Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-31513 (GCVE-0-2026-31513)
Vulnerability from cvelistv5 – Published: 2026-04-22 13:54 – Updated: 2026-05-11 22:10| Vendor | Product | Version | |
|---|---|---|---|
| Linux | Linux |
Affected:
935f324e4b2461df2cf7f02b4195082b4304c708 , < c8e1a27edb8b4e5afb56b384acd7b6c2dec1b7cc
(git)
Affected: e981a9392800ce2c5bca196a6ab2c55e9370efaa , < 5b35f8211a913cfe7ab9d54fa36a272d2059a588 (git) Affected: f3fdf2e7276a3edc5df55454275da20eac186970 , < a3d9c50d69785ae02e153f000da1b5fd6dbfdf1b (git) Affected: c28d2bff70444a85b3b86aaf241ece9408c7858c , < 9d87cb22195b2c67405f5485d525190747ad5493 (git) |
|
| Linux | Linux |
Affected:
6.12.75 , < 6.12.80
(semver)
Affected: 6.18.16 , < 6.18.21 (semver) Affected: 6.19.6 , < 6.19.11 (semver) |
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"net/bluetooth/l2cap_core.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "c8e1a27edb8b4e5afb56b384acd7b6c2dec1b7cc",
"status": "affected",
"version": "935f324e4b2461df2cf7f02b4195082b4304c708",
"versionType": "git"
},
{
"lessThan": "5b35f8211a913cfe7ab9d54fa36a272d2059a588",
"status": "affected",
"version": "e981a9392800ce2c5bca196a6ab2c55e9370efaa",
"versionType": "git"
},
{
"lessThan": "a3d9c50d69785ae02e153f000da1b5fd6dbfdf1b",
"status": "affected",
"version": "f3fdf2e7276a3edc5df55454275da20eac186970",
"versionType": "git"
},
{
"lessThan": "9d87cb22195b2c67405f5485d525190747ad5493",
"status": "affected",
"version": "c28d2bff70444a85b3b86aaf241ece9408c7858c",
"versionType": "git"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"net/bluetooth/l2cap_core.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "6.12.80",
"status": "affected",
"version": "6.12.75",
"versionType": "semver"
},
{
"lessThan": "6.18.21",
"status": "affected",
"version": "6.18.16",
"versionType": "semver"
},
{
"lessThan": "6.19.11",
"status": "affected",
"version": "6.19.6",
"versionType": "semver"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.80",
"versionStartIncluding": "6.12.75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.21",
"versionStartIncluding": "6.18.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19.11",
"versionStartIncluding": "6.19.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix stack-out-of-bounds read in l2cap_ecred_conn_req\n\nSyzbot reported a KASAN stack-out-of-bounds read in l2cap_build_cmd()\nthat is triggered by a malformed Enhanced Credit Based Connection Request.\n\nThe vulnerability stems from l2cap_ecred_conn_req(). The function allocates\na local stack buffer (`pdu`) designed to hold a maximum of 5 Source Channel\nIDs (SCIDs), totaling 18 bytes. When an attacker sends a request with more\nthan 5 SCIDs, the function calculates `rsp_len` based on this unvalidated\n`cmd_len` before checking if the number of SCIDs exceeds\nL2CAP_ECRED_MAX_CID.\n\nIf the SCID count is too high, the function correctly jumps to the\n`response` label to reject the packet, but `rsp_len` retains the\nattacker\u0027s oversized value. Consequently, l2cap_send_cmd() is instructed\nto read past the end of the 18-byte `pdu` buffer, triggering a\nKASAN panic.\n\nFix this by moving the assignment of `rsp_len` to after the `num_scid`\nboundary check. If the packet is rejected, `rsp_len` will safely\nremain 0, and the error response will only read the 8-byte base header\nfrom the stack."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-11T22:10:14.922Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/c8e1a27edb8b4e5afb56b384acd7b6c2dec1b7cc"
},
{
"url": "https://git.kernel.org/stable/c/5b35f8211a913cfe7ab9d54fa36a272d2059a588"
},
{
"url": "https://git.kernel.org/stable/c/a3d9c50d69785ae02e153f000da1b5fd6dbfdf1b"
},
{
"url": "https://git.kernel.org/stable/c/9d87cb22195b2c67405f5485d525190747ad5493"
}
],
"title": "Bluetooth: L2CAP: Fix stack-out-of-bounds read in l2cap_ecred_conn_req",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-31513",
"datePublished": "2026-04-22T13:54:30.835Z",
"dateReserved": "2026-03-09T15:48:24.107Z",
"dateUpdated": "2026-05-11T22:10:14.922Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-31513",
"date": "2026-05-23",
"epss": "0.00021",
"percentile": "0.0603"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-31513\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-04-22T14:16:50.673\",\"lastModified\":\"2026-04-28T16:15:22.477\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nBluetooth: L2CAP: Fix stack-out-of-bounds read in l2cap_ecred_conn_req\\n\\nSyzbot reported a KASAN stack-out-of-bounds read in l2cap_build_cmd()\\nthat is triggered by a malformed Enhanced Credit Based Connection Request.\\n\\nThe vulnerability stems from l2cap_ecred_conn_req(). The function allocates\\na local stack buffer (`pdu`) designed to hold a maximum of 5 Source Channel\\nIDs (SCIDs), totaling 18 bytes. When an attacker sends a request with more\\nthan 5 SCIDs, the function calculates `rsp_len` based on this unvalidated\\n`cmd_len` before checking if the number of SCIDs exceeds\\nL2CAP_ECRED_MAX_CID.\\n\\nIf the SCID count is too high, the function correctly jumps to the\\n`response` label to reject the packet, but `rsp_len` retains the\\nattacker\u0027s oversized value. Consequently, l2cap_send_cmd() is instructed\\nto read past the end of the 18-byte `pdu` buffer, triggering a\\nKASAN panic.\\n\\nFix this by moving the assignment of `rsp_len` to after the `num_scid`\\nboundary check. If the packet is rejected, `rsp_len` will safely\\nremain 0, and the error response will only read the 8-byte base header\\nfrom the stack.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.12.75\",\"versionEndExcluding\":\"6.12.80\",\"matchCriteriaId\":\"E823EB64-1F92-40BB-891C-D94D00EDA086\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.18.16\",\"versionEndExcluding\":\"6.18.21\",\"matchCriteriaId\":\"6C57E63A-04BA-47E0-A942-789F7236A636\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.19.6\",\"versionEndExcluding\":\"6.19.11\",\"matchCriteriaId\":\"1BFE33C3-C605-4CC2-9F15-3494BA78E2C9\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/5b35f8211a913cfe7ab9d54fa36a272d2059a588\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/9d87cb22195b2c67405f5485d525190747ad5493\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a3d9c50d69785ae02e153f000da1b5fd6dbfdf1b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c8e1a27edb8b4e5afb56b384acd7b6c2dec1b7cc\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
FKIE_CVE-2026-31513
Vulnerability from fkie_nvd - Published: 2026-04-22 14:16 - Updated: 2026-04-28 16:15| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E823EB64-1F92-40BB-891C-D94D00EDA086",
"versionEndExcluding": "6.12.80",
"versionStartIncluding": "6.12.75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6C57E63A-04BA-47E0-A942-789F7236A636",
"versionEndExcluding": "6.18.21",
"versionStartIncluding": "6.18.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1BFE33C3-C605-4CC2-9F15-3494BA78E2C9",
"versionEndExcluding": "6.19.11",
"versionStartIncluding": "6.19.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix stack-out-of-bounds read in l2cap_ecred_conn_req\n\nSyzbot reported a KASAN stack-out-of-bounds read in l2cap_build_cmd()\nthat is triggered by a malformed Enhanced Credit Based Connection Request.\n\nThe vulnerability stems from l2cap_ecred_conn_req(). The function allocates\na local stack buffer (`pdu`) designed to hold a maximum of 5 Source Channel\nIDs (SCIDs), totaling 18 bytes. When an attacker sends a request with more\nthan 5 SCIDs, the function calculates `rsp_len` based on this unvalidated\n`cmd_len` before checking if the number of SCIDs exceeds\nL2CAP_ECRED_MAX_CID.\n\nIf the SCID count is too high, the function correctly jumps to the\n`response` label to reject the packet, but `rsp_len` retains the\nattacker\u0027s oversized value. Consequently, l2cap_send_cmd() is instructed\nto read past the end of the 18-byte `pdu` buffer, triggering a\nKASAN panic.\n\nFix this by moving the assignment of `rsp_len` to after the `num_scid`\nboundary check. If the packet is rejected, `rsp_len` will safely\nremain 0, and the error response will only read the 8-byte base header\nfrom the stack."
}
],
"id": "CVE-2026-31513",
"lastModified": "2026-04-28T16:15:22.477",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"type": "Secondary"
}
]
},
"published": "2026-04-22T14:16:50.673",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/5b35f8211a913cfe7ab9d54fa36a272d2059a588"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/9d87cb22195b2c67405f5485d525190747ad5493"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/a3d9c50d69785ae02e153f000da1b5fd6dbfdf1b"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/c8e1a27edb8b4e5afb56b384acd7b6c2dec1b7cc"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-8H97-6438-987H
Vulnerability from github – Published: 2026-04-22 15:31 – Updated: 2026-04-27 15:30In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: L2CAP: Fix stack-out-of-bounds read in l2cap_ecred_conn_req
Syzbot reported a KASAN stack-out-of-bounds read in l2cap_build_cmd() that is triggered by a malformed Enhanced Credit Based Connection Request.
The vulnerability stems from l2cap_ecred_conn_req(). The function allocates
a local stack buffer (pdu) designed to hold a maximum of 5 Source Channel
IDs (SCIDs), totaling 18 bytes. When an attacker sends a request with more
than 5 SCIDs, the function calculates rsp_len based on this unvalidated
cmd_len before checking if the number of SCIDs exceeds
L2CAP_ECRED_MAX_CID.
If the SCID count is too high, the function correctly jumps to the
response label to reject the packet, but rsp_len retains the
attacker's oversized value. Consequently, l2cap_send_cmd() is instructed
to read past the end of the 18-byte pdu buffer, triggering a
KASAN panic.
Fix this by moving the assignment of rsp_len to after the num_scid
boundary check. If the packet is rejected, rsp_len will safely
remain 0, and the error response will only read the 8-byte base header
from the stack.
{
"affected": [],
"aliases": [
"CVE-2026-31513"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-04-22T14:16:50Z",
"severity": "HIGH"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix stack-out-of-bounds read in l2cap_ecred_conn_req\n\nSyzbot reported a KASAN stack-out-of-bounds read in l2cap_build_cmd()\nthat is triggered by a malformed Enhanced Credit Based Connection Request.\n\nThe vulnerability stems from l2cap_ecred_conn_req(). The function allocates\na local stack buffer (`pdu`) designed to hold a maximum of 5 Source Channel\nIDs (SCIDs), totaling 18 bytes. When an attacker sends a request with more\nthan 5 SCIDs, the function calculates `rsp_len` based on this unvalidated\n`cmd_len` before checking if the number of SCIDs exceeds\nL2CAP_ECRED_MAX_CID.\n\nIf the SCID count is too high, the function correctly jumps to the\n`response` label to reject the packet, but `rsp_len` retains the\nattacker\u0027s oversized value. Consequently, l2cap_send_cmd() is instructed\nto read past the end of the 18-byte `pdu` buffer, triggering a\nKASAN panic.\n\nFix this by moving the assignment of `rsp_len` to after the `num_scid`\nboundary check. If the packet is rejected, `rsp_len` will safely\nremain 0, and the error response will only read the 8-byte base header\nfrom the stack.",
"id": "GHSA-8h97-6438-987h",
"modified": "2026-04-27T15:30:39Z",
"published": "2026-04-22T15:31:43Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31513"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/5b35f8211a913cfe7ab9d54fa36a272d2059a588"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/9d87cb22195b2c67405f5485d525190747ad5493"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/a3d9c50d69785ae02e153f000da1b5fd6dbfdf1b"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/c8e1a27edb8b4e5afb56b384acd7b6c2dec1b7cc"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2026-1252
Vulnerability from csaf_certbund - Published: 2026-04-22 22:00 - Updated: 2026-05-20 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:-
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Google Container-Optimized OS
Google
|
cpe:/o:google:container-optimized_os:-
|
— |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, Informationen offenzulegen, andere nicht n\u00e4her spezifizierte Auswirkungen zu verursachen und m\u00f6glicherweise Code auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-1252 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1252.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-1252 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1252"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31434",
"url": "https://lore.kernel.org/linux-cve-announce/2026042240-CVE-2026-31434-87f3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31435",
"url": "https://lore.kernel.org/linux-cve-announce/2026042242-CVE-2026-31435-f0f5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31436",
"url": "https://lore.kernel.org/linux-cve-announce/2026042242-CVE-2026-31436-7ac7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31437",
"url": "https://lore.kernel.org/linux-cve-announce/2026042243-CVE-2026-31437-7cba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31438",
"url": "https://lore.kernel.org/linux-cve-announce/2026042243-CVE-2026-31438-66c2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31439",
"url": "https://lore.kernel.org/linux-cve-announce/2026042243-CVE-2026-31439-b890@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31440",
"url": "https://lore.kernel.org/linux-cve-announce/2026042244-CVE-2026-31440-78bd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31441",
"url": "https://lore.kernel.org/linux-cve-announce/2026042244-CVE-2026-31441-eb92@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31442",
"url": "https://lore.kernel.org/linux-cve-announce/2026042244-CVE-2026-31442-dece@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31443",
"url": "https://lore.kernel.org/linux-cve-announce/2026042245-CVE-2026-31443-0b7d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31444",
"url": "https://lore.kernel.org/linux-cve-announce/2026042245-CVE-2026-31444-8b6e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31445",
"url": "https://lore.kernel.org/linux-cve-announce/2026042246-CVE-2026-31445-cbbf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31446",
"url": "https://lore.kernel.org/linux-cve-announce/2026042246-CVE-2026-31446-8993@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31447",
"url": "https://lore.kernel.org/linux-cve-announce/2026042246-CVE-2026-31447-ed33@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31448",
"url": "https://lore.kernel.org/linux-cve-announce/2026042247-CVE-2026-31448-3c50@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31449",
"url": "https://lore.kernel.org/linux-cve-announce/2026042247-CVE-2026-31449-0942@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31450",
"url": "https://lore.kernel.org/linux-cve-announce/2026042247-CVE-2026-31450-19fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31451",
"url": "https://lore.kernel.org/linux-cve-announce/2026042248-CVE-2026-31451-cec9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31452",
"url": "https://lore.kernel.org/linux-cve-announce/2026042248-CVE-2026-31452-9f5b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31453",
"url": "https://lore.kernel.org/linux-cve-announce/2026042248-CVE-2026-31453-6c3f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31454",
"url": "https://lore.kernel.org/linux-cve-announce/2026042249-CVE-2026-31454-ae01@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31455",
"url": "https://lore.kernel.org/linux-cve-announce/2026042249-CVE-2026-31455-1c26@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31456",
"url": "https://lore.kernel.org/linux-cve-announce/2026042249-CVE-2026-31456-3db6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31457",
"url": "https://lore.kernel.org/linux-cve-announce/2026042250-CVE-2026-31457-601a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31458",
"url": "https://lore.kernel.org/linux-cve-announce/2026042250-CVE-2026-31458-5a8e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31459",
"url": "https://lore.kernel.org/linux-cve-announce/2026042250-CVE-2026-31459-0600@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31460",
"url": "https://lore.kernel.org/linux-cve-announce/2026042251-CVE-2026-31460-2405@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31461",
"url": "https://lore.kernel.org/linux-cve-announce/2026042251-CVE-2026-31461-2b9c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31462",
"url": "https://lore.kernel.org/linux-cve-announce/2026042251-CVE-2026-31462-d050@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31463",
"url": "https://lore.kernel.org/linux-cve-announce/2026042252-CVE-2026-31463-7bc8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31464",
"url": "https://lore.kernel.org/linux-cve-announce/2026042252-CVE-2026-31464-f9c5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31465",
"url": "https://lore.kernel.org/linux-cve-announce/2026042252-CVE-2026-31465-66a4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31466",
"url": "https://lore.kernel.org/linux-cve-announce/2026042253-CVE-2026-31466-4fba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31467",
"url": "https://lore.kernel.org/linux-cve-announce/2026042253-CVE-2026-31467-914b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31468",
"url": "https://lore.kernel.org/linux-cve-announce/2026042253-CVE-2026-31468-13b8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31469",
"url": "https://lore.kernel.org/linux-cve-announce/2026042254-CVE-2026-31469-65d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31470",
"url": "https://lore.kernel.org/linux-cve-announce/2026042254-CVE-2026-31470-350c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31471",
"url": "https://lore.kernel.org/linux-cve-announce/2026042254-CVE-2026-31471-d8ba@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31472",
"url": "https://lore.kernel.org/linux-cve-announce/2026042255-CVE-2026-31472-396d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31473",
"url": "https://lore.kernel.org/linux-cve-announce/2026042255-CVE-2026-31473-fad0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31474",
"url": "https://lore.kernel.org/linux-cve-announce/2026042256-CVE-2026-31474-8673@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31475",
"url": "https://lore.kernel.org/linux-cve-announce/2026042256-CVE-2026-31475-74ed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31476",
"url": "https://lore.kernel.org/linux-cve-announce/2026042256-CVE-2026-31476-bb58@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31477",
"url": "https://lore.kernel.org/linux-cve-announce/2026042257-CVE-2026-31477-2808@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31478",
"url": "https://lore.kernel.org/linux-cve-announce/2026042257-CVE-2026-31478-7be0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31479",
"url": "https://lore.kernel.org/linux-cve-announce/2026042257-CVE-2026-31479-3a31@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31480",
"url": "https://lore.kernel.org/linux-cve-announce/2026042258-CVE-2026-31480-c2bf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31481",
"url": "https://lore.kernel.org/linux-cve-announce/2026042258-CVE-2026-31481-390e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31482",
"url": "https://lore.kernel.org/linux-cve-announce/2026042258-CVE-2026-31482-b482@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31483",
"url": "https://lore.kernel.org/linux-cve-announce/2026042259-CVE-2026-31483-9bc8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31484",
"url": "https://lore.kernel.org/linux-cve-announce/2026042259-CVE-2026-31484-3268@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31485",
"url": "https://lore.kernel.org/linux-cve-announce/2026042259-CVE-2026-31485-e15c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31486",
"url": "https://lore.kernel.org/linux-cve-announce/2026042200-CVE-2026-31486-52d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31487",
"url": "https://lore.kernel.org/linux-cve-announce/2026042200-CVE-2026-31487-a0ca@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31488",
"url": "https://lore.kernel.org/linux-cve-announce/2026042200-CVE-2026-31488-fe04@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31489",
"url": "https://lore.kernel.org/linux-cve-announce/2026042201-CVE-2026-31489-3a01@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31490",
"url": "https://lore.kernel.org/linux-cve-announce/2026042201-CVE-2026-31490-8635@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31491",
"url": "https://lore.kernel.org/linux-cve-announce/2026042201-CVE-2026-31491-e599@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31492",
"url": "https://lore.kernel.org/linux-cve-announce/2026042202-CVE-2026-31492-2f6c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31493",
"url": "https://lore.kernel.org/linux-cve-announce/2026042202-CVE-2026-31493-4d67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31494",
"url": "https://lore.kernel.org/linux-cve-announce/2026042202-CVE-2026-31494-647e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31495",
"url": "https://lore.kernel.org/linux-cve-announce/2026042203-CVE-2026-31495-f86b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31496",
"url": "https://lore.kernel.org/linux-cve-announce/2026042203-CVE-2026-31496-e130@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31497",
"url": "https://lore.kernel.org/linux-cve-announce/2026042203-CVE-2026-31497-f54a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31498",
"url": "https://lore.kernel.org/linux-cve-announce/2026042204-CVE-2026-31498-1aee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31499",
"url": "https://lore.kernel.org/linux-cve-announce/2026042204-CVE-2026-31499-0142@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31500",
"url": "https://lore.kernel.org/linux-cve-announce/2026042204-CVE-2026-31500-c032@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31501",
"url": "https://lore.kernel.org/linux-cve-announce/2026042205-CVE-2026-31501-113b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31502",
"url": "https://lore.kernel.org/linux-cve-announce/2026042205-CVE-2026-31502-4b98@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31503",
"url": "https://lore.kernel.org/linux-cve-announce/2026042206-CVE-2026-31503-602a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31504",
"url": "https://lore.kernel.org/linux-cve-announce/2026042206-CVE-2026-31504-10f4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31505",
"url": "https://lore.kernel.org/linux-cve-announce/2026042206-CVE-2026-31505-a1db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31506",
"url": "https://lore.kernel.org/linux-cve-announce/2026042207-CVE-2026-31506-31d7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31507",
"url": "https://lore.kernel.org/linux-cve-announce/2026042207-CVE-2026-31507-cbc0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31508",
"url": "https://lore.kernel.org/linux-cve-announce/2026042207-CVE-2026-31508-4def@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31509",
"url": "https://lore.kernel.org/linux-cve-announce/2026042208-CVE-2026-31509-8609@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31510",
"url": "https://lore.kernel.org/linux-cve-announce/2026042208-CVE-2026-31510-1c90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31511",
"url": "https://lore.kernel.org/linux-cve-announce/2026042208-CVE-2026-31511-b569@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31512",
"url": "https://lore.kernel.org/linux-cve-announce/2026042209-CVE-2026-31512-b386@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31513",
"url": "https://lore.kernel.org/linux-cve-announce/2026042209-CVE-2026-31513-a32a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31514",
"url": "https://lore.kernel.org/linux-cve-announce/2026042209-CVE-2026-31514-510b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31515",
"url": "https://lore.kernel.org/linux-cve-announce/2026042210-CVE-2026-31515-d929@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31516",
"url": "https://lore.kernel.org/linux-cve-announce/2026042210-CVE-2026-31516-59d8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31517",
"url": "https://lore.kernel.org/linux-cve-announce/2026042210-CVE-2026-31517-e189@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31518",
"url": "https://lore.kernel.org/linux-cve-announce/2026042211-CVE-2026-31518-ba84@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31519",
"url": "https://lore.kernel.org/linux-cve-announce/2026042211-CVE-2026-31519-fdd6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31520",
"url": "https://lore.kernel.org/linux-cve-announce/2026042211-CVE-2026-31520-a81f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31521",
"url": "https://lore.kernel.org/linux-cve-announce/2026042212-CVE-2026-31521-b61e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31522",
"url": "https://lore.kernel.org/linux-cve-announce/2026042212-CVE-2026-31522-b576@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31523",
"url": "https://lore.kernel.org/linux-cve-announce/2026042212-CVE-2026-31523-1f48@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31524",
"url": "https://lore.kernel.org/linux-cve-announce/2026042213-CVE-2026-31524-3f28@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31525",
"url": "https://lore.kernel.org/linux-cve-announce/2026042213-CVE-2026-31525-0fff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31526",
"url": "https://lore.kernel.org/linux-cve-announce/2026042213-CVE-2026-31526-9771@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31527",
"url": "https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31527-a1bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31528",
"url": "https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31528-b375@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31529",
"url": "https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31529-f32e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31530",
"url": "https://lore.kernel.org/linux-cve-announce/2026042215-CVE-2026-31530-b6f5@gregkh/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4561 vom 2026-05-02",
"url": "https://lists.debian.org/debian-lts-announce/2026/05/msg00005.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6238 vom 2026-05-04",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00148.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6243 vom 2026-05-04",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00154.html"
},
{
"category": "external",
"summary": "Container-Optimized OS release notes vom 2026-05-02",
"url": "https://docs.cloud.google.com/container-optimized-os/docs/release-notes#May_01_2026"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:13932 vom 2026-05-06",
"url": "https://access.redhat.com/errata/RHSA-2026:13932"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:14339 vom 2026-05-06",
"url": "https://access.redhat.com/errata/RHSA-2026:14339"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:15883 vom 2026-05-11",
"url": "https://access.redhat.com/errata/RHSA-2026:15883"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50261 vom 2026-05-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-50261.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50260 vom 2026-05-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-50260.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6274 vom 2026-05-18",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00185.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:19521 vom 2026-05-20",
"url": "https://access.redhat.com/errata/RHSA-2026:19521"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8279-1 vom 2026-05-20",
"url": "https://ubuntu.com/security/notices/USN-8279-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8277-1 vom 2026-05-20",
"url": "https://ubuntu.com/security/notices/USN-8277-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8278-1 vom 2026-05-20",
"url": "https://ubuntu.com/security/notices/USN-8278-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8281-1 vom 2026-05-20",
"url": "https://ubuntu.com/security/notices/USN-8281-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:19568 vom 2026-05-21",
"url": "https://access.redhat.com/errata/RHSA-2026:19568"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:19705 vom 2026-05-20",
"url": "https://access.redhat.com/errata/RHSA-2026:19705"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8289-1 vom 2026-05-21",
"url": "https://ubuntu.com/security/notices/USN-8289-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:19875 vom 2026-05-21",
"url": "https://access.redhat.com/errata/RHSA-2026:19875"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:19711 vom 2026-05-20",
"url": "https://access.redhat.com/errata/RHSA-2026:19711"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-05-20T22:00:00.000+00:00",
"generator": {
"date": "2026-05-21T07:57:31.170+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.6.0"
}
},
"id": "WID-SEC-W-2026-1252",
"initial_release_date": "2026-04-22T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-04-22T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-04-23T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2026-25218, EUVD-2026-25219"
},
{
"date": "2026-05-03T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-05-05T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-05-06T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-05-10T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-05-12T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-05-17T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-05-19T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2026-05-20T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
}
],
"status": "final",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Google Container-Optimized OS",
"product": {
"name": "Google Container-Optimized OS",
"product_id": "1607324",
"product_identification_helper": {
"cpe": "cpe:/o:google:container-optimized_os:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T053276",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-38617",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2025-38617"
},
{
"cve": "CVE-2026-31434",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31434"
},
{
"cve": "CVE-2026-31435",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31435"
},
{
"cve": "CVE-2026-31436",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31436"
},
{
"cve": "CVE-2026-31437",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31437"
},
{
"cve": "CVE-2026-31438",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31438"
},
{
"cve": "CVE-2026-31439",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31439"
},
{
"cve": "CVE-2026-31440",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31440"
},
{
"cve": "CVE-2026-31441",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31441"
},
{
"cve": "CVE-2026-31442",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31442"
},
{
"cve": "CVE-2026-31443",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31443"
},
{
"cve": "CVE-2026-31444",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31444"
},
{
"cve": "CVE-2026-31445",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31445"
},
{
"cve": "CVE-2026-31446",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31446"
},
{
"cve": "CVE-2026-31447",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31447"
},
{
"cve": "CVE-2026-31448",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31448"
},
{
"cve": "CVE-2026-31449",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31449"
},
{
"cve": "CVE-2026-31450",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31450"
},
{
"cve": "CVE-2026-31451",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31451"
},
{
"cve": "CVE-2026-31452",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31452"
},
{
"cve": "CVE-2026-31453",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31453"
},
{
"cve": "CVE-2026-31454",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31454"
},
{
"cve": "CVE-2026-31455",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31455"
},
{
"cve": "CVE-2026-31456",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31456"
},
{
"cve": "CVE-2026-31457",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31457"
},
{
"cve": "CVE-2026-31458",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31458"
},
{
"cve": "CVE-2026-31459",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31459"
},
{
"cve": "CVE-2026-31460",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31460"
},
{
"cve": "CVE-2026-31461",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31461"
},
{
"cve": "CVE-2026-31462",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31462"
},
{
"cve": "CVE-2026-31463",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31463"
},
{
"cve": "CVE-2026-31464",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31464"
},
{
"cve": "CVE-2026-31465",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31465"
},
{
"cve": "CVE-2026-31466",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31466"
},
{
"cve": "CVE-2026-31467",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31467"
},
{
"cve": "CVE-2026-31468",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31468"
},
{
"cve": "CVE-2026-31469",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31469"
},
{
"cve": "CVE-2026-31470",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31470"
},
{
"cve": "CVE-2026-31471",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31471"
},
{
"cve": "CVE-2026-31472",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31472"
},
{
"cve": "CVE-2026-31473",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31473"
},
{
"cve": "CVE-2026-31474",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31474"
},
{
"cve": "CVE-2026-31475",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31475"
},
{
"cve": "CVE-2026-31476",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31476"
},
{
"cve": "CVE-2026-31477",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31477"
},
{
"cve": "CVE-2026-31478",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31478"
},
{
"cve": "CVE-2026-31479",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31479"
},
{
"cve": "CVE-2026-31480",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31480"
},
{
"cve": "CVE-2026-31481",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31481"
},
{
"cve": "CVE-2026-31482",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31482"
},
{
"cve": "CVE-2026-31483",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31483"
},
{
"cve": "CVE-2026-31484",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31484"
},
{
"cve": "CVE-2026-31485",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31485"
},
{
"cve": "CVE-2026-31486",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31486"
},
{
"cve": "CVE-2026-31487",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31487"
},
{
"cve": "CVE-2026-31488",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31488"
},
{
"cve": "CVE-2026-31489",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31489"
},
{
"cve": "CVE-2026-31490",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31490"
},
{
"cve": "CVE-2026-31491",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31491"
},
{
"cve": "CVE-2026-31492",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31492"
},
{
"cve": "CVE-2026-31493",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31493"
},
{
"cve": "CVE-2026-31494",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31494"
},
{
"cve": "CVE-2026-31495",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31495"
},
{
"cve": "CVE-2026-31496",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31496"
},
{
"cve": "CVE-2026-31497",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31497"
},
{
"cve": "CVE-2026-31498",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31498"
},
{
"cve": "CVE-2026-31499",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31499"
},
{
"cve": "CVE-2026-31500",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31500"
},
{
"cve": "CVE-2026-31501",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31501"
},
{
"cve": "CVE-2026-31502",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31502"
},
{
"cve": "CVE-2026-31503",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31503"
},
{
"cve": "CVE-2026-31504",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31504"
},
{
"cve": "CVE-2026-31505",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31505"
},
{
"cve": "CVE-2026-31506",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31506"
},
{
"cve": "CVE-2026-31507",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31507"
},
{
"cve": "CVE-2026-31508",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31508"
},
{
"cve": "CVE-2026-31509",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31509"
},
{
"cve": "CVE-2026-31510",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31510"
},
{
"cve": "CVE-2026-31511",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31511"
},
{
"cve": "CVE-2026-31512",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31512"
},
{
"cve": "CVE-2026-31513",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31513"
},
{
"cve": "CVE-2026-31514",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31514"
},
{
"cve": "CVE-2026-31515",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31515"
},
{
"cve": "CVE-2026-31516",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31516"
},
{
"cve": "CVE-2026-31517",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31517"
},
{
"cve": "CVE-2026-31518",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31518"
},
{
"cve": "CVE-2026-31519",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31519"
},
{
"cve": "CVE-2026-31520",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31520"
},
{
"cve": "CVE-2026-31521",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31521"
},
{
"cve": "CVE-2026-31522",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31522"
},
{
"cve": "CVE-2026-31523",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31523"
},
{
"cve": "CVE-2026-31524",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31524"
},
{
"cve": "CVE-2026-31525",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31525"
},
{
"cve": "CVE-2026-31526",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31526"
},
{
"cve": "CVE-2026-31527",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31527"
},
{
"cve": "CVE-2026-31528",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31528"
},
{
"cve": "CVE-2026-31529",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31529"
},
{
"cve": "CVE-2026-31530",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31530"
},
{
"cve": "CVE-2026-31531",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31531"
},
{
"cve": "CVE-2026-31532",
"product_status": {
"known_affected": [
"T053276",
"2951",
"67646",
"T000126",
"T004914",
"1607324"
]
},
"release_date": "2026-04-22T22:00:00.000+00:00",
"title": "CVE-2026-31532"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.