Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-23203 (GCVE-0-2026-23203)
Vulnerability from cvelistv5 – Published: 2026-02-14 16:27 – Updated: 2026-02-14 16:27{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/ti/cpsw_new.c",
"drivers/net/ethernet/ti/cpsw_priv.h"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "d5b3a669866977dc87fd56fcf00a70df1536d258",
"status": "affected",
"version": "1767bb2d47b715a106287a8f963d9ec6cbab4e69",
"versionType": "git"
},
{
"lessThan": "c0b5dc73a38f954e780f93a549b8fe225235c07a",
"status": "affected",
"version": "1767bb2d47b715a106287a8f963d9ec6cbab4e69",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/ti/cpsw_new.c",
"drivers/net/ethernet/ti/cpsw_priv.h"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.17"
},
{
"lessThan": "6.17",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.10",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.19",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.10",
"versionStartIncluding": "6.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19",
"versionStartIncluding": "6.17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: cpsw_new: Execute ndo_set_rx_mode callback in a work queue\n\nCommit 1767bb2d47b7 (\"ipv6: mcast: Don\u0027t hold RTNL for\nIPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP.\") removed the RTNL lock for\nIPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP operations. However, this\nchange triggered the following call trace on my BeagleBone Black board:\n WARNING: net/8021q/vlan_core.c:236 at vlan_for_each+0x120/0x124, CPU#0: rpcbind/496\n RTNL: assertion failed at net/8021q/vlan_core.c (236)\n Modules linked in:\n CPU: 0 UID: 997 PID: 496 Comm: rpcbind Not tainted 6.19.0-rc6-next-20260122-yocto-standard+ #8 PREEMPT\n Hardware name: Generic AM33XX (Flattened Device Tree)\n Call trace:\n unwind_backtrace from show_stack+0x28/0x2c\n show_stack from dump_stack_lvl+0x30/0x38\n dump_stack_lvl from __warn+0xb8/0x11c\n __warn from warn_slowpath_fmt+0x130/0x194\n warn_slowpath_fmt from vlan_for_each+0x120/0x124\n vlan_for_each from cpsw_add_mc_addr+0x54/0xd8\n cpsw_add_mc_addr from __hw_addr_ref_sync_dev+0xc4/0xec\n __hw_addr_ref_sync_dev from __dev_mc_add+0x78/0x88\n __dev_mc_add from igmp6_group_added+0x84/0xec\n igmp6_group_added from __ipv6_dev_mc_inc+0x1fc/0x2f0\n __ipv6_dev_mc_inc from __ipv6_sock_mc_join+0x124/0x1b4\n __ipv6_sock_mc_join from do_ipv6_setsockopt+0x84c/0x1168\n do_ipv6_setsockopt from ipv6_setsockopt+0x88/0xc8\n ipv6_setsockopt from do_sock_setsockopt+0xe8/0x19c\n do_sock_setsockopt from __sys_setsockopt+0x84/0xac\n __sys_setsockopt from ret_fast_syscall+0x0/0x5\n\nThis trace occurs because vlan_for_each() is called within\ncpsw_ndo_set_rx_mode(), which expects the RTNL lock to be held.\nSince modifying vlan_for_each() to operate without the RTNL lock is not\nstraightforward, and because ndo_set_rx_mode() is invoked both with and\nwithout the RTNL lock across different code paths, simply adding\nrtnl_lock() in cpsw_ndo_set_rx_mode() is not a viable solution.\n\nTo resolve this issue, we opt to execute the actual processing within\na work queue, following the approach used by the icssg-prueth driver."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-14T16:27:27.048Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/d5b3a669866977dc87fd56fcf00a70df1536d258"
},
{
"url": "https://git.kernel.org/stable/c/c0b5dc73a38f954e780f93a549b8fe225235c07a"
}
],
"title": "net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-23203",
"datePublished": "2026-02-14T16:27:27.048Z",
"dateReserved": "2026-01-13T15:37:45.986Z",
"dateUpdated": "2026-02-14T16:27:27.048Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-23203\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-02-14T17:15:58.177\",\"lastModified\":\"2026-03-19T16:34:57.810\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet: cpsw_new: Execute ndo_set_rx_mode callback in a work queue\\n\\nCommit 1767bb2d47b7 (\\\"ipv6: mcast: Don\u0027t hold RTNL for\\nIPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP.\\\") removed the RTNL lock for\\nIPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP operations. However, this\\nchange triggered the following call trace on my BeagleBone Black board:\\n WARNING: net/8021q/vlan_core.c:236 at vlan_for_each+0x120/0x124, CPU#0: rpcbind/496\\n RTNL: assertion failed at net/8021q/vlan_core.c (236)\\n Modules linked in:\\n CPU: 0 UID: 997 PID: 496 Comm: rpcbind Not tainted 6.19.0-rc6-next-20260122-yocto-standard+ #8 PREEMPT\\n Hardware name: Generic AM33XX (Flattened Device Tree)\\n Call trace:\\n unwind_backtrace from show_stack+0x28/0x2c\\n show_stack from dump_stack_lvl+0x30/0x38\\n dump_stack_lvl from __warn+0xb8/0x11c\\n __warn from warn_slowpath_fmt+0x130/0x194\\n warn_slowpath_fmt from vlan_for_each+0x120/0x124\\n vlan_for_each from cpsw_add_mc_addr+0x54/0xd8\\n cpsw_add_mc_addr from __hw_addr_ref_sync_dev+0xc4/0xec\\n __hw_addr_ref_sync_dev from __dev_mc_add+0x78/0x88\\n __dev_mc_add from igmp6_group_added+0x84/0xec\\n igmp6_group_added from __ipv6_dev_mc_inc+0x1fc/0x2f0\\n __ipv6_dev_mc_inc from __ipv6_sock_mc_join+0x124/0x1b4\\n __ipv6_sock_mc_join from do_ipv6_setsockopt+0x84c/0x1168\\n do_ipv6_setsockopt from ipv6_setsockopt+0x88/0xc8\\n ipv6_setsockopt from do_sock_setsockopt+0xe8/0x19c\\n do_sock_setsockopt from __sys_setsockopt+0x84/0xac\\n __sys_setsockopt from ret_fast_syscall+0x0/0x5\\n\\nThis trace occurs because vlan_for_each() is called within\\ncpsw_ndo_set_rx_mode(), which expects the RTNL lock to be held.\\nSince modifying vlan_for_each() to operate without the RTNL lock is not\\nstraightforward, and because ndo_set_rx_mode() is invoked both with and\\nwithout the RTNL lock across different code paths, simply adding\\nrtnl_lock() in cpsw_ndo_set_rx_mode() is not a viable solution.\\n\\nTo resolve this issue, we opt to execute the actual processing within\\na work queue, following the approach used by the icssg-prueth driver.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\\n\\nnet: cpsw_new: Ejecutar la devoluci\u00f3n de llamada ndo_set_rx_mode en una cola de trabajo\\n\\nEl commit 1767bb2d47b7 (\u0027ipv6: mcast: No mantener RTNL para IPV6_ADD_MEMBERSHIP y MCAST_JOIN_GROUP.\u0027) elimin\u00f3 el bloqueo RTNL para las operaciones IPV6_ADD_MEMBERSHIP y MCAST_JOIN_GROUP. Sin embargo, este cambio desencaden\u00f3 el siguiente rastreo de llamadas en mi placa BeagleBone Black:\\n WARNING: net/8021q/vlan_core.c:236 en vlan_for_each+0x120/0x124, CPU#0: rpcbind/496\\n RTNL: aserci\u00f3n fallida en net/8021q/vlan_core.c (236)\\n M\u00f3dulos enlazados:\\n CPU: 0 UID: 997 PID: 496 Comm: rpcbind No contaminado 6.19.0-rc6-next-20260122-yocto-standard+ #8 PREEMPT\\n Nombre del hardware: Generic AM33XX (Flattened Device Tree)\\n Rastreo de llamadas:\\n unwind_backtrace desde show_stack+0x28/0x2c\\n show_stack desde dump_stack_lvl+0x30/0x38\\n dump_stack_lvl desde __warn+0xb8/0x11c\\n __warn desde warn_slowpath_fmt+0x130/0x194\\n warn_slowpath_fmt desde vlan_for_each+0x120/0x124\\n vlan_for_each desde cpsw_add_mc_addr+0x54/0xd8\\n cpsw_add_mc_addr desde __hw_addr_ref_sync_dev+0xc4/0xec\\n __hw_addr_ref_sync_dev desde __dev_mc_add+0x78/0x88\\n __dev_mc_add desde igmp6_group_added+0x84/0xec\\n igmp6_group_added desde __ipv6_dev_mc_inc+0x1fc/0x2f0\\n __ipv6_dev_mc_inc desde __ipv6_sock_mc_join+0x124/0x1b4\\n __ipv6_sock_mc_join desde do_ipv6_setsockopt+0x84c/0x1168\\n do_ipv6_setsockopt desde ipv6_setsockopt+0x88/0xc8\\n ipv6_setsockopt desde do_sock_setsockopt+0xe8/0x19c\\n do_sock_setsockopt desde __sys_setsockopt+0x84/0xac\\n __sys_setsockopt desde ret_fast_syscall+0x0/0x5\\n\\nEste rastreo ocurre porque se llama a vlan_for_each() dentro de cpsw_ndo_set_rx_mode(), que espera que el bloqueo RTNL est\u00e9 mantenido. Dado que modificar vlan_for_each() para operar sin el bloqueo RTNL no es sencillo, y debido a que ndo_set_rx_mode() se invoca tanto con como sin el bloqueo RTNL a trav\u00e9s de diferentes rutas de c\u00f3digo, simplemente a\u00f1adir rtnl_lock() en cpsw_ndo_set_rx_mode() no es una soluci\u00f3n viable.\\n\\nPara resolver este problema, optamos por ejecutar el procesamiento real dentro de una cola de trabajo, siguiendo el enfoque utilizado por el controlador icssg-prueth.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.17\",\"versionEndExcluding\":\"6.18.10\",\"matchCriteriaId\":\"006F0E3E-7CDC-49C8-880D-47A126A6F299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"17B67AA7-40D6-4AFA-8459-F200F3D7CFD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C47E4CC9-C826-4FA9-B014-7FE3D9B318B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F71D92C0-C023-48BD-B3B6-70B638EEE298\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"13580667-0A98-40CC-B29F-D12790B91BDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD1FED7-CF48-47BF-AC7D-7B6FA3C065FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EF854A1-ABB1-4E93-BE9A-44569EC76C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5DC0CA6-F0AF-4DDF-A882-3DADB9A886A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB5B7DFC-C36B-45D8-922C-877569FDDF43\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/c0b5dc73a38f954e780f93a549b8fe225235c07a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d5b3a669866977dc87fd56fcf00a70df1536d258\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
GHSA-WR52-6C6F-X6GV
Vulnerability from github – Published: 2026-02-14 18:30 – Updated: 2026-03-19 18:31In the Linux kernel, the following vulnerability has been resolved:
net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue
Commit 1767bb2d47b7 ("ipv6: mcast: Don't hold RTNL for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP.") removed the RTNL lock for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP operations. However, this change triggered the following call trace on my BeagleBone Black board: WARNING: net/8021q/vlan_core.c:236 at vlan_for_each+0x120/0x124, CPU#0: rpcbind/496 RTNL: assertion failed at net/8021q/vlan_core.c (236) Modules linked in: CPU: 0 UID: 997 PID: 496 Comm: rpcbind Not tainted 6.19.0-rc6-next-20260122-yocto-standard+ #8 PREEMPT Hardware name: Generic AM33XX (Flattened Device Tree) Call trace: unwind_backtrace from show_stack+0x28/0x2c show_stack from dump_stack_lvl+0x30/0x38 dump_stack_lvl from __warn+0xb8/0x11c __warn from warn_slowpath_fmt+0x130/0x194 warn_slowpath_fmt from vlan_for_each+0x120/0x124 vlan_for_each from cpsw_add_mc_addr+0x54/0xd8 cpsw_add_mc_addr from __hw_addr_ref_sync_dev+0xc4/0xec __hw_addr_ref_sync_dev from __dev_mc_add+0x78/0x88 __dev_mc_add from igmp6_group_added+0x84/0xec igmp6_group_added from __ipv6_dev_mc_inc+0x1fc/0x2f0 __ipv6_dev_mc_inc from __ipv6_sock_mc_join+0x124/0x1b4 __ipv6_sock_mc_join from do_ipv6_setsockopt+0x84c/0x1168 do_ipv6_setsockopt from ipv6_setsockopt+0x88/0xc8 ipv6_setsockopt from do_sock_setsockopt+0xe8/0x19c do_sock_setsockopt from __sys_setsockopt+0x84/0xac __sys_setsockopt from ret_fast_syscall+0x0/0x5
This trace occurs because vlan_for_each() is called within cpsw_ndo_set_rx_mode(), which expects the RTNL lock to be held. Since modifying vlan_for_each() to operate without the RTNL lock is not straightforward, and because ndo_set_rx_mode() is invoked both with and without the RTNL lock across different code paths, simply adding rtnl_lock() in cpsw_ndo_set_rx_mode() is not a viable solution.
To resolve this issue, we opt to execute the actual processing within a work queue, following the approach used by the icssg-prueth driver.
{
"affected": [],
"aliases": [
"CVE-2026-23203"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-02-14T17:15:58Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: cpsw_new: Execute ndo_set_rx_mode callback in a work queue\n\nCommit 1767bb2d47b7 (\"ipv6: mcast: Don\u0027t hold RTNL for\nIPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP.\") removed the RTNL lock for\nIPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP operations. However, this\nchange triggered the following call trace on my BeagleBone Black board:\n WARNING: net/8021q/vlan_core.c:236 at vlan_for_each+0x120/0x124, CPU#0: rpcbind/496\n RTNL: assertion failed at net/8021q/vlan_core.c (236)\n Modules linked in:\n CPU: 0 UID: 997 PID: 496 Comm: rpcbind Not tainted 6.19.0-rc6-next-20260122-yocto-standard+ #8 PREEMPT\n Hardware name: Generic AM33XX (Flattened Device Tree)\n Call trace:\n unwind_backtrace from show_stack+0x28/0x2c\n show_stack from dump_stack_lvl+0x30/0x38\n dump_stack_lvl from __warn+0xb8/0x11c\n __warn from warn_slowpath_fmt+0x130/0x194\n warn_slowpath_fmt from vlan_for_each+0x120/0x124\n vlan_for_each from cpsw_add_mc_addr+0x54/0xd8\n cpsw_add_mc_addr from __hw_addr_ref_sync_dev+0xc4/0xec\n __hw_addr_ref_sync_dev from __dev_mc_add+0x78/0x88\n __dev_mc_add from igmp6_group_added+0x84/0xec\n igmp6_group_added from __ipv6_dev_mc_inc+0x1fc/0x2f0\n __ipv6_dev_mc_inc from __ipv6_sock_mc_join+0x124/0x1b4\n __ipv6_sock_mc_join from do_ipv6_setsockopt+0x84c/0x1168\n do_ipv6_setsockopt from ipv6_setsockopt+0x88/0xc8\n ipv6_setsockopt from do_sock_setsockopt+0xe8/0x19c\n do_sock_setsockopt from __sys_setsockopt+0x84/0xac\n __sys_setsockopt from ret_fast_syscall+0x0/0x5\n\nThis trace occurs because vlan_for_each() is called within\ncpsw_ndo_set_rx_mode(), which expects the RTNL lock to be held.\nSince modifying vlan_for_each() to operate without the RTNL lock is not\nstraightforward, and because ndo_set_rx_mode() is invoked both with and\nwithout the RTNL lock across different code paths, simply adding\nrtnl_lock() in cpsw_ndo_set_rx_mode() is not a viable solution.\n\nTo resolve this issue, we opt to execute the actual processing within\na work queue, following the approach used by the icssg-prueth driver.",
"id": "GHSA-wr52-6c6f-x6gv",
"modified": "2026-03-19T18:31:14Z",
"published": "2026-02-14T18:30:16Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23203"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/c0b5dc73a38f954e780f93a549b8fe225235c07a"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d5b3a669866977dc87fd56fcf00a70df1536d258"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2026-0421
Vulnerability from csaf_certbund - Published: 2026-02-15 23:00 - Updated: 2026-03-30 22:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu einer Denial-of-Service- Bedingung f\u00fchren oder eine Speicherbesch\u00e4digung verursachen k\u00f6nnen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0421 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0421.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0421 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0421"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71200",
"url": "https://lore.kernel.org/linux-cve-announce/2026021403-CVE-2025-71200-b7c7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71201",
"url": "https://lore.kernel.org/linux-cve-announce/2026021428-CVE-2025-71201-9d67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71202",
"url": "https://lore.kernel.org/linux-cve-announce/2026021414-CVE-2025-71202-4c01@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71203",
"url": "https://lore.kernel.org/linux-cve-announce/2026021423-CVE-2025-71203-a81c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71204",
"url": "https://lore.kernel.org/linux-cve-announce/2026021425-CVE-2025-71204-88b2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71220",
"url": "https://lore.kernel.org/linux-cve-announce/2026021425-CVE-2025-71220-162f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71221",
"url": "https://lore.kernel.org/linux-cve-announce/2026021426-CVE-2025-71221-2987@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71222",
"url": "https://lore.kernel.org/linux-cve-announce/2026021426-CVE-2025-71222-1437@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71223",
"url": "https://lore.kernel.org/linux-cve-announce/2026021426-CVE-2025-71223-65b9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71224",
"url": "https://lore.kernel.org/linux-cve-announce/2026021427-CVE-2025-71224-318e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23111",
"url": "https://lore.kernel.org/linux-cve-announce/2026021300-CVE-2026-23111-9762@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23112",
"url": "https://lore.kernel.org/linux-cve-announce/2026021302-CVE-2026-23112-6499@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23113",
"url": "https://lore.kernel.org/linux-cve-announce/2026021405-CVE-2026-23113-a027@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23114",
"url": "https://lore.kernel.org/linux-cve-announce/2026021405-CVE-2026-23114-21a3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23115",
"url": "https://lore.kernel.org/linux-cve-announce/2026021406-CVE-2026-23115-64da@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23116",
"url": "https://lore.kernel.org/linux-cve-announce/2026021406-CVE-2026-23116-41e5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23117",
"url": "https://lore.kernel.org/linux-cve-announce/2026021406-CVE-2026-23117-0b29@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23118",
"url": "https://lore.kernel.org/linux-cve-announce/2026021407-CVE-2026-23118-7579@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23119",
"url": "https://lore.kernel.org/linux-cve-announce/2026021407-CVE-2026-23119-0f44@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23120",
"url": "https://lore.kernel.org/linux-cve-announce/2026021407-CVE-2026-23120-5f82@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23121",
"url": "https://lore.kernel.org/linux-cve-announce/2026021408-CVE-2026-23121-73e6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23123",
"url": "https://lore.kernel.org/linux-cve-announce/2026021408-CVE-2026-23123-9ee2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23124",
"url": "https://lore.kernel.org/linux-cve-announce/2026021409-CVE-2026-23124-2074@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23125",
"url": "https://lore.kernel.org/linux-cve-announce/2026021409-CVE-2026-23125-1ee3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23126",
"url": "https://lore.kernel.org/linux-cve-announce/2026021409-CVE-2026-23126-b259@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23127",
"url": "https://lore.kernel.org/linux-cve-announce/2026021410-CVE-2026-23127-d01a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23128",
"url": "https://lore.kernel.org/linux-cve-announce/2026021410-CVE-2026-23128-fab1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23129",
"url": "https://lore.kernel.org/linux-cve-announce/2026021410-CVE-2026-23129-81ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23130",
"url": "https://lore.kernel.org/linux-cve-announce/2026021411-CVE-2026-23130-4390@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23131",
"url": "https://lore.kernel.org/linux-cve-announce/2026021411-CVE-2026-23131-6201@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23132",
"url": "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23132-175d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23133",
"url": "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23133-19ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23134",
"url": "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23134-22cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23135",
"url": "https://lore.kernel.org/linux-cve-announce/2026021438-CVE-2026-23135-74c1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23136",
"url": "https://lore.kernel.org/linux-cve-announce/2026021428-CVE-2026-23136-f28c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23137",
"url": "https://lore.kernel.org/linux-cve-announce/2026021429-CVE-2026-23137-b77f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23138",
"url": "https://lore.kernel.org/linux-cve-announce/2026021429-CVE-2026-23138-9853@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23139",
"url": "https://lore.kernel.org/linux-cve-announce/2026021429-CVE-2026-23139-a7b4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23140",
"url": "https://lore.kernel.org/linux-cve-announce/2026021430-CVE-2026-23140-fed3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23141",
"url": "https://lore.kernel.org/linux-cve-announce/2026021415-CVE-2026-23141-c6bd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23142",
"url": "https://lore.kernel.org/linux-cve-announce/2026021416-CVE-2026-23142-f91e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23143",
"url": "https://lore.kernel.org/linux-cve-announce/2026021416-CVE-2026-23143-9346@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23144",
"url": "https://lore.kernel.org/linux-cve-announce/2026021417-CVE-2026-23144-297b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23145",
"url": "https://lore.kernel.org/linux-cve-announce/2026021417-CVE-2026-23145-0c0b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23146",
"url": "https://lore.kernel.org/linux-cve-announce/2026021411-CVE-2026-23146-3658@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23147",
"url": "https://lore.kernel.org/linux-cve-announce/2026021413-CVE-2026-23147-1f6d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23148",
"url": "https://lore.kernel.org/linux-cve-announce/2026021413-CVE-2026-23148-bb5d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23149",
"url": "https://lore.kernel.org/linux-cve-announce/2026021413-CVE-2026-23149-8329@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23150",
"url": "https://lore.kernel.org/linux-cve-announce/2026021414-CVE-2026-23150-5706@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23151",
"url": "https://lore.kernel.org/linux-cve-announce/2026021414-CVE-2026-23151-74d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23152",
"url": "https://lore.kernel.org/linux-cve-announce/2026021414-CVE-2026-23152-c2ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23153",
"url": "https://lore.kernel.org/linux-cve-announce/2026021415-CVE-2026-23153-9e56@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23154",
"url": "https://lore.kernel.org/linux-cve-announce/2026021415-CVE-2026-23154-f658@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23155",
"url": "https://lore.kernel.org/linux-cve-announce/2026021415-CVE-2026-23155-32be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23156",
"url": "https://lore.kernel.org/linux-cve-announce/2026021416-CVE-2026-23156-b2f4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23157",
"url": "https://lore.kernel.org/linux-cve-announce/2026021416-CVE-2026-23157-6214@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23158",
"url": "https://lore.kernel.org/linux-cve-announce/2026021417-CVE-2026-23158-052d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23159",
"url": "https://lore.kernel.org/linux-cve-announce/2026021417-CVE-2026-23159-7d2c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23160",
"url": "https://lore.kernel.org/linux-cve-announce/2026021417-CVE-2026-23160-d1e6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23161",
"url": "https://lore.kernel.org/linux-cve-announce/2026021418-CVE-2026-23161-d727@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23162",
"url": "https://lore.kernel.org/linux-cve-announce/2026021418-CVE-2026-23162-da25@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23163",
"url": "https://lore.kernel.org/linux-cve-announce/2026021418-CVE-2026-23163-abc8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23164",
"url": "https://lore.kernel.org/linux-cve-announce/2026021419-CVE-2026-23164-9874@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23165",
"url": "https://lore.kernel.org/linux-cve-announce/2026021419-CVE-2026-23165-3437@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23166",
"url": "https://lore.kernel.org/linux-cve-announce/2026021419-CVE-2026-23166-c1fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23167",
"url": "https://lore.kernel.org/linux-cve-announce/2026021420-CVE-2026-23167-1892@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23168",
"url": "https://lore.kernel.org/linux-cve-announce/2026021420-CVE-2026-23168-0630@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23169",
"url": "https://lore.kernel.org/linux-cve-announce/2026021420-CVE-2026-23169-38ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23170",
"url": "https://lore.kernel.org/linux-cve-announce/2026021421-CVE-2026-23170-7a51@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23171",
"url": "https://lore.kernel.org/linux-cve-announce/2026021421-CVE-2026-23171-5a73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23172",
"url": "https://lore.kernel.org/linux-cve-announce/2026021421-CVE-2026-23172-acf0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23173",
"url": "https://lore.kernel.org/linux-cve-announce/2026021422-CVE-2026-23173-4a20@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23174",
"url": "https://lore.kernel.org/linux-cve-announce/2026021427-CVE-2026-23174-0b41@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23175",
"url": "https://lore.kernel.org/linux-cve-announce/2026021427-CVE-2026-23175-8c89@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23176",
"url": "https://lore.kernel.org/linux-cve-announce/2026021428-CVE-2026-23176-4baf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23177",
"url": "https://lore.kernel.org/linux-cve-announce/2026021428-CVE-2026-23177-a343@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23178",
"url": "https://lore.kernel.org/linux-cve-announce/2026021428-CVE-2026-23178-ffd4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23179",
"url": "https://lore.kernel.org/linux-cve-announce/2026021429-CVE-2026-23179-6ff7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23180",
"url": "https://lore.kernel.org/linux-cve-announce/2026021429-CVE-2026-23180-19a8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23181",
"url": "https://lore.kernel.org/linux-cve-announce/2026021429-CVE-2026-23181-7c82@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23182",
"url": "https://lore.kernel.org/linux-cve-announce/2026021430-CVE-2026-23182-651e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23183",
"url": "https://lore.kernel.org/linux-cve-announce/2026021430-CVE-2026-23183-b758@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23184",
"url": "https://lore.kernel.org/linux-cve-announce/2026021430-CVE-2026-23184-a1f1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23185",
"url": "https://lore.kernel.org/linux-cve-announce/2026021431-CVE-2026-23185-7d56@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23186",
"url": "https://lore.kernel.org/linux-cve-announce/2026021431-CVE-2026-23186-c917@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23187",
"url": "https://lore.kernel.org/linux-cve-announce/2026021431-CVE-2026-23187-018e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23188",
"url": "https://lore.kernel.org/linux-cve-announce/2026021432-CVE-2026-23188-c03c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23189",
"url": "https://lore.kernel.org/linux-cve-announce/2026021432-CVE-2026-23189-3d9f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23190",
"url": "https://lore.kernel.org/linux-cve-announce/2026021433-CVE-2026-23190-0719@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23191",
"url": "https://lore.kernel.org/linux-cve-announce/2026021433-CVE-2026-23191-f990@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23192",
"url": "https://lore.kernel.org/linux-cve-announce/2026021433-CVE-2026-23192-72a9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23193",
"url": "https://lore.kernel.org/linux-cve-announce/2026021434-CVE-2026-23193-2c6c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23194",
"url": "https://lore.kernel.org/linux-cve-announce/2026021434-CVE-2026-23194-5976@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23195",
"url": "https://lore.kernel.org/linux-cve-announce/2026021434-CVE-2026-23195-6042@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23196",
"url": "https://lore.kernel.org/linux-cve-announce/2026021435-CVE-2026-23196-2812@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23197",
"url": "https://lore.kernel.org/linux-cve-announce/2026021435-CVE-2026-23197-59da@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23198",
"url": "https://lore.kernel.org/linux-cve-announce/2026021435-CVE-2026-23198-8a25@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23199",
"url": "https://lore.kernel.org/linux-cve-announce/2026021436-CVE-2026-23199-0dc0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23200",
"url": "https://lore.kernel.org/linux-cve-announce/2026021436-CVE-2026-23200-e35e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23201",
"url": "https://lore.kernel.org/linux-cve-announce/2026021436-CVE-2026-23201-4530@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23202",
"url": "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23202-0480@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23203",
"url": "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23203-de1a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23204",
"url": "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23204-be85@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23205",
"url": "https://lore.kernel.org/linux-cve-announce/2026021438-CVE-2026-23205-a62a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23206",
"url": "https://lore.kernel.org/linux-cve-announce/2026021438-CVE-2026-23206-ed03@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23207",
"url": "https://lore.kernel.org/linux-cve-announce/2026021438-CVE-2026-23207-a80c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23208",
"url": "https://lore.kernel.org/linux-cve-announce/2026021439-CVE-2026-23208-cc9e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23209",
"url": "https://lore.kernel.org/linux-cve-announce/2026021439-CVE-2026-23209-9ad6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23210",
"url": "https://lore.kernel.org/linux-cve-announce/2026021439-CVE-2026-23210-7cac@gregkh/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4012 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4012"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-4012 vom 2026-03-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-4012.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50145 vom 2026-03-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-50145.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50144 vom 2026-03-11",
"url": "https://linux.oracle.com/errata/ELSA-2026-50144.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6163 vom 2026-03-13",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00071.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4498 vom 2026-03-13",
"url": "https://lists.debian.org/debian-lts-announce/2026/03/msg00002.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4499 vom 2026-03-13",
"url": "https://lists.debian.org/debian-lts-announce/2026/03/msg00003.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8100-1 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8100-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20711-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20667-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0928-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2026-099 vom 2026-03-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2026-099.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20720-1 vom 2026-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20713-1 vom 2026-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-114 vom 2026-03-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-114.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0962-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0961-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50160 vom 2026-03-24",
"url": "https://linux.oracle.com/errata/ELSA-2026-50160.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20772-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20794-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0984-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20819-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1003-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1041-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1081-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1078-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1077-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20873-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20872-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20845-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6036 vom 2026-03-30",
"url": "https://access.redhat.com/errata/RHSA-2026:6036"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6037 vom 2026-03-30",
"url": "https://access.redhat.com/errata/RHSA-2026:6037"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1131-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025031.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20838-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1130-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025020.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20876-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6153 vom 2026-03-30",
"url": "https://access.redhat.com/errata/RHSA-2026:6153"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6164 vom 2026-03-30",
"url": "https://access.redhat.com/errata/RHSA-2026:6164"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-30T22:00:00.000+00:00",
"generator": {
"date": "2026-03-31T08:19:21.763+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0421",
"initial_release_date": "2026-02-15T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-10T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-11T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-12T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-03-15T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-03-16T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-18T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
},
{
"date": "2026-03-23T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-24T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-25T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-26T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-29T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-03-30T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
}
],
"status": "final",
"version": "15"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T050933",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-23156",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23156"
},
{
"cve": "CVE-2026-23157",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23157"
},
{
"cve": "CVE-2026-23158",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23158"
},
{
"cve": "CVE-2026-23159",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23159"
},
{
"cve": "CVE-2026-23160",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23160"
},
{
"cve": "CVE-2026-23161",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23161"
},
{
"cve": "CVE-2026-23162",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23162"
},
{
"cve": "CVE-2026-23163",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23163"
},
{
"cve": "CVE-2026-23164",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23164"
},
{
"cve": "CVE-2026-23165",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23165"
},
{
"cve": "CVE-2026-23166",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23166"
},
{
"cve": "CVE-2026-23167",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23167"
},
{
"cve": "CVE-2026-23168",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23168"
},
{
"cve": "CVE-2026-23169",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23169"
},
{
"cve": "CVE-2026-23170",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23170"
},
{
"cve": "CVE-2026-23171",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23171"
},
{
"cve": "CVE-2026-23172",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23172"
},
{
"cve": "CVE-2026-23173",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23173"
},
{
"cve": "CVE-2026-23174",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23174"
},
{
"cve": "CVE-2026-23175",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23175"
},
{
"cve": "CVE-2026-23176",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23176"
},
{
"cve": "CVE-2026-23177",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23177"
},
{
"cve": "CVE-2026-23178",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23178"
},
{
"cve": "CVE-2026-23179",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23179"
},
{
"cve": "CVE-2026-23180",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23180"
},
{
"cve": "CVE-2026-23181",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23181"
},
{
"cve": "CVE-2026-23182",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23182"
},
{
"cve": "CVE-2026-23183",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23183"
},
{
"cve": "CVE-2026-23184",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23184"
},
{
"cve": "CVE-2026-23185",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23185"
},
{
"cve": "CVE-2026-23186",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23186"
},
{
"cve": "CVE-2026-23187",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23187"
},
{
"cve": "CVE-2026-23188",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23188"
},
{
"cve": "CVE-2026-23189",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23189"
},
{
"cve": "CVE-2026-23190",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23190"
},
{
"cve": "CVE-2026-23191",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23191"
},
{
"cve": "CVE-2026-23192",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23192"
},
{
"cve": "CVE-2026-23193",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23193"
},
{
"cve": "CVE-2026-23194",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23194"
},
{
"cve": "CVE-2026-23195",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23195"
},
{
"cve": "CVE-2026-23196",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23196"
},
{
"cve": "CVE-2026-23197",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23197"
},
{
"cve": "CVE-2026-23198",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23198"
},
{
"cve": "CVE-2026-23199",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23199"
},
{
"cve": "CVE-2026-23200",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23200"
},
{
"cve": "CVE-2026-23201",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23201"
},
{
"cve": "CVE-2026-23202",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23202"
},
{
"cve": "CVE-2026-23203",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23203"
},
{
"cve": "CVE-2026-23204",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23204"
},
{
"cve": "CVE-2026-23205",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23205"
},
{
"cve": "CVE-2026-23206",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23206"
},
{
"cve": "CVE-2026-23207",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23207"
},
{
"cve": "CVE-2026-23208",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23208"
},
{
"cve": "CVE-2026-23209",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23209"
},
{
"cve": "CVE-2026-23210",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23210"
},
{
"cve": "CVE-2025-71200",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71200"
},
{
"cve": "CVE-2025-71201",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71201"
},
{
"cve": "CVE-2025-71202",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71202"
},
{
"cve": "CVE-2025-71203",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71203"
},
{
"cve": "CVE-2025-71204",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71204"
},
{
"cve": "CVE-2025-71220",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71220"
},
{
"cve": "CVE-2025-71221",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71221"
},
{
"cve": "CVE-2025-71222",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71222"
},
{
"cve": "CVE-2025-71223",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71223"
},
{
"cve": "CVE-2025-71224",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71224"
},
{
"cve": "CVE-2026-23111",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23111"
},
{
"cve": "CVE-2026-23112",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23112"
},
{
"cve": "CVE-2026-23113",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23113"
},
{
"cve": "CVE-2026-23114",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23114"
},
{
"cve": "CVE-2026-23115",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23115"
},
{
"cve": "CVE-2026-23116",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23116"
},
{
"cve": "CVE-2026-23117",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23117"
},
{
"cve": "CVE-2026-23118",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23118"
},
{
"cve": "CVE-2026-23119",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23119"
},
{
"cve": "CVE-2026-23120",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23120"
},
{
"cve": "CVE-2026-23121",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23121"
},
{
"cve": "CVE-2026-23123",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23123"
},
{
"cve": "CVE-2026-23124",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23124"
},
{
"cve": "CVE-2026-23125",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23125"
},
{
"cve": "CVE-2026-23126",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23126"
},
{
"cve": "CVE-2026-23127",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23127"
},
{
"cve": "CVE-2026-23128",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23128"
},
{
"cve": "CVE-2026-23129",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23129"
},
{
"cve": "CVE-2026-23130",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23130"
},
{
"cve": "CVE-2026-23131",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23131"
},
{
"cve": "CVE-2026-23132",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23132"
},
{
"cve": "CVE-2026-23133",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23133"
},
{
"cve": "CVE-2026-23134",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23134"
},
{
"cve": "CVE-2026-23135",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23135"
},
{
"cve": "CVE-2026-23136",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23136"
},
{
"cve": "CVE-2026-23137",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23137"
},
{
"cve": "CVE-2026-23138",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23138"
},
{
"cve": "CVE-2026-23139",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23139"
},
{
"cve": "CVE-2026-23140",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23140"
},
{
"cve": "CVE-2026-23141",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23141"
},
{
"cve": "CVE-2026-23142",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23142"
},
{
"cve": "CVE-2026-23143",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23143"
},
{
"cve": "CVE-2026-23144",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23144"
},
{
"cve": "CVE-2026-23145",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23145"
},
{
"cve": "CVE-2026-23146",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23146"
},
{
"cve": "CVE-2026-23147",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23147"
},
{
"cve": "CVE-2026-23148",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23148"
},
{
"cve": "CVE-2026-23149",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23149"
},
{
"cve": "CVE-2026-23150",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23150"
},
{
"cve": "CVE-2026-23151",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23151"
},
{
"cve": "CVE-2026-23152",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23152"
},
{
"cve": "CVE-2026-23153",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23153"
},
{
"cve": "CVE-2026-23154",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23154"
},
{
"cve": "CVE-2026-23155",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23155"
}
]
}
FKIE_CVE-2026-23203
Vulnerability from fkie_nvd - Published: 2026-02-14 17:15 - Updated: 2026-03-19 16:34| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "006F0E3E-7CDC-49C8-880D-47A126A6F299",
"versionEndExcluding": "6.18.10",
"versionStartIncluding": "6.17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "17B67AA7-40D6-4AFA-8459-F200F3D7CFD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C47E4CC9-C826-4FA9-B014-7FE3D9B318B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F71D92C0-C023-48BD-B3B6-70B638EEE298",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "13580667-0A98-40CC-B29F-D12790B91BDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "CAD1FED7-CF48-47BF-AC7D-7B6FA3C065FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "3EF854A1-ABB1-4E93-BE9A-44569EC76C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "F5DC0CA6-F0AF-4DDF-A882-3DADB9A886A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*",
"matchCriteriaId": "EB5B7DFC-C36B-45D8-922C-877569FDDF43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: cpsw_new: Execute ndo_set_rx_mode callback in a work queue\n\nCommit 1767bb2d47b7 (\"ipv6: mcast: Don\u0027t hold RTNL for\nIPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP.\") removed the RTNL lock for\nIPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP operations. However, this\nchange triggered the following call trace on my BeagleBone Black board:\n WARNING: net/8021q/vlan_core.c:236 at vlan_for_each+0x120/0x124, CPU#0: rpcbind/496\n RTNL: assertion failed at net/8021q/vlan_core.c (236)\n Modules linked in:\n CPU: 0 UID: 997 PID: 496 Comm: rpcbind Not tainted 6.19.0-rc6-next-20260122-yocto-standard+ #8 PREEMPT\n Hardware name: Generic AM33XX (Flattened Device Tree)\n Call trace:\n unwind_backtrace from show_stack+0x28/0x2c\n show_stack from dump_stack_lvl+0x30/0x38\n dump_stack_lvl from __warn+0xb8/0x11c\n __warn from warn_slowpath_fmt+0x130/0x194\n warn_slowpath_fmt from vlan_for_each+0x120/0x124\n vlan_for_each from cpsw_add_mc_addr+0x54/0xd8\n cpsw_add_mc_addr from __hw_addr_ref_sync_dev+0xc4/0xec\n __hw_addr_ref_sync_dev from __dev_mc_add+0x78/0x88\n __dev_mc_add from igmp6_group_added+0x84/0xec\n igmp6_group_added from __ipv6_dev_mc_inc+0x1fc/0x2f0\n __ipv6_dev_mc_inc from __ipv6_sock_mc_join+0x124/0x1b4\n __ipv6_sock_mc_join from do_ipv6_setsockopt+0x84c/0x1168\n do_ipv6_setsockopt from ipv6_setsockopt+0x88/0xc8\n ipv6_setsockopt from do_sock_setsockopt+0xe8/0x19c\n do_sock_setsockopt from __sys_setsockopt+0x84/0xac\n __sys_setsockopt from ret_fast_syscall+0x0/0x5\n\nThis trace occurs because vlan_for_each() is called within\ncpsw_ndo_set_rx_mode(), which expects the RTNL lock to be held.\nSince modifying vlan_for_each() to operate without the RTNL lock is not\nstraightforward, and because ndo_set_rx_mode() is invoked both with and\nwithout the RTNL lock across different code paths, simply adding\nrtnl_lock() in cpsw_ndo_set_rx_mode() is not a viable solution.\n\nTo resolve this issue, we opt to execute the actual processing within\na work queue, following the approach used by the icssg-prueth driver."
},
{
"lang": "es",
"value": "En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\nnet: cpsw_new: Ejecutar la devoluci\u00f3n de llamada ndo_set_rx_mode en una cola de trabajo\n\nEl commit 1767bb2d47b7 (\u0027ipv6: mcast: No mantener RTNL para IPV6_ADD_MEMBERSHIP y MCAST_JOIN_GROUP.\u0027) elimin\u00f3 el bloqueo RTNL para las operaciones IPV6_ADD_MEMBERSHIP y MCAST_JOIN_GROUP. Sin embargo, este cambio desencaden\u00f3 el siguiente rastreo de llamadas en mi placa BeagleBone Black:\n WARNING: net/8021q/vlan_core.c:236 en vlan_for_each+0x120/0x124, CPU#0: rpcbind/496\n RTNL: aserci\u00f3n fallida en net/8021q/vlan_core.c (236)\n M\u00f3dulos enlazados:\n CPU: 0 UID: 997 PID: 496 Comm: rpcbind No contaminado 6.19.0-rc6-next-20260122-yocto-standard+ #8 PREEMPT\n Nombre del hardware: Generic AM33XX (Flattened Device Tree)\n Rastreo de llamadas:\n unwind_backtrace desde show_stack+0x28/0x2c\n show_stack desde dump_stack_lvl+0x30/0x38\n dump_stack_lvl desde __warn+0xb8/0x11c\n __warn desde warn_slowpath_fmt+0x130/0x194\n warn_slowpath_fmt desde vlan_for_each+0x120/0x124\n vlan_for_each desde cpsw_add_mc_addr+0x54/0xd8\n cpsw_add_mc_addr desde __hw_addr_ref_sync_dev+0xc4/0xec\n __hw_addr_ref_sync_dev desde __dev_mc_add+0x78/0x88\n __dev_mc_add desde igmp6_group_added+0x84/0xec\n igmp6_group_added desde __ipv6_dev_mc_inc+0x1fc/0x2f0\n __ipv6_dev_mc_inc desde __ipv6_sock_mc_join+0x124/0x1b4\n __ipv6_sock_mc_join desde do_ipv6_setsockopt+0x84c/0x1168\n do_ipv6_setsockopt desde ipv6_setsockopt+0x88/0xc8\n ipv6_setsockopt desde do_sock_setsockopt+0xe8/0x19c\n do_sock_setsockopt desde __sys_setsockopt+0x84/0xac\n __sys_setsockopt desde ret_fast_syscall+0x0/0x5\n\nEste rastreo ocurre porque se llama a vlan_for_each() dentro de cpsw_ndo_set_rx_mode(), que espera que el bloqueo RTNL est\u00e9 mantenido. Dado que modificar vlan_for_each() para operar sin el bloqueo RTNL no es sencillo, y debido a que ndo_set_rx_mode() se invoca tanto con como sin el bloqueo RTNL a trav\u00e9s de diferentes rutas de c\u00f3digo, simplemente a\u00f1adir rtnl_lock() en cpsw_ndo_set_rx_mode() no es una soluci\u00f3n viable.\n\nPara resolver este problema, optamos por ejecutar el procesamiento real dentro de una cola de trabajo, siguiendo el enfoque utilizado por el controlador icssg-prueth."
}
],
"id": "CVE-2026-23203",
"lastModified": "2026-03-19T16:34:57.810",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-02-14T17:15:58.177",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/c0b5dc73a38f954e780f93a549b8fe225235c07a"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/d5b3a669866977dc87fd56fcf00a70df1536d258"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.