"name": "CVE-2026-31403",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31403"
},
{
"name": "CVE-2026-31400",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31400"
},
{
"name": "CVE-2026-31512",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31512"
},
{
"name": "CVE-2026-23330",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23330"
},
{
"name": "CVE-2026-31726",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31726"
},
{
"name": "CVE-2026-31504",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31504"
},
{
"name": "CVE-2026-31773",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31773"
},
{
"name": "CVE-2026-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23364"
},
{
"name": "CVE-2026-31607",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31607"
},
{
"name": "CVE-2026-23242",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23242"
},
{
"name": "CVE-2026-43015",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43015"
},
{
"name": "CVE-2026-31509",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31509"
},
{
"name": "CVE-2026-31679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31679"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2026-31637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31637"
},
{
"name": "CVE-2026-31779",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31779"
},
{
"name": "CVE-2026-31612",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31612"
},
{
"name": "CVE-2026-23428",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23428"
},
{
"name": "CVE-2026-23274",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23274"
},
{
"name": "CVE-2026-31590",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31590"
},
{
"name": "CVE-2026-22993",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22993"
},
{
"name": "CVE-2026-23361",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23361"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2026-43020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43020"
},
{
"name": "CVE-2026-31417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31417"
},
{
"name": "CVE-2026-43041",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43041"
},
{
"name": "CVE-2026-31761",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31761"
},
{
"name": "CVE-2026-31466",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31466"
},
{
"name": "CVE-2026-31527",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31527"
},
{
"name": "CVE-2026-31604",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31604"
},
{
"name": "CVE-2026-23448",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23448"
},
{
"name": "CVE-2026-22985",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22985"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2026-31414",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31414"
},
{
"name": "CVE-2026-31584",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31584"
},
{
"name": "CVE-2026-31778",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31778"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2026-31557",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31557"
},
{
"name": "CVE-2026-31426",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31426"
},
{
"name": "CVE-2026-23354",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23354"
},
{
"name": "CVE-2026-23325",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23325"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2026-43040",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43040"
},
{
"name": "CVE-2026-23440",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23440"
},
{
"name": "CVE-2026-31552",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31552"
},
{
"name": "CVE-2026-23284",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23284"
},
{
"name": "CVE-2026-31488",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31488"
},
{
"name": "CVE-2026-23278",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23278"
},
{
"name": "CVE-2026-31532",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31532"
},
{
"name": "CVE-2026-23397",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23397"
},
{
"name": "CVE-2026-23452",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23452"
},
{
"name": "CVE-2026-23474",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23474"
},
{
"name": "CVE-2026-31434",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31434"
},
{
"name": "CVE-2026-23343",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23343"
},
{
"name": "CVE-2026-31430",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31430"
},
{
"name": "CVE-2026-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23336"
},
{
"name": "CVE-2026-31497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31497"
},
{
"name": "CVE-2026-31682",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31682"
},
{
"name": "CVE-2026-31570",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31570"
},
{
"name": "CVE-2026-23289",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23289"
},
{
"name": "CVE-2026-31755",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31755"
},
{
"name": "CVE-2026-23292",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23292"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-31451",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31451"
},
{
"name": "CVE-2026-23277",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23277"
},
{
"name": "CVE-2026-31399",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31399"
},
{
"name": "CVE-2026-22986",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22986"
},
{
"name": "CVE-2026-31489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31489"
},
{
"name": "CVE-2026-31441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31441"
},
{
"name": "CVE-2026-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23455"
},
{
"name": "CVE-2026-23316",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23316"
},
{
"name": "CVE-2026-23251",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23251"
},
{
"name": "CVE-2026-23335",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23335"
},
{
"name": "CVE-2026-31551",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31551"
},
{
"name": "CVE-2026-31495",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31495"
},
{
"name": "CVE-2026-23252",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23252"
},
{
"name": "CVE-2026-23369",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23369"
},
{
"name": "CVE-2026-31507",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31507"
},
{
"name": "CVE-2026-23389",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23389"
},
{
"name": "CVE-2026-31762",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31762"
},
{
"name": "CVE-2026-31788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31788"
},
{
"name": "CVE-2026-31411",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31411"
},
{
"name": "CVE-2026-31428",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31428"
},
{
"name": "CVE-2026-23420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23420"
},
{
"name": "CVE-2026-23388",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23388"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-23449",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23449"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-71266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71266"
},
{
"name": "CVE-2026-31492",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31492"
},
{
"name": "CVE-2026-43037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43037"
},
{
"name": "CVE-2026-23070",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23070"
},
{
"name": "CVE-2026-31596",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31596"
},
{
"name": "CVE-2026-31666",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31666"
},
{
"name": "CVE-2026-31676",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31676"
},
{
"name": "CVE-2026-23442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23442"
},
{
"name": "CVE-2026-31476",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31476"
},
{
"name": "CVE-2026-31603",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31603"
},
{
"name": "CVE-2026-23104",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23104"
},
{
"name": "CVE-2026-23393",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23393"
},
{
"name": "CVE-2026-23458",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23458"
},
{
"name": "CVE-2026-23313",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23313"
},
{
"name": "CVE-2026-31649",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31649"
},
{
"name": "CVE-2026-31674",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31674"
},
{
"name": "CVE-2026-31393",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31393"
},
{
"name": "CVE-2026-23310",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23310"
},
{
"name": "CVE-2026-31577",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31577"
},
{
"name": "CVE-2026-43027",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43027"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2026-31576",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31576"
},
{
"name": "CVE-2026-31506",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31506"
},
{
"name": "CVE-2026-23339",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23339"
},
{
"name": "CVE-2026-31433",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31433"
},
{
"name": "CVE-2026-31458",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31458"
},
{
"name": "CVE-2026-31776",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31776"
},
{
"name": "CVE-2026-31575",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31575"
},
{
"name": "CVE-2026-23321",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23321"
},
{
"name": "CVE-2026-23460",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23460"
},
{
"name": "CVE-2026-31678",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31678"
},
{
"name": "CVE-2026-31587",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31587"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2026-31540",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31540"
},
{
"name": "CVE-2026-23395",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23395"
},
{
"name": "CVE-2026-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31651"
},
{
"name": "CVE-2023-53228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53228"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2026-31503",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31503"
},
{
"name": "CVE-2026-31657",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31657"
},
{
"name": "CVE-2026-31747",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31747"
},
{
"name": "CVE-2026-31455",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31455"
},
{
"name": "CVE-2026-31624",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31624"
},
{
"name": "CVE-2026-23306",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23306"
},
{
"name": "CVE-2026-31585",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31585"
},
{
"name": "CVE-2026-31474",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31474"
},
{
"name": "CVE-2026-23374",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23374"
},
{
"name": "CVE-2026-23378",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23378"
},
{
"name": "CVE-2026-31646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31646"
},
{
"name": "CVE-2026-31519",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31519"
},
{
"name": "CVE-2026-23464",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23464"
},
{
"name": "CVE-2026-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31439"
},
{
"name": "CVE-2026-23291",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23291"
},
{
"name": "CVE-2026-23413",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23413"
},
{
"name": "CVE-2026-31436",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31436"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2026-23382",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23382"
},
{
"name": "CVE-2026-31410",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31410"
},
{
"name": "CVE-2026-31446",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31446"
},
{
"name": "CVE-2026-31644",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31644"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2026-31464",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31464"
},
{
"name": "CVE-2026-31500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31500"
},
{
"name": "CVE-2026-31695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31695"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2026-31558",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31558"
},
{
"name": "CVE-2026-23312",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23312"
},
{
"name": "CVE-2026-31639",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31639"
},
{
"name": "CVE-2026-31508",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31508"
},
{
"name": "CVE-2026-23365",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23365"
},
{
"name": "CVE-2026-23419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23419"
},
{
"name": "CVE-2026-31424",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31424"
},
{
"name": "CVE-2026-23375",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23375"
},
{
"name": "CVE-2026-23356",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23356"
},
{
"name": "CVE-2026-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23307"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2026-31477",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31477"
},
{
"name": "CVE-2026-23249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23249"
},
{
"name": "CVE-2026-43038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43038"
},
{
"name": "CVE-2026-43013",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43013"
},
{
"name": "CVE-2026-31454",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31454"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2026-23386",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23386"
},
{
"name": "CVE-2026-31452",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31452"
},
{
"name": "CVE-2026-31407",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31407"
},
{
"name": "CVE-2026-23398",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23398"
},
{
"name": "CVE-2026-31602",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31602"
},
{
"name": "CVE-2026-31425",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31425"
},
{
"name": "CVE-2026-31440",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31440"
},
{
"name": "CVE-2026-23276",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23276"
},
{
"name": "CVE-2026-31629",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31629"
},
{
"name": "CVE-2026-23351",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23351"
},
{
"name": "CVE-2026-43050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-43050"
},
{
"name": "CVE-2026-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31438"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2026-31673",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31673"
},
{
"name": "CVE-2026-31667",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31667"
}
],
"initial_release_date": "2026-05-07T00:00:00",
"last_revision_date": "2026-05-07T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0548",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-05-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": "2026-05-01",
"title": "Bulletin de s\u00e9curit\u00e9 Debian msg00154",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00154.html"
},
{
"published_at": "2026-04-30",
"title": "Bulletin de s\u00e9curit\u00e9 Debian msg00148",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00148.html"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.