Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-68794 (GCVE-0-2025-68794)
Vulnerability from cvelistv5 – Published: 2026-01-13 15:29 – Updated: 2026-02-09 08:33| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
9dc55f1389f9569acf9659e58dd836a9c70df217 , < 82b60ffbb532d919959702768dca04c3c0500ae5
(git)
Affected: 9dc55f1389f9569acf9659e58dd836a9c70df217 , < 12053695c8ef5410e8cc6c9ed4c0db9cd9c82b3e (git) Affected: 9dc55f1389f9569acf9659e58dd836a9c70df217 , < 142194fb21afe964d2d194cab1fc357cbf87e899 (git) Affected: 9dc55f1389f9569acf9659e58dd836a9c70df217 , < 7aa6bc3e8766990824f66ca76c19596ce10daf3e (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/iomap/buffered-io.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "82b60ffbb532d919959702768dca04c3c0500ae5",
"status": "affected",
"version": "9dc55f1389f9569acf9659e58dd836a9c70df217",
"versionType": "git"
},
{
"lessThan": "12053695c8ef5410e8cc6c9ed4c0db9cd9c82b3e",
"status": "affected",
"version": "9dc55f1389f9569acf9659e58dd836a9c70df217",
"versionType": "git"
},
{
"lessThan": "142194fb21afe964d2d194cab1fc357cbf87e899",
"status": "affected",
"version": "9dc55f1389f9569acf9659e58dd836a9c70df217",
"versionType": "git"
},
{
"lessThan": "7aa6bc3e8766990824f66ca76c19596ce10daf3e",
"status": "affected",
"version": "9dc55f1389f9569acf9659e58dd836a9c70df217",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/iomap/buffered-io.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "4.19"
},
{
"lessThan": "4.19",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.120",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.64",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.19",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.120",
"versionStartIncluding": "4.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.64",
"versionStartIncluding": "4.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.3",
"versionStartIncluding": "4.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19",
"versionStartIncluding": "4.19",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niomap: adjust read range correctly for non-block-aligned positions\n\niomap_adjust_read_range() assumes that the position and length passed in\nare block-aligned. This is not always the case however, as shown in the\nsyzbot generated case for erofs. This causes too many bytes to be\nskipped for uptodate blocks, which results in returning the incorrect\nposition and length to read in. If all the blocks are uptodate, this\nunderflows length and returns a position beyond the folio.\n\nFix the calculation to also take into account the block offset when\ncalculating how many bytes can be skipped for uptodate blocks."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-09T08:33:41.860Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/82b60ffbb532d919959702768dca04c3c0500ae5"
},
{
"url": "https://git.kernel.org/stable/c/12053695c8ef5410e8cc6c9ed4c0db9cd9c82b3e"
},
{
"url": "https://git.kernel.org/stable/c/142194fb21afe964d2d194cab1fc357cbf87e899"
},
{
"url": "https://git.kernel.org/stable/c/7aa6bc3e8766990824f66ca76c19596ce10daf3e"
}
],
"title": "iomap: adjust read range correctly for non-block-aligned positions",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-68794",
"datePublished": "2026-01-13T15:29:05.553Z",
"dateReserved": "2025-12-24T10:30:51.037Z",
"dateUpdated": "2026-02-09T08:33:41.860Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-68794",
"date": "2026-04-18",
"epss": "0.00026",
"percentile": "0.07329"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-68794\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-01-13T16:16:01.310\",\"lastModified\":\"2026-01-14T16:26:00.933\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\niomap: adjust read range correctly for non-block-aligned positions\\n\\niomap_adjust_read_range() assumes that the position and length passed in\\nare block-aligned. This is not always the case however, as shown in the\\nsyzbot generated case for erofs. This causes too many bytes to be\\nskipped for uptodate blocks, which results in returning the incorrect\\nposition and length to read in. If all the blocks are uptodate, this\\nunderflows length and returns a position beyond the folio.\\n\\nFix the calculation to also take into account the block offset when\\ncalculating how many bytes can be skipped for uptodate blocks.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/12053695c8ef5410e8cc6c9ed4c0db9cd9c82b3e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/142194fb21afe964d2d194cab1fc357cbf87e899\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/7aa6bc3e8766990824f66ca76c19596ce10daf3e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/82b60ffbb532d919959702768dca04c3c0500ae5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
FKIE_CVE-2025-68794
Vulnerability from fkie_nvd - Published: 2026-01-13 16:16 - Updated: 2026-04-15 00:35| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niomap: adjust read range correctly for non-block-aligned positions\n\niomap_adjust_read_range() assumes that the position and length passed in\nare block-aligned. This is not always the case however, as shown in the\nsyzbot generated case for erofs. This causes too many bytes to be\nskipped for uptodate blocks, which results in returning the incorrect\nposition and length to read in. If all the blocks are uptodate, this\nunderflows length and returns a position beyond the folio.\n\nFix the calculation to also take into account the block offset when\ncalculating how many bytes can be skipped for uptodate blocks."
},
{
"lang": "es",
"value": "En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\niomap: ajustar el rango de lectura correctamente para posiciones no alineadas a bloques\n\niomap_adjust_read_range() asume que la posici\u00f3n y la longitud pasadas est\u00e1n alineadas a bloques. Sin embargo, este no siempre es el caso, como se muestra en el caso generado por syzbot para erofs. Esto causa que se salten demasiados bytes para bloques actualizados, lo que resulta en la devoluci\u00f3n de una posici\u00f3n y longitud incorrectas para leer. Si todos los bloques est\u00e1n actualizados, esto provoca un desbordamiento negativo de la longitud y devuelve una posici\u00f3n m\u00e1s all\u00e1 del folio.\n\nCorregir el c\u00e1lculo para tambi\u00e9n tener en cuenta el desplazamiento del bloque al calcular cu\u00e1ntos bytes pueden ser saltados para bloques actualizados."
}
],
"id": "CVE-2025-68794",
"lastModified": "2026-04-15T00:35:42.020",
"metrics": {},
"published": "2026-01-13T16:16:01.310",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/12053695c8ef5410e8cc6c9ed4c0db9cd9c82b3e"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/142194fb21afe964d2d194cab1fc357cbf87e899"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/7aa6bc3e8766990824f66ca76c19596ce10daf3e"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/82b60ffbb532d919959702768dca04c3c0500ae5"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Deferred"
}
WID-SEC-W-2026-0086
Vulnerability from csaf_certbund - Published: 2026-01-13 23:00 - Updated: 2026-04-09 22:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu einer Denial-of-Service- Bedingung f\u00fchren oder eine Speicherbesch\u00e4digung verursachen k\u00f6nnen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0086 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0086.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0086 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0086"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68767",
"url": "https://lore.kernel.org/linux-cve-announce/2026011353-CVE-2025-68767-cd16@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68768",
"url": "https://lore.kernel.org/linux-cve-announce/2026011356-CVE-2025-68768-d458@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68769",
"url": "https://lore.kernel.org/linux-cve-announce/2026011357-CVE-2025-68769-e471@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68770",
"url": "https://lore.kernel.org/linux-cve-announce/2026011357-CVE-2025-68770-6464@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68771",
"url": "https://lore.kernel.org/linux-cve-announce/2026011357-CVE-2025-68771-cf0d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68772",
"url": "https://lore.kernel.org/linux-cve-announce/2026011358-CVE-2025-68772-9d70@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68773",
"url": "https://lore.kernel.org/linux-cve-announce/2026011358-CVE-2025-68773-bd5d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68774",
"url": "https://lore.kernel.org/linux-cve-announce/2026011358-CVE-2025-68774-f2fd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68775",
"url": "https://lore.kernel.org/linux-cve-announce/2026011359-CVE-2025-68775-6e68@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68776",
"url": "https://lore.kernel.org/linux-cve-announce/2026011359-CVE-2025-68776-5aed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68777",
"url": "https://lore.kernel.org/linux-cve-announce/2026011359-CVE-2025-68777-2073@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68778",
"url": "https://lore.kernel.org/linux-cve-announce/2026011300-CVE-2025-68778-c392@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68779",
"url": "https://lore.kernel.org/linux-cve-announce/2026011300-CVE-2025-68779-726e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68780",
"url": "https://lore.kernel.org/linux-cve-announce/2026011300-CVE-2025-68780-f5c8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68781",
"url": "https://lore.kernel.org/linux-cve-announce/2026011301-CVE-2025-68781-f30f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68782",
"url": "https://lore.kernel.org/linux-cve-announce/2026011301-CVE-2025-68782-a72f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68783",
"url": "https://lore.kernel.org/linux-cve-announce/2026011302-CVE-2025-68783-e807@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68784",
"url": "https://lore.kernel.org/linux-cve-announce/2026011302-CVE-2025-68784-b1e0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68785",
"url": "https://lore.kernel.org/linux-cve-announce/2026011302-CVE-2025-68785-c96c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68786",
"url": "https://lore.kernel.org/linux-cve-announce/2026011303-CVE-2025-68786-d145@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68787",
"url": "https://lore.kernel.org/linux-cve-announce/2026011303-CVE-2025-68787-af6d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68788",
"url": "https://lore.kernel.org/linux-cve-announce/2026011303-CVE-2025-68788-05bd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68789",
"url": "https://lore.kernel.org/linux-cve-announce/2026011304-CVE-2025-68789-cca8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68790",
"url": "https://lore.kernel.org/linux-cve-announce/2026011304-CVE-2025-68790-6166@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68791",
"url": "https://lore.kernel.org/linux-cve-announce/2026011304-CVE-2025-68791-e739@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68792",
"url": "https://lore.kernel.org/linux-cve-announce/2026011305-CVE-2025-68792-9a3f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68793",
"url": "https://lore.kernel.org/linux-cve-announce/2026011305-CVE-2025-68793-bb5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68794",
"url": "https://lore.kernel.org/linux-cve-announce/2026011305-CVE-2025-68794-32db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68795",
"url": "https://lore.kernel.org/linux-cve-announce/2026011306-CVE-2025-68795-4e3e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68796",
"url": "https://lore.kernel.org/linux-cve-announce/2026011306-CVE-2025-68796-9eee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68797",
"url": "https://lore.kernel.org/linux-cve-announce/2026011306-CVE-2025-68797-b45e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68798",
"url": "https://lore.kernel.org/linux-cve-announce/2026011307-CVE-2025-68798-ea9c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68799",
"url": "https://lore.kernel.org/linux-cve-announce/2026011307-CVE-2025-68799-b0dd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68800",
"url": "https://lore.kernel.org/linux-cve-announce/2026011307-CVE-2025-68800-39d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68801",
"url": "https://lore.kernel.org/linux-cve-announce/2026011308-CVE-2025-68801-d3d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68802",
"url": "https://lore.kernel.org/linux-cve-announce/2026011308-CVE-2025-68802-a7f9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68803",
"url": "https://lore.kernel.org/linux-cve-announce/2026011309-CVE-2025-68803-d897@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68804",
"url": "https://lore.kernel.org/linux-cve-announce/2026011309-CVE-2025-68804-f10e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68805",
"url": "https://lore.kernel.org/linux-cve-announce/2026011309-CVE-2025-68805-3284@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68806",
"url": "https://lore.kernel.org/linux-cve-announce/2026011310-CVE-2025-68806-a2fb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68807",
"url": "https://lore.kernel.org/linux-cve-announce/2026011310-CVE-2025-68807-0fd6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68808",
"url": "https://lore.kernel.org/linux-cve-announce/2026011310-CVE-2025-68808-4cb9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68809",
"url": "https://lore.kernel.org/linux-cve-announce/2026011311-CVE-2025-68809-e875@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68810",
"url": "https://lore.kernel.org/linux-cve-announce/2026011311-CVE-2025-68810-308a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68811",
"url": "https://lore.kernel.org/linux-cve-announce/2026011311-CVE-2025-68811-7e46@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68812",
"url": "https://lore.kernel.org/linux-cve-announce/2026011312-CVE-2025-68812-4098@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68813",
"url": "https://lore.kernel.org/linux-cve-announce/2026011312-CVE-2025-68813-13a5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68814",
"url": "https://lore.kernel.org/linux-cve-announce/2026011312-CVE-2025-68814-146a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68815",
"url": "https://lore.kernel.org/linux-cve-announce/2026011313-CVE-2025-68815-2112@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68816",
"url": "https://lore.kernel.org/linux-cve-announce/2026011313-CVE-2025-68816-e773@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68817",
"url": "https://lore.kernel.org/linux-cve-announce/2026011313-CVE-2025-68817-03ab@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68818",
"url": "https://lore.kernel.org/linux-cve-announce/2026011314-CVE-2025-68818-08ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68819",
"url": "https://lore.kernel.org/linux-cve-announce/2026011314-CVE-2025-68819-64a3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68820",
"url": "https://lore.kernel.org/linux-cve-announce/2026011315-CVE-2025-68820-7a4f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68821",
"url": "https://lore.kernel.org/linux-cve-announce/2026011315-CVE-2025-68821-b515@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68822",
"url": "https://lore.kernel.org/linux-cve-announce/2026011315-CVE-2025-68822-a75d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68823",
"url": "https://lore.kernel.org/linux-cve-announce/2026011316-CVE-2025-68823-8bf1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71064",
"url": "https://lore.kernel.org/linux-cve-announce/2026011322-CVE-2025-71064-94ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71065",
"url": "https://lore.kernel.org/linux-cve-announce/2026011322-CVE-2025-71065-6818@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71066",
"url": "https://lore.kernel.org/linux-cve-announce/2026011323-CVE-2025-71066-f1fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71067",
"url": "https://lore.kernel.org/linux-cve-announce/2026011323-CVE-2025-71067-9c81@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71068",
"url": "https://lore.kernel.org/linux-cve-announce/2026011323-CVE-2025-71068-f1a9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71069",
"url": "https://lore.kernel.org/linux-cve-announce/2026011324-CVE-2025-71069-33d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71070",
"url": "https://lore.kernel.org/linux-cve-announce/2026011324-CVE-2025-71070-b6c2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71071",
"url": "https://lore.kernel.org/linux-cve-announce/2026011325-CVE-2025-71071-67e9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71072",
"url": "https://lore.kernel.org/linux-cve-announce/2026011325-CVE-2025-71072-b52b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71073",
"url": "https://lore.kernel.org/linux-cve-announce/2026011325-CVE-2025-71073-b002@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71074",
"url": "https://lore.kernel.org/linux-cve-announce/2026011326-CVE-2025-71074-f3ed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71075",
"url": "https://lore.kernel.org/linux-cve-announce/2026011326-CVE-2025-71075-c85d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71076",
"url": "https://lore.kernel.org/linux-cve-announce/2026011326-CVE-2025-71076-19ff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71077",
"url": "https://lore.kernel.org/linux-cve-announce/2026011327-CVE-2025-71077-6e08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71078",
"url": "https://lore.kernel.org/linux-cve-announce/2026011337-CVE-2025-71078-9a51@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71079",
"url": "https://lore.kernel.org/linux-cve-announce/2026011338-CVE-2025-71079-9f24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71080",
"url": "https://lore.kernel.org/linux-cve-announce/2026011338-CVE-2025-71080-f9ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71081",
"url": "https://lore.kernel.org/linux-cve-announce/2026011338-CVE-2025-71081-df43@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71082",
"url": "https://lore.kernel.org/linux-cve-announce/2026011339-CVE-2025-71082-ef8a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71083",
"url": "https://lore.kernel.org/linux-cve-announce/2026011339-CVE-2025-71083-ddb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71084",
"url": "https://lore.kernel.org/linux-cve-announce/2026011339-CVE-2025-71084-52a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71085",
"url": "https://lore.kernel.org/linux-cve-announce/2026011340-CVE-2025-71085-e6c1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71086",
"url": "https://lore.kernel.org/linux-cve-announce/2026011340-CVE-2025-71086-18be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71087",
"url": "https://lore.kernel.org/linux-cve-announce/2026011340-CVE-2025-71087-53c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71088",
"url": "https://lore.kernel.org/linux-cve-announce/2026011341-CVE-2025-71088-9436@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71089",
"url": "https://lore.kernel.org/linux-cve-announce/2026011341-CVE-2025-71089-a642@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71090",
"url": "https://lore.kernel.org/linux-cve-announce/2026011341-CVE-2025-71090-6e3a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71091",
"url": "https://lore.kernel.org/linux-cve-announce/2026011342-CVE-2025-71091-860d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71092",
"url": "https://lore.kernel.org/linux-cve-announce/2026011342-CVE-2025-71092-9f73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71093",
"url": "https://lore.kernel.org/linux-cve-announce/2026011343-CVE-2025-71093-387f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71094",
"url": "https://lore.kernel.org/linux-cve-announce/2026011343-CVE-2025-71094-087b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71095",
"url": "https://lore.kernel.org/linux-cve-announce/2026011343-CVE-2025-71095-6fad@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71096",
"url": "https://lore.kernel.org/linux-cve-announce/2026011344-CVE-2025-71096-fb73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71097",
"url": "https://lore.kernel.org/linux-cve-announce/2026011344-CVE-2025-71097-7cfc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71098",
"url": "https://lore.kernel.org/linux-cve-announce/2026011344-CVE-2025-71098-ef6d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71099",
"url": "https://lore.kernel.org/linux-cve-announce/2026011345-CVE-2025-71099-b6f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71100",
"url": "https://lore.kernel.org/linux-cve-announce/2026011345-CVE-2025-71100-537f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71101",
"url": "https://lore.kernel.org/linux-cve-announce/2026011345-CVE-2025-71101-1886@gregkh/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0350-1 vom 2026-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20145-1 vom 2026-02-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FIKVKDA42VXBWDNHA6WP345IDVA2E3XU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0369-1 vom 2026-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20207-1 vom 2026-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20220-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20228-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2282 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2282"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6127 vom 2026-02-10",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00036.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6126 vom 2026-02-09",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00035.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0411-1 vom 2026-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2282 vom 2026-02-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-2282.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4476 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00017.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0447-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4475 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00016.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0471-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0472-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0474-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0475-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0495-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2282 vom 2026-02-15",
"url": "https://errata.build.resf.org/RLSA-2026:2282"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0496-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2722 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2722"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2722 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-2722.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50113 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-50113.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-113 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-113.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0587-1 vom 2026-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50112 vom 2026-02-23",
"url": "https://linux.oracle.com/errata/ELSA-2026-50112.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3110 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3110"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3083 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3083"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2722 vom 2026-02-24",
"url": "https://errata.build.resf.org/RLSA-2026:2722"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0617-1 vom 2026-02-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3275 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3275"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3083 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3083.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3275 vom 2026-02-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-3275.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20477-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20479-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3488 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3488"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20287-1 vom 2026-02-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K7KIWX7XP3UMVFSHT47OOZ24TQQYNNHI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20520-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20498-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50133 vom 2026-03-02",
"url": "https://linux.oracle.com/errata/ELSA-2026-50133.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3488 vom 2026-03-02",
"url": "https://linux.oracle.com/errata/ELSA-2026-3488.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3488 vom 2026-03-05",
"url": "https://errata.build.resf.org/RLSA-2026:3488"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20615-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20570-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2026-098 vom 2026-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2026-098.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20564-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20555-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024590.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20599-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3963 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:3963"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3964 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:3964"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4012 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4012"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3963 vom 2026-03-09",
"url": "https://linux.oracle.com/errata/ELSA-2026-3963.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4246 vom 2026-03-11",
"url": "https://access.redhat.com/errata/RHSA-2026:4246"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-4012 vom 2026-03-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-4012.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3966 vom 2026-03-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-3966.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50145 vom 2026-03-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-50145.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50144 vom 2026-03-11",
"url": "https://linux.oracle.com/errata/ELSA-2026-50144.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6163 vom 2026-03-13",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00071.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4499 vom 2026-03-13",
"url": "https://lists.debian.org/debian-lts-announce/2026/03/msg00003.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-1 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-2 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4759 vom 2026-03-17",
"url": "https://access.redhat.com/errata/RHSA-2026:4759"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4745 vom 2026-03-17",
"url": "https://access.redhat.com/errata/RHSA-2026:4745"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-4 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-3 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-3"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-4759 vom 2026-03-18",
"url": "https://linux.oracle.com/errata/ELSA-2026-4759.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20711-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20667-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0928-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20720-1 vom 2026-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2026-099 vom 2026-03-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2026-099.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20713-1 vom 2026-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0943-1 vom 2026-03-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0953-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0941-1 vom 2026-03-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0939-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0945-1 vom 2026-03-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024778.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0946-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0951-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0944-1 vom 2026-03-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0940-1 vom 2026-03-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0958-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8116-1 vom 2026-03-23",
"url": "https://ubuntu.com/security/notices/USN-8116-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0961-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0970-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0954-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-5 vom 2026-03-23",
"url": "https://ubuntu.com/security/notices/USN-8096-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0967-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024808.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0964-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024809.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0983-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0962-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20772-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20773-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20774-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20775-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0984-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5732 vom 2026-03-25",
"url": "https://access.redhat.com/errata/RHSA-2026:5732"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0985-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5689 vom 2026-03-25",
"url": "https://access.redhat.com/errata/RHSA-2026:5689"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5690 vom 2026-03-25",
"url": "https://access.redhat.com/errata/RHSA-2026:5690"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5693 vom 2026-03-25",
"url": "https://access.redhat.com/errata/RHSA-2026:5693"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5691 vom 2026-03-25",
"url": "https://access.redhat.com/errata/RHSA-2026:5691"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5727 vom 2026-03-25",
"url": "https://access.redhat.com/errata/RHSA-2026:5727"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20792-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20791-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20790-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20789-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024845.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20788-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20780-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20781-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20782-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024852.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20783-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024851.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20784-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20785-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20786-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20787-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0997-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20794-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20807-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20806-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20805-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20804-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024885.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20803-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20802-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20801-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20800-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20799-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20798-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024891.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20819-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20817-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024872.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20815-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0992-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20814-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20816-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20813-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20812-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024877.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20811-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024878.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20810-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20809-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20808-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20779-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20778-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024856.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20777-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20776-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1039-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1041-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5813 vom 2026-03-25",
"url": "https://access.redhat.com/errata/RHSA-2026:5813"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1000-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1003-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1002-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1046-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1044-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3964 vom 2026-03-26",
"url": "https://errata.build.resf.org/RLSA-2026:3964"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3963 vom 2026-03-26",
"url": "https://errata.build.resf.org/RLSA-2026:3963"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1049-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1073-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:4759 vom 2026-03-26",
"url": "https://errata.build.resf.org/RLSA-2026:4759"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1077-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1083-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1059-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1078-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1081-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1048-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1089-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1088-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20872-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20838-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1131-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025031.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20864-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20865-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20866-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1136-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025028.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20873-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20847-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20845-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1099-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20828-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1102-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025010.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1101-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1100-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1096-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1125-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20837-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20852-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024988.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20836-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025001.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20853-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20832-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20854-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20831-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20855-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20856-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20857-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20858-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20859-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20860-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024980.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20861-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024979.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20840-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20848-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20841-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20849-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20842-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20850-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1132-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025029.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20851-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024989.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20862-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20863-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20830-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025007.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20829-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20876-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20891-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025041.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20892-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025040.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20893-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025039.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20894-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025038.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20895-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025037.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20896-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025036.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20897-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025035.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6164 vom 2026-03-30",
"url": "https://access.redhat.com/errata/RHSA-2026:6164"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20898-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025034.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20899-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025033.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20900-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025032.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6193 vom 2026-03-30",
"url": "https://access.redhat.com/errata/RHSA-2026:6193"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20880-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20881-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20882-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20883-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025048.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20884-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025047.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20885-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20886-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20887-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025044.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20888-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025043.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20889-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025042.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50171 vom 2026-03-31",
"url": "https://oss.oracle.com/pipermail/el-errata/2026-March/020110.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7268179 vom 2026-03-31",
"url": "https://www.ibm.com/support/pages/node/7268179"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20945-1 vom 2026-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025075.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20946-1 vom 2026-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025074.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20944-1 vom 2026-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025076.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20943-1 vom 2026-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025077.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20947-1 vom 2026-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025073.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20931-1 vom 2026-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025086.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8141-1 vom 2026-04-01",
"url": "https://ubuntu.com/security/notices/USN-8141-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6692 vom 2026-04-06",
"url": "https://access.redhat.com/errata/RHSA-2026:6692"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:7003 vom 2026-04-08",
"url": "https://access.redhat.com/errata/RHSA-2026:7003"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8163-1 vom 2026-04-10",
"url": "https://ubuntu.com/security/notices/USN-8163-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8162-1 vom 2026-04-10",
"url": "https://ubuntu.com/security/notices/USN-8162-1"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-04-09T22:00:00.000+00:00",
"generator": {
"date": "2026-04-10T07:46:05.932+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0086",
"initial_release_date": "2026-01-13T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE und SUSE aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat und Debian aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Debian und SUSE aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-23T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Rocky Enterprise Software Foundation, SUSE und Red Hat aufgenommen"
},
{
"date": "2026-02-25T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat, openSUSE und SUSE aufgenommen"
},
{
"date": "2026-03-02T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-09T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-10T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-03-11T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-12T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-03-15T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-03-16T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-17T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2026-03-18T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2026-03-22T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-23T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2026-03-24T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-03-25T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-03-26T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von SUSE und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-03-29T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-30T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-03-31T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Oracle Linux und IBM aufgenommen"
},
{
"date": "2026-04-01T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2026-04-06T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-04-07T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-04-09T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "43"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM QRadar SIEM",
"product": {
"name": "IBM QRadar SIEM",
"product_id": "T021415",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:-"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T049905",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68767",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68767"
},
{
"cve": "CVE-2025-68768",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68768"
},
{
"cve": "CVE-2025-68769",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68769"
},
{
"cve": "CVE-2025-68770",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68770"
},
{
"cve": "CVE-2025-68771",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68771"
},
{
"cve": "CVE-2025-68772",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68772"
},
{
"cve": "CVE-2025-68773",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68773"
},
{
"cve": "CVE-2025-68774",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68774"
},
{
"cve": "CVE-2025-68775",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68775"
},
{
"cve": "CVE-2025-68776",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68776"
},
{
"cve": "CVE-2025-68777",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68777"
},
{
"cve": "CVE-2025-68778",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68778"
},
{
"cve": "CVE-2025-68779",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68779"
},
{
"cve": "CVE-2025-68780",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68780"
},
{
"cve": "CVE-2025-68781",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68781"
},
{
"cve": "CVE-2025-68782",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68782"
},
{
"cve": "CVE-2025-68783",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68783"
},
{
"cve": "CVE-2025-68784",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68784"
},
{
"cve": "CVE-2025-68785",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68785"
},
{
"cve": "CVE-2025-68786",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68786"
},
{
"cve": "CVE-2025-68787",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68787"
},
{
"cve": "CVE-2025-68788",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68788"
},
{
"cve": "CVE-2025-68789",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68789"
},
{
"cve": "CVE-2025-68790",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68790"
},
{
"cve": "CVE-2025-68791",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68791"
},
{
"cve": "CVE-2025-68792",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68792"
},
{
"cve": "CVE-2025-68793",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68793"
},
{
"cve": "CVE-2025-68794",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68794"
},
{
"cve": "CVE-2025-68795",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68795"
},
{
"cve": "CVE-2025-68796",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68796"
},
{
"cve": "CVE-2025-68797",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68797"
},
{
"cve": "CVE-2025-68798",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68798"
},
{
"cve": "CVE-2025-68799",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68799"
},
{
"cve": "CVE-2025-68800",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68800"
},
{
"cve": "CVE-2025-68801",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68801"
},
{
"cve": "CVE-2025-68802",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68802"
},
{
"cve": "CVE-2025-68803",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68803"
},
{
"cve": "CVE-2025-68804",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68804"
},
{
"cve": "CVE-2025-68805",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68805"
},
{
"cve": "CVE-2025-68806",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68806"
},
{
"cve": "CVE-2025-68807",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68807"
},
{
"cve": "CVE-2025-68808",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68808"
},
{
"cve": "CVE-2025-68809",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68809"
},
{
"cve": "CVE-2025-68810",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68810"
},
{
"cve": "CVE-2025-68811",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68811"
},
{
"cve": "CVE-2025-68812",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68812"
},
{
"cve": "CVE-2025-68813",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68813"
},
{
"cve": "CVE-2025-68814",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68814"
},
{
"cve": "CVE-2025-68815",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68815"
},
{
"cve": "CVE-2025-68816",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68816"
},
{
"cve": "CVE-2025-68817",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68817"
},
{
"cve": "CVE-2025-68818",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68818"
},
{
"cve": "CVE-2025-68819",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68819"
},
{
"cve": "CVE-2025-68820",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68820"
},
{
"cve": "CVE-2025-68821",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68821"
},
{
"cve": "CVE-2025-68822",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68822"
},
{
"cve": "CVE-2025-68823",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68823"
},
{
"cve": "CVE-2025-71064",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71064"
},
{
"cve": "CVE-2025-71065",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71065"
},
{
"cve": "CVE-2025-71066",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71066"
},
{
"cve": "CVE-2025-71067",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71067"
},
{
"cve": "CVE-2025-71068",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71068"
},
{
"cve": "CVE-2025-71069",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71069"
},
{
"cve": "CVE-2025-71070",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71070"
},
{
"cve": "CVE-2025-71071",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71071"
},
{
"cve": "CVE-2025-71072",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71072"
},
{
"cve": "CVE-2025-71073",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71073"
},
{
"cve": "CVE-2025-71074",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71074"
},
{
"cve": "CVE-2025-71075",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71075"
},
{
"cve": "CVE-2025-71076",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71076"
},
{
"cve": "CVE-2025-71077",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71077"
},
{
"cve": "CVE-2025-71078",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71078"
},
{
"cve": "CVE-2025-71079",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71079"
},
{
"cve": "CVE-2025-71080",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71080"
},
{
"cve": "CVE-2025-71081",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71081"
},
{
"cve": "CVE-2025-71082",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71082"
},
{
"cve": "CVE-2025-71083",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71083"
},
{
"cve": "CVE-2025-71084",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71084"
},
{
"cve": "CVE-2025-71085",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71085"
},
{
"cve": "CVE-2025-71086",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71086"
},
{
"cve": "CVE-2025-71087",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71087"
},
{
"cve": "CVE-2025-71088",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71088"
},
{
"cve": "CVE-2025-71089",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71089"
},
{
"cve": "CVE-2025-71090",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71090"
},
{
"cve": "CVE-2025-71091",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71091"
},
{
"cve": "CVE-2025-71092",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71092"
},
{
"cve": "CVE-2025-71093",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71093"
},
{
"cve": "CVE-2025-71094",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71094"
},
{
"cve": "CVE-2025-71095",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71095"
},
{
"cve": "CVE-2025-71096",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71096"
},
{
"cve": "CVE-2025-71097",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71097"
},
{
"cve": "CVE-2025-71098",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71098"
},
{
"cve": "CVE-2025-71099",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71099"
},
{
"cve": "CVE-2025-71100",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71100"
},
{
"cve": "CVE-2025-71101",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71101"
}
]
}
CERTFR-2026-AVI-0166
Vulnerability from certfr_avis - Published: 2026-02-13 - Updated: 2026-02-13
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian trixie versions ant\u00e9rieures \u00e0 6.12.69-1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian bookworm versions ant\u00e9rieures \u00e0 6.1.162-1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2025-71065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71065"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2025-71134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71134"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2025-68749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68749"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2026-23072",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23072"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2025-71071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71071"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-71135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71135"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2025-68773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68773"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-71189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71189"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-71088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71088"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2026-23059",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23059"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2025-71076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71076"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2026-23094",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23094"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-68770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68770"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2025-71080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71080"
},
{
"name": "CVE-2026-22989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22989"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2025-39871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39871"
},
{
"name": "CVE-2026-23057",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23057"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2025-71138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71138"
},
{
"name": "CVE-2025-68291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68291"
},
{
"name": "CVE-2025-71122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71122"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2025-71144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71144"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23032",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23032"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2026-23055",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23055"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2026-23005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23005"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2026-23030",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23030"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2025-71153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71153"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-71143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71143"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2025-71130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71130"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-71126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71126"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2026-23006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23006"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2025-68789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68789"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2026-23013",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23013"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2026-22994",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22994"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2025-71157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71157"
},
{
"name": "CVE-2026-23023",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23023"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-71140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71140"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-71151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71151"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2026-23107",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23107"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2025-71101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71101"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2026-23025",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23025"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-68357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68357"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-71129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71129"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2025-39872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39872"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2025-68811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68811"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2025-68351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68351"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2023-52658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52658"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2026-23002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23002"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2026-23065",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23065"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-68369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68369"
},
{
"name": "CVE-2025-68775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68775"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-71148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71148"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2026-23062",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23062"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71099"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-68784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68784"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2025-68792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68792"
},
{
"name": "CVE-2025-71123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71123"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-71100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71100"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23010",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23010"
},
{
"name": "CVE-2025-71146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71146"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2025-71156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71156"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2025-71119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71119"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2026-23102",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23102"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2025-68810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68810"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-71072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71072"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2026-23053",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23053"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2025-71149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71149"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-02-13T00:00:00",
"last_revision_date": "2026-02-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0166",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": "2026-02-09",
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-6127-1",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00036.html"
},
{
"published_at": "2026-02-09",
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-6126-1",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00035.html"
}
]
}
CERTFR-2026-AVI-0453
Vulnerability from certfr_avis - Published: 2026-04-17 - Updated: 2026-04-17
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 25.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2025-68805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68805"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-71065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71065"
},
{
"name": "CVE-2025-68374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68374"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-68793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68793"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-68741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68741"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2026-23269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23269"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-71071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71071"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-71135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71135"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-68773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68773"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-71088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71088"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-23268",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23268"
},
{
"name": "CVE-2025-71076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71076"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-68770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68770"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23407",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23407"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-71080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71080"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2025-71138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71138"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2024-46777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46777"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2025-68291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68291"
},
{
"name": "CVE-2025-71117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71117"
},
{
"name": "CVE-2025-71122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71122"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2025-68763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68763"
},
{
"name": "CVE-2025-71144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71144"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-68368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68368"
},
{
"name": "CVE-2026-23408",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23408"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2025-68791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68791"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2026-23406",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23406"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2025-71153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71153"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-71143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71143"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2025-71130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71130"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-71126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71126"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2024-56581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56581"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-68807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68807"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2025-71157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71157"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2025-71140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71140"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-71151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71151"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-68353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68353"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2023-53041",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53041"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2025-71141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71141"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2026-23410",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23410"
},
{
"name": "CVE-2025-71101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71101"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2025-68756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68756"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2025-71070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71070"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-68811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68811"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2025-68351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68351"
},
{
"name": "CVE-2026-23405",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23405"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2026-23403",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23403"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-68369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68369"
},
{
"name": "CVE-2025-68775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68775"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2025-71148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71148"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71099"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2026-23411",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23411"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2026-23409",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23409"
},
{
"name": "CVE-2025-68784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68784"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-68792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68792"
},
{
"name": "CVE-2025-68823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68823"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-71123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71123"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-71124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71124"
},
{
"name": "CVE-2025-71100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71100"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23404",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23404"
},
{
"name": "CVE-2025-71146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71146"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-71156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71156"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2025-71119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71119"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2024-56593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56593"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2025-68810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68810"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2025-71072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71072"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2024-56640",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56640"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-71149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71149"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-04-17T00:00:00",
"last_revision_date": "2026-04-17T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0453",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2026-04-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8188-1",
"url": "https://ubuntu.com/security/notices/USN-8188-1"
},
{
"published_at": "2026-04-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8180-2",
"url": "https://ubuntu.com/security/notices/USN-8180-2"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8149-3",
"url": "https://ubuntu.com/security/notices/USN-8149-3"
},
{
"published_at": "2026-04-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0119-1",
"url": "https://ubuntu.com/security/notices/LSN-0119-1"
},
{
"published_at": "2026-04-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8148-7",
"url": "https://ubuntu.com/security/notices/USN-8148-7"
},
{
"published_at": "2026-04-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8187-1",
"url": "https://ubuntu.com/security/notices/USN-8187-1"
},
{
"published_at": "2026-04-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8184-1",
"url": "https://ubuntu.com/security/notices/USN-8184-1"
},
{
"published_at": "2026-04-14",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8148-6",
"url": "https://ubuntu.com/security/notices/USN-8148-6"
},
{
"published_at": "2026-04-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8185-1",
"url": "https://ubuntu.com/security/notices/USN-8185-1"
},
{
"published_at": "2026-04-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8186-1",
"url": "https://ubuntu.com/security/notices/USN-8186-1"
},
{
"published_at": "2026-04-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8179-2",
"url": "https://ubuntu.com/security/notices/USN-8179-2"
},
{
"published_at": "2026-04-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8180-1",
"url": "https://ubuntu.com/security/notices/USN-8180-1"
},
{
"published_at": "2026-04-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8179-1",
"url": "https://ubuntu.com/security/notices/USN-8179-1"
},
{
"published_at": "2026-04-16",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8177-1",
"url": "https://ubuntu.com/security/notices/USN-8177-1"
},
{
"published_at": "2026-04-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8163-2",
"url": "https://ubuntu.com/security/notices/USN-8163-2"
},
{
"published_at": "2026-04-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8183-1",
"url": "https://ubuntu.com/security/notices/USN-8183-1"
},
{
"published_at": "2026-04-15",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8145-5",
"url": "https://ubuntu.com/security/notices/USN-8145-5"
},
{
"published_at": "2026-04-17",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-8177-2",
"url": "https://ubuntu.com/security/notices/USN-8177-2"
}
]
}
CERTFR-2026-AVI-0316
Vulnerability from certfr_avis - Published: 2026-03-19 - Updated: 2026-03-19
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | NodeJS Buildpack versions antérieures à 1.8.82 | ||
| VMware | Tanzu Platform | Tanzu for MySQL sur Tanzu Platform versions antérieures à 10.1.1 | ||
| VMware | N/A | Java Buildpack versions antérieures à 4.90.0 | ||
| VMware | N/A | NGINX Buildpack versions antérieures à 1.2.71 | ||
| VMware | N/A | HWC Buildpack versions antérieures à 3.1.91 | ||
| VMware | Tanzu Platform | Foundation Core for VMware Tanzu Platform versions antérieures à 3.1.9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.82",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.90.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NGINX Buildpack versions ant\u00e9rieures \u00e0 1.2.71",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "HWC Buildpack versions ant\u00e9rieures \u00e0 3.1.91",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2022-50759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50759"
},
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2023-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3640"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2024-57875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57875"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54129"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-49543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2023-53562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53562"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2025-38042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38042"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-53829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53829"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-54002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54002"
},
{
"name": "CVE-2022-50550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50550"
},
{
"name": "CVE-2022-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0400"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2022-49359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2022-48673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48673"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2024-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39293"
},
{
"name": "CVE-2023-53008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
},
{
"name": "CVE-2025-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38669"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2024-38306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38306"
},
{
"name": "CVE-2023-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53733"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2023-1386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1386"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-52926",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
},
{
"name": "CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2026-25500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25500"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27558"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2023-53529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53529"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2025-52534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52534"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2022-50407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50407"
},
{
"name": "CVE-2026-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23196"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2024-45775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45775"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2026-23126",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23126"
},
{
"name": "CVE-2025-38329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38329"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2022-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50230"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53588"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2022-49533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2025-69645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69645"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2022-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2023-52561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52561"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2022-50815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50815"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38036"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2025-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2024-56665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56665"
},
{
"name": "CVE-2025-38340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38340"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-53629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53629"
},
{
"name": "CVE-2022-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50178"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2025-37880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2026-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23217"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2025-21656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21656"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2025-69650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69650"
},
{
"name": "CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2025-38207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38207"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49742"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2024-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52560"
},
{
"name": "CVE-2024-56604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2025-69647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69647"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2022-49108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49108"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2025-38717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38717"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2026-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2219"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2022-50627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50627"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38029"
},
{
"name": "CVE-2022-49123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38096"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2022-50380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50380"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2022-48990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48990"
},
{
"name": "CVE-2024-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24864"
},
{
"name": "CVE-2024-35832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35832"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2024-45782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45782"
},
{
"name": "CVE-2022-50785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50785"
},
{
"name": "CVE-2025-39745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39745"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-71223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71223"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2025-21752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21752"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-39282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39282"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-46316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46316"
},
{
"name": "CVE-2024-47866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47866"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2022-48667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48667"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-49161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49161"
},
{
"name": "CVE-2021-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21240"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2023-52485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52485"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2022-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49997"
},
{
"name": "CVE-2022-49469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49469"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0480"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1272"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2022-49651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49651"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2024-26770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26770"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2024-27041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27041"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2026-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3195"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26242"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2022-48668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48668"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2022-50322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50322"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-27635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27635"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2021-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4095"
},
{
"name": "CVE-2022-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50240"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71074"
},
{
"name": "CVE-2025-38673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38673"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2018-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1121"
},
{
"name": "CVE-2022-49547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49547"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2025-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0622"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-26757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26757"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2022-49484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2024-56788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56788"
},
{
"name": "CVE-2016-8660",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8660"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7519"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2022-50811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50811"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2023-53366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53366"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2022-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
},
{
"name": "CVE-2024-40918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40918"
},
{
"name": "CVE-2024-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27032"
},
{
"name": "CVE-2022-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50236"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2026-23137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23137"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-37882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2026-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3731"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2024-43844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43844"
},
{
"name": "CVE-2023-52920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-69652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69652"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38353"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2023-52761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52761"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2023-53609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53609"
},
{
"name": "CVE-2023-53478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53478"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2023-53682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53682"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2026-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3442"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-47908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47908"
},
{
"name": "CVE-2022-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2020-35501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35501"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-52624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52624"
},
{
"name": "CVE-2024-56557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53198"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-38082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38082"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2023-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4969"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53789"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2024-8612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8612"
},
{
"name": "CVE-2023-52586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52586"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2025-37834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2019-19378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19378"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2021-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31615"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49932"
},
{
"name": "CVE-2022-25837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25837"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2023-52831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2022-44034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44034"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53072"
},
{
"name": "CVE-2023-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2007"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2025-69648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69648"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2023-53602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53602"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2023-53867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53867"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2025-38038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38038"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2023-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33053"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38261"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-69644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69644"
},
{
"name": "CVE-2022-49303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49303"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-11961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11961"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2023-52916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52916"
},
{
"name": "CVE-2025-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38064"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2022-50628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50628"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2025-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
},
{
"name": "CVE-2022-50721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50721"
},
{
"name": "CVE-2022-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50095"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2026-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3196"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2022-50479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50479"
},
{
"name": "CVE-2022-50583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50583"
},
{
"name": "CVE-2025-37806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2023-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0030"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2024-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
},
{
"name": "CVE-2024-57945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57945"
},
{
"name": "CVE-2023-54233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54233"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-49534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-53010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-57888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57888"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2023-54237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54237"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2019-19814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19814"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2022-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
},
{
"name": "CVE-2015-8553",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8553"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2025-21751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21751"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2025-23162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2017-13694",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13694"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2013-7445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7445"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2023-52701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52701"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2022-49317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49317"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2018-12928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12928"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-56607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56607"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2023-53671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53671"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2023-29942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29942"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2022-48633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48633"
},
{
"name": "CVE-2022-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3238"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2023-53584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53584"
},
{
"name": "CVE-2024-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57809"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-53460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53460"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2024-56671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56671"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2022-49562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2023-53483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53483"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-37746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
},
{
"name": "CVE-2022-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38076"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2024-56368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-49172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49172"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38069"
},
{
"name": "CVE-2022-49750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49750"
},
{
"name": "CVE-2023-53707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53707"
},
{
"name": "CVE-2023-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53115"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2022-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48646"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-58012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2022-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48887"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2023-45929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45929"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-37855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-32249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32249"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-38330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38330"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2017-13693",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13693"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2022-49306",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2025-36423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36423"
},
{
"name": "CVE-2022-49622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49622"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2022-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50284"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2024-27035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27035"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-25836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25836"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-29934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29934"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-38438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38438"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-1193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1193"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2025-68779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68779"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-21819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
},
{
"name": "CVE-2025-48514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48514"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2026-25749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25749"
},
{
"name": "CVE-2024-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49504"
},
{
"name": "CVE-2025-38118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2022-50500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50500"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2022-49178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2022-49173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49173"
},
{
"name": "CVE-2024-45781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45781"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2026-26269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26269"
},
{
"name": "CVE-2024-43872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43872"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2023-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-69649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69649"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2022-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49766"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
},
{
"name": "CVE-2024-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49569"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2024-56609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
},
{
"name": "CVE-2022-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49940"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2024-56611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56611"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2020-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25743"
},
{
"name": "CVE-2022-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50167"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2026-27704",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27704"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2021-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3735"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2022-50634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50634"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54514"
},
{
"name": "CVE-2025-71202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71202"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2025-0677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0677"
},
{
"name": "CVE-2024-45780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45780"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2022-50492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50492"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-59691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59691"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2023-52481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52481"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1788"
},
{
"name": "CVE-2023-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53721"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-37907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37907"
},
{
"name": "CVE-2024-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38625"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2023-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4010"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2023-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54105"
},
{
"name": "CVE-2018-17977",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17977"
},
{
"name": "CVE-2019-1010204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010204"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2023-53434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53434"
},
{
"name": "CVE-2023-29935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29935"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2018-12930",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12930"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-40012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40012"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2024-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47141"
},
{
"name": "CVE-2024-8354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8354"
},
{
"name": "CVE-2023-54323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54323"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0689"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31347"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2023-53657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53657"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2023-52732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52732"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2022-49167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49167"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2025-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0690"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2022-49234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49234"
},
{
"name": "CVE-2022-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50163"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-26699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26699"
},
{
"name": "CVE-2024-57876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31648"
},
{
"name": "CVE-2026-1229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1229"
},
{
"name": "CVE-2025-0678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0678"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2022-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50166"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2024-56738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56738"
},
{
"name": "CVE-2022-50778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50778"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-71203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71203"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2025-39789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39789"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2024-56583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56583"
},
{
"name": "CVE-2022-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50195"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-56712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56712"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-52634",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52634"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2025-62526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62526"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-45776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45776"
},
{
"name": "CVE-2022-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50090"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2020-14356",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14356"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-53764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53764"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-38672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38672"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0684"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38272"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2019-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20794"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2022-4543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4543"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2023-53627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53627"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38091"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2023-53575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53575"
},
{
"name": "CVE-2022-49516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2022-3523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3523"
},
{
"name": "CVE-2026-26157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26157"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-22072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2023-53037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53037"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2025-69646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69646"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23215"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2022-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49955"
},
{
"name": "CVE-2023-53628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53628"
},
{
"name": "CVE-2025-29943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29943"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-38140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38140"
},
{
"name": "CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39908"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2026-23118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23118"
},
{
"name": "CVE-2025-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34034"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-59692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59692"
},
{
"name": "CVE-2022-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50116"
},
{
"name": "CVE-2018-12931",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12931"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2022-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50224"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13791"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-49990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49990"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24240"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2022-50552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50552"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2023-53376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53376"
},
{
"name": "CVE-2023-53538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53538"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2017-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13165"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2023-53635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53635"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-23132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2022-49531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49531"
},
{
"name": "CVE-2022-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2022-50332",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50332"
},
{
"name": "CVE-2023-53822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53822"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2022-50461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50461"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2025-38486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38486"
},
{
"name": "CVE-2021-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26934"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2022-49528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49528"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2022-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49967"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2022-49245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49245"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2023-52682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52682"
},
{
"name": "CVE-2022-50871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50871"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2025-39958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39958"
},
{
"name": "CVE-2018-8956",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8956"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40964"
},
{
"name": "CVE-2026-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3441"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2022-50746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50746"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-53596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53596"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2023-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3397"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2024-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26672"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2026-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26158"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-38168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38168"
},
{
"name": "CVE-2023-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53547"
},
{
"name": "CVE-2019-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20426"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-56584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56584"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50212"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2023-54259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54259"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2025-1369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1369"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2022-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2961"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2024-57899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57899"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2025-38674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38674"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-45777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45777"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2024-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0564"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2022-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49961"
},
{
"name": "CVE-2025-69651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69651"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2025-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0033"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-52625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52625"
},
{
"name": "CVE-2023-53353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53353"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2023-53702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53702"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2023-54059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54059"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2022-50571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50571"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2022-49393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49393"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-71204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71204"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2025-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1118"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2023-53355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53355"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23181"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2023-53558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53558"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-22860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22860"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2025-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0686"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2024-45778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45778"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2023-54151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54151"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2022-36351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36351"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-26658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26658"
},
{
"name": "CVE-2026-2243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2243"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2025-8746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8746"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-45779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45779"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-57857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57857"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50213"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2025-71227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71227"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2024-7883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7883"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2022-50772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50772"
},
{
"name": "CVE-2024-56717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56717"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-45885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45885"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2025-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47153"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2024-26869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2021-20255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20255"
},
{
"name": "CVE-2022-48979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48979"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2023-54180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54180"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2021-0308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0308"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2023-45927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45927"
},
{
"name": "CVE-2020-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25742"
},
{
"name": "CVE-2022-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0987"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38199"
},
{
"name": "CVE-2025-39905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39905"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2022-50720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50720"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2022-49529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2024-26876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26876"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2025-37876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
},
{
"name": "CVE-2024-58089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58089"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2022-49127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49127"
},
{
"name": "CVE-2020-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25741"
},
{
"name": "CVE-2022-50748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50748"
},
{
"name": "CVE-2023-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53767"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2023-53620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53620"
},
{
"name": "CVE-2022-50539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50539"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2022-49496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49496"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2024-56782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56782"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2023-53540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53540"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2023-54187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54187"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2025-13735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13735"
},
{
"name": "CVE-2023-53694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53694"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-56660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56660"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2025-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38033"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2024-56737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56737"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2020-11935",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11935"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
},
{
"name": "CVE-2025-71158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71158"
},
{
"name": "CVE-2022-49803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49803"
},
{
"name": "CVE-2024-57898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57898"
},
{
"name": "CVE-2020-35503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35503"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-56639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56639"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-53002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2025-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39884"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2024-35826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2022-49764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49764"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-21651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21651"
},
{
"name": "CVE-2025-38092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38092"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-37776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6519"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2022-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50009"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-37877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
},
{
"name": "CVE-2024-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2193"
},
{
"name": "CVE-2025-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4382"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-22038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-50518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50518"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2016-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2568"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2018-12929",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12929"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2024-45783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45783"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-53410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53410"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2022-49177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2024-58241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58241"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2022-49833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49833"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1125"
},
{
"name": "CVE-2023-53647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53647"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0012"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2022-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3872"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2023-53561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53561"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2020-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0256"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2025-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21634"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2025-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38047"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2017-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0537"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-26112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26112"
},
{
"name": "CVE-2018-6952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6952"
},
{
"name": "CVE-2020-14304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14304"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2026-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24001"
},
{
"name": "CVE-2025-37807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"name": "CVE-2025-29481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29481"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2024-25740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25740"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-57950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57950"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2022-48998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48998"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49974"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2019-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20633"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2021-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3714"
},
{
"name": "CVE-2023-54071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54071"
},
{
"name": "CVE-2024-56566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56566"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-56591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56591"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2024-57976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57976"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0685"
},
{
"name": "CVE-2024-57893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2022-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50071"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2024-56180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56180"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2021-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3864"
},
{
"name": "CVE-2025-39771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39771"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26648"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2020-24352",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24352"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2022-49296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2024-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0217"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2021-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47658"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2019-12067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12067"
},
{
"name": "CVE-2024-57843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57843"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2024-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48875"
},
{
"name": "CVE-2024-41935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41935"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53382"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2023-53651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53651"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2022-50383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50383"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-53387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53387"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2024-45774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45774"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2022-50863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50863"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-39762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39762"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-52576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52576"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-57887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57887"
},
{
"name": "CVE-2025-21730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21730"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-22127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38689"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2025-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38070"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-62525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62525"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"name": "CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-38189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38189"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2021-44534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44534"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2024-56565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56565"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2024-57872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57872"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2024-46833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46833"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2023-53742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53742"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38041"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2024-56588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2022-50616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50616"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2023-53544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53544"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2022-50708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50708"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
},
{
"name": "CVE-2025-9301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9301"
}
],
"initial_release_date": "2026-03-19T00:00:00",
"last_revision_date": "2026-03-19T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0316",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37219",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37219"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37211",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37211"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37215",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37215"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37218",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37218"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37220",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37220"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37216",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37216"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37221",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37221"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37213",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37213"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37217",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37217"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37212",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37212"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37214",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37214"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37222",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37222"
}
]
}
CERTFR-2026-AVI-0166
Vulnerability from certfr_avis - Published: 2026-02-13 - Updated: 2026-02-13
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian trixie versions ant\u00e9rieures \u00e0 6.12.69-1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian bookworm versions ant\u00e9rieures \u00e0 6.1.162-1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2025-71065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71065"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2025-71134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71134"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2025-68749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68749"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2026-23072",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23072"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2025-71071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71071"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-71135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71135"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2025-68773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68773"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-71189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71189"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2025-71088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71088"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2026-23059",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23059"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2025-71076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71076"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2026-23094",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23094"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-68770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68770"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2025-71080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71080"
},
{
"name": "CVE-2026-22989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22989"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2025-39871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39871"
},
{
"name": "CVE-2026-23057",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23057"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2025-71138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71138"
},
{
"name": "CVE-2025-68291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68291"
},
{
"name": "CVE-2025-71122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71122"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2025-71144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71144"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23032",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23032"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2026-23055",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23055"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2026-23005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23005"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2026-23030",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23030"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2025-71153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71153"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-71143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71143"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2025-71130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71130"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-71126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71126"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2026-23006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23006"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2025-68789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68789"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2026-23013",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23013"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2026-22994",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22994"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2025-71157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71157"
},
{
"name": "CVE-2026-23023",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23023"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-71140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71140"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-71151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71151"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2026-23107",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23107"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2025-71101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71101"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2026-23025",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23025"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-68357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68357"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-71129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71129"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2025-39872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39872"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2025-68811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68811"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2025-68351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68351"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2023-52658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52658"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2026-23002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23002"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2026-23065",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23065"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-68369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68369"
},
{
"name": "CVE-2025-68775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68775"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-71148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71148"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2026-23062",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23062"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71099"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-68784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68784"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2025-68792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68792"
},
{
"name": "CVE-2025-71123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71123"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2025-71100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71100"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23010",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23010"
},
{
"name": "CVE-2025-71146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71146"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2025-71156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71156"
},
{
"name": "CVE-2025-40276",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40276"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2025-71119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71119"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2026-23102",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23102"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2025-68810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68810"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-71072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71072"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2026-23053",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23053"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2025-71149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71149"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-02-13T00:00:00",
"last_revision_date": "2026-02-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0166",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": "2026-02-09",
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-6127-1",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00036.html"
},
{
"published_at": "2026-02-09",
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-6126-1",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00035.html"
}
]
}
CERTFR-2026-AVI-0326
Vulnerability from certfr_avis - Published: 2026-03-20 - Updated: 2026-03-20
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 6.0.26+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.3.6 | ||
| VMware | Tanzu Platform | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.6.9 | ||
| VMware | N/A | Python Buildpack versions antérieures à 1.8.83 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 3.1.9 | ||
| VMware | Tanzu Platform | Tanzu RabbitMQ sur Tanzu Platform versions antérieures à 2.4.4 | ||
| VMware | N/A | PHP Buildpack versions antérieures à 4.6.69 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 3.2.5 | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.9+LTS-T | ||
| VMware | Tanzu Platform | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.17 | ||
| VMware | Tanzu Platform | Tanzu RabbitMQ pour Tanzu Platform versions antérieures à 10.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 2.4.6 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 1.16.18 | ||
| VMware | Tanzu Platform | Tanzu for Valkey sur Tanzu Platform versions antérieures à 10.2.2 | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 6.0.26+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.9+LTS-T | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.3.6 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.26+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.6.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.83",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ sur Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.69",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.5",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.9+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.17",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.18",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for Valkey sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.26+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.9+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2022-50759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50759"
},
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2023-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3640"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2024-57875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57875"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54129"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-49543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2023-53562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53562"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2025-38042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38042"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-53829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53829"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-54002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54002"
},
{
"name": "CVE-2022-50550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50550"
},
{
"name": "CVE-2022-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0400"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2022-49359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2022-48673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48673"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2024-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39293"
},
{
"name": "CVE-2023-53008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
},
{
"name": "CVE-2025-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38669"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2024-38306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38306"
},
{
"name": "CVE-2023-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53733"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2023-1386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1386"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-52926",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
},
{
"name": "CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2026-25500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25500"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27558"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2023-53529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53529"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2025-52534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52534"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2022-50407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50407"
},
{
"name": "CVE-2026-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23196"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2024-45775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45775"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2026-23126",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23126"
},
{
"name": "CVE-2025-38329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38329"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2022-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50230"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53588"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2022-49533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2025-69645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69645"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2022-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2023-52561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52561"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2026-24734",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24734"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2022-50815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50815"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38036"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2025-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2024-56665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56665"
},
{
"name": "CVE-2025-38340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38340"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-53629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53629"
},
{
"name": "CVE-2022-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50178"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2025-37880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2026-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23217"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2025-21656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21656"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2025-69650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69650"
},
{
"name": "CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2025-38207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38207"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49742"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2024-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52560"
},
{
"name": "CVE-2024-56604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2025-69647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69647"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2022-49108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49108"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2025-38717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38717"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2026-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2219"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2022-50627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50627"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38029"
},
{
"name": "CVE-2022-49123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38096"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2022-50380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50380"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2022-48990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48990"
},
{
"name": "CVE-2024-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24864"
},
{
"name": "CVE-2024-35832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35832"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2024-45782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45782"
},
{
"name": "CVE-2022-50785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50785"
},
{
"name": "CVE-2025-39745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39745"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-71223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71223"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2025-21752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21752"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-39282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39282"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-46316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46316"
},
{
"name": "CVE-2024-47866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47866"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2022-48667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48667"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-49161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49161"
},
{
"name": "CVE-2021-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21240"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2023-52485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52485"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2022-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49997"
},
{
"name": "CVE-2022-49469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49469"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0480"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1272"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2022-49651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49651"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2024-26770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26770"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2024-27041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27041"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2026-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3195"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26242"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2022-48668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48668"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2025-14177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14177"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2022-50322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50322"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-27635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27635"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2026-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2391"
},
{
"name": "CVE-2021-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4095"
},
{
"name": "CVE-2022-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50240"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71074"
},
{
"name": "CVE-2025-38673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38673"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2018-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1121"
},
{
"name": "CVE-2022-49547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49547"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2025-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0622"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-26757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26757"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2022-49484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2024-56788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56788"
},
{
"name": "CVE-2016-8660",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8660"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7519"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2022-50811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50811"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2023-53366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53366"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2022-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
},
{
"name": "CVE-2024-40918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40918"
},
{
"name": "CVE-2024-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27032"
},
{
"name": "CVE-2022-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50236"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2026-23137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23137"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-37882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2026-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3731"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2024-43844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43844"
},
{
"name": "CVE-2023-52920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-69652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69652"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38353"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2023-52761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52761"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2023-53609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53609"
},
{
"name": "CVE-2023-53478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53478"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2023-53682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53682"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2026-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3442"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2022-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2020-35501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35501"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-52624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52624"
},
{
"name": "CVE-2024-56557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53198"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-38082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38082"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2023-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4969"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53789"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2024-8612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8612"
},
{
"name": "CVE-2023-52586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52586"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2025-37834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2019-19378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19378"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2021-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31615"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49932"
},
{
"name": "CVE-2022-25837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25837"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2023-52831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2022-44034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44034"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53072"
},
{
"name": "CVE-2023-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2007"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2025-69648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69648"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-53602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53602"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2023-53867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53867"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2025-38038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38038"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2023-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33053"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38261"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-69644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69644"
},
{
"name": "CVE-2022-49303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49303"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-11961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11961"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2023-52916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52916"
},
{
"name": "CVE-2025-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38064"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2022-50628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50628"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2025-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
},
{
"name": "CVE-2022-50721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50721"
},
{
"name": "CVE-2022-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50095"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2026-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3196"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2022-50479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50479"
},
{
"name": "CVE-2022-50583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50583"
},
{
"name": "CVE-2025-37806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2023-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0030"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2024-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
},
{
"name": "CVE-2024-57945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57945"
},
{
"name": "CVE-2023-54233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54233"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-49534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-53010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-57888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57888"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2023-54237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54237"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-27111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27111"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2019-19814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19814"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2026-1703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1703"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2022-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
},
{
"name": "CVE-2015-8553",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8553"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2025-21751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21751"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2025-23162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2017-13694",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13694"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2013-7445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7445"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2023-52701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52701"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2022-49317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49317"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2018-12928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12928"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-56607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56607"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2023-53671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53671"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2023-29942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29942"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2022-48633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48633"
},
{
"name": "CVE-2022-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3238"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2023-53584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53584"
},
{
"name": "CVE-2024-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57809"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-53460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53460"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2024-56671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56671"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2022-49562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2023-53483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53483"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-37746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
},
{
"name": "CVE-2022-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38076"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2024-56368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-49172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49172"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38069"
},
{
"name": "CVE-2022-49750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49750"
},
{
"name": "CVE-2023-53707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53707"
},
{
"name": "CVE-2023-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53115"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2022-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48646"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-58012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2022-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48887"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2023-45929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45929"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-37855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-32249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32249"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-38330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38330"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2017-13693",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13693"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2022-49306",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2025-36423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36423"
},
{
"name": "CVE-2022-49622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49622"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2022-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50284"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2024-27035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27035"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-25836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25836"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-29934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29934"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-38438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38438"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-1193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1193"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2025-68779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68779"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-21819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
},
{
"name": "CVE-2025-48514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48514"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2026-25749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25749"
},
{
"name": "CVE-2024-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49504"
},
{
"name": "CVE-2025-38118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2022-50500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50500"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2026-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26958"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2022-49178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2022-49173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49173"
},
{
"name": "CVE-2024-45781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45781"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2026-26269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26269"
},
{
"name": "CVE-2024-43872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43872"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2023-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-69649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69649"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2022-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49766"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
},
{
"name": "CVE-2024-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49569"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2024-56609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
},
{
"name": "CVE-2022-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49940"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2024-56611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56611"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2020-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25743"
},
{
"name": "CVE-2022-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50167"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2026-27704",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27704"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2021-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3735"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2022-50634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50634"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54514"
},
{
"name": "CVE-2025-71202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71202"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2025-0677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0677"
},
{
"name": "CVE-2024-45780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45780"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2022-50492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50492"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-59691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59691"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2023-52481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52481"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1788"
},
{
"name": "CVE-2023-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53721"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-37907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37907"
},
{
"name": "CVE-2024-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38625"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2023-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4010"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2023-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54105"
},
{
"name": "CVE-2018-17977",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17977"
},
{
"name": "CVE-2019-1010204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010204"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2023-53434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53434"
},
{
"name": "CVE-2023-29935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29935"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2018-12930",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12930"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-40012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40012"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2024-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47141"
},
{
"name": "CVE-2024-8354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8354"
},
{
"name": "CVE-2023-54323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54323"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0689"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31347"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2023-53657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53657"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2023-52732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52732"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2022-49167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49167"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2025-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0690"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2022-49234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49234"
},
{
"name": "CVE-2022-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50163"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-26699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26699"
},
{
"name": "CVE-2024-57876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31648"
},
{
"name": "CVE-2025-0678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0678"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2026-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1002"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2022-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50166"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2024-56738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56738"
},
{
"name": "CVE-2022-50778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50778"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-71203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71203"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2025-39789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39789"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2024-56583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56583"
},
{
"name": "CVE-2022-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50195"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-56712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56712"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-52634",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52634"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2025-62526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62526"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2024-45776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45776"
},
{
"name": "CVE-2022-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50090"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2020-14356",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14356"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-53764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53764"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-38672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38672"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0684"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38272"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2019-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20794"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2022-4543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4543"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2023-53627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53627"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38091"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2023-53575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53575"
},
{
"name": "CVE-2022-49516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2022-3523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3523"
},
{
"name": "CVE-2026-26157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26157"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-22072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2023-53037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53037"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2025-69646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69646"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23215"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2022-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49955"
},
{
"name": "CVE-2023-53628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53628"
},
{
"name": "CVE-2025-29943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29943"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-38140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38140"
},
{
"name": "CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39908"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2026-23118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23118"
},
{
"name": "CVE-2025-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34034"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-59692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59692"
},
{
"name": "CVE-2022-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50116"
},
{
"name": "CVE-2018-12931",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12931"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2022-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50224"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13791"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-49990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49990"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24240"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2022-50552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50552"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2023-53376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53376"
},
{
"name": "CVE-2023-53538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53538"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2017-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13165"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2023-53635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53635"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-23132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2022-49531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49531"
},
{
"name": "CVE-2022-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2022-50332",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50332"
},
{
"name": "CVE-2023-53822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53822"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2022-50461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50461"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2025-38486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38486"
},
{
"name": "CVE-2021-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26934"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2022-49528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49528"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2022-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49967"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2022-49245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49245"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2023-52682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52682"
},
{
"name": "CVE-2022-50871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50871"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2025-39958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39958"
},
{
"name": "CVE-2018-8956",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8956"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40964"
},
{
"name": "CVE-2025-69873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69873"
},
{
"name": "CVE-2026-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3441"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2022-50746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50746"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-53596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53596"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2023-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3397"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2024-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26672"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2026-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26158"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-38168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38168"
},
{
"name": "CVE-2023-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53547"
},
{
"name": "CVE-2019-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20426"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-56584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56584"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50212"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2023-54259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54259"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2025-1369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1369"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2022-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2961"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2025-14180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14180"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2024-57899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57899"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2025-38674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38674"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-45777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45777"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2024-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0564"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2022-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49961"
},
{
"name": "CVE-2025-69651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69651"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2025-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0033"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2025-25184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25184"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-52625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52625"
},
{
"name": "CVE-2023-53353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53353"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2023-53702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53702"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2023-54059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54059"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2022-50571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50571"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2022-49393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49393"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-71204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71204"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2025-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1118"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2023-53355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53355"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23181"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2023-53558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53558"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-22860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22860"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2025-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0686"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2024-45778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45778"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2023-54151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54151"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2022-36351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36351"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2026-25639",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25639"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-26658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26658"
},
{
"name": "CVE-2026-2243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2243"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2025-8746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8746"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-45779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45779"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-57857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57857"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50213"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2025-71227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71227"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2024-7883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7883"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2022-50772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50772"
},
{
"name": "CVE-2024-56717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56717"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-45885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45885"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2025-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47153"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2024-26869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2021-20255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20255"
},
{
"name": "CVE-2022-48979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48979"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2023-54180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54180"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2021-0308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0308"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2023-45927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45927"
},
{
"name": "CVE-2020-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25742"
},
{
"name": "CVE-2022-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0987"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38199"
},
{
"name": "CVE-2025-39905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39905"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2022-50720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50720"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2022-49529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2024-26876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26876"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2025-37876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
},
{
"name": "CVE-2024-58089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58089"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2022-49127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49127"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2020-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25741"
},
{
"name": "CVE-2022-50748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50748"
},
{
"name": "CVE-2023-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53767"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2023-53620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53620"
},
{
"name": "CVE-2022-50539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50539"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2022-49496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49496"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2024-56782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56782"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2023-53540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53540"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2023-54187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54187"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2025-13735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13735"
},
{
"name": "CVE-2023-53694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53694"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-56660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56660"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2025-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38033"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2024-56737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56737"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2020-11935",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11935"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
},
{
"name": "CVE-2025-71158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71158"
},
{
"name": "CVE-2022-49803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49803"
},
{
"name": "CVE-2024-57898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57898"
},
{
"name": "CVE-2020-35503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35503"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-56639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56639"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-53002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2025-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39884"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2024-35826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2022-49764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49764"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-21651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21651"
},
{
"name": "CVE-2025-38092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38092"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-37776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6519"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2022-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50009"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-37877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
},
{
"name": "CVE-2024-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2193"
},
{
"name": "CVE-2025-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4382"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-22038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2026-27141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27141"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-50518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50518"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2016-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2568"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2018-12929",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12929"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2024-45783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45783"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-53410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53410"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2022-49177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2024-58241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58241"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2022-49833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49833"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1125"
},
{
"name": "CVE-2023-53647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53647"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0012"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2022-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3872"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2025-27610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27610"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2023-53561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53561"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2020-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0256"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2025-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21634"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2025-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38047"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2017-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0537"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-26112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26112"
},
{
"name": "CVE-2018-6952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6952"
},
{
"name": "CVE-2020-14304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14304"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2026-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24001"
},
{
"name": "CVE-2025-37807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"name": "CVE-2025-29481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29481"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2024-25740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25740"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-14178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14178"
},
{
"name": "CVE-2024-57950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57950"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2022-48998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48998"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49974"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2019-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20633"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2021-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3714"
},
{
"name": "CVE-2023-54071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54071"
},
{
"name": "CVE-2024-56566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56566"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-56591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56591"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2024-57976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57976"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0685"
},
{
"name": "CVE-2024-57893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2022-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50071"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2024-56180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56180"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2021-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3864"
},
{
"name": "CVE-2025-39771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39771"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26648"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2020-24352",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24352"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2022-49296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2024-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0217"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2021-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47658"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2025-4575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
},
{
"name": "CVE-2019-12067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12067"
},
{
"name": "CVE-2024-57843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57843"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2024-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48875"
},
{
"name": "CVE-2024-41935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41935"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53382"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2023-53651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53651"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2022-50383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50383"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-53387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53387"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2024-45774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45774"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2022-50863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50863"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-39762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39762"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-52576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52576"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-57887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57887"
},
{
"name": "CVE-2025-21730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21730"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-22127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38689"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2025-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38070"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-62525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62525"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"name": "CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-38189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38189"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2021-44534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44534"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2024-56565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56565"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2024-57872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57872"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2024-46833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46833"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2023-53742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53742"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38041"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2024-56588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2022-50616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50616"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2023-53544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53544"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2022-50708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50708"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
},
{
"name": "CVE-2025-9301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9301"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2026-03-20T00:00:00",
"last_revision_date": "2026-03-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0326",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37233",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37233"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37237",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37237"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37236",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37236"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37246",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37246"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37235",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37235"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37229",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37229"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37226",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37226"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37230",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37230"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37242",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37242"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37228",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37228"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37240",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37240"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37243",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37243"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37234",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37234"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37231",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37231"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37239",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37239"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37227",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37227"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37232",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37232"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37247",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37247"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37241",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37241"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37238",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37238"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37244",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37244"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37245",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37245"
}
]
}
MSRC_CVE-2025-68794
Vulnerability from csaf_microsoft - Published: 2026-01-02 00:00 - Updated: 2026-02-18 14:36| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-68794 iomap: adjust read range correctly for non-block-aligned positions - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2025-68794.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "iomap: adjust read range correctly for non-block-aligned positions",
"tracking": {
"current_release_date": "2026-02-18T14:36:42.000Z",
"generator": {
"date": "2026-02-18T14:43:41.737Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-68794",
"initial_release_date": "2026-01-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-01-15T01:06:51.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-01-20T14:40:27.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-02-18T14:36:42.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 kernel 6.6.119.3-3",
"product": {
"name": "\u003cazl3 kernel 6.6.119.3-3",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 kernel 6.6.119.3-3",
"product": {
"name": "azl3 kernel 6.6.119.3-3",
"product_id": "20823"
}
},
{
"category": "product_version_range",
"name": "azl3 kernel 6.6.119.3-1",
"product": {
"name": "azl3 kernel 6.6.119.3-1",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 kernel 6.6.119.3-3 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.119.3-3 as a component of Azure Linux 3.0",
"product_id": "20823-17084"
},
"product_reference": "20823",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.119.3-1 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68794",
"notes": [
{
"category": "general",
"text": "Linux",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20823-17084"
],
"known_affected": [
"17084-1",
"17084-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-68794 iomap: adjust read range correctly for non-block-aligned positions - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2025-68794.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2026-01-15T01:06:51.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-2"
]
},
{
"category": "vendor_fix",
"date": "2026-01-15T01:06:51.000Z",
"details": "6.6.121.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"title": "iomap: adjust read range correctly for non-block-aligned positions"
}
]
}
SUSE-SU-2026:21123-1
Vulnerability from csaf_suse - Published: 2026-04-13 18:28 - Updated: 2026-04-13 18:28| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-38542: RDMA/mana_ib: boundary check before installing cq callbacks (bsc#1226591).\n- CVE-2025-39817: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (bsc#1249998).\n- CVE-2025-39998: scsi: target: target_core_configfs: Add length check to avoid buffer overflow (bsc#1252073).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n (bsc#1253455).\n- CVE-2025-40253: s390/ctcm: Fix double-kfree (bsc#1255084).\n- CVE-2025-68794: iomap: adjust read range correctly for non-block-aligned positions (bsc#1256647).\n- CVE-2025-71125: tracing: Do not register unsupported perf events (bsc#1256784).\n- CVE-2025-71268: btrfs: fix reservation leak in some error paths when inserting inline extent (bsc#1259865).\n- CVE-2025-71269: btrfs: do not free data reservation in fallback from inline due to -ENOSPC (bsc#1259889).\n- CVE-2026-23030: phy: rockchip: inno-usb2: Fix a double free bug in rockchip_usb2phy_probe() (bsc#1257561).\n- CVE-2026-23047: libceph: make calc_target() set t-\u003epaused, not just clear it (bsc#1257682).\n- CVE-2026-23069: vsock/virtio: fix potential underflow in virtio_transport_get_credit() (bsc#1257755).\n- CVE-2026-23088: tracing: Fix crash on synthetic stacktrace field usage (bsc#1257814).\n- CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773).\n- CVE-2026-23120: l2tp: avoid one data-race in l2tp_tunnel_del_work() (bsc#1258280).\n- CVE-2026-23125: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT (bsc#1258293).\n- CVE-2026-23136: libceph: reset sparse-read state in osd_fault() (bsc#1258303).\n- CVE-2026-23140: bpf, test_run: Subtract size of xdp_frame from allowed metadata size (bsc#1258305).\n- CVE-2026-23154: net: fix segmentation of forwarding fraglist GRO (bsc#1258286).\n- CVE-2026-23169: mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() (bsc#1258389).\n- CVE-2026-23187: pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc-\u003edomains (bsc#1258330).\n- CVE-2026-23193: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() (bsc#1258414).\n- CVE-2026-23201: ceph: fix oops due to invalid pointer for kfree() in parse_longname() (bsc#1258337).\n- CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful() (bsc#1258340).\n- CVE-2026-23216: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() (bsc#1258447).\n- CVE-2026-23231: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() (bsc#1259188).\n- CVE-2026-23242: RDMA/siw: Fix potential NULL pointer dereference in header processing (bsc#1259795).\n- CVE-2026-23243: RDMA/umad: Reject negative data_len in ib_umad_write (bsc#1259797).\n- CVE-2026-23255: net: add proper RCU protection to /proc/net/ptype (bsc#1259891).\n- CVE-2026-23262: gve: Fix stats report corruption on queue count change (bsc#1259870).\n- CVE-2026-23270: net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks (bsc#1259886).\n- CVE-2026-23272: netfilter: nf_tables: unconditionally bump set-\u003enelems before insertion (bsc#1260009).\n- CVE-2026-23274: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels (bsc#1260005).\n- CVE-2026-23277: net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit (bsc#1259997).\n- CVE-2026-23278: netfilter: nf_tables: always walk all pending catchall elements (bsc#1259998).\n- CVE-2026-23281: wifi: libertas: fix use-after-free in lbs_free_adapter() (bsc#1260464).\n- CVE-2026-23292: scsi: target: Fix recursive locking in __configfs_open_file() (bsc#1260500).\n- CVE-2026-23293: net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260486).\n- CVE-2026-23304: ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu() (bsc#1260544).\n- CVE-2026-23317: drm/vmwgfx: Return the correct value in vmw_translate_ptr functions (bsc#1260562).\n- CVE-2026-23319: bpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim (bsc#1260735).\n- CVE-2026-23335: RDMA/irdma: Fix kernel stack leak in irdma_create_user_ah() (bsc#1260550).\n- CVE-2026-23343: xdp: produce a warning when calculated tailroom is negative (bsc#1260527).\n- CVE-2026-23361: PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry (bsc#1260732).\n- CVE-2026-23379: net/sched: ets: fix divide by zero in the offload path (bsc#1260481).\n- CVE-2026-23381: net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260471).\n- CVE-2026-23383: bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing (bsc#1260497).\n- CVE-2026-23386: gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL (bsc#1260799).\n- CVE-2026-23395: Bluetooth: L2CAP: Fix accepting multiple L2CAP_ECRED_CONN_REQ (bsc#1260580).\n- CVE-2026-23398: icmp: fix NULL pointer dereference in icmp_tag_validation() (bsc#1260730).\n- CVE-2026-23412: netfilter: bpf: defer hook memory release until rcu readers are done (bsc#1261412).\n- CVE-2026-23413: clsact: Fix use-after-free in init/destroy rollback asymmetry (bsc#1261498).\n- CVE-2026-23414: tls: Purge async_hold in tls_decrypt_async_wait() (bsc#1261496).\n- CVE-2026-23419: net/rds: Fix circular locking dependency in rds_tcp_tune (bsc#1261507).\n- CVE-2026-31788: xen/privcmd: restrict usage in unprivileged domU (bsc#1259707).\n\nThe following non-security bugs were fixed:\n\n- ACPI: EC: clean up handlers on probe failure in acpi_ec_setup() (git-fixes).\n- ACPI: OSI: Add DMI quirk for Acer Aspire One D255 (stable-fixes).\n- ACPI: OSL: fix __iomem type on return from acpi_os_map_generic_address() (git-fixes).\n- ACPI: PM: Save NVS memory on Lenovo G70-35 (stable-fixes).\n- ACPI: processor: Fix previous acpi_processor_errata_piix4() fix (git-fixes).\n- ALSA: caiaq: fix stack out-of-bounds read in init_card (git-fixes).\n- ALSA: firewire-lib: fix uninitialized local variable (git-fixes).\n- ALSA: hda/conexant: Add quirk for HP ZBook Studio G4 (stable-fixes).\n- ALSA: hda/conexant: Fix headphone jack handling on Acer Swift SF314 (stable-fixes).\n- ALSA: hda/realtek: Add headset jack quirk for Thinkpad X390 (stable-fixes).\n- ALSA: hda/realtek: add HP Laptop 14s-dr5xxx mute LED quirk (stable-fixes).\n- ALSA: hda: cs35l56: Fix signedness error in cs35l56_hda_posture_put() (git-fixes).\n- ALSA: pci: hda: use snd_kcontrol_chip() (stable-fixes).\n- ALSA: pcm: fix use-after-free on linked stream runtime in snd_pcm_drain() (git-fixes).\n- ALSA: usb-audio: Check endpoint numbers at parsing Scarlett2 mixer interfaces (stable-fixes).\n- ASoC: Intel: catpt: Fix the device initialization (git-fixes).\n- ASoC: SOF: ipc4-topology: Allow bytes controls without initial payload (git-fixes).\n- ASoC: adau1372: Fix clock leak on PLL lock failure (git-fixes).\n- ASoC: adau1372: Fix unchecked clk_prepare_enable() return value (git-fixes).\n- ASoC: amd: acp-mach-common: Add missing error check for clock acquisition (git-fixes).\n- ASoC: amd: acp3x-rt5682-max9836: Add missing error check for clock acquisition (git-fixes).\n- ASoC: amd: yc: Add ASUS EXPERTBOOK BM1503CDA to quirk table (stable-fixes).\n- ASoC: amd: yc: Add DMI quirk for ASUS EXPERTBOOK PM1503CDA (stable-fixes).\n- ASoC: detect empty DMI strings (git-fixes).\n- ASoC: ep93xx: Fix unchecked clk_prepare_enable() and add rollback on failure (git-fixes).\n- ASoC: fsl_easrc: Fix event generation in fsl_easrc_iec958_put_bits() (stable-fixes).\n- ASoC: fsl_easrc: Fix event generation in fsl_easrc_iec958_set_reg() (stable-fixes).\n- ASoC: qcom: qdsp6: Fix q6apm remove ordering during ADSP stop and start (git-fixes).\n- ASoC: soc-core: drop delayed_work_pending() check before flush (git-fixes).\n- ASoC: soc-core: flush delayed work before removing DAIs and widgets (git-fixes).\n- Bluetooth: HIDP: Fix possible UAF (git-fixes).\n- Bluetooth: L2CAP: Fix ERTM re-init and zero pdu_len infinite loop (git-fixes).\n- Bluetooth: L2CAP: Fix null-ptr-deref on l2cap_sock_ready_cb (git-fixes).\n- Bluetooth: L2CAP: Fix send LE flow credits in ACL link (git-fixes).\n- Bluetooth: L2CAP: Fix type confusion in l2cap_ecred_reconf_rsp() (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user (git-fixes).\n- Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access (git-fixes).\n- Bluetooth: L2CAP: Validate PDU length before reading SDU length in l2cap_ecred_data_rcv() (git-fixes).\n- Bluetooth: LE L2CAP: Disconnect if received packet\u0027s SDU exceeds IMTU (git-fixes).\n- Bluetooth: LE L2CAP: Disconnect if sum of payload sizes exceed SDU (git-fixes).\n- Bluetooth: MGMT: Fix dangling pointer on mgmt_add_adv_patterns_monitor_complete (git-fixes).\n- Bluetooth: MGMT: validate LTK enc_size on load (git-fixes).\n- Bluetooth: MGMT: validate mesh send advertising payload length (git-fixes).\n- Bluetooth: Remove 3 repeated macro definitions (stable-fixes).\n- Bluetooth: SCO: Fix use-after-free in sco_recv_frame() due to missing sock_hold (git-fixes).\n- Bluetooth: SCO: fix race conditions in sco_sock_connect() (git-fixes).\n- Bluetooth: SMP: derive legacy responder STK authentication from MITM state (git-fixes).\n- Bluetooth: SMP: force responder MITM requirements before building the pairing response (git-fixes).\n- Bluetooth: SMP: make SM/PER/KDU/BI-04-C happy (git-fixes).\n- Bluetooth: btintel: serialize btintel_hw_error() with hci_req_sync_lock (git-fixes).\n- Bluetooth: btusb: clamp SCO altsetting table indices (git-fixes).\n- Bluetooth: hci_event: fix potential UAF in hci_le_remote_conn_param_req_evt (git-fixes).\n- Bluetooth: hci_ll: Fix firmware leak on error path (git-fixes).\n- Bluetooth: hci_sync: Fix hci_le_create_conn_sync (git-fixes).\n- Bluetooth: hci_sync: Remove remaining dependencies of hci_request (stable-fixes).\n- Bluetooth: hci_sync: call destroy in hci_cmd_sync_run if immediate (git-fixes).\n- Drivers: hv: fix missing kernel-doc description for \u0027size\u0027 in request_arr_init() (git-fixes).\n- Drivers: hv: remove stale comment (git-fixes).\n- Drivers: hv: vmbus: Clean up sscanf format specifier in target_cpu_store() (git-fixes).\n- Drivers: hv: vmbus: Fix sysfs output format for ring buffer index (git-fixes).\n- Drivers: hv: vmbus: Fix typos in vmbus_drv.c (git-fixes).\n- HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them (stable-fixes).\n- HID: apple: avoid memory leak in apple_report_fixup() (stable-fixes).\n- HID: asus: avoid memory leak in asus_report_fixup() (stable-fixes).\n- HID: magicmouse: avoid memory leak in magicmouse_report_fixup() (stable-fixes).\n- HID: mcp2221: cancel last I2C command on read error (stable-fixes).\n- Input: synaptics-rmi4 - fix a locking bug in an error path (git-fixes).\n- KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE (bsc#1259461).\n- NFC: nxp-nci: allow GPIOs to sleep (git-fixes).\n- NFC: pn533: bound the UART receive buffer (git-fixes).\n- PCI: Update BAR # and window messages (stable-fixes).\n- PCI: hv: Correct a comment (git-fixes).\n- PCI: hv: Remove unnecessary flex array in struct pci_packet (git-fixes).\n- PCI: hv: Remove unused field pci_bus in struct hv_pcibus_device (git-fixes).\n- PCI: hv: remove unnecessary module_init/exit functions (git-fixes).\n- PM: runtime: Fix a race condition related to device removal (git-fixes).\n- RDMA/mana_ib: Access remote atomic for MRs (bsc#1251135).\n- RDMA/mana_ib: Add EQ creation for rnic adapter (git-fixes).\n- RDMA/mana_ib: Add device statistics support (git-fixes).\n- RDMA/mana_ib: Add device-memory support (git-fixes).\n- RDMA/mana_ib: Add port statistics support (git-fixes).\n- RDMA/mana_ib: Add support of 4M, 1G, and 2G pages (git-fixes).\n- RDMA/mana_ib: Add support of mana_ib for RNIC and ETH nic (git-fixes).\n- RDMA/mana_ib: Adding and deleting GIDs (git-fixes).\n- RDMA/mana_ib: Allow registration of DMA-mapped memory in PDs (git-fixes).\n- RDMA/mana_ib: Configure mac address in RNIC (git-fixes).\n- RDMA/mana_ib: Create and destroy RC QP (git-fixes).\n- RDMA/mana_ib: Create and destroy UD/GSI QP (git-fixes).\n- RDMA/mana_ib: Create and destroy rnic adapter (git-fixes).\n- RDMA/mana_ib: Drain send wrs of GSI QP (git-fixes).\n- RDMA/mana_ib: Enable RoCE on port 1 (git-fixes).\n- RDMA/mana_ib: Extend modify QP (git-fixes).\n- RDMA/mana_ib: Fix DSCP value in modify QP (git-fixes).\n- RDMA/mana_ib: Fix error code in probe() (git-fixes).\n- RDMA/mana_ib: Fix integer overflow during queue creation (bsc#1251135).\n- RDMA/mana_ib: Fix missing ret value (git-fixes).\n- RDMA/mana_ib: Handle net event for pointing to the current netdev (bsc#1256690).\n- RDMA/mana_ib: Implement DMABUF MR support (git-fixes).\n- RDMA/mana_ib: Implement port parameters (git-fixes).\n- RDMA/mana_ib: Implement uapi to create and destroy RC QP (git-fixes).\n- RDMA/mana_ib: Introduce helpers to create and destroy mana queues (git-fixes).\n- RDMA/mana_ib: Introduce mana_ib_get_netdev helper function (git-fixes).\n- RDMA/mana_ib: Introduce mana_ib_install_cq_cb helper function (git-fixes).\n- RDMA/mana_ib: Introduce mdev_to_gc helper function (git-fixes).\n- RDMA/mana_ib: Modify QP state (git-fixes).\n- RDMA/mana_ib: Process QP error events in mana_ib (git-fixes).\n- RDMA/mana_ib: Query feature_flags bitmask from FW (git-fixes).\n- RDMA/mana_ib: Set correct device into ib (git-fixes).\n- RDMA/mana_ib: Take CQ type from the device type (git-fixes).\n- RDMA/mana_ib: UD/GSI QP creation for kernel (git-fixes).\n- RDMA/mana_ib: UD/GSI work requests (git-fixes).\n- RDMA/mana_ib: Use num_comp_vectors of ib_device (git-fixes).\n- RDMA/mana_ib: Use safer allocation function() (bsc#1251135).\n- RDMA/mana_ib: Use struct mana_ib_queue for CQs (git-fixes).\n- RDMA/mana_ib: Use struct mana_ib_queue for RAW QPs (git-fixes).\n- RDMA/mana_ib: Use struct mana_ib_queue for WQs (git-fixes).\n- RDMA/mana_ib: add additional port counters (bsc#1251135).\n- RDMA/mana_ib: add support of multiple ports (bsc#1251135).\n- RDMA/mana_ib: check cqe length for kernel CQs (git-fixes).\n- RDMA/mana_ib: create EQs for RNIC CQs (git-fixes).\n- RDMA/mana_ib: create and destroy RNIC cqs (git-fixes).\n- RDMA/mana_ib: create kernel-level CQs (git-fixes).\n- RDMA/mana_ib: create/destroy AH (git-fixes).\n- RDMA/mana_ib: extend mana QP table (git-fixes).\n- RDMA/mana_ib: extend query device (git-fixes).\n- RDMA/mana_ib: helpers to allocate kernel queues (git-fixes).\n- RDMA/mana_ib: implement get_dma_mr (git-fixes).\n- RDMA/mana_ib: implement req_notify_cq (git-fixes).\n- RDMA/mana_ib: implement uapi for creation of rnic cq (git-fixes).\n- RDMA/mana_ib: indicate CM support (git-fixes).\n- RDMA/mana_ib: introduce a helper to remove cq callbacks (git-fixes).\n- RDMA/mana_ib: polling of CQs for GSI/UD (git-fixes).\n- RDMA/mana_ib: remove useless return values from dbg prints (git-fixes).\n- RDMA/mana_ib: request error CQEs when supported (git-fixes).\n- RDMA/mana_ib: set node_guid (git-fixes).\n- RDMA/mana_ib: support of the zero based MRs (bsc#1251135).\n- RDMA/mana_ib: unify mana_ib functions to support any gdma device (git-fixes).\n- Remove \"scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans\" changes (bsc#1257506).\n- USB: core: Limit the length of unkillable synchronous timeouts (git-fixes).\n- USB: dummy-hcd: Fix interrupt synchronization error (git-fixes).\n- USB: dummy-hcd: Fix locking/synchronization error (git-fixes).\n- USB: ezcap401 needs USB_QUIRK_NO_BOS to function on 10gbs usb speed (stable-fixes).\n- USB: serial: f81232: fix incomplete serial port generation (stable-fixes).\n- USB: usbcore: Introduce usb_bulk_msg_killable() (git-fixes).\n- USB: usbtmc: Use usb_bulk_msg_killable() with user-specified timeouts (git-fixes).\n- accel/qaic: Handle DBC deactivation if the owner went away (git-fixes).\n- apparmor: Fix double free of ns_name in aa_replace_profiles() (bsc#1258849).\n- apparmor: fix differential encoding verification (bsc#1258849).\n- apparmor: fix memory leak in verify_header (bsc#1258849).\n- apparmor: fix missing bounds check on DEFAULT table in verify_dfa() (bsc#1258849).\n- apparmor: fix race between freeing data and fs accessing it (bsc#1258849).\n- apparmor: fix race on rawdata dereference (bsc#1258849).\n- apparmor: fix side-effect bug in match_char() macro usage (bsc#1258849).\n- apparmor: fix unprivileged local user can do privileged policy management (bsc#1258849).\n- apparmor: fix: limit the number of levels of policy namespaces (bsc#1258849).\n- apparmor: replace recursive profile removal with iterative approach (bsc#1258849).\n- apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1258849).\n- batman-adv: Avoid double-rtnl_lock ELP metric worker (git-fixes).\n- bonding: do not set usable_slaves for broadcast mode (git-fixes).\n- btrfs: fix zero size inode with non-zero size after log replay (git-fixes).\n- btrfs: log new dentries when logging parent dir of a conflicting inode (git-fixes).\n- btrfs: tracepoints: get correct superblock from dentry in event btrfs_sync_file() (bsc#1257777).\n- can: bcm: fix locking for bcm_op runtime updates (git-fixes).\n- can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message (git-fixes).\n- can: gw: fix OOB heap access in cgw_csum_crc8_rel() (git-fixes).\n- can: hi311x: hi3110_open(): add check for hi3110_power_enable() return value (git-fixes).\n- can: isotp: fix tx.buf use-after-free in isotp_sendmsg() (git-fixes).\n- can: mcp251x: fix deadlock in error path of mcp251x_open (git-fixes).\n- can: ucan: Fix infinite loop from zero-length messages (git-fixes).\n- can: usb: etas_es58x: correctly anchor the urb in the read bulk callback (git-fixes).\n- comedi: Reinit dev-\u003espinlock between attachments to low-level drivers (git-fixes).\n- comedi: me4000: Fix potential overrun of firmware buffer (git-fixes).\n- comedi: me_daq: Fix potential overrun of firmware buffer (git-fixes).\n- comedi: ni_atmio16d: Fix invalid clean-up after failed attach (git-fixes).\n- crypto: af-alg - fix NULL pointer dereference in scatterwalk (git-fixes).\n- crypto: caam - fix DMA corruption on long hmac keys (git-fixes).\n- crypto: caam - fix overflow on long hmac keys (git-fixes).\n- dmaengine: idxd: Fix freeing the allocated ida too late (git-fixes).\n- dmaengine: idxd: Fix leaking event log memory (git-fixes).\n- dmaengine: idxd: Fix memory leak when a wq is reset (git-fixes).\n- dmaengine: idxd: Fix not releasing workqueue on .release() (git-fixes).\n- dmaengine: idxd: Remove usage of the deprecated ida_simple_xx() API (stable-fixes).\n- dmaengine: idxd: fix possible wrong descriptor completion in llist_abort_desc() (git-fixes).\n- dmaengine: sh: rz-dmac: Move CHCTRL updates under spinlock (git-fixes).\n- dmaengine: sh: rz-dmac: Protect the driver specific lists (git-fixes).\n- dmaengine: xilinx: xdma: Fix regmap init error handling (git-fixes).\n- dmaengine: xilinx: xilinx_dma: Fix dma_device directions (git-fixes).\n- dmaengine: xilinx: xilinx_dma: Fix residue calculation for cyclic DMA (git-fixes).\n- dmaengine: xilinx: xilinx_dma: Fix unmasked residue subtraction (git-fixes).\n- drm/amd/display: Add pixel_clock to amd_pp_display_configuration (stable-fixes).\n- drm/amd/display: Fix DisplayID not-found handling in parse_edid_displayid_vrr() (git-fixes).\n- drm/amd: Set num IP blocks to 0 if discovery fails (stable-fixes).\n- drm/amdgpu/gmc9.0: add bounds checking for cid (stable-fixes).\n- drm/amdgpu/mmhub2.0: add bounds checking for cid (stable-fixes).\n- drm/amdgpu/mmhub2.3: add bounds checking for cid (stable-fixes).\n- drm/amdgpu/mmhub3.0.1: add bounds checking for cid (stable-fixes).\n- drm/amdgpu/mmhub3.0.2: add bounds checking for cid (stable-fixes).\n- drm/amdgpu/mmhub3.0: add bounds checking for cid (stable-fixes).\n- drm/amdgpu: Fix fence put before wait in amdgpu_amdkfd_submit_ib (git-fixes).\n- drm/amdgpu: Fix use-after-free race in VM acquire (stable-fixes).\n- drm/amdgpu: apply state adjust rules to some additional HAINAN vairants (stable-fixes).\n- drm/amdgpu: keep vga memory on MacBooks with switchable graphics (stable-fixes).\n- drm/ast: dp501: Fix initialization of SCU2C (git-fixes).\n- drm/bridge: ti-sn65dsi83: fix CHA_DSI_CLK_RANGE rounding (git-fixes).\n- drm/bridge: ti-sn65dsi86: Add support for DisplayPort mode with HPD (stable-fixes).\n- drm/i915/dp: Use crtc_state-\u003eenhanced_framing properly on ivb/hsw CPU eDP (git-fixes).\n- drm/i915/gmbus: fix spurious timeout on 512-byte burst reads (git-fixes).\n- drm/i915/gt: Check set_default_submission() before deferencing (git-fixes).\n- drm/ioc32: stop speculation on the drm_compat_ioctl path (git-fixes).\n- drm/msm/dsi: Document DSC related pclk_rate and hdisplay calculations (stable-fixes).\n- drm/msm/dsi: fix hdisplay calculation when programming dsi registers (git-fixes).\n- drm/msm/dsi: fix pclk rate calculation for bonded dsi (git-fixes).\n- drm/radeon: apply state adjust rules to some additional HAINAN vairants (stable-fixes).\n- drm/sched: Fix kernel-doc warning for drm_sched_job_done() (git-fixes).\n- drm/solomon: Fix page start when updating rectangle in page addressing mode (git-fixes).\n- firmware: arm_scpi: Fix device_node reference leak in probe path (git-fixes).\n- gpio: mxc: map Both Edge pad wakeup to Rising Edge (git-fixes).\n- hv/hv_kvp_daemon: Handle IPv4 and Ipv6 combination for keyfile format (git-fixes).\n- hv/hv_kvp_daemon: Pass NIC name to hv_get_dns_info as well (git-fixes).\n- hwmon: (adm1177) fix sysfs ABI violation and current unit conversion (git-fixes).\n- hwmon: (axi-fan-control) Make use of dev_err_probe() (stable-fixes).\n- hwmon: (axi-fan-control) Use device firmware agnostic API (stable-fixes).\n- hwmon: (it87) Check the it87_lock() return value (git-fixes).\n- hwmon: (occ) Fix division by zero in occ_show_power_1() (git-fixes).\n- hwmon: (occ) Fix missing newline in occ_show_extended() (git-fixes).\n- hwmon: (peci/cputemp) Fix crit_hyst returning delta instead of absolute temperature (git-fixes).\n- hwmon: (peci/cputemp) Fix off-by-one in cputemp_is_visible() (git-fixes).\n- hwmon: (pmbus/isl68137) Add mutex protection for AVS enable sysfs attributes (git-fixes).\n- hwmon: (pmbus/isl68137) Fix unchecked return value and use sysfs_emit() (git-fixes).\n- hwmon: (pmbus/q54sj108a2) fix stack overflow in debugfs read (git-fixes).\n- hwmon: (pxe1610) Check return value of page-select write in probe (git-fixes).\n- hwmon: (tps53679) Fix device ID comparison and printing in tps53676_identify() (git-fixes).\n- hwmon: axi-fan: do not use driver_override as IRQ name (git-fixes).\n- i2c: cp2615: fix serial string NULL-deref at probe (git-fixes).\n- i2c: cp2615: replace deprecated strncpy with strscpy (stable-fixes).\n- i2c: fsi: Fix a potential leak in fsi_i2c_probe() (git-fixes).\n- i2c: pxa: defer reset on Armada 3700 when recovery is used (git-fixes).\n- idpf: nullify pointers after they are freed (git-fixes).\n- iio: accel: fix ADXL355 temperature signature value (git-fixes).\n- iio: adc: ti-adc161s626: fix buffer read on big-endian (git-fixes).\n- iio: chemical: bme680: Fix measurement wait duration calculation (git-fixes).\n- iio: chemical: sps30_i2c: fix buffer size in sps30_i2c_read_meas() (git-fixes).\n- iio: chemical: sps30_serial: fix buffer size in sps30_serial_read_meas() (git-fixes).\n- iio: dac: ad5770r: fix error return in ad5770r_read_raw() (git-fixes).\n- iio: dac: ds4424: reject -128 RAW value (git-fixes).\n- iio: frequency: adf4377: Fix duplicated soft reset mask (git-fixes).\n- iio: gyro: mpu3050-core: fix pm_runtime error handling (git-fixes).\n- iio: gyro: mpu3050-i2c: fix pm_runtime error handling (git-fixes).\n- iio: gyro: mpu3050: Fix incorrect free_irq() variable (git-fixes).\n- iio: gyro: mpu3050: Fix irq resource leak (git-fixes).\n- iio: gyro: mpu3050: Fix out-of-sequence free_irq() (git-fixes).\n- iio: gyro: mpu3050: Move iio_device_register() to correct location (git-fixes).\n- iio: imu: bmi160: Remove potential undefined behavior in bmi160_config_pin() (git-fixes).\n- iio: imu: bno055: fix BNO055_SCAN_CH_COUNT off by one (git-fixes).\n- iio: imu: inv_icm42600: fix odr switch to the same value (git-fixes).\n- iio: imu: st_lsm6dsx: Set FIFO ODR for accelerometer and gyroscope only (git-fixes).\n- iio: light: vcnl4035: fix scan buffer on big-endian (git-fixes).\n- iio: potentiometer: mcp4131: fix double application of wiper shift (git-fixes).\n- media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex (git-fixes).\n- media: tegra-video: Use accessors for pad config \u0027try_*\u0027 fields (stable-fixes).\n- mfd: omap-usb-host: Convert to platform remove callback returning void (stable-fixes).\n- mfd: omap-usb-host: Fix OF populate on driver rebind (git-fixes).\n- mfd: qcom-pm8xxx: Convert to platform remove callback returning void (stable-fixes).\n- mfd: qcom-pm8xxx: Fix OF populate on driver rebind (git-fixes).\n- misc: fastrpc: possible double-free of cctx-\u003eremote_heap (git-fixes).\n- mmc: sdhci-pci-gli: fix GL9750 DMA write corruption (git-fixes).\n- mmc: sdhci: fix timing selection for 1-bit bus width (git-fixes).\n- mtd: Avoid boot crash in RedBoot partition table parser (git-fixes).\n- mtd: rawnand: brcmnand: skip DMA during panic write (git-fixes).\n- mtd: rawnand: cadence: Fix error check for dma_alloc_coherent() in cadence_nand_init() (git-fixes).\n- mtd: rawnand: pl353: make sure optimal timings are applied (git-fixes).\n- mtd: rawnand: serialize lock/unlock against other NAND operations (git-fixes).\n- mtd: spi-nor: core: avoid odd length/address reads on 8D-8D-8D mode (stable-fixes).\n- mtd: spi-nor: core: avoid odd length/address writes in 8D-8D-8D mode (stable-fixes).\n- net/mana: Null service_wq on setup error to prevent double destroy (git-fix).\n- net/mlx5: Fix crash when moving to switchdev mode (git-fixes).\n- net/rose: fix NULL pointer dereference in rose_transmit_link on reconnect (git-fixes).\n- net/x25: Fix overflow when accumulating packets (git-fixes).\n- net/x25: Fix potential double free of skb (git-fixes).\n- net: mana: Add metadata support for xdp mode (git-fixes).\n- net: mana: Add standard counter rx_missed_errors (git-fixes).\n- net: mana: Add support for auxiliary device servicing events (bsc#1251971).\n- net: mana: Change the function signature of mana_get_primary_netdev_rcu (bsc#1256690).\n- net: mana: Drop TX skb on post_work_request failure and unmap resources (git-fixes).\n- net: mana: Fix double destroy_workqueue on service rescan PCI path (git-fixes).\n- net: mana: Fix use-after-free in reset service rescan path (git-fixes).\n- net: mana: Fix warnings for missing export.h header inclusion (git-fixes).\n- net: mana: Handle Reset Request from MANA NIC (bsc#1245728 bsc#1251971).\n- net: mana: Handle SKB if TX SGEs exceed hardware limit (git-fixes).\n- net: mana: Handle hardware recovery events when probing the device (bsc#1257466).\n- net: mana: Handle unsupported HWC commands (git-fixes).\n- net: mana: Implement ndo_tx_timeout and serialize queue resets per port (bsc#1257472).\n- net: mana: Move hardware counter stats from per-port to per-VF context (git-fixes).\n- net: mana: Probe rdma device in mana driver (git-fixes).\n- net: mana: Reduce waiting time if HWC not responding (bsc#1252266).\n- net: mana: Ring doorbell at 4 CQ wraparounds (git-fixes).\n- net: mana: Support HW link state events (bsc#1253049).\n- net: mana: Trigger VF reset/recovery on health check failure due to HWC timeout (bsc#1259580).\n- net: mana: Use mana_cleanup_port_context() for rxq cleanup (git-fixes).\n- net: mana: fix spelling for mana_gd_deregiser_irq() (git-fixes).\n- net: mana: fix use-after-free in add_adev() error path (git-fixes).\n- net: mana: use ethtool string helpers (git-fixes).\n- net: nfc: nci: Fix zero-length proprietary notifications (git-fixes).\n- net: usb: aqc111: Do not perform PM inside suspend callback (git-fixes).\n- net: usb: cdc_ncm: add ndpoffset to NDP16 nframes bounds check (git-fixes).\n- net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check (git-fixes).\n- net: usb: lan78xx: fix TX byte statistics for small packets (git-fixes).\n- net: usb: lan78xx: fix silent drop of packets with checksum errors (git-fixes).\n- net: usb: pegasus: validate USB endpoints (stable-fixes).\n- nfc: nci: clear NCI_DATA_EXCHANGE before calling completion callback (git-fixes).\n- nfc: nci: fix circular locking dependency in nci_close_device (git-fixes).\n- nfc: nci: free skb on nci_transceive early error paths (git-fixes).\n- nfc: rawsock: cancel tx_work before socket teardown (git-fixes).\n- nouveau/dpcd: return EBUSY for aux xfer if the device is asleep (git-fixes).\n- phy: ti: j721e-wiz: Fix device node reference leak in wiz_get_lane_phy_types() (git-fixes).\n- pinctrl: equilibrium: fix warning trace on load (git-fixes).\n- pinctrl: equilibrium: rename irq_chip function callbacks (stable-fixes).\n- pinctrl: mediatek: common: Fix probe failure for devices without EINT (git-fixes).\n- pinctrl: qcom: spmi-gpio: implement .get_direction() (git-fixes).\n- platform/olpc: olpc-xo175-ec: Fix overflow error message to print inlen (git-fixes).\n- platform/x86: ISST: Correct locked bit width (git-fixes).\n- platform/x86: dell-wmi-sysman: Do not hex dump plaintext password data (git-fixes).\n- platform/x86: dell-wmi: Add audio/mic mute key codes (stable-fixes).\n- platform/x86: intel-hid: Add Dell 14 Plus 2-in-1 to dmi_vgbs_allow_list (stable-fixes).\n- platform/x86: intel-hid: Enable 5-button array on ThinkPad X1 Fold 16 Gen 1 (stable-fixes).\n- platform/x86: touchscreen_dmi: Add quirk for y-inverted Goodix touchscreen on SUPI S10 (stable-fixes).\n- qmi_wwan: allow max_mtu above hard_mtu to control rx_urb_size (git-fixes).\n- regmap: Synchronize cache for the page selector (git-fixes).\n- regulator: pca9450: Correct interrupt type (git-fixes).\n- regulator: pca9450: Make IRQ optional (stable-fixes).\n- remoteproc: sysmon: Correct subsys_name_len type in QMI request (git-fixes).\n- rename Hyper-v patch files to simplify further SP6-SP7 merges\n- s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP (bsc#1254306).\n- scsi: mpi3mr: Event processing debug improvement (bsc#1251186, bsc#1258832).\n- scsi: storvsc: Fix scheduling while atomic on PREEMPT_RT (git-fixes).\n- scsi: storvsc: Remove redundant ternary operators (git-fixes).\n- selftests/powerpc: Re-order *FLAGS to follow lib.mk (bsc#1261669).\n- selftests/powerpc: Suppress -Wmaybe-uninitialized with GCC 15 (bsc#1261669).\n- selftests/powerpc: make sub-folders buildable on their own (bsc#1261669).\n- serial: 8250: Add late synchronize_irq() to shutdown to handle DW UART BUSY (git-fixes).\n- serial: 8250: Fix TX deadlock when using DMA (git-fixes).\n- serial: 8250_pci: add support for the AX99100 (stable-fixes).\n- serial: uartlite: fix PM runtime usage count underflow on probe (git-fixes).\n- soc: aspeed: socinfo: Mask table entries for accurate SoC ID matching (git-fixes).\n- soc: fsl: qbman: fix race condition in qman_destroy_fq (git-fixes).\n- spi: fix statistics allocation (git-fixes).\n- spi: fix use-after-free on controller registration failure (git-fixes).\n- spi: spi-fsl-lpspi: fix teardown order issue (UAF) (git-fixes).\n- staging: rtl8723bs: properly validate the data in rtw_get_ie_ex() (stable-fixes).\n- tg3: Fix race for querying speed/duplex (bsc#1257183).\n- thunderbolt: Fix property read in nhi_wake_supported() (git-fixes).\n- tools/hv: add a .gitignore file (git-fixes).\n- tools/hv: reduce resouce usage in hv_get_dns_info helper (git-fixes).\n- tools/hv: reduce resource usage in hv_kvp_daemon (git-fixes).\n- tools: hv: Enable debug logs for hv_kvp_daemon (git-fixes).\n- tools: hv: lsvmbus: change shebang to use python3 (git-fixes).\n- usb/core/quirks: Add Huawei ME906S-device to wakeup quirk (stable-fixes).\n- usb: cdc-acm: Restore CAP_BRK functionnality to CH343 (git-fixes).\n- usb: cdns3: call cdns_power_is_lost() only once in cdns_resume() (stable-fixes).\n- usb: cdns3: fix role switching during resume (git-fixes).\n- usb: cdns3: gadget: fix NULL pointer dereference in ep_queue (git-fixes).\n- usb: cdns3: gadget: fix state inconsistency on gadget init failure (git-fixes).\n- usb: cdns3: remove redundant if branch (stable-fixes).\n- usb: class: cdc-wdm: fix reordering issue in read code path (git-fixes).\n- usb: core: do not power off roothub PHYs if phy_set_mode() fails (git-fixes).\n- usb: dwc2: gadget: Fix spin_lock/unlock mismatch in dwc2_hsotg_udc_stop() (git-fixes).\n- usb: dwc3: pci: add support for the Intel Nova Lake -H (stable-fixes).\n- usb: ehci-brcm: fix sleep during atomic (git-fixes).\n- usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks() (git-fixes).\n- usb: gadget: f_rndis: Protect RNDIS options with mutex (git-fixes).\n- usb: gadget: f_subset: Fix unbalanced refcnt in geth_free (git-fixes).\n- usb: gadget: u_ether: Fix race between gether_disconnect and eth_stop (git-fixes).\n- usb: gadget: uvc: fix NULL pointer dereference during unbind race (git-fixes).\n- usb: image: mdc800: kill download URB on timeout (stable-fixes).\n- usb: mdc800: handle signal and read racing (stable-fixes).\n- usb: misc: uss720: properly clean up reference in uss720_probe() (stable-fixes).\n- usb: renesas_usbhs: fix use-after-free in ISR during device removal (git-fixes).\n- usb: roles: get usb role switch from parent only for usb-b-connector (git-fixes).\n- usb: ulpi: fix double free in ulpi_register_interface() error path (git-fixes).\n- usb: usbtmc: Flush anchored URBs in usbtmc_release (git-fixes).\n- usb: xhci: Fix memory leak in xhci_disable_slot() (git-fixes).\n- usb: xhci: Prevent interrupt storm on host controller error (HCE) (stable-fixes).\n- usb: yurex: fix race in probe (stable-fixes).\n- wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down (git-fixes).\n- wifi: cw1200: Fix locking in error paths (git-fixes).\n- wifi: iwlwifi: mvm: fix potential out-of-bounds read in iwl_mvm_nd_match_info_handler() (git-fixes).\n- wifi: mac80211: Fix static_branch_dec() underflow for aql_disable (git-fixes).\n- wifi: mac80211: fix NULL deref in mesh_matches_local() (git-fixes).\n- wifi: mac80211: set default WMM parameters on all links (stable-fixes).\n- wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211() (git-fixes).\n- wifi: mt76: mt7925: Fix possible oob access in mt7925_mac_write_txwi_80211() (git-fixes).\n- wifi: mt76: mt7996: Fix possible oob access in mt7996_mac_write_txwi_80211() (git-fixes).\n- wifi: rsi: Do not default to -EOPNOTSUPP in rsi_mac80211_config (git-fixes).\n- wifi: wilc1000: fix u8 overflow in SSID scan buffer size calculation (git-fixes).\n- wifi: wlcore: Fix a locking bug (git-fixes).\n- wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom (git-fixes).\n- x86/platform/uv: Handle deconfigured sockets (bsc#1260347).\n- xen/privcmd: unregister xenstore notifier on module exit (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-kernel-340",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21123-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21123-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621123-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21123-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025421.html"
},
{
"category": "self",
"summary": "SUSE Bug 1226591",
"url": "https://bugzilla.suse.com/1226591"
},
{
"category": "self",
"summary": "SUSE Bug 1245728",
"url": "https://bugzilla.suse.com/1245728"
},
{
"category": "self",
"summary": "SUSE Bug 1249998",
"url": "https://bugzilla.suse.com/1249998"
},
{
"category": "self",
"summary": "SUSE Bug 1251135",
"url": "https://bugzilla.suse.com/1251135"
},
{
"category": "self",
"summary": "SUSE Bug 1251186",
"url": "https://bugzilla.suse.com/1251186"
},
{
"category": "self",
"summary": "SUSE Bug 1251971",
"url": "https://bugzilla.suse.com/1251971"
},
{
"category": "self",
"summary": "SUSE Bug 1252073",
"url": "https://bugzilla.suse.com/1252073"
},
{
"category": "self",
"summary": "SUSE Bug 1252266",
"url": "https://bugzilla.suse.com/1252266"
},
{
"category": "self",
"summary": "SUSE Bug 1253049",
"url": "https://bugzilla.suse.com/1253049"
},
{
"category": "self",
"summary": "SUSE Bug 1253455",
"url": "https://bugzilla.suse.com/1253455"
},
{
"category": "self",
"summary": "SUSE Bug 1254306",
"url": "https://bugzilla.suse.com/1254306"
},
{
"category": "self",
"summary": "SUSE Bug 1255084",
"url": "https://bugzilla.suse.com/1255084"
},
{
"category": "self",
"summary": "SUSE Bug 1256645",
"url": "https://bugzilla.suse.com/1256645"
},
{
"category": "self",
"summary": "SUSE Bug 1256647",
"url": "https://bugzilla.suse.com/1256647"
},
{
"category": "self",
"summary": "SUSE Bug 1256690",
"url": "https://bugzilla.suse.com/1256690"
},
{
"category": "self",
"summary": "SUSE Bug 1256784",
"url": "https://bugzilla.suse.com/1256784"
},
{
"category": "self",
"summary": "SUSE Bug 1257183",
"url": "https://bugzilla.suse.com/1257183"
},
{
"category": "self",
"summary": "SUSE Bug 1257466",
"url": "https://bugzilla.suse.com/1257466"
},
{
"category": "self",
"summary": "SUSE Bug 1257472",
"url": "https://bugzilla.suse.com/1257472"
},
{
"category": "self",
"summary": "SUSE Bug 1257473",
"url": "https://bugzilla.suse.com/1257473"
},
{
"category": "self",
"summary": "SUSE Bug 1257506",
"url": "https://bugzilla.suse.com/1257506"
},
{
"category": "self",
"summary": "SUSE Bug 1257561",
"url": "https://bugzilla.suse.com/1257561"
},
{
"category": "self",
"summary": "SUSE Bug 1257682",
"url": "https://bugzilla.suse.com/1257682"
},
{
"category": "self",
"summary": "SUSE Bug 1257732",
"url": "https://bugzilla.suse.com/1257732"
},
{
"category": "self",
"summary": "SUSE Bug 1257755",
"url": "https://bugzilla.suse.com/1257755"
},
{
"category": "self",
"summary": "SUSE Bug 1257773",
"url": "https://bugzilla.suse.com/1257773"
},
{
"category": "self",
"summary": "SUSE Bug 1257777",
"url": "https://bugzilla.suse.com/1257777"
},
{
"category": "self",
"summary": "SUSE Bug 1257814",
"url": "https://bugzilla.suse.com/1257814"
},
{
"category": "self",
"summary": "SUSE Bug 1257952",
"url": "https://bugzilla.suse.com/1257952"
},
{
"category": "self",
"summary": "SUSE Bug 1258280",
"url": "https://bugzilla.suse.com/1258280"
},
{
"category": "self",
"summary": "SUSE Bug 1258286",
"url": "https://bugzilla.suse.com/1258286"
},
{
"category": "self",
"summary": "SUSE Bug 1258293",
"url": "https://bugzilla.suse.com/1258293"
},
{
"category": "self",
"summary": "SUSE Bug 1258303",
"url": "https://bugzilla.suse.com/1258303"
},
{
"category": "self",
"summary": "SUSE Bug 1258305",
"url": "https://bugzilla.suse.com/1258305"
},
{
"category": "self",
"summary": "SUSE Bug 1258330",
"url": "https://bugzilla.suse.com/1258330"
},
{
"category": "self",
"summary": "SUSE Bug 1258337",
"url": "https://bugzilla.suse.com/1258337"
},
{
"category": "self",
"summary": "SUSE Bug 1258338",
"url": "https://bugzilla.suse.com/1258338"
},
{
"category": "self",
"summary": "SUSE Bug 1258340",
"url": "https://bugzilla.suse.com/1258340"
},
{
"category": "self",
"summary": "SUSE Bug 1258376",
"url": "https://bugzilla.suse.com/1258376"
},
{
"category": "self",
"summary": "SUSE Bug 1258389",
"url": "https://bugzilla.suse.com/1258389"
},
{
"category": "self",
"summary": "SUSE Bug 1258414",
"url": "https://bugzilla.suse.com/1258414"
},
{
"category": "self",
"summary": "SUSE Bug 1258424",
"url": "https://bugzilla.suse.com/1258424"
},
{
"category": "self",
"summary": "SUSE Bug 1258447",
"url": "https://bugzilla.suse.com/1258447"
},
{
"category": "self",
"summary": "SUSE Bug 1258524",
"url": "https://bugzilla.suse.com/1258524"
},
{
"category": "self",
"summary": "SUSE Bug 1258832",
"url": "https://bugzilla.suse.com/1258832"
},
{
"category": "self",
"summary": "SUSE Bug 1258849",
"url": "https://bugzilla.suse.com/1258849"
},
{
"category": "self",
"summary": "SUSE Bug 1259188",
"url": "https://bugzilla.suse.com/1259188"
},
{
"category": "self",
"summary": "SUSE Bug 1259461",
"url": "https://bugzilla.suse.com/1259461"
},
{
"category": "self",
"summary": "SUSE Bug 1259580",
"url": "https://bugzilla.suse.com/1259580"
},
{
"category": "self",
"summary": "SUSE Bug 1259707",
"url": "https://bugzilla.suse.com/1259707"
},
{
"category": "self",
"summary": "SUSE Bug 1259795",
"url": "https://bugzilla.suse.com/1259795"
},
{
"category": "self",
"summary": "SUSE Bug 1259797",
"url": "https://bugzilla.suse.com/1259797"
},
{
"category": "self",
"summary": "SUSE Bug 1259865",
"url": "https://bugzilla.suse.com/1259865"
},
{
"category": "self",
"summary": "SUSE Bug 1259870",
"url": "https://bugzilla.suse.com/1259870"
},
{
"category": "self",
"summary": "SUSE Bug 1259886",
"url": "https://bugzilla.suse.com/1259886"
},
{
"category": "self",
"summary": "SUSE Bug 1259889",
"url": "https://bugzilla.suse.com/1259889"
},
{
"category": "self",
"summary": "SUSE Bug 1259891",
"url": "https://bugzilla.suse.com/1259891"
},
{
"category": "self",
"summary": "SUSE Bug 1259997",
"url": "https://bugzilla.suse.com/1259997"
},
{
"category": "self",
"summary": "SUSE Bug 1259998",
"url": "https://bugzilla.suse.com/1259998"
},
{
"category": "self",
"summary": "SUSE Bug 1260005",
"url": "https://bugzilla.suse.com/1260005"
},
{
"category": "self",
"summary": "SUSE Bug 1260009",
"url": "https://bugzilla.suse.com/1260009"
},
{
"category": "self",
"summary": "SUSE Bug 1260347",
"url": "https://bugzilla.suse.com/1260347"
},
{
"category": "self",
"summary": "SUSE Bug 1260464",
"url": "https://bugzilla.suse.com/1260464"
},
{
"category": "self",
"summary": "SUSE Bug 1260471",
"url": "https://bugzilla.suse.com/1260471"
},
{
"category": "self",
"summary": "SUSE Bug 1260481",
"url": "https://bugzilla.suse.com/1260481"
},
{
"category": "self",
"summary": "SUSE Bug 1260486",
"url": "https://bugzilla.suse.com/1260486"
},
{
"category": "self",
"summary": "SUSE Bug 1260497",
"url": "https://bugzilla.suse.com/1260497"
},
{
"category": "self",
"summary": "SUSE Bug 1260500",
"url": "https://bugzilla.suse.com/1260500"
},
{
"category": "self",
"summary": "SUSE Bug 1260527",
"url": "https://bugzilla.suse.com/1260527"
},
{
"category": "self",
"summary": "SUSE Bug 1260544",
"url": "https://bugzilla.suse.com/1260544"
},
{
"category": "self",
"summary": "SUSE Bug 1260550",
"url": "https://bugzilla.suse.com/1260550"
},
{
"category": "self",
"summary": "SUSE Bug 1260562",
"url": "https://bugzilla.suse.com/1260562"
},
{
"category": "self",
"summary": "SUSE Bug 1260580",
"url": "https://bugzilla.suse.com/1260580"
},
{
"category": "self",
"summary": "SUSE Bug 1260730",
"url": "https://bugzilla.suse.com/1260730"
},
{
"category": "self",
"summary": "SUSE Bug 1260732",
"url": "https://bugzilla.suse.com/1260732"
},
{
"category": "self",
"summary": "SUSE Bug 1260735",
"url": "https://bugzilla.suse.com/1260735"
},
{
"category": "self",
"summary": "SUSE Bug 1260799",
"url": "https://bugzilla.suse.com/1260799"
},
{
"category": "self",
"summary": "SUSE Bug 1261412",
"url": "https://bugzilla.suse.com/1261412"
},
{
"category": "self",
"summary": "SUSE Bug 1261496",
"url": "https://bugzilla.suse.com/1261496"
},
{
"category": "self",
"summary": "SUSE Bug 1261498",
"url": "https://bugzilla.suse.com/1261498"
},
{
"category": "self",
"summary": "SUSE Bug 1261507",
"url": "https://bugzilla.suse.com/1261507"
},
{
"category": "self",
"summary": "SUSE Bug 1261669",
"url": "https://bugzilla.suse.com/1261669"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38542 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39817 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39998 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40201 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40253 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68794 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68794/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71066 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71066/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71125 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71268 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71269 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71269/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23030 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23047 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23054 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23054/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23069 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23069/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23088 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23103 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23120 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23125 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23136 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23136/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23140 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23154 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23157 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23169 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23187 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23193 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23193/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23201 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23202 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23204 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23207 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23216 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23216/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23231 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23242 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23242/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23243 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23243/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23255 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23255/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23262 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23262/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23270 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23270/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23272 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23272/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23274 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23274/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23277 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23277/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23278 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23278/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23281 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23292 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23292/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23293 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23293/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23304 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23317 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23317/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23319 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23335 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23335/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23343 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23343/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23361 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23379 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23381 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23383 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23386 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23395 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23395/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23398 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23398/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23412 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23412/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23413 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23413/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23414 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23414/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23419 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31788 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31788/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-04-13T18:28:29Z",
"generator": {
"date": "2026-04-13T18:28:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21123-1",
"initial_release_date": "2026-04-13T18:28:29Z",
"revision_history": [
{
"date": "2026-04-13T18:28:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-41.1.aarch64",
"product": {
"name": "kernel-default-6.4.0-41.1.aarch64",
"product_id": "kernel-default-6.4.0-41.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-41.1.21.18.aarch64",
"product": {
"name": "kernel-default-base-6.4.0-41.1.21.18.aarch64",
"product_id": "kernel-default-base-6.4.0-41.1.21.18.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.4.0-41.1.noarch",
"product": {
"name": "kernel-devel-6.4.0-41.1.noarch",
"product_id": "kernel-devel-6.4.0-41.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.4.0-41.1.noarch",
"product": {
"name": "kernel-macros-6.4.0-41.1.noarch",
"product_id": "kernel-macros-6.4.0-41.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.4.0-41.1.noarch",
"product": {
"name": "kernel-source-6.4.0-41.1.noarch",
"product_id": "kernel-source-6.4.0-41.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-41.1.s390x",
"product": {
"name": "kernel-default-6.4.0-41.1.s390x",
"product_id": "kernel-default-6.4.0-41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-41.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.4.0-41.1.s390x",
"product_id": "kernel-default-livepatch-6.4.0-41.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-41.1.x86_64",
"product": {
"name": "kernel-default-6.4.0-41.1.x86_64",
"product_id": "kernel-default-6.4.0-41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-41.1.21.18.x86_64",
"product": {
"name": "kernel-default-base-6.4.0-41.1.21.18.x86_64",
"product_id": "kernel-default-base-6.4.0-41.1.21.18.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-41.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.4.0-41.1.x86_64",
"product_id": "kernel-default-livepatch-6.4.0-41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-41.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.4.0-41.1.x86_64",
"product_id": "kernel-kvmsmall-6.4.0-41.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-41.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64"
},
"product_reference": "kernel-default-6.4.0-41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-41.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x"
},
"product_reference": "kernel-default-6.4.0-41.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-41.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-41.1.21.18.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-41.1.21.18.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-41.1.21.18.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-41.1.21.18.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-41.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-41.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-41.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-41.1.noarch as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-41.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-41.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.4.0-41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-41.1.noarch as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-41.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-41.1.noarch as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
},
"product_reference": "kernel-source-6.4.0-41.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-38542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38542"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mana_ib: boundary check before installing cq callbacks\n\nAdd a boundary check inside mana_ib_install_cq_cb to prevent index overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38542",
"url": "https://www.suse.com/security/cve/CVE-2024-38542"
},
{
"category": "external",
"summary": "SUSE Bug 1226591 for CVE-2024-38542",
"url": "https://bugzilla.suse.com/1226591"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2024-38542"
},
{
"cve": "CVE-2025-39817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39817"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: Fix slab-out-of-bounds in efivarfs_d_compare\n\nObserved on kernel 6.6 (present on master as well):\n\n BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0\n Call trace:\n kasan_check_range+0xe8/0x190\n __asan_loadN+0x1c/0x28\n memcmp+0x98/0xd0\n efivarfs_d_compare+0x68/0xd8\n __d_lookup_rcu_op_compare+0x178/0x218\n __d_lookup_rcu+0x1f8/0x228\n d_alloc_parallel+0x150/0x648\n lookup_open.isra.0+0x5f0/0x8d0\n open_last_lookups+0x264/0x828\n path_openat+0x130/0x3f8\n do_filp_open+0x114/0x248\n do_sys_openat2+0x340/0x3c0\n __arm64_sys_openat+0x120/0x1a0\n\nIf dentry-\u003ed_name.len \u003c EFI_VARIABLE_GUID_LEN , \u0027guid\u0027 can become\nnegative, leadings to oob. The issue can be triggered by parallel\nlookups using invalid filename:\n\n T1\t\t\tT2\n lookup_open\n -\u003elookup\n simple_lookup\n d_add\n // invalid dentry is added to hash list\n\n\t\t\tlookup_open\n\t\t\t d_alloc_parallel\n\t\t\t __d_lookup_rcu\n\t\t\t __d_lookup_rcu_op_compare\n\t\t\t hlist_bl_for_each_entry_rcu\n\t\t\t // invalid dentry can be retrieved\n\t\t\t -\u003ed_compare\n\t\t\t efivarfs_d_compare\n\t\t\t // oob\n\nFix it by checking \u0027guid\u0027 before cmp.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39817",
"url": "https://www.suse.com/security/cve/CVE-2025-39817"
},
{
"category": "external",
"summary": "SUSE Bug 1249998 for CVE-2025-39817",
"url": "https://bugzilla.suse.com/1249998"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2025-39817"
},
{
"cve": "CVE-2025-39998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39998"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: target_core_configfs: Add length check to avoid buffer overflow\n\nA buffer overflow arises from the usage of snprintf to write into the\nbuffer \"buf\" in target_lu_gp_members_show function located in\n/drivers/target/target_core_configfs.c. This buffer is allocated with\nsize LU_GROUP_NAME_BUF (256 bytes).\n\nsnprintf(...) formats multiple strings into buf with the HBA name\n(hba-\u003ehba_group.cg_item), a slash character, a devicename (dev-\u003e\ndev_group.cg_item) and a newline character, the total formatted string\nlength may exceed the buffer size of 256 bytes.\n\nSince snprintf() returns the total number of bytes that would have been\nwritten (the length of %s/%sn ), this value may exceed the buffer length\n(256 bytes) passed to memcpy(), this will ultimately cause function\nmemcpy reporting a buffer overflow error.\n\nAn additional check of the return value of snprintf() can avoid this\nbuffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39998",
"url": "https://www.suse.com/security/cve/CVE-2025-39998"
},
{
"category": "external",
"summary": "SUSE Bug 1252073 for CVE-2025-39998",
"url": "https://bugzilla.suse.com/1252073"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2025-39998"
},
{
"cve": "CVE-2025-40201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40201",
"url": "https://www.suse.com/security/cve/CVE-2025-40201"
},
{
"category": "external",
"summary": "SUSE Bug 1253455 for CVE-2025-40201",
"url": "https://bugzilla.suse.com/1253455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/ctcm: Fix double-kfree\n\nThe function \u0027mpc_rcvd_sweep_req(mpcginfo)\u0027 is called conditionally\nfrom function \u0027ctcmpc_unpack_skb\u0027. It frees passed mpcginfo.\nAfter that a call to function \u0027kfree\u0027 in function \u0027ctcmpc_unpack_skb\u0027\nfrees it again.\n\nRemove \u0027kfree\u0027 call in function \u0027mpc_rcvd_sweep_req(mpcginfo)\u0027.\n\nBug detected by the clang static analyzer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40253",
"url": "https://www.suse.com/security/cve/CVE-2025-40253"
},
{
"category": "external",
"summary": "SUSE Bug 1255084 for CVE-2025-40253",
"url": "https://bugzilla.suse.com/1255084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2025-40253"
},
{
"cve": "CVE-2025-68794",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68794"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niomap: adjust read range correctly for non-block-aligned positions\n\niomap_adjust_read_range() assumes that the position and length passed in\nare block-aligned. This is not always the case however, as shown in the\nsyzbot generated case for erofs. This causes too many bytes to be\nskipped for uptodate blocks, which results in returning the incorrect\nposition and length to read in. If all the blocks are uptodate, this\nunderflows length and returns a position beyond the folio.\n\nFix the calculation to also take into account the block offset when\ncalculating how many bytes can be skipped for uptodate blocks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68794",
"url": "https://www.suse.com/security/cve/CVE-2025-68794"
},
{
"category": "external",
"summary": "SUSE Bug 1256647 for CVE-2025-68794",
"url": "https://bugzilla.suse.com/1256647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2025-68794"
},
{
"cve": "CVE-2025-71066",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71066"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: ets: Always remove class from active list before deleting in ets_qdisc_change\n\nzdi-disclosures@trendmicro.com says:\n\nThe vulnerability is a race condition between `ets_qdisc_dequeue` and\n`ets_qdisc_change`. It leads to UAF on `struct Qdisc` object.\nAttacker requires the capability to create new user and network namespace\nin order to trigger the bug.\nSee my additional commentary at the end of the analysis.\n\nAnalysis:\n\nstatic int ets_qdisc_change(struct Qdisc *sch, struct nlattr *opt,\n struct netlink_ext_ack *extack)\n{\n...\n\n // (1) this lock is preventing .change handler (`ets_qdisc_change`)\n //to race with .dequeue handler (`ets_qdisc_dequeue`)\n sch_tree_lock(sch);\n\n for (i = nbands; i \u003c oldbands; i++) {\n if (i \u003e= q-\u003enstrict \u0026\u0026 q-\u003eclasses[i].qdisc-\u003eq.qlen)\n list_del_init(\u0026q-\u003eclasses[i].alist);\n qdisc_purge_queue(q-\u003eclasses[i].qdisc);\n }\n\n WRITE_ONCE(q-\u003enbands, nbands);\n for (i = nstrict; i \u003c q-\u003enstrict; i++) {\n if (q-\u003eclasses[i].qdisc-\u003eq.qlen) {\n\t\t // (2) the class is added to the q-\u003eactive\n list_add_tail(\u0026q-\u003eclasses[i].alist, \u0026q-\u003eactive);\n q-\u003eclasses[i].deficit = quanta[i];\n }\n }\n WRITE_ONCE(q-\u003enstrict, nstrict);\n memcpy(q-\u003eprio2band, priomap, sizeof(priomap));\n\n for (i = 0; i \u003c q-\u003enbands; i++)\n WRITE_ONCE(q-\u003eclasses[i].quantum, quanta[i]);\n\n for (i = oldbands; i \u003c q-\u003enbands; i++) {\n q-\u003eclasses[i].qdisc = queues[i];\n if (q-\u003eclasses[i].qdisc != \u0026noop_qdisc)\n qdisc_hash_add(q-\u003eclasses[i].qdisc, true);\n }\n\n // (3) the qdisc is unlocked, now dequeue can be called in parallel\n // to the rest of .change handler\n sch_tree_unlock(sch);\n\n ets_offload_change(sch);\n for (i = q-\u003enbands; i \u003c oldbands; i++) {\n\t // (4) we\u0027re reducing the refcount for our class\u0027s qdisc and\n\t // freeing it\n qdisc_put(q-\u003eclasses[i].qdisc);\n\t // (5) If we call .dequeue between (4) and (5), we will have\n\t // a strong UAF and we can control RIP\n q-\u003eclasses[i].qdisc = NULL;\n WRITE_ONCE(q-\u003eclasses[i].quantum, 0);\n q-\u003eclasses[i].deficit = 0;\n gnet_stats_basic_sync_init(\u0026q-\u003eclasses[i].bstats);\n memset(\u0026q-\u003eclasses[i].qstats, 0, sizeof(q-\u003eclasses[i].qstats));\n }\n return 0;\n}\n\nComment:\nThis happens because some of the classes have their qdiscs assigned to\nNULL, but remain in the active list. This commit fixes this issue by always\nremoving the class from the active list before deleting and freeing its\nassociated qdisc\n\nReproducer Steps\n(trimmed version of what was sent by zdi-disclosures@trendmicro.com)\n\n```\nDEV=\"${DEV:-lo}\"\nROOT_HANDLE=\"${ROOT_HANDLE:-1:}\"\nBAND2_HANDLE=\"${BAND2_HANDLE:-20:}\" # child under 1:2\nPING_BYTES=\"${PING_BYTES:-48}\"\nPING_COUNT=\"${PING_COUNT:-200000}\"\nPING_DST=\"${PING_DST:-127.0.0.1}\"\n\nSLOW_TBF_RATE=\"${SLOW_TBF_RATE:-8bit}\"\nSLOW_TBF_BURST=\"${SLOW_TBF_BURST:-100b}\"\nSLOW_TBF_LAT=\"${SLOW_TBF_LAT:-1s}\"\n\ncleanup() {\n tc qdisc del dev \"$DEV\" root 2\u003e/dev/null\n}\ntrap cleanup EXIT\n\nip link set \"$DEV\" up\n\ntc qdisc del dev \"$DEV\" root 2\u003e/dev/null || true\n\ntc qdisc add dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 2\n\ntc qdisc add dev \"$DEV\" parent 1:2 handle \"$BAND2_HANDLE\" \\\n tbf rate \"$SLOW_TBF_RATE\" burst \"$SLOW_TBF_BURST\" latency \"$SLOW_TBF_LAT\"\n\ntc filter add dev \"$DEV\" parent 1: protocol all prio 1 u32 match u32 0 0 flowid 1:2\ntc -s qdisc ls dev $DEV\n\nping -I \"$DEV\" -f -c \"$PING_COUNT\" -s \"$PING_BYTES\" -W 0.001 \"$PING_DST\" \\\n \u003e/dev/null 2\u003e\u00261 \u0026\ntc qdisc change dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 0\ntc qdisc change dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 2\ntc -s qdisc ls dev $DEV\ntc qdisc del dev \"$DEV\" parent \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71066",
"url": "https://www.suse.com/security/cve/CVE-2025-71066"
},
{
"category": "external",
"summary": "SUSE Bug 1256645 for CVE-2025-71066",
"url": "https://bugzilla.suse.com/1256645"
},
{
"category": "external",
"summary": "SUSE Bug 1258005 for CVE-2025-71066",
"url": "https://bugzilla.suse.com/1258005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "important"
}
],
"title": "CVE-2025-71066"
},
{
"cve": "CVE-2025-71125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71125"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Do not register unsupported perf events\n\nSynthetic events currently do not have a function to register perf events.\nThis leads to calling the tracepoint register functions with a NULL\nfunction pointer which triggers:\n\n ------------[ cut here ]------------\n WARNING: kernel/tracepoint.c:175 at tracepoint_add_func+0x357/0x370, CPU#2: perf/2272\n Modules linked in: kvm_intel kvm irqbypass\n CPU: 2 UID: 0 PID: 2272 Comm: perf Not tainted 6.18.0-ftest-11964-ge022764176fc-dirty #323 PREEMPTLAZY\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-debian-1.17.0-1 04/01/2014\n RIP: 0010:tracepoint_add_func+0x357/0x370\n Code: 28 9c e8 4c 0b f5 ff eb 0f 4c 89 f7 48 c7 c6 80 4d 28 9c e8 ab 89 f4 ff 31 c0 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc \u003c0f\u003e 0b 49 c7 c6 ea ff ff ff e9 ee fe ff ff 0f 0b e9 f9 fe ff ff 0f\n RSP: 0018:ffffabc0c44d3c40 EFLAGS: 00010246\n RAX: 0000000000000001 RBX: ffff9380aa9e4060 RCX: 0000000000000000\n RDX: 000000000000000a RSI: ffffffff9e1d4a98 RDI: ffff937fcf5fd6c8\n RBP: 0000000000000001 R08: 0000000000000007 R09: ffff937fcf5fc780\n R10: 0000000000000003 R11: ffffffff9c193910 R12: 000000000000000a\n R13: ffffffff9e1e5888 R14: 0000000000000000 R15: ffffabc0c44d3c78\n FS: 00007f6202f5f340(0000) GS:ffff93819f00f000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000055d3162281a8 CR3: 0000000106a56003 CR4: 0000000000172ef0\n Call Trace:\n \u003cTASK\u003e\n tracepoint_probe_register+0x5d/0x90\n synth_event_reg+0x3c/0x60\n perf_trace_event_init+0x204/0x340\n perf_trace_init+0x85/0xd0\n perf_tp_event_init+0x2e/0x50\n perf_try_init_event+0x6f/0x230\n ? perf_event_alloc+0x4bb/0xdc0\n perf_event_alloc+0x65a/0xdc0\n __se_sys_perf_event_open+0x290/0x9f0\n do_syscall_64+0x93/0x7b0\n ? entry_SYSCALL_64_after_hwframe+0x76/0x7e\n ? trace_hardirqs_off+0x53/0xc0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nInstead, have the code return -ENODEV, which doesn\u0027t warn and has perf\nerror out with:\n\n # perf record -e synthetic:futex_wait\nError:\nThe sys_perf_event_open() syscall returned with 19 (No such device) for event (synthetic:futex_wait).\n\"dmesg | grep -i perf\" may provide additional information.\n\nIdeally perf should support synthetic events, but for now just fix the\nwarning. The support can come later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71125",
"url": "https://www.suse.com/security/cve/CVE-2025-71125"
},
{
"category": "external",
"summary": "SUSE Bug 1256784 for CVE-2025-71125",
"url": "https://bugzilla.suse.com/1256784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "low"
}
],
"title": "CVE-2025-71125"
},
{
"cve": "CVE-2025-71231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode\n\nThe local variable \u0027i\u0027 is initialized with -EINVAL, but the for loop\nimmediately overwrites it and -EINVAL is never returned.\n\nIf no empty compression mode can be found, the function would return the\nout-of-bounds index IAA_COMP_MODES_MAX, which would cause an invalid\narray access in add_iaa_compression_mode().\n\nFix both issues by returning either a valid index or -EINVAL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71231",
"url": "https://www.suse.com/security/cve/CVE-2025-71231"
},
{
"category": "external",
"summary": "SUSE Bug 1258424 for CVE-2025-71231",
"url": "https://bugzilla.suse.com/1258424"
},
{
"category": "external",
"summary": "SUSE Bug 1258425 for CVE-2025-71231",
"url": "https://bugzilla.suse.com/1258425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "important"
}
],
"title": "CVE-2025-71231"
},
{
"cve": "CVE-2025-71268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71268"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix reservation leak in some error paths when inserting inline extent\n\nIf we fail to allocate a path or join a transaction, we return from\n__cow_file_range_inline() without freeing the reserved qgroup data,\nresulting in a leak. Fix this by ensuring we call btrfs_qgroup_free_data()\nin such cases.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71268",
"url": "https://www.suse.com/security/cve/CVE-2025-71268"
},
{
"category": "external",
"summary": "SUSE Bug 1259865 for CVE-2025-71268",
"url": "https://bugzilla.suse.com/1259865"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2025-71268"
},
{
"cve": "CVE-2025-71269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71269"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not free data reservation in fallback from inline due to -ENOSPC\n\nIf we fail to create an inline extent due to -ENOSPC, we will attempt to\ngo through the normal COW path, reserve an extent, create an ordered\nextent, etc. However we were always freeing the reserved qgroup data,\nwhich is wrong since we will use data. Fix this by freeing the reserved\nqgroup data in __cow_file_range_inline() only if we are not doing the\nfallback (ret is \u003c= 0).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71269",
"url": "https://www.suse.com/security/cve/CVE-2025-71269"
},
{
"category": "external",
"summary": "SUSE Bug 1259889 for CVE-2025-71269",
"url": "https://bugzilla.suse.com/1259889"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2025-71269"
},
{
"cve": "CVE-2026-23030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: rockchip: inno-usb2: Fix a double free bug in rockchip_usb2phy_probe()\n\nThe for_each_available_child_of_node() calls of_node_put() to\nrelease child_np in each success loop. After breaking from the\nloop with the child_np has been released, the code will jump to\nthe put_child label and will call the of_node_put() again if the\ndevm_request_threaded_irq() fails. These cause a double free bug.\n\nFix by returning directly to avoid the duplicate of_node_put().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23030",
"url": "https://www.suse.com/security/cve/CVE-2026-23030"
},
{
"category": "external",
"summary": "SUSE Bug 1257561 for CVE-2026-23030",
"url": "https://bugzilla.suse.com/1257561"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23030"
},
{
"cve": "CVE-2026-23047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: make calc_target() set t-\u003epaused, not just clear it\n\nCurrently calc_target() clears t-\u003epaused if the request shouldn\u0027t be\npaused anymore, but doesn\u0027t ever set t-\u003epaused even though it\u0027s able to\ndetermine when the request should be paused. Setting t-\u003epaused is left\nto __submit_request() which is fine for regular requests but doesn\u0027t\nwork for linger requests -- since __submit_request() doesn\u0027t operate\non linger requests, there is nowhere for lreq-\u003et.paused to be set.\nOne consequence of this is that watches don\u0027t get reestablished on\npaused -\u003e unpaused transitions in cases where requests have been paused\nlong enough for the (paused) unwatch request to time out and for the\nsubsequent (re)watch request to enter the paused state. On top of the\nwatch not getting reestablished, rbd_reregister_watch() gets stuck with\nrbd_dev-\u003ewatch_mutex held:\n\n rbd_register_watch\n __rbd_register_watch\n ceph_osdc_watch\n linger_reg_commit_wait\n\nIt\u0027s waiting for lreq-\u003ereg_commit_wait to be completed, but for that to\nhappen the respective request needs to end up on need_resend_linger list\nand be kicked when requests are unpaused. There is no chance for that\nif the request in question is never marked paused in the first place.\n\nThe fact that rbd_dev-\u003ewatch_mutex remains taken out forever then\nprevents the image from getting unmapped -- \"rbd unmap\" would inevitably\nhang in D state on an attempt to grab the mutex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23047",
"url": "https://www.suse.com/security/cve/CVE-2026-23047"
},
{
"category": "external",
"summary": "SUSE Bug 1257682 for CVE-2026-23047",
"url": "https://bugzilla.suse.com/1257682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23047"
},
{
"cve": "CVE-2026-23054",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23054"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hv_netvsc: reject RSS hash key programming without RX indirection table\n\nRSS configuration requires a valid RX indirection table. When the device\nreports a single receive queue, rndis_filter_device_add() does not\nallocate an indirection table, accepting RSS hash key updates in this\nstate leads to a hang.\n\nFix this by gating netvsc_set_rxfh() on ndc-\u003erx_table_sz and return\n-EOPNOTSUPP when the table is absent. This aligns set_rxfh with the device\ncapabilities and prevents incorrect behavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23054",
"url": "https://www.suse.com/security/cve/CVE-2026-23054"
},
{
"category": "external",
"summary": "SUSE Bug 1257732 for CVE-2026-23054",
"url": "https://bugzilla.suse.com/1257732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23054"
},
{
"cve": "CVE-2026-23069",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23069"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: fix potential underflow in virtio_transport_get_credit()\n\nThe credit calculation in virtio_transport_get_credit() uses unsigned\narithmetic:\n\n ret = vvs-\u003epeer_buf_alloc - (vvs-\u003etx_cnt - vvs-\u003epeer_fwd_cnt);\n\nIf the peer shrinks its advertised buffer (peer_buf_alloc) while bytes\nare in flight, the subtraction can underflow and produce a large\npositive value, potentially allowing more data to be queued than the\npeer can handle.\n\nReuse virtio_transport_has_space() which already handles this case and\nadd a comment to make it clear why we are doing that.\n\n[Stefano: use virtio_transport_has_space() instead of duplicating the code]\n[Stefano: tweak the commit message]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23069",
"url": "https://www.suse.com/security/cve/CVE-2026-23069"
},
{
"category": "external",
"summary": "SUSE Bug 1257755 for CVE-2026-23069",
"url": "https://bugzilla.suse.com/1257755"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23069"
},
{
"cve": "CVE-2026-23088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23088"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix crash on synthetic stacktrace field usage\n\nWhen creating a synthetic event based on an existing synthetic event that\nhad a stacktrace field and the new synthetic event used that field a\nkernel crash occurred:\n\n ~# cd /sys/kernel/tracing\n ~# echo \u0027s:stack unsigned long stack[];\u0027 \u003e dynamic_events\n ~# echo \u0027hist:keys=prev_pid:s0=common_stacktrace if prev_state \u0026 3\u0027 \u003e\u003e events/sched/sched_switch/trigger\n ~# echo \u0027hist:keys=next_pid:s1=$s0:onmatch(sched.sched_switch).trace(stack,$s1)\u0027 \u003e\u003e events/sched/sched_switch/trigger\n\nThe above creates a synthetic event that takes a stacktrace when a task\nschedules out in a non-running state and passes that stacktrace to the\nsched_switch event when that task schedules back in. It triggers the\n\"stack\" synthetic event that has a stacktrace as its field (called \"stack\").\n\n ~# echo \u0027s:syscall_stack s64 id; unsigned long stack[];\u0027 \u003e\u003e dynamic_events\n ~# echo \u0027hist:keys=common_pid:s2=stack\u0027 \u003e\u003e events/synthetic/stack/trigger\n ~# echo \u0027hist:keys=common_pid:s3=$s2,i0=id:onmatch(synthetic.stack).trace(syscall_stack,$i0,$s3)\u0027 \u003e\u003e events/raw_syscalls/sys_exit/trigger\n\nThe above makes another synthetic event called \"syscall_stack\" that\nattaches the first synthetic event (stack) to the sys_exit trace event and\nrecords the stacktrace from the stack event with the id of the system call\nthat is exiting.\n\nWhen enabling this event (or using it in a historgram):\n\n ~# echo 1 \u003e events/synthetic/syscall_stack/enable\n\nProduces a kernel crash!\n\n BUG: unable to handle page fault for address: 0000000000400010\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: Oops: 0000 [#1] SMP PTI\n CPU: 6 UID: 0 PID: 1257 Comm: bash Not tainted 6.16.3+deb14-amd64 #1 PREEMPT(lazy) Debian 6.16.3-1\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-debian-1.17.0-1 04/01/2014\n RIP: 0010:trace_event_raw_event_synth+0x90/0x380\n Code: c5 00 00 00 00 85 d2 0f 84 e1 00 00 00 31 db eb 34 0f 1f 00 66 66 2e 0f 1f 84 00 00 00 00 00 66 66 2e 0f 1f 84 00 00 00 00 00 \u003c49\u003e 8b 04 24 48 83 c3 01 8d 0c c5 08 00 00 00 01 cd 41 3b 5d 40 0f\n RSP: 0018:ffffd2670388f958 EFLAGS: 00010202\n RAX: ffff8ba1065cc100 RBX: 0000000000000000 RCX: 0000000000000000\n RDX: 0000000000000001 RSI: fffff266ffda7b90 RDI: ffffd2670388f9b0\n RBP: 0000000000000010 R08: ffff8ba104e76000 R09: ffffd2670388fa50\n R10: ffff8ba102dd42e0 R11: ffffffff9a908970 R12: 0000000000400010\n R13: ffff8ba10a246400 R14: ffff8ba10a710220 R15: fffff266ffda7b90\n FS: 00007fa3bc63f740(0000) GS:ffff8ba2e0f48000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000400010 CR3: 0000000107f9e003 CR4: 0000000000172ef0\n Call Trace:\n \u003cTASK\u003e\n ? __tracing_map_insert+0x208/0x3a0\n action_trace+0x67/0x70\n event_hist_trigger+0x633/0x6d0\n event_triggers_call+0x82/0x130\n trace_event_buffer_commit+0x19d/0x250\n trace_event_raw_event_sys_exit+0x62/0xb0\n syscall_exit_work+0x9d/0x140\n do_syscall_64+0x20a/0x2f0\n ? trace_event_raw_event_sched_switch+0x12b/0x170\n ? save_fpregs_to_fpstate+0x3e/0x90\n ? _raw_spin_unlock+0xe/0x30\n ? finish_task_switch.isra.0+0x97/0x2c0\n ? __rseq_handle_notify_resume+0xad/0x4c0\n ? __schedule+0x4b8/0xd00\n ? restore_fpregs_from_fpstate+0x3c/0x90\n ? switch_fpu_return+0x5b/0xe0\n ? do_syscall_64+0x1ef/0x2f0\n ? do_fault+0x2e9/0x540\n ? __handle_mm_fault+0x7d1/0xf70\n ? count_memcg_events+0x167/0x1d0\n ? handle_mm_fault+0x1d7/0x2e0\n ? do_user_addr_fault+0x2c3/0x7f0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe reason is that the stacktrace field is not labeled as such, and is\ntreated as a normal field and not as a dynamic event that it is.\n\nIn trace_event_raw_event_synth() the event is field is still treated as a\ndynamic array, but the retrieval of the data is considered a normal field,\nand the reference is just the meta data:\n\n// Meta data is retrieved instead of a dynamic array\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23088",
"url": "https://www.suse.com/security/cve/CVE-2026-23088"
},
{
"category": "external",
"summary": "SUSE Bug 1257814 for CVE-2026-23088",
"url": "https://bugzilla.suse.com/1257814"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23088"
},
{
"cve": "CVE-2026-23103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23103"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: Make the addrs_lock be per port\n\nMake the addrs_lock be per port, not per ipvlan dev.\n\nInitial code seems to be written in the assumption,\nthat any address change must occur under RTNL.\nBut it is not so for the case of IPv6. So\n\n1) Introduce per-port addrs_lock.\n\n2) It was needed to fix places where it was forgotten\nto take lock (ipvlan_open/ipvlan_close)\n\nThis appears to be a very minor problem though.\nSince it\u0027s highly unlikely that ipvlan_add_addr() will\nbe called on 2 CPU simultaneously. But nevertheless,\nthis could cause:\n\n1) False-negative of ipvlan_addr_busy(): one interface\niterated through all port-\u003eipvlans + ipvlan-\u003eaddrs\nunder some ipvlan spinlock, and another added IP\nunder its own lock. Though this is only possible\nfor IPv6, since looks like only ipvlan_addr6_event() can be\ncalled without rtnl_lock.\n\n2) Race since ipvlan_ht_addr_add(port) is called under\ndifferent ipvlan-\u003eaddrs_lock locks\n\nThis should not affect performance, since add/remove IP\nis a rare situation and spinlock is not taken on fast\npaths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23103",
"url": "https://www.suse.com/security/cve/CVE-2026-23103"
},
{
"category": "external",
"summary": "SUSE Bug 1257773 for CVE-2026-23103",
"url": "https://bugzilla.suse.com/1257773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23103"
},
{
"cve": "CVE-2026-23120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: avoid one data-race in l2tp_tunnel_del_work()\n\nWe should read sk-\u003esk_socket only when dealing with kernel sockets.\n\nsyzbot reported the following data-race:\n\nBUG: KCSAN: data-race in l2tp_tunnel_del_work / sk_common_release\n\nwrite to 0xffff88811c182b20 of 8 bytes by task 5365 on cpu 0:\n sk_set_socket include/net/sock.h:2092 [inline]\n sock_orphan include/net/sock.h:2118 [inline]\n sk_common_release+0xae/0x230 net/core/sock.c:4003\n udp_lib_close+0x15/0x20 include/net/udp.h:325\n inet_release+0xce/0xf0 net/ipv4/af_inet.c:437\n __sock_release net/socket.c:662 [inline]\n sock_close+0x6b/0x150 net/socket.c:1455\n __fput+0x29b/0x650 fs/file_table.c:468\n ____fput+0x1c/0x30 fs/file_table.c:496\n task_work_run+0x131/0x1a0 kernel/task_work.c:233\n resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]\n __exit_to_user_mode_loop kernel/entry/common.c:44 [inline]\n exit_to_user_mode_loop+0x1fe/0x740 kernel/entry/common.c:75\n __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline]\n syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline]\n syscall_exit_to_user_mode_work include/linux/entry-common.h:159 [inline]\n syscall_exit_to_user_mode include/linux/entry-common.h:194 [inline]\n do_syscall_64+0x1e1/0x2b0 arch/x86/entry/syscall_64.c:100\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nread to 0xffff88811c182b20 of 8 bytes by task 827 on cpu 1:\n l2tp_tunnel_del_work+0x2f/0x1a0 net/l2tp/l2tp_core.c:1418\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0x4ce/0x9d0 kernel/workqueue.c:3340\n worker_thread+0x582/0x770 kernel/workqueue.c:3421\n kthread+0x489/0x510 kernel/kthread.c:463\n ret_from_fork+0x149/0x290 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246\n\nvalue changed: 0xffff88811b818000 -\u003e 0x0000000000000000",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23120",
"url": "https://www.suse.com/security/cve/CVE-2026-23120"
},
{
"category": "external",
"summary": "SUSE Bug 1258280 for CVE-2026-23120",
"url": "https://bugzilla.suse.com/1258280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23120"
},
{
"cve": "CVE-2026-23125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23125"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT\n\nA null-ptr-deref was reported in the SCTP transmit path when SCTP-AUTH key\ninitialization fails:\n\n ==================================================================\n KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]\n CPU: 0 PID: 16 Comm: ksoftirqd/0 Tainted: G W 6.6.0 #2\n RIP: 0010:sctp_packet_bundle_auth net/sctp/output.c:264 [inline]\n RIP: 0010:sctp_packet_append_chunk+0xb36/0x1260 net/sctp/output.c:401\n Call Trace:\n\n sctp_packet_transmit_chunk+0x31/0x250 net/sctp/output.c:189\n sctp_outq_flush_data+0xa29/0x26d0 net/sctp/outqueue.c:1111\n sctp_outq_flush+0xc80/0x1240 net/sctp/outqueue.c:1217\n sctp_cmd_interpreter.isra.0+0x19a5/0x62c0 net/sctp/sm_sideeffect.c:1787\n sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]\n sctp_do_sm+0x1a3/0x670 net/sctp/sm_sideeffect.c:1169\n sctp_assoc_bh_rcv+0x33e/0x640 net/sctp/associola.c:1052\n sctp_inq_push+0x1dd/0x280 net/sctp/inqueue.c:88\n sctp_rcv+0x11ae/0x3100 net/sctp/input.c:243\n sctp6_rcv+0x3d/0x60 net/sctp/ipv6.c:1127\n\nThe issue is triggered when sctp_auth_asoc_init_active_key() fails in\nsctp_sf_do_5_1C_ack() while processing an INIT_ACK. In this case, the\ncommand sequence is currently:\n\n- SCTP_CMD_PEER_INIT\n- SCTP_CMD_TIMER_STOP (T1_INIT)\n- SCTP_CMD_TIMER_START (T1_COOKIE)\n- SCTP_CMD_NEW_STATE (COOKIE_ECHOED)\n- SCTP_CMD_ASSOC_SHKEY\n- SCTP_CMD_GEN_COOKIE_ECHO\n\nIf SCTP_CMD_ASSOC_SHKEY fails, asoc-\u003eshkey remains NULL, while\nasoc-\u003epeer.auth_capable and asoc-\u003epeer.peer_chunks have already been set by\nSCTP_CMD_PEER_INIT. This allows a DATA chunk with auth = 1 and shkey = NULL\nto be queued by sctp_datamsg_from_user().\n\nSince command interpretation stops on failure, no COOKIE_ECHO should been\nsent via SCTP_CMD_GEN_COOKIE_ECHO. However, the T1_COOKIE timer has already\nbeen started, and it may enqueue a COOKIE_ECHO into the outqueue later. As\na result, the DATA chunk can be transmitted together with the COOKIE_ECHO\nin sctp_outq_flush_data(), leading to the observed issue.\n\nSimilar to the other places where it calls sctp_auth_asoc_init_active_key()\nright after sctp_process_init(), this patch moves the SCTP_CMD_ASSOC_SHKEY\nimmediately after SCTP_CMD_PEER_INIT, before stopping T1_INIT and starting\nT1_COOKIE. This ensures that if shared key generation fails, authenticated\nDATA cannot be sent. It also allows the T1_INIT timer to retransmit INIT,\ngiving the client another chance to process INIT_ACK and retry key setup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23125",
"url": "https://www.suse.com/security/cve/CVE-2026-23125"
},
{
"category": "external",
"summary": "SUSE Bug 1258293 for CVE-2026-23125",
"url": "https://bugzilla.suse.com/1258293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23125"
},
{
"cve": "CVE-2026-23136",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23136"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: reset sparse-read state in osd_fault()\n\nWhen a fault occurs, the connection is abandoned, reestablished, and any\npending operations are retried. The OSD client tracks the progress of a\nsparse-read reply using a separate state machine, largely independent of\nthe messenger\u0027s state.\n\nIf a connection is lost mid-payload or the sparse-read state machine\nreturns an error, the sparse-read state is not reset. The OSD client\nwill then interpret the beginning of a new reply as the continuation of\nthe old one. If this makes the sparse-read machinery enter a failure\nstate, it may never recover, producing loops like:\n\n libceph: [0] got 0 extents\n libceph: data len 142248331 != extent len 0\n libceph: osd0 (1)...:6801 socket error on read\n libceph: data len 142248331 != extent len 0\n libceph: osd0 (1)...:6801 socket error on read\n\nTherefore, reset the sparse-read state in osd_fault(), ensuring retries\nstart from a clean state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23136",
"url": "https://www.suse.com/security/cve/CVE-2026-23136"
},
{
"category": "external",
"summary": "SUSE Bug 1258303 for CVE-2026-23136",
"url": "https://bugzilla.suse.com/1258303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23136"
},
{
"cve": "CVE-2026-23140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, test_run: Subtract size of xdp_frame from allowed metadata size\n\nThe xdp_frame structure takes up part of the XDP frame headroom,\nlimiting the size of the metadata. However, in bpf_test_run, we don\u0027t\ntake this into account, which makes it possible for userspace to supply\na metadata size that is too large (taking up the entire headroom).\n\nIf userspace supplies such a large metadata size in live packet mode,\nthe xdp_update_frame_from_buff() call in xdp_test_run_init_page() call\nwill fail, after which packet transmission proceeds with an\nuninitialised frame structure, leading to the usual Bad Stuff.\n\nThe commit in the Fixes tag fixed a related bug where the second check\nin xdp_update_frame_from_buff() could fail, but did not add any\nadditional constraints on the metadata size. Complete the fix by adding\nan additional check on the metadata size. Reorder the checks slightly to\nmake the logic clearer and add a comment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23140",
"url": "https://www.suse.com/security/cve/CVE-2026-23140"
},
{
"category": "external",
"summary": "SUSE Bug 1258305 for CVE-2026-23140",
"url": "https://bugzilla.suse.com/1258305"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23140"
},
{
"cve": "CVE-2026-23154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix segmentation of forwarding fraglist GRO\n\nThis patch enhances GSO segment handling by properly checking\nthe SKB_GSO_DODGY flag for frag_list GSO packets, addressing\nlow throughput issues observed when a station accesses IPv4\nservers via hotspots with an IPv6-only upstream interface.\n\nSpecifically, it fixes a bug in GSO segmentation when forwarding\nGRO packets containing a frag_list. The function skb_segment_list\ncannot correctly process GRO skbs that have been converted by XLAT,\nsince XLAT only translates the header of the head skb. Consequently,\nskbs in the frag_list may remain untranslated, resulting in protocol\ninconsistencies and reduced throughput.\n\nTo address this, the patch explicitly sets the SKB_GSO_DODGY flag\nfor GSO packets in XLAT\u0027s IPv4/IPv6 protocol translation helpers\n(bpf_skb_proto_4_to_6 and bpf_skb_proto_6_to_4). This marks GSO\npackets as potentially modified after protocol translation. As a\nresult, GSO segmentation will avoid using skb_segment_list and\ninstead falls back to skb_segment for packets with the SKB_GSO_DODGY\nflag. This ensures that only safe and fully translated frag_list\npackets are processed by skb_segment_list, resolving protocol\ninconsistencies and improving throughput when forwarding GRO packets\nconverted by XLAT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23154",
"url": "https://www.suse.com/security/cve/CVE-2026-23154"
},
{
"category": "external",
"summary": "SUSE Bug 1258286 for CVE-2026-23154",
"url": "https://bugzilla.suse.com/1258286"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23154"
},
{
"cve": "CVE-2026-23157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not strictly require dirty metadata threshold for metadata writepages\n\n[BUG]\nThere is an internal report that over 1000 processes are\nwaiting at the io_schedule_timeout() of balance_dirty_pages(), causing\na system hang and trigger a kernel coredump.\n\nThe kernel is v6.4 kernel based, but the root problem still applies to\nany upstream kernel before v6.18.\n\n[CAUSE]\nFrom Jan Kara for his wisdom on the dirty page balance behavior first.\n\n This cgroup dirty limit was what was actually playing the role here\n because the cgroup had only a small amount of memory and so the dirty\n limit for it was something like 16MB.\n\n Dirty throttling is responsible for enforcing that nobody can dirty\n (significantly) more dirty memory than there\u0027s dirty limit. Thus when\n a task is dirtying pages it periodically enters into balance_dirty_pages()\n and we let it sleep there to slow down the dirtying.\n\n When the system is over dirty limit already (either globally or within\n a cgroup of the running task), we will not let the task exit from\n balance_dirty_pages() until the number of dirty pages drops below the\n limit.\n\n So in this particular case, as I already mentioned, there was a cgroup\n with relatively small amount of memory and as a result with dirty limit\n set at 16MB. A task from that cgroup has dirtied about 28MB worth of\n pages in btrfs btree inode and these were practically the only dirty\n pages in that cgroup.\n\nSo that means the only way to reduce the dirty pages of that cgroup is\nto writeback the dirty pages of btrfs btree inode, and only after that\nthose processes can exit balance_dirty_pages().\n\nNow back to the btrfs part, btree_writepages() is responsible for\nwriting back dirty btree inode pages.\n\nThe problem here is, there is a btrfs internal threshold that if the\nbtree inode\u0027s dirty bytes are below the 32M threshold, it will not\ndo any writeback.\n\nThis behavior is to batch as much metadata as possible so we won\u0027t write\nback those tree blocks and then later re-COW them again for another\nmodification.\n\nThis internal 32MiB is higher than the existing dirty page size (28MiB),\nmeaning no writeback will happen, causing a deadlock between btrfs and\ncgroup:\n\n- Btrfs doesn\u0027t want to write back btree inode until more dirty pages\n\n- Cgroup/MM doesn\u0027t want more dirty pages for btrfs btree inode\n Thus any process touching that btree inode is put into sleep until\n the number of dirty pages is reduced.\n\nThanks Jan Kara a lot for the analysis of the root cause.\n\n[ENHANCEMENT]\nSince kernel commit b55102826d7d (\"btrfs: set AS_KERNEL_FILE on the\nbtree_inode\"), btrfs btree inode pages will only be charged to the root\ncgroup which should have a much larger limit than btrfs\u0027 32MiB\nthreshold.\nSo it should not affect newer kernels.\n\nBut for all current LTS kernels, they are all affected by this problem,\nand backporting the whole AS_KERNEL_FILE may not be a good idea.\n\nEven for newer kernels I still think it\u0027s a good idea to get\nrid of the internal threshold at btree_writepages(), since for most cases\ncgroup/MM has a better view of full system memory usage than btrfs\u0027 fixed\nthreshold.\n\nFor internal callers using btrfs_btree_balance_dirty() since that\nfunction is already doing internal threshold check, we don\u0027t need to\nbother them.\n\nBut for external callers of btree_writepages(), just respect their\nrequests and write back whatever they want, ignoring the internal\nbtrfs threshold to avoid such deadlock on btree inode dirty page\nbalancing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23157",
"url": "https://www.suse.com/security/cve/CVE-2026-23157"
},
{
"category": "external",
"summary": "SUSE Bug 1258376 for CVE-2026-23157",
"url": "https://bugzilla.suse.com/1258376"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23157"
},
{
"cve": "CVE-2026-23169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix race in mptcp_pm_nl_flush_addrs_doit()\n\nsyzbot and Eulgyu Kim reported crashes in mptcp_pm_nl_get_local_id()\nand/or mptcp_pm_nl_is_backup()\n\nRoot cause is list_splice_init() in mptcp_pm_nl_flush_addrs_doit()\nwhich is not RCU ready.\n\nlist_splice_init_rcu() can not be called here while holding pernet-\u003elock\nspinlock.\n\nMany thanks to Eulgyu Kim for providing a repro and testing our patches.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23169",
"url": "https://www.suse.com/security/cve/CVE-2026-23169"
},
{
"category": "external",
"summary": "SUSE Bug 1258389 for CVE-2026-23169",
"url": "https://bugzilla.suse.com/1258389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23169"
},
{
"cve": "CVE-2026-23187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23187"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npmdomain: imx8m-blk-ctrl: fix out-of-range access of bc-\u003edomains\n\nFix out-of-range access of bc-\u003edomains in imx8m_blk_ctrl_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23187",
"url": "https://www.suse.com/security/cve/CVE-2026-23187"
},
{
"category": "external",
"summary": "SUSE Bug 1258330 for CVE-2026-23187",
"url": "https://bugzilla.suse.com/1258330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23187"
},
{
"cve": "CVE-2026-23193",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23193"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()\n\nIn iscsit_dec_session_usage_count(), the function calls complete() while\nholding the sess-\u003esession_usage_lock. Similar to the connection usage count\nlogic, the waiter signaled by complete() (e.g., in the session release\npath) may wake up and free the iscsit_session structure immediately.\n\nThis creates a race condition where the current thread may attempt to\nexecute spin_unlock_bh() on a session structure that has already been\ndeallocated, resulting in a KASAN slab-use-after-free.\n\nTo resolve this, release the session_usage_lock before calling complete()\nto ensure all dereferences of the sess pointer are finished before the\nwaiter is allowed to proceed with deallocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23193",
"url": "https://www.suse.com/security/cve/CVE-2026-23193"
},
{
"category": "external",
"summary": "SUSE Bug 1258414 for CVE-2026-23193",
"url": "https://bugzilla.suse.com/1258414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23193"
},
{
"cve": "CVE-2026-23201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: fix oops due to invalid pointer for kfree() in parse_longname()\n\nThis fixes a kernel oops when reading ceph snapshot directories (.snap),\nfor example by simply running `ls /mnt/my_ceph/.snap`.\n\nThe variable str is guarded by __free(kfree), but advanced by one for\nskipping the initial \u0027_\u0027 in snapshot names. Thus, kfree() is called\nwith an invalid pointer. This patch removes the need for advancing the\npointer so kfree() is called with correct memory pointer.\n\nSteps to reproduce:\n\n1. Create snapshots on a cephfs volume (I\u0027ve 63 snaps in my testcase)\n\n2. Add cephfs mount to fstab\n$ echo \"samba-fileserver@.files=/volumes/datapool/stuff/3461082b-ecc9-4e82-8549-3fd2590d3fb6 /mnt/test/stuff ceph acl,noatime,_netdev 0 0\" \u003e\u003e /etc/fstab\n\n3. Reboot the system\n$ systemctl reboot\n\n4. Check if it\u0027s really mounted\n$ mount | grep stuff\n\n5. List snapshots (expected 63 snapshots on my system)\n$ ls /mnt/test/stuff/.snap\n\nNow ls hangs forever and the kernel log shows the oops.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23201",
"url": "https://www.suse.com/security/cve/CVE-2026-23201"
},
{
"category": "external",
"summary": "SUSE Bug 1258337 for CVE-2026-23201",
"url": "https://bugzilla.suse.com/1258337"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23201"
},
{
"cve": "CVE-2026-23202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer\n\nThe curr_xfer field is read by the IRQ handler without holding the lock\nto check if a transfer is in progress. When clearing curr_xfer in the\ncombined sequence transfer loop, protect it with the spinlock to prevent\na race with the interrupt handler.\n\nProtect the curr_xfer clearing at the exit path of\ntegra_qspi_combined_seq_xfer() with the spinlock to prevent a race\nwith the interrupt handler that reads this field.\n\nWithout this protection, the IRQ handler could read a partially updated\ncurr_xfer value, leading to NULL pointer dereference or use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23202",
"url": "https://www.suse.com/security/cve/CVE-2026-23202"
},
{
"category": "external",
"summary": "SUSE Bug 1258338 for CVE-2026-23202",
"url": "https://bugzilla.suse.com/1258338"
},
{
"category": "external",
"summary": "SUSE Bug 1261033 for CVE-2026-23202",
"url": "https://bugzilla.suse.com/1261033"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "important"
}
],
"title": "CVE-2026-23202"
},
{
"cve": "CVE-2026-23204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: cls_u32: use skb_header_pointer_careful()\n\nskb_header_pointer() does not fully validate negative @offset values.\n\nUse skb_header_pointer_careful() instead.\n\nGangMin Kim provided a report and a repro fooling u32_classify():\n\nBUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0\nnet/sched/cls_u32.c:221",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23204",
"url": "https://www.suse.com/security/cve/CVE-2026-23204"
},
{
"category": "external",
"summary": "SUSE Bug 1258340 for CVE-2026-23204",
"url": "https://bugzilla.suse.com/1258340"
},
{
"category": "external",
"summary": "SUSE Bug 1259126 for CVE-2026-23204",
"url": "https://bugzilla.suse.com/1259126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "important"
}
],
"title": "CVE-2026-23204"
},
{
"cve": "CVE-2026-23207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer check in IRQ handler\n\nNow that all other accesses to curr_xfer are done under the lock,\nprotect the curr_xfer NULL check in tegra_qspi_isr_thread() with the\nspinlock. Without this protection, the following race can occur:\n\n CPU0 (ISR thread) CPU1 (timeout path)\n ---------------- -------------------\n if (!tqspi-\u003ecurr_xfer)\n // sees non-NULL\n spin_lock()\n tqspi-\u003ecurr_xfer = NULL\n spin_unlock()\n handle_*_xfer()\n spin_lock()\n t = tqspi-\u003ecurr_xfer // NULL!\n ... t-\u003elen ... // NULL dereference!\n\nWith this patch, all curr_xfer accesses are now properly synchronized.\n\nAlthough all accesses to curr_xfer are done under the lock, in\ntegra_qspi_isr_thread() it checks for NULL, releases the lock and\nreacquires it later in handle_cpu_based_xfer()/handle_dma_based_xfer().\nThere is a potential for an update in between, which could cause a NULL\npointer dereference.\n\nTo handle this, add a NULL check inside the handlers after acquiring\nthe lock. This ensures that if the timeout path has already cleared\ncurr_xfer, the handler will safely return without dereferencing the\nNULL pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23207",
"url": "https://www.suse.com/security/cve/CVE-2026-23207"
},
{
"category": "external",
"summary": "SUSE Bug 1258524 for CVE-2026-23207",
"url": "https://bugzilla.suse.com/1258524"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23207"
},
{
"cve": "CVE-2026-23216",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23216"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()\n\nIn iscsit_dec_conn_usage_count(), the function calls complete() while\nholding the conn-\u003econn_usage_lock. As soon as complete() is invoked, the\nwaiter (such as iscsit_close_connection()) may wake up and proceed to free\nthe iscsit_conn structure.\n\nIf the waiter frees the memory before the current thread reaches\nspin_unlock_bh(), it results in a KASAN slab-use-after-free as the function\nattempts to release a lock within the already-freed connection structure.\n\nFix this by releasing the spinlock before calling complete().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23216",
"url": "https://www.suse.com/security/cve/CVE-2026-23216"
},
{
"category": "external",
"summary": "SUSE Bug 1258447 for CVE-2026-23216",
"url": "https://bugzilla.suse.com/1258447"
},
{
"category": "external",
"summary": "SUSE Bug 1258448 for CVE-2026-23216",
"url": "https://bugzilla.suse.com/1258448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23216"
},
{
"cve": "CVE-2026-23231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix use-after-free in nf_tables_addchain()\n\nnf_tables_addchain() publishes the chain to table-\u003echains via\nlist_add_tail_rcu() (in nft_chain_add()) before registering hooks.\nIf nf_tables_register_hook() then fails, the error path calls\nnft_chain_del() (list_del_rcu()) followed by nf_tables_chain_destroy()\nwith no RCU grace period in between.\n\nThis creates two use-after-free conditions:\n\n 1) Control-plane: nf_tables_dump_chains() traverses table-\u003echains\n under rcu_read_lock(). A concurrent dump can still be walking\n the chain when the error path frees it.\n\n 2) Packet path: for NFPROTO_INET, nf_register_net_hook() briefly\n installs the IPv4 hook before IPv6 registration fails. Packets\n entering nft_do_chain() via the transient IPv4 hook can still be\n dereferencing chain-\u003eblob_gen_X when the error path frees the\n chain.\n\nAdd synchronize_rcu() between nft_chain_del() and the chain destroy\nso that all RCU readers -- both dump threads and in-flight packet\nevaluation -- have finished before the chain is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23231",
"url": "https://www.suse.com/security/cve/CVE-2026-23231"
},
{
"category": "external",
"summary": "SUSE Bug 1259188 for CVE-2026-23231",
"url": "https://bugzilla.suse.com/1259188"
},
{
"category": "external",
"summary": "SUSE Bug 1259189 for CVE-2026-23231",
"url": "https://bugzilla.suse.com/1259189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "important"
}
],
"title": "CVE-2026-23231"
},
{
"cve": "CVE-2026-23242",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23242"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/siw: Fix potential NULL pointer dereference in header processing\n\nIf siw_get_hdr() returns -EINVAL before set_rx_fpdu_context(),\nqp-\u003erx_fpdu can be NULL. The error path in siw_tcp_rx_data()\ndereferences qp-\u003erx_fpdu-\u003emore_ddp_segs without checking, which\nmay lead to a NULL pointer deref. Only check more_ddp_segs when\nrx_fpdu is present.\n\nKASAN splat:\n[ 101.384271] KASAN: null-ptr-deref in range [0x00000000000000c0-0x00000000000000c7]\n[ 101.385869] RIP: 0010:siw_tcp_rx_data+0x13ad/0x1e50",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23242",
"url": "https://www.suse.com/security/cve/CVE-2026-23242"
},
{
"category": "external",
"summary": "SUSE Bug 1259795 for CVE-2026-23242",
"url": "https://bugzilla.suse.com/1259795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23242"
},
{
"cve": "CVE-2026-23243",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23243"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/umad: Reject negative data_len in ib_umad_write\n\nib_umad_write computes data_len from user-controlled count and the\nMAD header sizes. With a mismatched user MAD header size and RMPP\nheader length, data_len can become negative and reach ib_create_send_mad().\nThis can make the padding calculation exceed the segment size and trigger\nan out-of-bounds memset in alloc_send_rmpp_list().\n\nAdd an explicit check to reject negative data_len before creating the\nsend buffer.\n\nKASAN splat:\n[ 211.363464] BUG: KASAN: slab-out-of-bounds in ib_create_send_mad+0xa01/0x11b0\n[ 211.364077] Write of size 220 at addr ffff88800c3fa1f8 by task spray_thread/102\n[ 211.365867] ib_create_send_mad+0xa01/0x11b0\n[ 211.365887] ib_umad_write+0x853/0x1c80",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23243",
"url": "https://www.suse.com/security/cve/CVE-2026-23243"
},
{
"category": "external",
"summary": "SUSE Bug 1259797 for CVE-2026-23243",
"url": "https://bugzilla.suse.com/1259797"
},
{
"category": "external",
"summary": "SUSE Bug 1259798 for CVE-2026-23243",
"url": "https://bugzilla.suse.com/1259798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "important"
}
],
"title": "CVE-2026-23243"
},
{
"cve": "CVE-2026-23255",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23255"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: add proper RCU protection to /proc/net/ptype\n\nYin Fengwei reported an RCU stall in ptype_seq_show() and provided\na patch.\n\nReal issue is that ptype_seq_next() and ptype_seq_show() violate\nRCU rules.\n\nptype_seq_show() runs under rcu_read_lock(), and reads pt-\u003edev\nto get device name without any barrier.\n\nAt the same time, concurrent writers can remove a packet_type structure\n(which is correctly freed after an RCU grace period) and clear pt-\u003edev\nwithout an RCU grace period.\n\nDefine ptype_iter_state to carry a dev pointer along seq_net_private:\n\nstruct ptype_iter_state {\n\tstruct seq_net_private\tp;\n\tstruct net_device\t*dev; // added in this patch\n};\n\nWe need to record the device pointer in ptype_get_idx() and\nptype_seq_next() so that ptype_seq_show() is safe against\nconcurrent pt-\u003edev changes.\n\nWe also need to add full RCU protection in ptype_seq_next().\n(Missing READ_ONCE() when reading list.next values)\n\nMany thanks to Dong Chenchen for providing a repro.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23255",
"url": "https://www.suse.com/security/cve/CVE-2026-23255"
},
{
"category": "external",
"summary": "SUSE Bug 1259891 for CVE-2026-23255",
"url": "https://bugzilla.suse.com/1259891"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23255"
},
{
"cve": "CVE-2026-23262",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23262"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: Fix stats report corruption on queue count change\n\nThe driver and the NIC share a region in memory for stats reporting.\nThe NIC calculates its offset into this region based on the total size\nof the stats region and the size of the NIC\u0027s stats.\n\nWhen the number of queues is changed, the driver\u0027s stats region is\nresized. If the queue count is increased, the NIC can write past\nthe end of the allocated stats region, causing memory corruption.\nIf the queue count is decreased, there is a gap between the driver\nand NIC stats, leading to incorrect stats reporting.\n\nThis change fixes the issue by allocating stats region with maximum\nsize, and the offset calculation for NIC stats is changed to match\nwith the calculation of the NIC.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23262",
"url": "https://www.suse.com/security/cve/CVE-2026-23262"
},
{
"category": "external",
"summary": "SUSE Bug 1259870 for CVE-2026-23262",
"url": "https://bugzilla.suse.com/1259870"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23262"
},
{
"cve": "CVE-2026-23270",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23270"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks\n\nAs Paolo said earlier [1]:\n\n\"Since the blamed commit below, classify can return TC_ACT_CONSUMED while\nthe current skb being held by the defragmentation engine. As reported by\nGangMin Kim, if such packet is that may cause a UaF when the defrag engine\nlater on tries to tuch again such packet.\"\n\nact_ct was never meant to be used in the egress path, however some users\nare attaching it to egress today [2]. Attempting to reach a middle\nground, we noticed that, while most qdiscs are not handling\nTC_ACT_CONSUMED, clsact/ingress qdiscs are. With that in mind, we\naddress the issue by only allowing act_ct to bind to clsact/ingress\nqdiscs and shared blocks. That way it\u0027s still possible to attach act_ct to\negress (albeit only with clsact).\n\n[1] https://lore.kernel.org/netdev/674b8cbfc385c6f37fb29a1de08d8fe5c2b0fbee.1771321118.git.pabeni@redhat.com/\n[2] https://lore.kernel.org/netdev/cc6bfb4a-4a2b-42d8-b9ce-7ef6644fb22b@ovn.org/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23270",
"url": "https://www.suse.com/security/cve/CVE-2026-23270"
},
{
"category": "external",
"summary": "SUSE Bug 1259886 for CVE-2026-23270",
"url": "https://bugzilla.suse.com/1259886"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23270"
},
{
"cve": "CVE-2026-23272",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23272"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: unconditionally bump set-\u003enelems before insertion\n\nIn case that the set is full, a new element gets published then removed\nwithout waiting for the RCU grace period, while RCU reader can be\nwalking over it already.\n\nTo address this issue, add the element transaction even if set is full,\nbut toggle the set_full flag to report -ENFILE so the abort path safely\nunwinds the set to its previous state.\n\nAs for element updates, decrement set-\u003enelems to restore it.\n\nA simpler fix is to call synchronize_rcu() in the error path.\nHowever, with a large batch adding elements to already maxed-out set,\nthis could cause noticeable slowdown of such batches.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23272",
"url": "https://www.suse.com/security/cve/CVE-2026-23272"
},
{
"category": "external",
"summary": "SUSE Bug 1260009 for CVE-2026-23272",
"url": "https://bugzilla.suse.com/1260009"
},
{
"category": "external",
"summary": "SUSE Bug 1260909 for CVE-2026-23272",
"url": "https://bugzilla.suse.com/1260909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "important"
}
],
"title": "CVE-2026-23272"
},
{
"cve": "CVE-2026-23274",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23274"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels\n\nIDLETIMER revision 0 rules reuse existing timers by label and always call\nmod_timer() on timer-\u003etimer.\n\nIf the label was created first by revision 1 with XT_IDLETIMER_ALARM,\nthe object uses alarm timer semantics and timer-\u003etimer is never initialized.\nReusing that object from revision 0 causes mod_timer() on an uninitialized\ntimer_list, triggering debugobjects warnings and possible panic when\npanic_on_warn=1.\n\nFix this by rejecting revision 0 rule insertion when an existing timer with\nthe same label is of ALARM type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23274",
"url": "https://www.suse.com/security/cve/CVE-2026-23274"
},
{
"category": "external",
"summary": "SUSE Bug 1260005 for CVE-2026-23274",
"url": "https://bugzilla.suse.com/1260005"
},
{
"category": "external",
"summary": "SUSE Bug 1260908 for CVE-2026-23274",
"url": "https://bugzilla.suse.com/1260908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "important"
}
],
"title": "CVE-2026-23274"
},
{
"cve": "CVE-2026-23277",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23277"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit\n\nteql_master_xmit() calls netdev_start_xmit(skb, slave) to transmit\nthrough slave devices, but does not update skb-\u003edev to the slave device\nbeforehand.\n\nWhen a gretap tunnel is a TEQL slave, the transmit path reaches\niptunnel_xmit() which saves dev = skb-\u003edev (still pointing to teql0\nmaster) and later calls iptunnel_xmit_stats(dev, pkt_len). This\nfunction does:\n\n get_cpu_ptr(dev-\u003etstats)\n\nSince teql_master_setup() does not set dev-\u003epcpu_stat_type to\nNETDEV_PCPU_STAT_TSTATS, the core network stack never allocates tstats\nfor teql0, so dev-\u003etstats is NULL. get_cpu_ptr(NULL) computes\nNULL + __per_cpu_offset[cpu], resulting in a page fault.\n\n BUG: unable to handle page fault for address: ffff8880e6659018\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 68bc067 P4D 68bc067 PUD 0\n Oops: Oops: 0002 [#1] SMP KASAN PTI\n RIP: 0010:iptunnel_xmit (./include/net/ip_tunnels.h:664 net/ipv4/ip_tunnel_core.c:89)\n Call Trace:\n \u003cTASK\u003e\n ip_tunnel_xmit (net/ipv4/ip_tunnel.c:847)\n __gre_xmit (net/ipv4/ip_gre.c:478)\n gre_tap_xmit (net/ipv4/ip_gre.c:779)\n teql_master_xmit (net/sched/sch_teql.c:319)\n dev_hard_start_xmit (net/core/dev.c:3887)\n sch_direct_xmit (net/sched/sch_generic.c:347)\n __dev_queue_xmit (net/core/dev.c:4802)\n neigh_direct_output (net/core/neighbour.c:1660)\n ip_finish_output2 (net/ipv4/ip_output.c:237)\n __ip_finish_output.part.0 (net/ipv4/ip_output.c:315)\n ip_mc_output (net/ipv4/ip_output.c:369)\n ip_send_skb (net/ipv4/ip_output.c:1508)\n udp_send_skb (net/ipv4/udp.c:1195)\n udp_sendmsg (net/ipv4/udp.c:1485)\n inet_sendmsg (net/ipv4/af_inet.c:859)\n __sys_sendto (net/socket.c:2206)\n\nFix this by setting skb-\u003edev = slave before calling\nnetdev_start_xmit(), so that tunnel xmit functions see the correct\nslave device with properly allocated tstats.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23277",
"url": "https://www.suse.com/security/cve/CVE-2026-23277"
},
{
"category": "external",
"summary": "SUSE Bug 1259997 for CVE-2026-23277",
"url": "https://bugzilla.suse.com/1259997"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23277"
},
{
"cve": "CVE-2026-23278",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23278"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: always walk all pending catchall elements\n\nDuring transaction processing we might have more than one catchall element:\n1 live catchall element and 1 pending element that is coming as part of the\nnew batch.\n\nIf the map holding the catchall elements is also going away, its\nrequired to toggle all catchall elements and not just the first viable\ncandidate.\n\nOtherwise, we get:\n WARNING: ./include/net/netfilter/nf_tables.h:1281 at nft_data_release+0xb7/0xe0 [nf_tables], CPU#2: nft/1404\n RIP: 0010:nft_data_release+0xb7/0xe0 [nf_tables]\n [..]\n __nft_set_elem_destroy+0x106/0x380 [nf_tables]\n nf_tables_abort_release+0x348/0x8d0 [nf_tables]\n nf_tables_abort+0xcf2/0x3ac0 [nf_tables]\n nfnetlink_rcv_batch+0x9c9/0x20e0 [..]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23278",
"url": "https://www.suse.com/security/cve/CVE-2026-23278"
},
{
"category": "external",
"summary": "SUSE Bug 1259998 for CVE-2026-23278",
"url": "https://bugzilla.suse.com/1259998"
},
{
"category": "external",
"summary": "SUSE Bug 1260907 for CVE-2026-23278",
"url": "https://bugzilla.suse.com/1260907"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "important"
}
],
"title": "CVE-2026-23278"
},
{
"cve": "CVE-2026-23281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23281"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: libertas: fix use-after-free in lbs_free_adapter()\n\nThe lbs_free_adapter() function uses timer_delete() (non-synchronous)\nfor both command_timer and tx_lockup_timer before the structure is\nfreed. This is incorrect because timer_delete() does not wait for\nany running timer callback to complete.\n\nIf a timer callback is executing when lbs_free_adapter() is called,\nthe callback will access freed memory since lbs_cfg_free() frees the\ncontaining structure immediately after lbs_free_adapter() returns.\n\nBoth timer callbacks (lbs_cmd_timeout_handler and lbs_tx_lockup_handler)\naccess priv-\u003edriver_lock, priv-\u003ecur_cmd, priv-\u003edev, and other fields,\nwhich would all be use-after-free violations.\n\nUse timer_delete_sync() instead to ensure any running timer callback\nhas completed before returning.\n\nThis bug was introduced in commit 8f641d93c38a (\"libertas: detect TX\nlockups and reset hardware\") where del_timer() was used instead of\ndel_timer_sync() in the cleanup path. The command_timer has had the\nsame issue since the driver was first written.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23281",
"url": "https://www.suse.com/security/cve/CVE-2026-23281"
},
{
"category": "external",
"summary": "SUSE Bug 1260464 for CVE-2026-23281",
"url": "https://bugzilla.suse.com/1260464"
},
{
"category": "external",
"summary": "SUSE Bug 1260466 for CVE-2026-23281",
"url": "https://bugzilla.suse.com/1260466"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23281"
},
{
"cve": "CVE-2026-23292",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23292"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: Fix recursive locking in __configfs_open_file()\n\nIn flush_write_buffer, \u0026p-\u003efrag_sem is acquired and then the loaded store\nfunction is called, which, here, is target_core_item_dbroot_store(). This\nfunction called filp_open(), following which these functions were called\n(in reverse order), according to the call trace:\n\n down_read\n __configfs_open_file\n do_dentry_open\n vfs_open\n do_open\n path_openat\n do_filp_open\n file_open_name\n filp_open\n target_core_item_dbroot_store\n flush_write_buffer\n configfs_write_iter\n\ntarget_core_item_dbroot_store() tries to validate the new file path by\ntrying to open the file path provided to it; however, in this case, the bug\nreport shows:\n\ndb_root: not a directory: /sys/kernel/config/target/dbroot\n\nindicating that the same configfs file was tried to be opened, on which it\nis currently working on. Thus, it is trying to acquire frag_sem semaphore\nof the same file of which it already holds the semaphore obtained in\nflush_write_buffer(), leading to acquiring the semaphore in a nested manner\nand a possibility of recursive locking.\n\nFix this by modifying target_core_item_dbroot_store() to use kern_path()\ninstead of filp_open() to avoid opening the file using filesystem-specific\nfunction __configfs_open_file(), and further modifying it to make this fix\ncompatible.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23292",
"url": "https://www.suse.com/security/cve/CVE-2026-23292"
},
{
"category": "external",
"summary": "SUSE Bug 1260500 for CVE-2026-23292",
"url": "https://bugzilla.suse.com/1260500"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23292"
},
{
"cve": "CVE-2026-23293",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23293"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled\n\nWhen booting with the \u0027ipv6.disable=1\u0027 parameter, the nd_tbl is never\ninitialized because inet6_init() exits before ndisc_init() is called\nwhich initializes it. If an IPv6 packet is injected into the interface,\nroute_shortcircuit() is called and a NULL pointer dereference happens on\nneigh_lookup().\n\n BUG: kernel NULL pointer dereference, address: 0000000000000380\n Oops: Oops: 0000 [#1] SMP NOPTI\n [...]\n RIP: 0010:neigh_lookup+0x20/0x270\n [...]\n Call Trace:\n \u003cTASK\u003e\n vxlan_xmit+0x638/0x1ef0 [vxlan]\n dev_hard_start_xmit+0x9e/0x2e0\n __dev_queue_xmit+0xbee/0x14e0\n packet_sendmsg+0x116f/0x1930\n __sys_sendto+0x1f5/0x200\n __x64_sys_sendto+0x24/0x30\n do_syscall_64+0x12f/0x1590\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFix this by adding an early check on route_shortcircuit() when protocol\nis ETH_P_IPV6. Note that ipv6_mod_enabled() cannot be used here because\nVXLAN can be built-in even when IPv6 is built as a module.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23293",
"url": "https://www.suse.com/security/cve/CVE-2026-23293"
},
{
"category": "external",
"summary": "SUSE Bug 1260486 for CVE-2026-23293",
"url": "https://bugzilla.suse.com/1260486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23293"
},
{
"cve": "CVE-2026-23304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23304"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu()\n\nl3mdev_master_dev_rcu() can return NULL when the slave device is being\nun-slaved from a VRF. All other callers deal with this, but we lost\nthe fallback to loopback in ip6_rt_pcpu_alloc() -\u003e ip6_rt_get_dev_rcu()\nwith commit 4832c30d5458 (\"net: ipv6: put host and anycast routes on\ndevice with address\").\n\n KASAN: null-ptr-deref in range [0x0000000000000108-0x000000000000010f]\n RIP: 0010:ip6_rt_pcpu_alloc (net/ipv6/route.c:1418)\n Call Trace:\n ip6_pol_route (net/ipv6/route.c:2318)\n fib6_rule_lookup (net/ipv6/fib6_rules.c:115)\n ip6_route_output_flags (net/ipv6/route.c:2607)\n vrf_process_v6_outbound (drivers/net/vrf.c:437)\n\nI was tempted to rework the un-slaving code to clear the flag first\nand insert synchronize_rcu() before we remove the upper. But looks like\nthe explicit fallback to loopback_dev is an established pattern.\nAnd I guess avoiding the synchronize_rcu() is nice, too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23304",
"url": "https://www.suse.com/security/cve/CVE-2026-23304"
},
{
"category": "external",
"summary": "SUSE Bug 1260544 for CVE-2026-23304",
"url": "https://bugzilla.suse.com/1260544"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23304"
},
{
"cve": "CVE-2026-23317",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23317"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Return the correct value in vmw_translate_ptr functions\n\nBefore the referenced fixes these functions used a lookup function that\nreturned a pointer. This was changed to another lookup function that\nreturned an error code with the pointer becoming an out parameter.\n\nThe error path when the lookup failed was not changed to reflect this\nchange and the code continued to return the PTR_ERR of the now\nuninitialized pointer. This could cause the vmw_translate_ptr functions\nto return success when they actually failed causing further uninitialized\nand OOB accesses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23317",
"url": "https://www.suse.com/security/cve/CVE-2026-23317"
},
{
"category": "external",
"summary": "SUSE Bug 1260562 for CVE-2026-23317",
"url": "https://bugzilla.suse.com/1260562"
},
{
"category": "external",
"summary": "SUSE Bug 1260563 for CVE-2026-23317",
"url": "https://bugzilla.suse.com/1260563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "important"
}
],
"title": "CVE-2026-23317"
},
{
"cve": "CVE-2026-23319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23319"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim\n\nThe root cause of this bug is that when \u0027bpf_link_put\u0027 reduces the\nrefcount of \u0027shim_link-\u003elink.link\u0027 to zero, the resource is considered\nreleased but may still be referenced via \u0027tr-\u003eprogs_hlist\u0027 in\n\u0027cgroup_shim_find\u0027. The actual cleanup of \u0027tr-\u003eprogs_hlist\u0027 in\n\u0027bpf_shim_tramp_link_release\u0027 is deferred. During this window, another\nprocess can cause a use-after-free via \u0027bpf_trampoline_link_cgroup_shim\u0027.\n\nBased on Martin KaFai Lau\u0027s suggestions, I have created a simple patch.\n\nTo fix this:\n Add an atomic non-zero check in \u0027bpf_trampoline_link_cgroup_shim\u0027.\n Only increment the refcount if it is not already zero.\n\nTesting:\n I verified the fix by adding a delay in\n \u0027bpf_shim_tramp_link_release\u0027 to make the bug easier to trigger:\n\nstatic void bpf_shim_tramp_link_release(struct bpf_link *link)\n{\n\t/* ... */\n\tif (!shim_link-\u003etrampoline)\n\t\treturn;\n\n+\tmsleep(100);\n\tWARN_ON_ONCE(bpf_trampoline_unlink_prog(\u0026shim_link-\u003elink,\n\t\tshim_link-\u003etrampoline, NULL));\n\tbpf_trampoline_put(shim_link-\u003etrampoline);\n}\n\nBefore the patch, running a PoC easily reproduced the crash(almost 100%)\nwith a call trace similar to KaiyanM\u0027s report.\nAfter the patch, the bug no longer occurs even after millions of\niterations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23319",
"url": "https://www.suse.com/security/cve/CVE-2026-23319"
},
{
"category": "external",
"summary": "SUSE Bug 1260735 for CVE-2026-23319",
"url": "https://bugzilla.suse.com/1260735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23319"
},
{
"cve": "CVE-2026-23335",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23335"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix kernel stack leak in irdma_create_user_ah()\n\nstruct irdma_create_ah_resp { // 8 bytes, no padding\n __u32 ah_id; // offset 0 - SET (uresp.ah_id = ah-\u003esc_ah.ah_info.ah_idx)\n __u8 rsvd[4]; // offset 4 - NEVER SET \u003c- LEAK\n};\n\nrsvd[4]: 4 bytes of stack memory leaked unconditionally. Only ah_id is assigned before ib_respond_udata().\n\nThe reserved members of the structure were not zeroed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23335",
"url": "https://www.suse.com/security/cve/CVE-2026-23335"
},
{
"category": "external",
"summary": "SUSE Bug 1260550 for CVE-2026-23335",
"url": "https://bugzilla.suse.com/1260550"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "low"
}
],
"title": "CVE-2026-23335"
},
{
"cve": "CVE-2026-23343",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23343"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxdp: produce a warning when calculated tailroom is negative\n\nMany ethernet drivers report xdp Rx queue frag size as being the same as\nDMA write size. However, the only user of this field, namely\nbpf_xdp_frags_increase_tail(), clearly expects a truesize.\n\nSuch difference leads to unspecific memory corruption issues under certain\ncircumstances, e.g. in ixgbevf maximum DMA write size is 3 KB, so when\nrunning xskxceiver\u0027s XDP_ADJUST_TAIL_GROW_MULTI_BUFF, 6K packet fully uses\nall DMA-writable space in 2 buffers. This would be fine, if only\nrxq-\u003efrag_size was properly set to 4K, but value of 3K results in a\nnegative tailroom, because there is a non-zero page offset.\n\nWe are supposed to return -EINVAL and be done with it in such case, but due\nto tailroom being stored as an unsigned int, it is reported to be somewhere\nnear UINT_MAX, resulting in a tail being grown, even if the requested\noffset is too much (it is around 2K in the abovementioned test). This later\nleads to all kinds of unspecific calltraces.\n\n[ 7340.337579] xskxceiver[1440]: segfault at 1da718 ip 00007f4161aeac9d sp 00007f41615a6a00 error 6\n[ 7340.338040] xskxceiver[1441]: segfault at 7f410000000b ip 00000000004042b5 sp 00007f415bffecf0 error 4\n[ 7340.338179] in libc.so.6[61c9d,7f4161aaf000+160000]\n[ 7340.339230] in xskxceiver[42b5,400000+69000]\n[ 7340.340300] likely on CPU 6 (core 0, socket 6)\n[ 7340.340302] Code: ff ff 01 e9 f4 fe ff ff 0f 1f 44 00 00 4c 39 f0 74 73 31 c0 ba 01 00 00 00 f0 0f b1 17 0f 85 ba 00 00 00 49 8b 87 88 00 00 00 \u003c4c\u003e 89 70 08 eb cc 0f 1f 44 00 00 48 8d bd f0 fe ff ff 89 85 ec fe\n[ 7340.340888] likely on CPU 3 (core 0, socket 3)\n[ 7340.345088] Code: 00 00 00 ba 00 00 00 00 be 00 00 00 00 89 c7 e8 31 ca ff ff 89 45 ec 8b 45 ec 85 c0 78 07 b8 00 00 00 00 eb 46 e8 0b c8 ff ff \u003c8b\u003e 00 83 f8 69 74 24 e8 ff c7 ff ff 8b 00 83 f8 0b 74 18 e8 f3 c7\n[ 7340.404334] Oops: general protection fault, probably for non-canonical address 0x6d255010bdffc: 0000 [#1] SMP NOPTI\n[ 7340.405972] CPU: 7 UID: 0 PID: 1439 Comm: xskxceiver Not tainted 6.19.0-rc1+ #21 PREEMPT(lazy)\n[ 7340.408006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014\n[ 7340.409716] RIP: 0010:lookup_swap_cgroup_id+0x44/0x80\n[ 7340.410455] Code: 83 f8 1c 73 39 48 ba ff ff ff ff ff ff ff 03 48 8b 04 c5 20 55 fa bd 48 21 d1 48 89 ca 83 e1 01 48 d1 ea c1 e1 04 48 8d 04 90 \u003c8b\u003e 00 48 83 c4 10 d3 e8 c3 cc cc cc cc 31 c0 e9 98 b7 dd 00 48 89\n[ 7340.412787] RSP: 0018:ffffcc5c04f7f6d0 EFLAGS: 00010202\n[ 7340.413494] RAX: 0006d255010bdffc RBX: ffff891f477895a8 RCX: 0000000000000010\n[ 7340.414431] RDX: 0001c17e3fffffff RSI: 00fa070000000000 RDI: 000382fc7fffffff\n[ 7340.415354] RBP: 00fa070000000000 R08: ffffcc5c04f7f8f8 R09: ffffcc5c04f7f7d0\n[ 7340.416283] R10: ffff891f4c1a7000 R11: ffffcc5c04f7f9c8 R12: ffffcc5c04f7f7d0\n[ 7340.417218] R13: 03ffffffffffffff R14: 00fa06fffffffe00 R15: ffff891f47789500\n[ 7340.418229] FS: 0000000000000000(0000) GS:ffff891ffdfaa000(0000) knlGS:0000000000000000\n[ 7340.419489] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 7340.420286] CR2: 00007f415bfffd58 CR3: 0000000103f03002 CR4: 0000000000772ef0\n[ 7340.421237] PKRU: 55555554\n[ 7340.421623] Call Trace:\n[ 7340.421987] \u003cTASK\u003e\n[ 7340.422309] ? softleaf_from_pte+0x77/0xa0\n[ 7340.422855] swap_pte_batch+0xa7/0x290\n[ 7340.423363] zap_nonpresent_ptes.constprop.0.isra.0+0xd1/0x270\n[ 7340.424102] zap_pte_range+0x281/0x580\n[ 7340.424607] zap_pmd_range.isra.0+0xc9/0x240\n[ 7340.425177] unmap_page_range+0x24d/0x420\n[ 7340.425714] unmap_vmas+0xa1/0x180\n[ 7340.426185] exit_mmap+0xe1/0x3b0\n[ 7340.426644] __mmput+0x41/0x150\n[ 7340.427098] exit_mm+0xb1/0x110\n[ 7340.427539] do_exit+0x1b2/0x460\n[ 7340.427992] do_group_exit+0x2d/0xc0\n[ 7340.428477] get_signal+0x79d/0x7e0\n[ 7340.428957] arch_do_signal_or_restart+0x34/0x100\n[ 7340.429571] exit_to_user_mode_loop+0x8e/0x4c0\n[ 7340.430159] do_syscall_64+0x188/\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23343",
"url": "https://www.suse.com/security/cve/CVE-2026-23343"
},
{
"category": "external",
"summary": "SUSE Bug 1260527 for CVE-2026-23343",
"url": "https://bugzilla.suse.com/1260527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23343"
},
{
"cve": "CVE-2026-23361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry\n\nEndpoint drivers use dw_pcie_ep_raise_msix_irq() to raise an MSI-X\ninterrupt to the host using a writel(), which generates a PCI posted write\ntransaction. There\u0027s no completion for posted writes, so the writel() may\nreturn before the PCI write completes. dw_pcie_ep_raise_msix_irq() also\nunmaps the outbound ATU entry used for the PCI write, so the write races\nwith the unmap.\n\nIf the PCI write loses the race with the ATU unmap, the write may corrupt\nhost memory or cause IOMMU errors, e.g., these when running fio with a\nlarger queue depth against nvmet-pci-epf:\n\n arm-smmu-v3 fc900000.iommu: 0x0000010000000010\n arm-smmu-v3 fc900000.iommu: 0x0000020000000000\n arm-smmu-v3 fc900000.iommu: 0x000000090000f040\n arm-smmu-v3 fc900000.iommu: 0x0000000000000000\n arm-smmu-v3 fc900000.iommu: event: F_TRANSLATION client: 0000:01:00.0 sid: 0x100 ssid: 0x0 iova: 0x90000f040 ipa: 0x0\n arm-smmu-v3 fc900000.iommu: unpriv data write s1 \"Input address caused fault\" stag: 0x0\n\nFlush the write by performing a readl() of the same address to ensure that\nthe write has reached the destination before the ATU entry is unmapped.\n\nThe same problem was solved for dw_pcie_ep_raise_msi_irq() in commit\n8719c64e76bf (\"PCI: dwc: ep: Cache MSI outbound iATU mapping\"), but there\nit was solved by dedicating an outbound iATU only for MSI. We can\u0027t do the\nsame for MSI-X because each vector can have a different msg_addr and the\nmsg_addr may be changed while the vector is masked.\n\n[bhelgaas: commit log]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23361",
"url": "https://www.suse.com/security/cve/CVE-2026-23361"
},
{
"category": "external",
"summary": "SUSE Bug 1260732 for CVE-2026-23361",
"url": "https://bugzilla.suse.com/1260732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23361"
},
{
"cve": "CVE-2026-23379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23379"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: ets: fix divide by zero in the offload path\n\nOffloading ETS requires computing each class\u0027 WRR weight: this is done by\naveraging over the sums of quanta as \u0027q_sum\u0027 and \u0027q_psum\u0027. Using unsigned\nint, the same integer size as the individual DRR quanta, can overflow and\neven cause division by zero, like it happened in the following splat:\n\n Oops: divide error: 0000 [#1] SMP PTI\n CPU: 13 UID: 0 PID: 487 Comm: tc Tainted: G E 6.19.0-virtme #45 PREEMPT(full)\n Tainted: [E]=UNSIGNED_MODULE\n Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011\n RIP: 0010:ets_offload_change+0x11f/0x290 [sch_ets]\n Code: e4 45 31 ff eb 03 41 89 c7 41 89 cb 89 ce 83 f9 0f 0f 87 b7 00 00 00 45 8b 08 31 c0 45 01 cc 45 85 c9 74 09 41 6b c4 64 31 d2 \u003c41\u003e f7 f2 89 c2 44 29 fa 45 89 df 41 83 fb 0f 0f 87 c7 00 00 00 44\n RSP: 0018:ffffd0a180d77588 EFLAGS: 00010246\n RAX: 00000000ffffff38 RBX: ffff8d3d482ca000 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffd0a180d77660\n RBP: ffffd0a180d77690 R08: ffff8d3d482ca2d8 R09: 00000000fffffffe\n R10: 0000000000000000 R11: 0000000000000000 R12: 00000000fffffffe\n R13: ffff8d3d472f2000 R14: 0000000000000003 R15: 0000000000000000\n FS: 00007f440b6c2740(0000) GS:ffff8d3dc9803000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000003cdd2000 CR3: 0000000007b58002 CR4: 0000000000172ef0\n Call Trace:\n \u003cTASK\u003e\n ets_qdisc_change+0x870/0xf40 [sch_ets]\n qdisc_create+0x12b/0x540\n tc_modify_qdisc+0x6d7/0xbd0\n rtnetlink_rcv_msg+0x168/0x6b0\n netlink_rcv_skb+0x5c/0x110\n netlink_unicast+0x1d6/0x2b0\n netlink_sendmsg+0x22e/0x470\n ____sys_sendmsg+0x38a/0x3c0\n ___sys_sendmsg+0x99/0xe0\n __sys_sendmsg+0x8a/0xf0\n do_syscall_64+0x111/0xf80\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x7f440b81c77e\n Code: 4d 89 d8 e8 d4 bc 00 00 4c 8b 5d f8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 11 c9 c3 0f 1f 80 00 00 00 00 48 8b 45 10 0f 05 \u003cc9\u003e c3 83 e2 39 83 fa 08 75 e7 e8 13 ff ff ff 0f 1f 00 f3 0f 1e fa\n RSP: 002b:00007fff951e4c10 EFLAGS: 00000202 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 0000000000481820 RCX: 00007f440b81c77e\n RDX: 0000000000000000 RSI: 00007fff951e4cd0 RDI: 0000000000000003\n RBP: 00007fff951e4c20 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000202 R12: 00007fff951f4fa8\n R13: 00000000699ddede R14: 00007f440bb01000 R15: 0000000000486980\n \u003c/TASK\u003e\n Modules linked in: sch_ets(E) netdevsim(E)\n ---[ end trace 0000000000000000 ]---\n RIP: 0010:ets_offload_change+0x11f/0x290 [sch_ets]\n Code: e4 45 31 ff eb 03 41 89 c7 41 89 cb 89 ce 83 f9 0f 0f 87 b7 00 00 00 45 8b 08 31 c0 45 01 cc 45 85 c9 74 09 41 6b c4 64 31 d2 \u003c41\u003e f7 f2 89 c2 44 29 fa 45 89 df 41 83 fb 0f 0f 87 c7 00 00 00 44\n RSP: 0018:ffffd0a180d77588 EFLAGS: 00010246\n RAX: 00000000ffffff38 RBX: ffff8d3d482ca000 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffd0a180d77660\n RBP: ffffd0a180d77690 R08: ffff8d3d482ca2d8 R09: 00000000fffffffe\n R10: 0000000000000000 R11: 0000000000000000 R12: 00000000fffffffe\n R13: ffff8d3d472f2000 R14: 0000000000000003 R15: 0000000000000000\n FS: 00007f440b6c2740(0000) GS:ffff8d3dc9803000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000003cdd2000 CR3: 0000000007b58002 CR4: 0000000000172ef0\n Kernel panic - not syncing: Fatal exception\n Kernel Offset: 0x30000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)\n ---[ end Kernel panic - not syncing: Fatal exception ]---\n\nFix this using 64-bit integers for \u0027q_sum\u0027 and \u0027q_psum\u0027.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23379",
"url": "https://www.suse.com/security/cve/CVE-2026-23379"
},
{
"category": "external",
"summary": "SUSE Bug 1260481 for CVE-2026-23379",
"url": "https://bugzilla.suse.com/1260481"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23379"
},
{
"cve": "CVE-2026-23381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23381"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: fix nd_tbl NULL dereference when IPv6 is disabled\n\nWhen booting with the \u0027ipv6.disable=1\u0027 parameter, the nd_tbl is never\ninitialized because inet6_init() exits before ndisc_init() is called\nwhich initializes it. Then, if neigh_suppress is enabled and an ICMPv6\nNeighbor Discovery packet reaches the bridge, br_do_suppress_nd() will\ndereference ipv6_stub-\u003end_tbl which is NULL, passing it to\nneigh_lookup(). This causes a kernel NULL pointer dereference.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000268\n Oops: 0000 [#1] PREEMPT SMP NOPTI\n [...]\n RIP: 0010:neigh_lookup+0x16/0xe0\n [...]\n Call Trace:\n \u003cIRQ\u003e\n ? neigh_lookup+0x16/0xe0\n br_do_suppress_nd+0x160/0x290 [bridge]\n br_handle_frame_finish+0x500/0x620 [bridge]\n br_handle_frame+0x353/0x440 [bridge]\n __netif_receive_skb_core.constprop.0+0x298/0x1110\n __netif_receive_skb_one_core+0x3d/0xa0\n process_backlog+0xa0/0x140\n __napi_poll+0x2c/0x170\n net_rx_action+0x2c4/0x3a0\n handle_softirqs+0xd0/0x270\n do_softirq+0x3f/0x60\n\nFix this by replacing IS_ENABLED(IPV6) call with ipv6_mod_enabled() in\nthe callers. This is in essence disabling NS/NA suppression when IPv6 is\ndisabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23381",
"url": "https://www.suse.com/security/cve/CVE-2026-23381"
},
{
"category": "external",
"summary": "SUSE Bug 1260471 for CVE-2026-23381",
"url": "https://bugzilla.suse.com/1260471"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23381"
},
{
"cve": "CVE-2026-23383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23383"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing\n\nstruct bpf_plt contains a u64 target field. Currently, the BPF JIT\nallocator requests an alignment of 4 bytes (sizeof(u32)) for the JIT\nbuffer.\n\nBecause the base address of the JIT buffer can be 4-byte aligned (e.g.,\nending in 0x4 or 0xc), the relative padding logic in build_plt() fails\nto ensure that target lands on an 8-byte boundary.\n\nThis leads to two issues:\n1. UBSAN reports misaligned-access warnings when dereferencing the\n structure.\n2. More critically, target is updated concurrently via WRITE_ONCE() in\n bpf_arch_text_poke() while the JIT\u0027d code executes ldr. On arm64,\n 64-bit loads/stores are only guaranteed to be single-copy atomic if\n they are 64-bit aligned. A misaligned target risks a torn read,\n causing the JIT to jump to a corrupted address.\n\nFix this by increasing the allocation alignment requirement to 8 bytes\n(sizeof(u64)) in bpf_jit_binary_pack_alloc(). This anchors the base of\nthe JIT buffer to an 8-byte boundary, allowing the relative padding math\nin build_plt() to correctly align the target field.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23383",
"url": "https://www.suse.com/security/cve/CVE-2026-23383"
},
{
"category": "external",
"summary": "SUSE Bug 1260497 for CVE-2026-23383",
"url": "https://bugzilla.suse.com/1260497"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23383"
},
{
"cve": "CVE-2026-23386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23386"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL\n\nIn DQ-QPL mode, gve_tx_clean_pending_packets() incorrectly uses the RDA\nbuffer cleanup path. It iterates num_bufs times and attempts to unmap\nentries in the dma array.\n\nThis leads to two issues:\n1. The dma array shares storage with tx_qpl_buf_ids (union).\n Interpreting buffer IDs as DMA addresses results in attempting to\n unmap incorrect memory locations.\n2. num_bufs in QPL mode (counting 2K chunks) can significantly exceed\n the size of the dma array, causing out-of-bounds access warnings\n(trace below is how we noticed this issue).\n\nUBSAN: array-index-out-of-bounds in\ndrivers/net/ethernet/drivers/net/ethernet/google/gve/gve_tx_dqo.c:178:5 index 18 is out of\nrange for type \u0027dma_addr_t[18]\u0027 (aka \u0027unsigned long long[18]\u0027)\nWorkqueue: gve gve_service_task [gve]\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x33/0xa0\n__ubsan_handle_out_of_bounds+0xdc/0x110\ngve_tx_stop_ring_dqo+0x182/0x200 [gve]\ngve_close+0x1be/0x450 [gve]\ngve_reset+0x99/0x120 [gve]\ngve_service_task+0x61/0x100 [gve]\nprocess_scheduled_works+0x1e9/0x380\n\nFix this by properly checking for QPL mode and delegating to\ngve_free_tx_qpl_bufs() to reclaim the buffers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23386",
"url": "https://www.suse.com/security/cve/CVE-2026-23386"
},
{
"category": "external",
"summary": "SUSE Bug 1260799 for CVE-2026-23386",
"url": "https://bugzilla.suse.com/1260799"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23386"
},
{
"cve": "CVE-2026-23395",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23395"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix accepting multiple L2CAP_ECRED_CONN_REQ\n\nCurrently the code attempts to accept requests regardless of the\ncommand identifier which may cause multiple requests to be marked\nas pending (FLAG_DEFER_SETUP) which can cause more than\nL2CAP_ECRED_MAX_CID(5) to be allocated in l2cap_ecred_rsp_defer\ncausing an overflow.\n\nThe spec is quite clear that the same identifier shall not be used on\nsubsequent requests:\n\n\u0027Within each signaling channel a different Identifier shall be used\nfor each successive request or indication.\u0027\nhttps://www.bluetooth.com/wp-content/uploads/Files/Specification/HTML/Core-62/out/en/host/logical-link-control-and-adaptation-protocol-specification.html#UUID-32a25a06-4aa4-c6c7-77c5-dcfe3682355d\n\nSo this attempts to check if there are any channels pending with the\nsame identifier and rejects if any are found.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23395",
"url": "https://www.suse.com/security/cve/CVE-2026-23395"
},
{
"category": "external",
"summary": "SUSE Bug 1260580 for CVE-2026-23395",
"url": "https://bugzilla.suse.com/1260580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23395"
},
{
"cve": "CVE-2026-23398",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23398"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nicmp: fix NULL pointer dereference in icmp_tag_validation()\n\nicmp_tag_validation() unconditionally dereferences the result of\nrcu_dereference(inet_protos[proto]) without checking for NULL.\nThe inet_protos[] array is sparse -- only about 15 of 256 protocol\nnumbers have registered handlers. When ip_no_pmtu_disc is set to 3\n(hardened PMTU mode) and the kernel receives an ICMP Fragmentation\nNeeded error with a quoted inner IP header containing an unregistered\nprotocol number, the NULL dereference causes a kernel panic in\nsoftirq context.\n\n Oops: general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] SMP KASAN NOPTI\n KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\n RIP: 0010:icmp_unreach (net/ipv4/icmp.c:1085 net/ipv4/icmp.c:1143)\n Call Trace:\n \u003cIRQ\u003e\n icmp_rcv (net/ipv4/icmp.c:1527)\n ip_protocol_deliver_rcu (net/ipv4/ip_input.c:207)\n ip_local_deliver_finish (net/ipv4/ip_input.c:242)\n ip_local_deliver (net/ipv4/ip_input.c:262)\n ip_rcv (net/ipv4/ip_input.c:573)\n __netif_receive_skb_one_core (net/core/dev.c:6164)\n process_backlog (net/core/dev.c:6628)\n handle_softirqs (kernel/softirq.c:561)\n \u003c/IRQ\u003e\n\nAdd a NULL check before accessing icmp_strict_tag_validation. If the\nprotocol has no registered handler, return false since it cannot\nperform strict tag validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23398",
"url": "https://www.suse.com/security/cve/CVE-2026-23398"
},
{
"category": "external",
"summary": "SUSE Bug 1260730 for CVE-2026-23398",
"url": "https://bugzilla.suse.com/1260730"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23398"
},
{
"cve": "CVE-2026-23412",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23412"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: bpf: defer hook memory release until rcu readers are done\n\nYiming Qian reports UaF when concurrent process is dumping hooks via\nnfnetlink_hooks:\n\nBUG: KASAN: slab-use-after-free in nfnl_hook_dump_one.isra.0+0xe71/0x10f0\nRead of size 8 at addr ffff888003edbf88 by task poc/79\nCall Trace:\n \u003cTASK\u003e\n nfnl_hook_dump_one.isra.0+0xe71/0x10f0\n netlink_dump+0x554/0x12b0\n nfnl_hook_get+0x176/0x230\n [..]\n\nDefer release until after concurrent readers have completed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23412",
"url": "https://www.suse.com/security/cve/CVE-2026-23412"
},
{
"category": "external",
"summary": "SUSE Bug 1261412 for CVE-2026-23412",
"url": "https://bugzilla.suse.com/1261412"
},
{
"category": "external",
"summary": "SUSE Bug 1261579 for CVE-2026-23412",
"url": "https://bugzilla.suse.com/1261579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "important"
}
],
"title": "CVE-2026-23412"
},
{
"cve": "CVE-2026-23413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23413"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclsact: Fix use-after-free in init/destroy rollback asymmetry\n\nFix a use-after-free in the clsact qdisc upon init/destroy rollback asymmetry.\nThe latter is achieved by first fully initializing a clsact instance, and\nthen in a second step having a replacement failure for the new clsact qdisc\ninstance. clsact_init() initializes ingress first and then takes care of the\negress part. This can fail midway, for example, via tcf_block_get_ext(). Upon\nfailure, the kernel will trigger the clsact_destroy() callback.\n\nCommit 1cb6f0bae504 (\"bpf: Fix too early release of tcx_entry\") details the\nway how the transition is happening. If tcf_block_get_ext on the q-\u003eingress_block\nends up failing, we took the tcx_miniq_inc reference count on the ingress\nside, but not yet on the egress side. clsact_destroy() tests whether the\n{ingress,egress}_entry was non-NULL. However, even in midway failure on the\nreplacement, both are in fact non-NULL with a valid egress_entry from the\nprevious clsact instance.\n\nWhat we really need to test for is whether the qdisc instance-specific ingress\nor egress side previously got initialized. This adds a small helper for checking\nthe miniq initialization called mini_qdisc_pair_inited, and utilizes that upon\nclsact_destroy() in order to fix the use-after-free scenario. Convert the\ningress_destroy() side as well so both are consistent to each other.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23413",
"url": "https://www.suse.com/security/cve/CVE-2026-23413"
},
{
"category": "external",
"summary": "SUSE Bug 1261498 for CVE-2026-23413",
"url": "https://bugzilla.suse.com/1261498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23413"
},
{
"cve": "CVE-2026-23414",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23414"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Purge async_hold in tls_decrypt_async_wait()\n\nThe async_hold queue pins encrypted input skbs while\nthe AEAD engine references their scatterlist data. Once\ntls_decrypt_async_wait() returns, every AEAD operation\nhas completed and the engine no longer references those\nskbs, so they can be freed unconditionally.\n\nA subsequent patch adds batch async decryption to\ntls_sw_read_sock(), introducing a new call site that\nmust drain pending AEAD operations and release held\nskbs. Move __skb_queue_purge(\u0026ctx-\u003easync_hold) into\ntls_decrypt_async_wait() so the purge is centralized\nand every caller -- recvmsg\u0027s drain path, the -EBUSY\nfallback in tls_do_decryption(), and the new read_sock\nbatch path -- releases held skbs on synchronization\nwithout each site managing the purge independently.\n\nThis fixes a leak when tls_strp_msg_hold() fails part-way through,\nafter having added some cloned skbs to the async_hold\nqueue. tls_decrypt_sg() will then call tls_decrypt_async_wait() to\nprocess all pending decrypts, and drop back to synchronous mode, but\ntls_sw_recvmsg() only flushes the async_hold queue when one record has\nbeen processed in \"fully-async\" mode, which may not be the case here.\n\n[pabeni@redhat.com: added leak comment]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23414",
"url": "https://www.suse.com/security/cve/CVE-2026-23414"
},
{
"category": "external",
"summary": "SUSE Bug 1261496 for CVE-2026-23414",
"url": "https://bugzilla.suse.com/1261496"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23414"
},
{
"cve": "CVE-2026-23419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23419"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/rds: Fix circular locking dependency in rds_tcp_tune\n\nsyzbot reported a circular locking dependency in rds_tcp_tune() where\nsk_net_refcnt_upgrade() is called while holding the socket lock:\n\n======================================================\nWARNING: possible circular locking dependency detected\n======================================================\nkworker/u10:8/15040 is trying to acquire lock:\nffffffff8e9aaf80 (fs_reclaim){+.+.}-{0:0},\nat: __kmalloc_cache_noprof+0x4b/0x6f0\n\nbut task is already holding lock:\nffff88805a3c1ce0 (k-sk_lock-AF_INET6){+.+.}-{0:0},\nat: rds_tcp_tune+0xd7/0x930\n\nThe issue occurs because sk_net_refcnt_upgrade() performs memory\nallocation (via get_net_track() -\u003e ref_tracker_alloc()) while the\nsocket lock is held, creating a circular dependency with fs_reclaim.\n\nFix this by moving sk_net_refcnt_upgrade() outside the socket lock\ncritical section. This is safe because the fields modified by the\nsk_net_refcnt_upgrade() call (sk_net_refcnt, ns_tracker) are not\naccessed by any concurrent code path at this point.\n\nv2:\n - Corrected fixes tag\n - check patch line wrap nits\n - ai commentary nits",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23419",
"url": "https://www.suse.com/security/cve/CVE-2026-23419"
},
{
"category": "external",
"summary": "SUSE Bug 1261507 for CVE-2026-23419",
"url": "https://bugzilla.suse.com/1261507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "moderate"
}
],
"title": "CVE-2026-23419"
},
{
"cve": "CVE-2026-31788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/privcmd: restrict usage in unprivileged domU\n\nThe Xen privcmd driver allows to issue arbitrary hypercalls from\nuser space processes. This is normally no problem, as access is\nusually limited to root and the hypervisor will deny any hypercalls\naffecting other domains.\n\nIn case the guest is booted using secure boot, however, the privcmd\ndriver would be enabling a root user process to modify e.g. kernel\nmemory contents, thus breaking the secure boot feature.\n\nThe only known case where an unprivileged domU is really needing to\nuse the privcmd driver is the case when it is acting as the device\nmodel for another guest. In this case all hypercalls issued via the\nprivcmd driver will target that other guest.\n\nFortunately the privcmd driver can already be locked down to allow\nonly hypercalls targeting a specific domain, but this mode can be\nactivated from user land only today.\n\nThe target domain can be obtained from Xenstore, so when not running\nin dom0 restrict the privcmd driver to that target domain from the\nbeginning, resolving the potential problem of breaking secure boot.\n\nThis is XSA-482\n\n---\nV2:\n- defer reading from Xenstore if Xenstore isn\u0027t ready yet (Jan Beulich)\n- wait in open() if target domain isn\u0027t known yet\n- issue message in case no target domain found (Jan Beulich)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31788",
"url": "https://www.suse.com/security/cve/CVE-2026-31788"
},
{
"category": "external",
"summary": "SUSE Bug 1259707 for CVE-2026-31788",
"url": "https://bugzilla.suse.com/1259707"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.0:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.0:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.0:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.0:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T18:28:29Z",
"details": "important"
}
],
"title": "CVE-2026-31788"
}
]
}
SUSE-SU-2026:21114-1
Vulnerability from csaf_suse - Published: 2026-04-13 17:04 - Updated: 2026-04-13 17:04| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise Micro 6.0 and 6.1 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-38542: RDMA/mana_ib: boundary check before installing cq callbacks (bsc#1226591).\n- CVE-2025-39817: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (bsc#1249998).\n- CVE-2025-39998: scsi: target: target_core_configfs: Add length check to avoid buffer overflow (bsc#1252073).\n- CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n (bsc#1253455).\n- CVE-2025-40253: s390/ctcm: Fix double-kfree (bsc#1255084).\n- CVE-2025-68794: iomap: adjust read range correctly for non-block-aligned positions (bsc#1256647).\n- CVE-2025-71125: tracing: Do not register unsupported perf events (bsc#1256784).\n- CVE-2025-71268: btrfs: fix reservation leak in some error paths when inserting inline extent (bsc#1259865).\n- CVE-2025-71269: btrfs: do not free data reservation in fallback from inline due to -ENOSPC (bsc#1259889).\n- CVE-2026-23030: phy: rockchip: inno-usb2: Fix a double free bug in rockchip_usb2phy_probe() (bsc#1257561).\n- CVE-2026-23047: libceph: make calc_target() set t-\u003epaused, not just clear it (bsc#1257682).\n- CVE-2026-23069: vsock/virtio: fix potential underflow in virtio_transport_get_credit() (bsc#1257755).\n- CVE-2026-23088: tracing: Fix crash on synthetic stacktrace field usage (bsc#1257814).\n- CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773).\n- CVE-2026-23120: l2tp: avoid one data-race in l2tp_tunnel_del_work() (bsc#1258280).\n- CVE-2026-23125: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT (bsc#1258293).\n- CVE-2026-23136: libceph: reset sparse-read state in osd_fault() (bsc#1258303).\n- CVE-2026-23140: bpf, test_run: Subtract size of xdp_frame from allowed metadata size (bsc#1258305).\n- CVE-2026-23154: net: fix segmentation of forwarding fraglist GRO (bsc#1258286).\n- CVE-2026-23169: mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() (bsc#1258389).\n- CVE-2026-23187: pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc-\u003edomains (bsc#1258330).\n- CVE-2026-23193: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() (bsc#1258414).\n- CVE-2026-23201: ceph: fix oops due to invalid pointer for kfree() in parse_longname() (bsc#1258337).\n- CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful() (bsc#1258340).\n- CVE-2026-23216: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() (bsc#1258447).\n- CVE-2026-23231: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() (bsc#1259188).\n- CVE-2026-23242: RDMA/siw: Fix potential NULL pointer dereference in header processing (bsc#1259795).\n- CVE-2026-23243: RDMA/umad: Reject negative data_len in ib_umad_write (bsc#1259797).\n- CVE-2026-23255: net: add proper RCU protection to /proc/net/ptype (bsc#1259891).\n- CVE-2026-23262: gve: Fix stats report corruption on queue count change (bsc#1259870).\n- CVE-2026-23270: net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks (bsc#1259886).\n- CVE-2026-23272: netfilter: nf_tables: unconditionally bump set-\u003enelems before insertion (bsc#1260009).\n- CVE-2026-23274: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels (bsc#1260005).\n- CVE-2026-23277: net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit (bsc#1259997).\n- CVE-2026-23278: netfilter: nf_tables: always walk all pending catchall elements (bsc#1259998).\n- CVE-2026-23281: wifi: libertas: fix use-after-free in lbs_free_adapter() (bsc#1260464).\n- CVE-2026-23292: scsi: target: Fix recursive locking in __configfs_open_file() (bsc#1260500).\n- CVE-2026-23293: net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260486).\n- CVE-2026-23304: ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu() (bsc#1260544).\n- CVE-2026-23317: drm/vmwgfx: Return the correct value in vmw_translate_ptr functions (bsc#1260562).\n- CVE-2026-23319: bpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim (bsc#1260735).\n- CVE-2026-23335: RDMA/irdma: Fix kernel stack leak in irdma_create_user_ah() (bsc#1260550).\n- CVE-2026-23343: xdp: produce a warning when calculated tailroom is negative (bsc#1260527).\n- CVE-2026-23361: PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry (bsc#1260732).\n- CVE-2026-23379: net/sched: ets: fix divide by zero in the offload path (bsc#1260481).\n- CVE-2026-23381: net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260471).\n- CVE-2026-23383: bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing (bsc#1260497).\n- CVE-2026-23386: gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL (bsc#1260799).\n- CVE-2026-23395: Bluetooth: L2CAP: Fix accepting multiple L2CAP_ECRED_CONN_REQ (bsc#1260580).\n- CVE-2026-23398: icmp: fix NULL pointer dereference in icmp_tag_validation() (bsc#1260730).\n- CVE-2026-23412: netfilter: bpf: defer hook memory release until rcu readers are done (bsc#1261412).\n- CVE-2026-23413: clsact: Fix use-after-free in init/destroy rollback asymmetry (bsc#1261498).\n- CVE-2026-23414: tls: Purge async_hold in tls_decrypt_async_wait() (bsc#1261496).\n- CVE-2026-23419: net/rds: Fix circular locking dependency in rds_tcp_tune (bsc#1261507).\n- CVE-2026-31788: xen/privcmd: restrict usage in unprivileged domU (bsc#1259707).\n\nThe following non-security bugs were fixed:\n\n- ACPI: EC: clean up handlers on probe failure in acpi_ec_setup() (git-fixes).\n- ACPI: OSI: Add DMI quirk for Acer Aspire One D255 (stable-fixes).\n- ACPI: OSL: fix __iomem type on return from acpi_os_map_generic_address() (git-fixes).\n- ACPI: PM: Save NVS memory on Lenovo G70-35 (stable-fixes).\n- ACPI: processor: Fix previous acpi_processor_errata_piix4() fix (git-fixes).\n- ALSA: caiaq: fix stack out-of-bounds read in init_card (git-fixes).\n- ALSA: firewire-lib: fix uninitialized local variable (git-fixes).\n- ALSA: hda/conexant: Add quirk for HP ZBook Studio G4 (stable-fixes).\n- ALSA: hda/conexant: Fix headphone jack handling on Acer Swift SF314 (stable-fixes).\n- ALSA: hda/realtek: Add headset jack quirk for Thinkpad X390 (stable-fixes).\n- ALSA: hda/realtek: add HP Laptop 14s-dr5xxx mute LED quirk (stable-fixes).\n- ALSA: hda: cs35l56: Fix signedness error in cs35l56_hda_posture_put() (git-fixes).\n- ALSA: pci: hda: use snd_kcontrol_chip() (stable-fixes).\n- ALSA: pcm: fix use-after-free on linked stream runtime in snd_pcm_drain() (git-fixes).\n- ALSA: usb-audio: Check endpoint numbers at parsing Scarlett2 mixer interfaces (stable-fixes).\n- ASoC: Intel: catpt: Fix the device initialization (git-fixes).\n- ASoC: SOF: ipc4-topology: Allow bytes controls without initial payload (git-fixes).\n- ASoC: adau1372: Fix clock leak on PLL lock failure (git-fixes).\n- ASoC: adau1372: Fix unchecked clk_prepare_enable() return value (git-fixes).\n- ASoC: amd: acp-mach-common: Add missing error check for clock acquisition (git-fixes).\n- ASoC: amd: acp3x-rt5682-max9836: Add missing error check for clock acquisition (git-fixes).\n- ASoC: amd: yc: Add ASUS EXPERTBOOK BM1503CDA to quirk table (stable-fixes).\n- ASoC: amd: yc: Add DMI quirk for ASUS EXPERTBOOK PM1503CDA (stable-fixes).\n- ASoC: detect empty DMI strings (git-fixes).\n- ASoC: ep93xx: Fix unchecked clk_prepare_enable() and add rollback on failure (git-fixes).\n- ASoC: fsl_easrc: Fix event generation in fsl_easrc_iec958_put_bits() (stable-fixes).\n- ASoC: fsl_easrc: Fix event generation in fsl_easrc_iec958_set_reg() (stable-fixes).\n- ASoC: qcom: qdsp6: Fix q6apm remove ordering during ADSP stop and start (git-fixes).\n- ASoC: soc-core: drop delayed_work_pending() check before flush (git-fixes).\n- ASoC: soc-core: flush delayed work before removing DAIs and widgets (git-fixes).\n- Bluetooth: HIDP: Fix possible UAF (git-fixes).\n- Bluetooth: L2CAP: Fix ERTM re-init and zero pdu_len infinite loop (git-fixes).\n- Bluetooth: L2CAP: Fix null-ptr-deref on l2cap_sock_ready_cb (git-fixes).\n- Bluetooth: L2CAP: Fix send LE flow credits in ACL link (git-fixes).\n- Bluetooth: L2CAP: Fix type confusion in l2cap_ecred_reconf_rsp() (git-fixes).\n- Bluetooth: L2CAP: Fix use-after-free in l2cap_unregister_user (git-fixes).\n- Bluetooth: L2CAP: Validate L2CAP_INFO_RSP payload length before access (git-fixes).\n- Bluetooth: L2CAP: Validate PDU length before reading SDU length in l2cap_ecred_data_rcv() (git-fixes).\n- Bluetooth: LE L2CAP: Disconnect if received packet\u0027s SDU exceeds IMTU (git-fixes).\n- Bluetooth: LE L2CAP: Disconnect if sum of payload sizes exceed SDU (git-fixes).\n- Bluetooth: MGMT: Fix dangling pointer on mgmt_add_adv_patterns_monitor_complete (git-fixes).\n- Bluetooth: MGMT: validate LTK enc_size on load (git-fixes).\n- Bluetooth: MGMT: validate mesh send advertising payload length (git-fixes).\n- Bluetooth: Remove 3 repeated macro definitions (stable-fixes).\n- Bluetooth: SCO: Fix use-after-free in sco_recv_frame() due to missing sock_hold (git-fixes).\n- Bluetooth: SCO: fix race conditions in sco_sock_connect() (git-fixes).\n- Bluetooth: SMP: derive legacy responder STK authentication from MITM state (git-fixes).\n- Bluetooth: SMP: force responder MITM requirements before building the pairing response (git-fixes).\n- Bluetooth: SMP: make SM/PER/KDU/BI-04-C happy (git-fixes).\n- Bluetooth: btintel: serialize btintel_hw_error() with hci_req_sync_lock (git-fixes).\n- Bluetooth: btusb: clamp SCO altsetting table indices (git-fixes).\n- Bluetooth: hci_event: fix potential UAF in hci_le_remote_conn_param_req_evt (git-fixes).\n- Bluetooth: hci_ll: Fix firmware leak on error path (git-fixes).\n- Bluetooth: hci_sync: Fix hci_le_create_conn_sync (git-fixes).\n- Bluetooth: hci_sync: Remove remaining dependencies of hci_request (stable-fixes).\n- Bluetooth: hci_sync: call destroy in hci_cmd_sync_run if immediate (git-fixes).\n- Drivers: hv: fix missing kernel-doc description for \u0027size\u0027 in request_arr_init() (git-fixes).\n- Drivers: hv: remove stale comment (git-fixes).\n- Drivers: hv: vmbus: Clean up sscanf format specifier in target_cpu_store() (git-fixes).\n- Drivers: hv: vmbus: Fix sysfs output format for ring buffer index (git-fixes).\n- Drivers: hv: vmbus: Fix typos in vmbus_drv.c (git-fixes).\n- HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them (stable-fixes).\n- HID: apple: avoid memory leak in apple_report_fixup() (stable-fixes).\n- HID: asus: avoid memory leak in asus_report_fixup() (stable-fixes).\n- HID: magicmouse: avoid memory leak in magicmouse_report_fixup() (stable-fixes).\n- HID: mcp2221: cancel last I2C command on read error (stable-fixes).\n- Input: synaptics-rmi4 - fix a locking bug in an error path (git-fixes).\n- KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE (bsc#1259461).\n- NFC: nxp-nci: allow GPIOs to sleep (git-fixes).\n- NFC: pn533: bound the UART receive buffer (git-fixes).\n- PCI: Update BAR # and window messages (stable-fixes).\n- PCI: hv: Correct a comment (git-fixes).\n- PCI: hv: Remove unnecessary flex array in struct pci_packet (git-fixes).\n- PCI: hv: Remove unused field pci_bus in struct hv_pcibus_device (git-fixes).\n- PCI: hv: remove unnecessary module_init/exit functions (git-fixes).\n- PM: runtime: Fix a race condition related to device removal (git-fixes).\n- RDMA/mana_ib: Access remote atomic for MRs (bsc#1251135).\n- RDMA/mana_ib: Add EQ creation for rnic adapter (git-fixes).\n- RDMA/mana_ib: Add device statistics support (git-fixes).\n- RDMA/mana_ib: Add device-memory support (git-fixes).\n- RDMA/mana_ib: Add port statistics support (git-fixes).\n- RDMA/mana_ib: Add support of 4M, 1G, and 2G pages (git-fixes).\n- RDMA/mana_ib: Add support of mana_ib for RNIC and ETH nic (git-fixes).\n- RDMA/mana_ib: Adding and deleting GIDs (git-fixes).\n- RDMA/mana_ib: Allow registration of DMA-mapped memory in PDs (git-fixes).\n- RDMA/mana_ib: Configure mac address in RNIC (git-fixes).\n- RDMA/mana_ib: Create and destroy RC QP (git-fixes).\n- RDMA/mana_ib: Create and destroy UD/GSI QP (git-fixes).\n- RDMA/mana_ib: Create and destroy rnic adapter (git-fixes).\n- RDMA/mana_ib: Drain send wrs of GSI QP (git-fixes).\n- RDMA/mana_ib: Enable RoCE on port 1 (git-fixes).\n- RDMA/mana_ib: Extend modify QP (git-fixes).\n- RDMA/mana_ib: Fix DSCP value in modify QP (git-fixes).\n- RDMA/mana_ib: Fix error code in probe() (git-fixes).\n- RDMA/mana_ib: Fix integer overflow during queue creation (bsc#1251135).\n- RDMA/mana_ib: Fix missing ret value (git-fixes).\n- RDMA/mana_ib: Handle net event for pointing to the current netdev (bsc#1256690).\n- RDMA/mana_ib: Implement DMABUF MR support (git-fixes).\n- RDMA/mana_ib: Implement port parameters (git-fixes).\n- RDMA/mana_ib: Implement uapi to create and destroy RC QP (git-fixes).\n- RDMA/mana_ib: Introduce helpers to create and destroy mana queues (git-fixes).\n- RDMA/mana_ib: Introduce mana_ib_get_netdev helper function (git-fixes).\n- RDMA/mana_ib: Introduce mana_ib_install_cq_cb helper function (git-fixes).\n- RDMA/mana_ib: Introduce mdev_to_gc helper function (git-fixes).\n- RDMA/mana_ib: Modify QP state (git-fixes).\n- RDMA/mana_ib: Process QP error events in mana_ib (git-fixes).\n- RDMA/mana_ib: Query feature_flags bitmask from FW (git-fixes).\n- RDMA/mana_ib: Set correct device into ib (git-fixes).\n- RDMA/mana_ib: Take CQ type from the device type (git-fixes).\n- RDMA/mana_ib: UD/GSI QP creation for kernel (git-fixes).\n- RDMA/mana_ib: UD/GSI work requests (git-fixes).\n- RDMA/mana_ib: Use num_comp_vectors of ib_device (git-fixes).\n- RDMA/mana_ib: Use safer allocation function() (bsc#1251135).\n- RDMA/mana_ib: Use struct mana_ib_queue for CQs (git-fixes).\n- RDMA/mana_ib: Use struct mana_ib_queue for RAW QPs (git-fixes).\n- RDMA/mana_ib: Use struct mana_ib_queue for WQs (git-fixes).\n- RDMA/mana_ib: add additional port counters (bsc#1251135).\n- RDMA/mana_ib: add support of multiple ports (bsc#1251135).\n- RDMA/mana_ib: check cqe length for kernel CQs (git-fixes).\n- RDMA/mana_ib: create EQs for RNIC CQs (git-fixes).\n- RDMA/mana_ib: create and destroy RNIC cqs (git-fixes).\n- RDMA/mana_ib: create kernel-level CQs (git-fixes).\n- RDMA/mana_ib: create/destroy AH (git-fixes).\n- RDMA/mana_ib: extend mana QP table (git-fixes).\n- RDMA/mana_ib: extend query device (git-fixes).\n- RDMA/mana_ib: helpers to allocate kernel queues (git-fixes).\n- RDMA/mana_ib: implement get_dma_mr (git-fixes).\n- RDMA/mana_ib: implement req_notify_cq (git-fixes).\n- RDMA/mana_ib: implement uapi for creation of rnic cq (git-fixes).\n- RDMA/mana_ib: indicate CM support (git-fixes).\n- RDMA/mana_ib: introduce a helper to remove cq callbacks (git-fixes).\n- RDMA/mana_ib: polling of CQs for GSI/UD (git-fixes).\n- RDMA/mana_ib: remove useless return values from dbg prints (git-fixes).\n- RDMA/mana_ib: request error CQEs when supported (git-fixes).\n- RDMA/mana_ib: set node_guid (git-fixes).\n- RDMA/mana_ib: support of the zero based MRs (bsc#1251135).\n- RDMA/mana_ib: unify mana_ib functions to support any gdma device (git-fixes).\n- Remove \"scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans\" changes (bsc#1257506).\n- USB: core: Limit the length of unkillable synchronous timeouts (git-fixes).\n- USB: dummy-hcd: Fix interrupt synchronization error (git-fixes).\n- USB: dummy-hcd: Fix locking/synchronization error (git-fixes).\n- USB: ezcap401 needs USB_QUIRK_NO_BOS to function on 10gbs usb speed (stable-fixes).\n- USB: serial: f81232: fix incomplete serial port generation (stable-fixes).\n- USB: usbcore: Introduce usb_bulk_msg_killable() (git-fixes).\n- USB: usbtmc: Use usb_bulk_msg_killable() with user-specified timeouts (git-fixes).\n- accel/qaic: Handle DBC deactivation if the owner went away (git-fixes).\n- apparmor: Fix double free of ns_name in aa_replace_profiles() (bsc#1258849).\n- apparmor: fix differential encoding verification (bsc#1258849).\n- apparmor: fix memory leak in verify_header (bsc#1258849).\n- apparmor: fix missing bounds check on DEFAULT table in verify_dfa() (bsc#1258849).\n- apparmor: fix race between freeing data and fs accessing it (bsc#1258849).\n- apparmor: fix race on rawdata dereference (bsc#1258849).\n- apparmor: fix side-effect bug in match_char() macro usage (bsc#1258849).\n- apparmor: fix unprivileged local user can do privileged policy management (bsc#1258849).\n- apparmor: fix: limit the number of levels of policy namespaces (bsc#1258849).\n- apparmor: replace recursive profile removal with iterative approach (bsc#1258849).\n- apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1258849).\n- batman-adv: Avoid double-rtnl_lock ELP metric worker (git-fixes).\n- bonding: do not set usable_slaves for broadcast mode (git-fixes).\n- btrfs: fix zero size inode with non-zero size after log replay (git-fixes).\n- btrfs: log new dentries when logging parent dir of a conflicting inode (git-fixes).\n- btrfs: tracepoints: get correct superblock from dentry in event btrfs_sync_file() (bsc#1257777).\n- can: bcm: fix locking for bcm_op runtime updates (git-fixes).\n- can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message (git-fixes).\n- can: gw: fix OOB heap access in cgw_csum_crc8_rel() (git-fixes).\n- can: hi311x: hi3110_open(): add check for hi3110_power_enable() return value (git-fixes).\n- can: isotp: fix tx.buf use-after-free in isotp_sendmsg() (git-fixes).\n- can: mcp251x: fix deadlock in error path of mcp251x_open (git-fixes).\n- can: ucan: Fix infinite loop from zero-length messages (git-fixes).\n- can: usb: etas_es58x: correctly anchor the urb in the read bulk callback (git-fixes).\n- comedi: Reinit dev-\u003espinlock between attachments to low-level drivers (git-fixes).\n- comedi: me4000: Fix potential overrun of firmware buffer (git-fixes).\n- comedi: me_daq: Fix potential overrun of firmware buffer (git-fixes).\n- comedi: ni_atmio16d: Fix invalid clean-up after failed attach (git-fixes).\n- crypto: af-alg - fix NULL pointer dereference in scatterwalk (git-fixes).\n- crypto: caam - fix DMA corruption on long hmac keys (git-fixes).\n- crypto: caam - fix overflow on long hmac keys (git-fixes).\n- dmaengine: idxd: Fix freeing the allocated ida too late (git-fixes).\n- dmaengine: idxd: Fix leaking event log memory (git-fixes).\n- dmaengine: idxd: Fix memory leak when a wq is reset (git-fixes).\n- dmaengine: idxd: Fix not releasing workqueue on .release() (git-fixes).\n- dmaengine: idxd: Remove usage of the deprecated ida_simple_xx() API (stable-fixes).\n- dmaengine: idxd: fix possible wrong descriptor completion in llist_abort_desc() (git-fixes).\n- dmaengine: sh: rz-dmac: Move CHCTRL updates under spinlock (git-fixes).\n- dmaengine: sh: rz-dmac: Protect the driver specific lists (git-fixes).\n- dmaengine: xilinx: xdma: Fix regmap init error handling (git-fixes).\n- dmaengine: xilinx: xilinx_dma: Fix dma_device directions (git-fixes).\n- dmaengine: xilinx: xilinx_dma: Fix residue calculation for cyclic DMA (git-fixes).\n- dmaengine: xilinx: xilinx_dma: Fix unmasked residue subtraction (git-fixes).\n- drm/amd/display: Add pixel_clock to amd_pp_display_configuration (stable-fixes).\n- drm/amd/display: Fix DisplayID not-found handling in parse_edid_displayid_vrr() (git-fixes).\n- drm/amd: Set num IP blocks to 0 if discovery fails (stable-fixes).\n- drm/amdgpu/gmc9.0: add bounds checking for cid (stable-fixes).\n- drm/amdgpu/mmhub2.0: add bounds checking for cid (stable-fixes).\n- drm/amdgpu/mmhub2.3: add bounds checking for cid (stable-fixes).\n- drm/amdgpu/mmhub3.0.1: add bounds checking for cid (stable-fixes).\n- drm/amdgpu/mmhub3.0.2: add bounds checking for cid (stable-fixes).\n- drm/amdgpu/mmhub3.0: add bounds checking for cid (stable-fixes).\n- drm/amdgpu: Fix fence put before wait in amdgpu_amdkfd_submit_ib (git-fixes).\n- drm/amdgpu: Fix use-after-free race in VM acquire (stable-fixes).\n- drm/amdgpu: apply state adjust rules to some additional HAINAN vairants (stable-fixes).\n- drm/amdgpu: keep vga memory on MacBooks with switchable graphics (stable-fixes).\n- drm/ast: dp501: Fix initialization of SCU2C (git-fixes).\n- drm/bridge: ti-sn65dsi83: fix CHA_DSI_CLK_RANGE rounding (git-fixes).\n- drm/bridge: ti-sn65dsi86: Add support for DisplayPort mode with HPD (stable-fixes).\n- drm/i915/dp: Use crtc_state-\u003eenhanced_framing properly on ivb/hsw CPU eDP (git-fixes).\n- drm/i915/gmbus: fix spurious timeout on 512-byte burst reads (git-fixes).\n- drm/i915/gt: Check set_default_submission() before deferencing (git-fixes).\n- drm/ioc32: stop speculation on the drm_compat_ioctl path (git-fixes).\n- drm/msm/dsi: Document DSC related pclk_rate and hdisplay calculations (stable-fixes).\n- drm/msm/dsi: fix hdisplay calculation when programming dsi registers (git-fixes).\n- drm/msm/dsi: fix pclk rate calculation for bonded dsi (git-fixes).\n- drm/radeon: apply state adjust rules to some additional HAINAN vairants (stable-fixes).\n- drm/sched: Fix kernel-doc warning for drm_sched_job_done() (git-fixes).\n- drm/solomon: Fix page start when updating rectangle in page addressing mode (git-fixes).\n- firmware: arm_scpi: Fix device_node reference leak in probe path (git-fixes).\n- gpio: mxc: map Both Edge pad wakeup to Rising Edge (git-fixes).\n- hv/hv_kvp_daemon: Handle IPv4 and Ipv6 combination for keyfile format (git-fixes).\n- hv/hv_kvp_daemon: Pass NIC name to hv_get_dns_info as well (git-fixes).\n- hwmon: (adm1177) fix sysfs ABI violation and current unit conversion (git-fixes).\n- hwmon: (axi-fan-control) Make use of dev_err_probe() (stable-fixes).\n- hwmon: (axi-fan-control) Use device firmware agnostic API (stable-fixes).\n- hwmon: (it87) Check the it87_lock() return value (git-fixes).\n- hwmon: (occ) Fix division by zero in occ_show_power_1() (git-fixes).\n- hwmon: (occ) Fix missing newline in occ_show_extended() (git-fixes).\n- hwmon: (peci/cputemp) Fix crit_hyst returning delta instead of absolute temperature (git-fixes).\n- hwmon: (peci/cputemp) Fix off-by-one in cputemp_is_visible() (git-fixes).\n- hwmon: (pmbus/isl68137) Add mutex protection for AVS enable sysfs attributes (git-fixes).\n- hwmon: (pmbus/isl68137) Fix unchecked return value and use sysfs_emit() (git-fixes).\n- hwmon: (pmbus/q54sj108a2) fix stack overflow in debugfs read (git-fixes).\n- hwmon: (pxe1610) Check return value of page-select write in probe (git-fixes).\n- hwmon: (tps53679) Fix device ID comparison and printing in tps53676_identify() (git-fixes).\n- hwmon: axi-fan: do not use driver_override as IRQ name (git-fixes).\n- i2c: cp2615: fix serial string NULL-deref at probe (git-fixes).\n- i2c: cp2615: replace deprecated strncpy with strscpy (stable-fixes).\n- i2c: fsi: Fix a potential leak in fsi_i2c_probe() (git-fixes).\n- i2c: pxa: defer reset on Armada 3700 when recovery is used (git-fixes).\n- idpf: nullify pointers after they are freed (git-fixes).\n- iio: accel: fix ADXL355 temperature signature value (git-fixes).\n- iio: adc: ti-adc161s626: fix buffer read on big-endian (git-fixes).\n- iio: chemical: bme680: Fix measurement wait duration calculation (git-fixes).\n- iio: chemical: sps30_i2c: fix buffer size in sps30_i2c_read_meas() (git-fixes).\n- iio: chemical: sps30_serial: fix buffer size in sps30_serial_read_meas() (git-fixes).\n- iio: dac: ad5770r: fix error return in ad5770r_read_raw() (git-fixes).\n- iio: dac: ds4424: reject -128 RAW value (git-fixes).\n- iio: frequency: adf4377: Fix duplicated soft reset mask (git-fixes).\n- iio: gyro: mpu3050-core: fix pm_runtime error handling (git-fixes).\n- iio: gyro: mpu3050-i2c: fix pm_runtime error handling (git-fixes).\n- iio: gyro: mpu3050: Fix incorrect free_irq() variable (git-fixes).\n- iio: gyro: mpu3050: Fix irq resource leak (git-fixes).\n- iio: gyro: mpu3050: Fix out-of-sequence free_irq() (git-fixes).\n- iio: gyro: mpu3050: Move iio_device_register() to correct location (git-fixes).\n- iio: imu: bmi160: Remove potential undefined behavior in bmi160_config_pin() (git-fixes).\n- iio: imu: bno055: fix BNO055_SCAN_CH_COUNT off by one (git-fixes).\n- iio: imu: inv_icm42600: fix odr switch to the same value (git-fixes).\n- iio: imu: st_lsm6dsx: Set FIFO ODR for accelerometer and gyroscope only (git-fixes).\n- iio: light: vcnl4035: fix scan buffer on big-endian (git-fixes).\n- iio: potentiometer: mcp4131: fix double application of wiper shift (git-fixes).\n- media: mc, v4l2: serialize REINIT and REQBUFS with req_queue_mutex (git-fixes).\n- media: tegra-video: Use accessors for pad config \u0027try_*\u0027 fields (stable-fixes).\n- mfd: omap-usb-host: Convert to platform remove callback returning void (stable-fixes).\n- mfd: omap-usb-host: Fix OF populate on driver rebind (git-fixes).\n- mfd: qcom-pm8xxx: Convert to platform remove callback returning void (stable-fixes).\n- mfd: qcom-pm8xxx: Fix OF populate on driver rebind (git-fixes).\n- misc: fastrpc: possible double-free of cctx-\u003eremote_heap (git-fixes).\n- mmc: sdhci-pci-gli: fix GL9750 DMA write corruption (git-fixes).\n- mmc: sdhci: fix timing selection for 1-bit bus width (git-fixes).\n- mtd: Avoid boot crash in RedBoot partition table parser (git-fixes).\n- mtd: rawnand: brcmnand: skip DMA during panic write (git-fixes).\n- mtd: rawnand: cadence: Fix error check for dma_alloc_coherent() in cadence_nand_init() (git-fixes).\n- mtd: rawnand: pl353: make sure optimal timings are applied (git-fixes).\n- mtd: rawnand: serialize lock/unlock against other NAND operations (git-fixes).\n- mtd: spi-nor: core: avoid odd length/address reads on 8D-8D-8D mode (stable-fixes).\n- mtd: spi-nor: core: avoid odd length/address writes in 8D-8D-8D mode (stable-fixes).\n- net/mana: Null service_wq on setup error to prevent double destroy (git-fix).\n- net/mlx5: Fix crash when moving to switchdev mode (git-fixes).\n- net/rose: fix NULL pointer dereference in rose_transmit_link on reconnect (git-fixes).\n- net/x25: Fix overflow when accumulating packets (git-fixes).\n- net/x25: Fix potential double free of skb (git-fixes).\n- net: mana: Add metadata support for xdp mode (git-fixes).\n- net: mana: Add standard counter rx_missed_errors (git-fixes).\n- net: mana: Add support for auxiliary device servicing events (bsc#1251971).\n- net: mana: Change the function signature of mana_get_primary_netdev_rcu (bsc#1256690).\n- net: mana: Drop TX skb on post_work_request failure and unmap resources (git-fixes).\n- net: mana: Fix double destroy_workqueue on service rescan PCI path (git-fixes).\n- net: mana: Fix use-after-free in reset service rescan path (git-fixes).\n- net: mana: Fix warnings for missing export.h header inclusion (git-fixes).\n- net: mana: Handle Reset Request from MANA NIC (bsc#1245728 bsc#1251971).\n- net: mana: Handle SKB if TX SGEs exceed hardware limit (git-fixes).\n- net: mana: Handle hardware recovery events when probing the device (bsc#1257466).\n- net: mana: Handle unsupported HWC commands (git-fixes).\n- net: mana: Implement ndo_tx_timeout and serialize queue resets per port (bsc#1257472).\n- net: mana: Move hardware counter stats from per-port to per-VF context (git-fixes).\n- net: mana: Probe rdma device in mana driver (git-fixes).\n- net: mana: Reduce waiting time if HWC not responding (bsc#1252266).\n- net: mana: Ring doorbell at 4 CQ wraparounds (git-fixes).\n- net: mana: Support HW link state events (bsc#1253049).\n- net: mana: Trigger VF reset/recovery on health check failure due to HWC timeout (bsc#1259580).\n- net: mana: Use mana_cleanup_port_context() for rxq cleanup (git-fixes).\n- net: mana: fix spelling for mana_gd_deregiser_irq() (git-fixes).\n- net: mana: fix use-after-free in add_adev() error path (git-fixes).\n- net: mana: use ethtool string helpers (git-fixes).\n- net: nfc: nci: Fix zero-length proprietary notifications (git-fixes).\n- net: usb: aqc111: Do not perform PM inside suspend callback (git-fixes).\n- net: usb: cdc_ncm: add ndpoffset to NDP16 nframes bounds check (git-fixes).\n- net: usb: cdc_ncm: add ndpoffset to NDP32 nframes bounds check (git-fixes).\n- net: usb: lan78xx: fix TX byte statistics for small packets (git-fixes).\n- net: usb: lan78xx: fix silent drop of packets with checksum errors (git-fixes).\n- net: usb: pegasus: validate USB endpoints (stable-fixes).\n- nfc: nci: clear NCI_DATA_EXCHANGE before calling completion callback (git-fixes).\n- nfc: nci: fix circular locking dependency in nci_close_device (git-fixes).\n- nfc: nci: free skb on nci_transceive early error paths (git-fixes).\n- nfc: rawsock: cancel tx_work before socket teardown (git-fixes).\n- nouveau/dpcd: return EBUSY for aux xfer if the device is asleep (git-fixes).\n- phy: ti: j721e-wiz: Fix device node reference leak in wiz_get_lane_phy_types() (git-fixes).\n- pinctrl: equilibrium: fix warning trace on load (git-fixes).\n- pinctrl: equilibrium: rename irq_chip function callbacks (stable-fixes).\n- pinctrl: mediatek: common: Fix probe failure for devices without EINT (git-fixes).\n- pinctrl: qcom: spmi-gpio: implement .get_direction() (git-fixes).\n- platform/olpc: olpc-xo175-ec: Fix overflow error message to print inlen (git-fixes).\n- platform/x86: ISST: Correct locked bit width (git-fixes).\n- platform/x86: dell-wmi-sysman: Do not hex dump plaintext password data (git-fixes).\n- platform/x86: dell-wmi: Add audio/mic mute key codes (stable-fixes).\n- platform/x86: intel-hid: Add Dell 14 Plus 2-in-1 to dmi_vgbs_allow_list (stable-fixes).\n- platform/x86: intel-hid: Enable 5-button array on ThinkPad X1 Fold 16 Gen 1 (stable-fixes).\n- platform/x86: touchscreen_dmi: Add quirk for y-inverted Goodix touchscreen on SUPI S10 (stable-fixes).\n- qmi_wwan: allow max_mtu above hard_mtu to control rx_urb_size (git-fixes).\n- regmap: Synchronize cache for the page selector (git-fixes).\n- regulator: pca9450: Correct interrupt type (git-fixes).\n- regulator: pca9450: Make IRQ optional (stable-fixes).\n- remoteproc: sysmon: Correct subsys_name_len type in QMI request (git-fixes).\n- rename Hyper-v patch files to simplify further SP6-SP7 merges\n- s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP (bsc#1254306).\n- scsi: mpi3mr: Event processing debug improvement (bsc#1251186, bsc#1258832).\n- scsi: storvsc: Fix scheduling while atomic on PREEMPT_RT (git-fixes).\n- scsi: storvsc: Remove redundant ternary operators (git-fixes).\n- selftests/powerpc: Re-order *FLAGS to follow lib.mk (bsc#1261669).\n- selftests/powerpc: Suppress -Wmaybe-uninitialized with GCC 15 (bsc#1261669).\n- selftests/powerpc: make sub-folders buildable on their own (bsc#1261669).\n- serial: 8250: Add late synchronize_irq() to shutdown to handle DW UART BUSY (git-fixes).\n- serial: 8250: Fix TX deadlock when using DMA (git-fixes).\n- serial: 8250_pci: add support for the AX99100 (stable-fixes).\n- serial: uartlite: fix PM runtime usage count underflow on probe (git-fixes).\n- soc: aspeed: socinfo: Mask table entries for accurate SoC ID matching (git-fixes).\n- soc: fsl: qbman: fix race condition in qman_destroy_fq (git-fixes).\n- spi: fix statistics allocation (git-fixes).\n- spi: fix use-after-free on controller registration failure (git-fixes).\n- spi: spi-fsl-lpspi: fix teardown order issue (UAF) (git-fixes).\n- staging: rtl8723bs: properly validate the data in rtw_get_ie_ex() (stable-fixes).\n- tg3: Fix race for querying speed/duplex (bsc#1257183).\n- thunderbolt: Fix property read in nhi_wake_supported() (git-fixes).\n- tools/hv: add a .gitignore file (git-fixes).\n- tools/hv: reduce resouce usage in hv_get_dns_info helper (git-fixes).\n- tools/hv: reduce resource usage in hv_kvp_daemon (git-fixes).\n- tools: hv: Enable debug logs for hv_kvp_daemon (git-fixes).\n- tools: hv: lsvmbus: change shebang to use python3 (git-fixes).\n- usb/core/quirks: Add Huawei ME906S-device to wakeup quirk (stable-fixes).\n- usb: cdc-acm: Restore CAP_BRK functionnality to CH343 (git-fixes).\n- usb: cdns3: call cdns_power_is_lost() only once in cdns_resume() (stable-fixes).\n- usb: cdns3: fix role switching during resume (git-fixes).\n- usb: cdns3: gadget: fix NULL pointer dereference in ep_queue (git-fixes).\n- usb: cdns3: gadget: fix state inconsistency on gadget init failure (git-fixes).\n- usb: cdns3: remove redundant if branch (stable-fixes).\n- usb: class: cdc-wdm: fix reordering issue in read code path (git-fixes).\n- usb: core: do not power off roothub PHYs if phy_set_mode() fails (git-fixes).\n- usb: dwc2: gadget: Fix spin_lock/unlock mismatch in dwc2_hsotg_udc_stop() (git-fixes).\n- usb: dwc3: pci: add support for the Intel Nova Lake -H (stable-fixes).\n- usb: ehci-brcm: fix sleep during atomic (git-fixes).\n- usb: gadget: f_mass_storage: Fix potential integer overflow in check_command_size_in_blocks() (git-fixes).\n- usb: gadget: f_rndis: Protect RNDIS options with mutex (git-fixes).\n- usb: gadget: f_subset: Fix unbalanced refcnt in geth_free (git-fixes).\n- usb: gadget: u_ether: Fix race between gether_disconnect and eth_stop (git-fixes).\n- usb: gadget: uvc: fix NULL pointer dereference during unbind race (git-fixes).\n- usb: image: mdc800: kill download URB on timeout (stable-fixes).\n- usb: mdc800: handle signal and read racing (stable-fixes).\n- usb: misc: uss720: properly clean up reference in uss720_probe() (stable-fixes).\n- usb: renesas_usbhs: fix use-after-free in ISR during device removal (git-fixes).\n- usb: roles: get usb role switch from parent only for usb-b-connector (git-fixes).\n- usb: ulpi: fix double free in ulpi_register_interface() error path (git-fixes).\n- usb: usbtmc: Flush anchored URBs in usbtmc_release (git-fixes).\n- usb: xhci: Fix memory leak in xhci_disable_slot() (git-fixes).\n- usb: xhci: Prevent interrupt storm on host controller error (HCE) (stable-fixes).\n- usb: yurex: fix race in probe (stable-fixes).\n- wifi: cfg80211: cancel pmsr_free_wk in cfg80211_pmsr_wdev_down (git-fixes).\n- wifi: cw1200: Fix locking in error paths (git-fixes).\n- wifi: iwlwifi: mvm: fix potential out-of-bounds read in iwl_mvm_nd_match_info_handler() (git-fixes).\n- wifi: mac80211: Fix static_branch_dec() underflow for aql_disable (git-fixes).\n- wifi: mac80211: fix NULL deref in mesh_matches_local() (git-fixes).\n- wifi: mac80211: set default WMM parameters on all links (stable-fixes).\n- wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211() (git-fixes).\n- wifi: mt76: mt7925: Fix possible oob access in mt7925_mac_write_txwi_80211() (git-fixes).\n- wifi: mt76: mt7996: Fix possible oob access in mt7996_mac_write_txwi_80211() (git-fixes).\n- wifi: rsi: Do not default to -EOPNOTSUPP in rsi_mac80211_config (git-fixes).\n- wifi: wilc1000: fix u8 overflow in SSID scan buffer size calculation (git-fixes).\n- wifi: wlcore: Fix a locking bug (git-fixes).\n- wifi: wlcore: Return -ENOMEM instead of -EAGAIN if there is not enough headroom (git-fixes).\n- x86/platform/uv: Handle deconfigured sockets (bsc#1260347).\n- xen/privcmd: unregister xenstore notifier on module exit (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-kernel-340",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21114-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21114-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621114-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21114-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025429.html"
},
{
"category": "self",
"summary": "SUSE Bug 1226591",
"url": "https://bugzilla.suse.com/1226591"
},
{
"category": "self",
"summary": "SUSE Bug 1245728",
"url": "https://bugzilla.suse.com/1245728"
},
{
"category": "self",
"summary": "SUSE Bug 1249998",
"url": "https://bugzilla.suse.com/1249998"
},
{
"category": "self",
"summary": "SUSE Bug 1251135",
"url": "https://bugzilla.suse.com/1251135"
},
{
"category": "self",
"summary": "SUSE Bug 1251186",
"url": "https://bugzilla.suse.com/1251186"
},
{
"category": "self",
"summary": "SUSE Bug 1251971",
"url": "https://bugzilla.suse.com/1251971"
},
{
"category": "self",
"summary": "SUSE Bug 1252073",
"url": "https://bugzilla.suse.com/1252073"
},
{
"category": "self",
"summary": "SUSE Bug 1252266",
"url": "https://bugzilla.suse.com/1252266"
},
{
"category": "self",
"summary": "SUSE Bug 1253049",
"url": "https://bugzilla.suse.com/1253049"
},
{
"category": "self",
"summary": "SUSE Bug 1253455",
"url": "https://bugzilla.suse.com/1253455"
},
{
"category": "self",
"summary": "SUSE Bug 1254306",
"url": "https://bugzilla.suse.com/1254306"
},
{
"category": "self",
"summary": "SUSE Bug 1255084",
"url": "https://bugzilla.suse.com/1255084"
},
{
"category": "self",
"summary": "SUSE Bug 1256645",
"url": "https://bugzilla.suse.com/1256645"
},
{
"category": "self",
"summary": "SUSE Bug 1256647",
"url": "https://bugzilla.suse.com/1256647"
},
{
"category": "self",
"summary": "SUSE Bug 1256690",
"url": "https://bugzilla.suse.com/1256690"
},
{
"category": "self",
"summary": "SUSE Bug 1256784",
"url": "https://bugzilla.suse.com/1256784"
},
{
"category": "self",
"summary": "SUSE Bug 1257183",
"url": "https://bugzilla.suse.com/1257183"
},
{
"category": "self",
"summary": "SUSE Bug 1257466",
"url": "https://bugzilla.suse.com/1257466"
},
{
"category": "self",
"summary": "SUSE Bug 1257472",
"url": "https://bugzilla.suse.com/1257472"
},
{
"category": "self",
"summary": "SUSE Bug 1257473",
"url": "https://bugzilla.suse.com/1257473"
},
{
"category": "self",
"summary": "SUSE Bug 1257506",
"url": "https://bugzilla.suse.com/1257506"
},
{
"category": "self",
"summary": "SUSE Bug 1257561",
"url": "https://bugzilla.suse.com/1257561"
},
{
"category": "self",
"summary": "SUSE Bug 1257682",
"url": "https://bugzilla.suse.com/1257682"
},
{
"category": "self",
"summary": "SUSE Bug 1257732",
"url": "https://bugzilla.suse.com/1257732"
},
{
"category": "self",
"summary": "SUSE Bug 1257755",
"url": "https://bugzilla.suse.com/1257755"
},
{
"category": "self",
"summary": "SUSE Bug 1257773",
"url": "https://bugzilla.suse.com/1257773"
},
{
"category": "self",
"summary": "SUSE Bug 1257777",
"url": "https://bugzilla.suse.com/1257777"
},
{
"category": "self",
"summary": "SUSE Bug 1257814",
"url": "https://bugzilla.suse.com/1257814"
},
{
"category": "self",
"summary": "SUSE Bug 1257952",
"url": "https://bugzilla.suse.com/1257952"
},
{
"category": "self",
"summary": "SUSE Bug 1258280",
"url": "https://bugzilla.suse.com/1258280"
},
{
"category": "self",
"summary": "SUSE Bug 1258286",
"url": "https://bugzilla.suse.com/1258286"
},
{
"category": "self",
"summary": "SUSE Bug 1258293",
"url": "https://bugzilla.suse.com/1258293"
},
{
"category": "self",
"summary": "SUSE Bug 1258303",
"url": "https://bugzilla.suse.com/1258303"
},
{
"category": "self",
"summary": "SUSE Bug 1258305",
"url": "https://bugzilla.suse.com/1258305"
},
{
"category": "self",
"summary": "SUSE Bug 1258330",
"url": "https://bugzilla.suse.com/1258330"
},
{
"category": "self",
"summary": "SUSE Bug 1258337",
"url": "https://bugzilla.suse.com/1258337"
},
{
"category": "self",
"summary": "SUSE Bug 1258338",
"url": "https://bugzilla.suse.com/1258338"
},
{
"category": "self",
"summary": "SUSE Bug 1258340",
"url": "https://bugzilla.suse.com/1258340"
},
{
"category": "self",
"summary": "SUSE Bug 1258376",
"url": "https://bugzilla.suse.com/1258376"
},
{
"category": "self",
"summary": "SUSE Bug 1258389",
"url": "https://bugzilla.suse.com/1258389"
},
{
"category": "self",
"summary": "SUSE Bug 1258414",
"url": "https://bugzilla.suse.com/1258414"
},
{
"category": "self",
"summary": "SUSE Bug 1258424",
"url": "https://bugzilla.suse.com/1258424"
},
{
"category": "self",
"summary": "SUSE Bug 1258447",
"url": "https://bugzilla.suse.com/1258447"
},
{
"category": "self",
"summary": "SUSE Bug 1258524",
"url": "https://bugzilla.suse.com/1258524"
},
{
"category": "self",
"summary": "SUSE Bug 1258832",
"url": "https://bugzilla.suse.com/1258832"
},
{
"category": "self",
"summary": "SUSE Bug 1258849",
"url": "https://bugzilla.suse.com/1258849"
},
{
"category": "self",
"summary": "SUSE Bug 1259188",
"url": "https://bugzilla.suse.com/1259188"
},
{
"category": "self",
"summary": "SUSE Bug 1259461",
"url": "https://bugzilla.suse.com/1259461"
},
{
"category": "self",
"summary": "SUSE Bug 1259580",
"url": "https://bugzilla.suse.com/1259580"
},
{
"category": "self",
"summary": "SUSE Bug 1259707",
"url": "https://bugzilla.suse.com/1259707"
},
{
"category": "self",
"summary": "SUSE Bug 1259795",
"url": "https://bugzilla.suse.com/1259795"
},
{
"category": "self",
"summary": "SUSE Bug 1259797",
"url": "https://bugzilla.suse.com/1259797"
},
{
"category": "self",
"summary": "SUSE Bug 1259865",
"url": "https://bugzilla.suse.com/1259865"
},
{
"category": "self",
"summary": "SUSE Bug 1259870",
"url": "https://bugzilla.suse.com/1259870"
},
{
"category": "self",
"summary": "SUSE Bug 1259886",
"url": "https://bugzilla.suse.com/1259886"
},
{
"category": "self",
"summary": "SUSE Bug 1259889",
"url": "https://bugzilla.suse.com/1259889"
},
{
"category": "self",
"summary": "SUSE Bug 1259891",
"url": "https://bugzilla.suse.com/1259891"
},
{
"category": "self",
"summary": "SUSE Bug 1259997",
"url": "https://bugzilla.suse.com/1259997"
},
{
"category": "self",
"summary": "SUSE Bug 1259998",
"url": "https://bugzilla.suse.com/1259998"
},
{
"category": "self",
"summary": "SUSE Bug 1260005",
"url": "https://bugzilla.suse.com/1260005"
},
{
"category": "self",
"summary": "SUSE Bug 1260009",
"url": "https://bugzilla.suse.com/1260009"
},
{
"category": "self",
"summary": "SUSE Bug 1260347",
"url": "https://bugzilla.suse.com/1260347"
},
{
"category": "self",
"summary": "SUSE Bug 1260464",
"url": "https://bugzilla.suse.com/1260464"
},
{
"category": "self",
"summary": "SUSE Bug 1260471",
"url": "https://bugzilla.suse.com/1260471"
},
{
"category": "self",
"summary": "SUSE Bug 1260481",
"url": "https://bugzilla.suse.com/1260481"
},
{
"category": "self",
"summary": "SUSE Bug 1260486",
"url": "https://bugzilla.suse.com/1260486"
},
{
"category": "self",
"summary": "SUSE Bug 1260497",
"url": "https://bugzilla.suse.com/1260497"
},
{
"category": "self",
"summary": "SUSE Bug 1260500",
"url": "https://bugzilla.suse.com/1260500"
},
{
"category": "self",
"summary": "SUSE Bug 1260527",
"url": "https://bugzilla.suse.com/1260527"
},
{
"category": "self",
"summary": "SUSE Bug 1260544",
"url": "https://bugzilla.suse.com/1260544"
},
{
"category": "self",
"summary": "SUSE Bug 1260550",
"url": "https://bugzilla.suse.com/1260550"
},
{
"category": "self",
"summary": "SUSE Bug 1260562",
"url": "https://bugzilla.suse.com/1260562"
},
{
"category": "self",
"summary": "SUSE Bug 1260580",
"url": "https://bugzilla.suse.com/1260580"
},
{
"category": "self",
"summary": "SUSE Bug 1260730",
"url": "https://bugzilla.suse.com/1260730"
},
{
"category": "self",
"summary": "SUSE Bug 1260732",
"url": "https://bugzilla.suse.com/1260732"
},
{
"category": "self",
"summary": "SUSE Bug 1260735",
"url": "https://bugzilla.suse.com/1260735"
},
{
"category": "self",
"summary": "SUSE Bug 1260799",
"url": "https://bugzilla.suse.com/1260799"
},
{
"category": "self",
"summary": "SUSE Bug 1261412",
"url": "https://bugzilla.suse.com/1261412"
},
{
"category": "self",
"summary": "SUSE Bug 1261496",
"url": "https://bugzilla.suse.com/1261496"
},
{
"category": "self",
"summary": "SUSE Bug 1261498",
"url": "https://bugzilla.suse.com/1261498"
},
{
"category": "self",
"summary": "SUSE Bug 1261507",
"url": "https://bugzilla.suse.com/1261507"
},
{
"category": "self",
"summary": "SUSE Bug 1261669",
"url": "https://bugzilla.suse.com/1261669"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38542 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39817 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39998 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40201 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40253 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68794 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68794/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71066 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71066/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71125 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71268 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71269 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71269/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23030 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23030/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23047 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23054 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23054/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23069 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23069/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23088 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23088/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23103 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23120 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23125 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23136 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23136/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23140 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23154 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23157 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23169 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23187 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23193 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23193/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23201 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23202 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23204 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23207 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23216 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23216/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23231 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23242 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23242/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23243 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23243/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23255 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23255/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23262 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23262/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23270 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23270/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23272 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23272/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23274 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23274/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23277 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23277/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23278 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23278/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23281 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23292 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23292/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23293 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23293/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23304 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23317 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23317/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23319 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23335 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23335/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23343 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23343/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23361 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23379 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23381 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23383 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23386 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23395 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23395/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23398 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23398/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23412 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23412/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23413 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23413/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23414 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23414/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23419 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31788 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31788/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-04-13T17:04:49Z",
"generator": {
"date": "2026-04-13T17:04:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21114-1",
"initial_release_date": "2026-04-13T17:04:49Z",
"revision_history": [
{
"date": "2026-04-13T17:04:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-41.1.aarch64",
"product": {
"name": "kernel-default-6.4.0-41.1.aarch64",
"product_id": "kernel-default-6.4.0-41.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-41.1.21.18.aarch64",
"product": {
"name": "kernel-default-base-6.4.0-41.1.21.18.aarch64",
"product_id": "kernel-default-base-6.4.0-41.1.21.18.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-41.1.aarch64",
"product": {
"name": "kernel-default-devel-6.4.0-41.1.aarch64",
"product_id": "kernel-default-devel-6.4.0-41.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.4.0-41.1.noarch",
"product": {
"name": "kernel-devel-6.4.0-41.1.noarch",
"product_id": "kernel-devel-6.4.0-41.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.4.0-41.1.noarch",
"product": {
"name": "kernel-macros-6.4.0-41.1.noarch",
"product_id": "kernel-macros-6.4.0-41.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.4.0-41.1.noarch",
"product": {
"name": "kernel-source-6.4.0-41.1.noarch",
"product_id": "kernel-source-6.4.0-41.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-41.1.ppc64le",
"product": {
"name": "kernel-default-6.4.0-41.1.ppc64le",
"product_id": "kernel-default-6.4.0-41.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"product": {
"name": "kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"product_id": "kernel-default-base-6.4.0-41.1.21.18.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-41.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.4.0-41.1.ppc64le",
"product_id": "kernel-default-devel-6.4.0-41.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-41.1.s390x",
"product": {
"name": "kernel-default-6.4.0-41.1.s390x",
"product_id": "kernel-default-6.4.0-41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-41.1.s390x",
"product": {
"name": "kernel-default-devel-6.4.0-41.1.s390x",
"product_id": "kernel-default-devel-6.4.0-41.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-41.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.4.0-41.1.s390x",
"product_id": "kernel-default-livepatch-6.4.0-41.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.4.0-41.1.x86_64",
"product": {
"name": "kernel-default-6.4.0-41.1.x86_64",
"product_id": "kernel-default-6.4.0-41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-41.1.21.18.x86_64",
"product": {
"name": "kernel-default-base-6.4.0-41.1.21.18.x86_64",
"product_id": "kernel-default-base-6.4.0-41.1.21.18.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-41.1.x86_64",
"product": {
"name": "kernel-default-devel-6.4.0-41.1.x86_64",
"product_id": "kernel-default-devel-6.4.0-41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-41.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.4.0-41.1.x86_64",
"product_id": "kernel-default-livepatch-6.4.0-41.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-41.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.4.0-41.1.x86_64",
"product_id": "kernel-kvmsmall-6.4.0-41.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-41.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64"
},
"product_reference": "kernel-default-6.4.0-41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-41.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le"
},
"product_reference": "kernel-default-6.4.0-41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-41.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x"
},
"product_reference": "kernel-default-6.4.0-41.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-41.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-41.1.21.18.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-41.1.21.18.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-41.1.21.18.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-41.1.21.18.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-41.1.21.18.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-41.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-41.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-41.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-41.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-41.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-41.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-41.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-41.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-41.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-41.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-41.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-41.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-41.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.4.0-41.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-41.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-41.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-41.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
},
"product_reference": "kernel-source-6.4.0-41.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-38542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38542"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mana_ib: boundary check before installing cq callbacks\n\nAdd a boundary check inside mana_ib_install_cq_cb to prevent index overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38542",
"url": "https://www.suse.com/security/cve/CVE-2024-38542"
},
{
"category": "external",
"summary": "SUSE Bug 1226591 for CVE-2024-38542",
"url": "https://bugzilla.suse.com/1226591"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2024-38542"
},
{
"cve": "CVE-2025-39817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39817"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: Fix slab-out-of-bounds in efivarfs_d_compare\n\nObserved on kernel 6.6 (present on master as well):\n\n BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0\n Call trace:\n kasan_check_range+0xe8/0x190\n __asan_loadN+0x1c/0x28\n memcmp+0x98/0xd0\n efivarfs_d_compare+0x68/0xd8\n __d_lookup_rcu_op_compare+0x178/0x218\n __d_lookup_rcu+0x1f8/0x228\n d_alloc_parallel+0x150/0x648\n lookup_open.isra.0+0x5f0/0x8d0\n open_last_lookups+0x264/0x828\n path_openat+0x130/0x3f8\n do_filp_open+0x114/0x248\n do_sys_openat2+0x340/0x3c0\n __arm64_sys_openat+0x120/0x1a0\n\nIf dentry-\u003ed_name.len \u003c EFI_VARIABLE_GUID_LEN , \u0027guid\u0027 can become\nnegative, leadings to oob. The issue can be triggered by parallel\nlookups using invalid filename:\n\n T1\t\t\tT2\n lookup_open\n -\u003elookup\n simple_lookup\n d_add\n // invalid dentry is added to hash list\n\n\t\t\tlookup_open\n\t\t\t d_alloc_parallel\n\t\t\t __d_lookup_rcu\n\t\t\t __d_lookup_rcu_op_compare\n\t\t\t hlist_bl_for_each_entry_rcu\n\t\t\t // invalid dentry can be retrieved\n\t\t\t -\u003ed_compare\n\t\t\t efivarfs_d_compare\n\t\t\t // oob\n\nFix it by checking \u0027guid\u0027 before cmp.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39817",
"url": "https://www.suse.com/security/cve/CVE-2025-39817"
},
{
"category": "external",
"summary": "SUSE Bug 1249998 for CVE-2025-39817",
"url": "https://bugzilla.suse.com/1249998"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-39817"
},
{
"cve": "CVE-2025-39998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39998"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: target_core_configfs: Add length check to avoid buffer overflow\n\nA buffer overflow arises from the usage of snprintf to write into the\nbuffer \"buf\" in target_lu_gp_members_show function located in\n/drivers/target/target_core_configfs.c. This buffer is allocated with\nsize LU_GROUP_NAME_BUF (256 bytes).\n\nsnprintf(...) formats multiple strings into buf with the HBA name\n(hba-\u003ehba_group.cg_item), a slash character, a devicename (dev-\u003e\ndev_group.cg_item) and a newline character, the total formatted string\nlength may exceed the buffer size of 256 bytes.\n\nSince snprintf() returns the total number of bytes that would have been\nwritten (the length of %s/%sn ), this value may exceed the buffer length\n(256 bytes) passed to memcpy(), this will ultimately cause function\nmemcpy reporting a buffer overflow error.\n\nAn additional check of the return value of snprintf() can avoid this\nbuffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39998",
"url": "https://www.suse.com/security/cve/CVE-2025-39998"
},
{
"category": "external",
"summary": "SUSE Bug 1252073 for CVE-2025-39998",
"url": "https://bugzilla.suse.com/1252073"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-39998"
},
{
"cve": "CVE-2025-40201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkernel/sys.c: fix the racy usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64() paths\n\nThe usage of task_lock(tsk-\u003egroup_leader) in sys_prlimit64()-\u003edo_prlimit()\npath is very broken.\n\nsys_prlimit64() does get_task_struct(tsk) but this only protects task_struct\nitself. If tsk != current and tsk is not a leader, this process can exit/exec\nand task_lock(tsk-\u003egroup_leader) may use the already freed task_struct.\n\nAnother problem is that sys_prlimit64() can race with mt-exec which changes\n-\u003egroup_leader. In this case do_prlimit() may take the wrong lock, or (worse)\n-\u003egroup_leader may change between task_lock() and task_unlock().\n\nChange sys_prlimit64() to take tasklist_lock when necessary. This is not\nnice, but I don\u0027t see a better fix for -stable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40201",
"url": "https://www.suse.com/security/cve/CVE-2025-40201"
},
{
"category": "external",
"summary": "SUSE Bug 1253455 for CVE-2025-40201",
"url": "https://bugzilla.suse.com/1253455"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40201"
},
{
"cve": "CVE-2025-40253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/ctcm: Fix double-kfree\n\nThe function \u0027mpc_rcvd_sweep_req(mpcginfo)\u0027 is called conditionally\nfrom function \u0027ctcmpc_unpack_skb\u0027. It frees passed mpcginfo.\nAfter that a call to function \u0027kfree\u0027 in function \u0027ctcmpc_unpack_skb\u0027\nfrees it again.\n\nRemove \u0027kfree\u0027 call in function \u0027mpc_rcvd_sweep_req(mpcginfo)\u0027.\n\nBug detected by the clang static analyzer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40253",
"url": "https://www.suse.com/security/cve/CVE-2025-40253"
},
{
"category": "external",
"summary": "SUSE Bug 1255084 for CVE-2025-40253",
"url": "https://bugzilla.suse.com/1255084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-40253"
},
{
"cve": "CVE-2025-68794",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68794"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niomap: adjust read range correctly for non-block-aligned positions\n\niomap_adjust_read_range() assumes that the position and length passed in\nare block-aligned. This is not always the case however, as shown in the\nsyzbot generated case for erofs. This causes too many bytes to be\nskipped for uptodate blocks, which results in returning the incorrect\nposition and length to read in. If all the blocks are uptodate, this\nunderflows length and returns a position beyond the folio.\n\nFix the calculation to also take into account the block offset when\ncalculating how many bytes can be skipped for uptodate blocks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68794",
"url": "https://www.suse.com/security/cve/CVE-2025-68794"
},
{
"category": "external",
"summary": "SUSE Bug 1256647 for CVE-2025-68794",
"url": "https://bugzilla.suse.com/1256647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-68794"
},
{
"cve": "CVE-2025-71066",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71066"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: ets: Always remove class from active list before deleting in ets_qdisc_change\n\nzdi-disclosures@trendmicro.com says:\n\nThe vulnerability is a race condition between `ets_qdisc_dequeue` and\n`ets_qdisc_change`. It leads to UAF on `struct Qdisc` object.\nAttacker requires the capability to create new user and network namespace\nin order to trigger the bug.\nSee my additional commentary at the end of the analysis.\n\nAnalysis:\n\nstatic int ets_qdisc_change(struct Qdisc *sch, struct nlattr *opt,\n struct netlink_ext_ack *extack)\n{\n...\n\n // (1) this lock is preventing .change handler (`ets_qdisc_change`)\n //to race with .dequeue handler (`ets_qdisc_dequeue`)\n sch_tree_lock(sch);\n\n for (i = nbands; i \u003c oldbands; i++) {\n if (i \u003e= q-\u003enstrict \u0026\u0026 q-\u003eclasses[i].qdisc-\u003eq.qlen)\n list_del_init(\u0026q-\u003eclasses[i].alist);\n qdisc_purge_queue(q-\u003eclasses[i].qdisc);\n }\n\n WRITE_ONCE(q-\u003enbands, nbands);\n for (i = nstrict; i \u003c q-\u003enstrict; i++) {\n if (q-\u003eclasses[i].qdisc-\u003eq.qlen) {\n\t\t // (2) the class is added to the q-\u003eactive\n list_add_tail(\u0026q-\u003eclasses[i].alist, \u0026q-\u003eactive);\n q-\u003eclasses[i].deficit = quanta[i];\n }\n }\n WRITE_ONCE(q-\u003enstrict, nstrict);\n memcpy(q-\u003eprio2band, priomap, sizeof(priomap));\n\n for (i = 0; i \u003c q-\u003enbands; i++)\n WRITE_ONCE(q-\u003eclasses[i].quantum, quanta[i]);\n\n for (i = oldbands; i \u003c q-\u003enbands; i++) {\n q-\u003eclasses[i].qdisc = queues[i];\n if (q-\u003eclasses[i].qdisc != \u0026noop_qdisc)\n qdisc_hash_add(q-\u003eclasses[i].qdisc, true);\n }\n\n // (3) the qdisc is unlocked, now dequeue can be called in parallel\n // to the rest of .change handler\n sch_tree_unlock(sch);\n\n ets_offload_change(sch);\n for (i = q-\u003enbands; i \u003c oldbands; i++) {\n\t // (4) we\u0027re reducing the refcount for our class\u0027s qdisc and\n\t // freeing it\n qdisc_put(q-\u003eclasses[i].qdisc);\n\t // (5) If we call .dequeue between (4) and (5), we will have\n\t // a strong UAF and we can control RIP\n q-\u003eclasses[i].qdisc = NULL;\n WRITE_ONCE(q-\u003eclasses[i].quantum, 0);\n q-\u003eclasses[i].deficit = 0;\n gnet_stats_basic_sync_init(\u0026q-\u003eclasses[i].bstats);\n memset(\u0026q-\u003eclasses[i].qstats, 0, sizeof(q-\u003eclasses[i].qstats));\n }\n return 0;\n}\n\nComment:\nThis happens because some of the classes have their qdiscs assigned to\nNULL, but remain in the active list. This commit fixes this issue by always\nremoving the class from the active list before deleting and freeing its\nassociated qdisc\n\nReproducer Steps\n(trimmed version of what was sent by zdi-disclosures@trendmicro.com)\n\n```\nDEV=\"${DEV:-lo}\"\nROOT_HANDLE=\"${ROOT_HANDLE:-1:}\"\nBAND2_HANDLE=\"${BAND2_HANDLE:-20:}\" # child under 1:2\nPING_BYTES=\"${PING_BYTES:-48}\"\nPING_COUNT=\"${PING_COUNT:-200000}\"\nPING_DST=\"${PING_DST:-127.0.0.1}\"\n\nSLOW_TBF_RATE=\"${SLOW_TBF_RATE:-8bit}\"\nSLOW_TBF_BURST=\"${SLOW_TBF_BURST:-100b}\"\nSLOW_TBF_LAT=\"${SLOW_TBF_LAT:-1s}\"\n\ncleanup() {\n tc qdisc del dev \"$DEV\" root 2\u003e/dev/null\n}\ntrap cleanup EXIT\n\nip link set \"$DEV\" up\n\ntc qdisc del dev \"$DEV\" root 2\u003e/dev/null || true\n\ntc qdisc add dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 2\n\ntc qdisc add dev \"$DEV\" parent 1:2 handle \"$BAND2_HANDLE\" \\\n tbf rate \"$SLOW_TBF_RATE\" burst \"$SLOW_TBF_BURST\" latency \"$SLOW_TBF_LAT\"\n\ntc filter add dev \"$DEV\" parent 1: protocol all prio 1 u32 match u32 0 0 flowid 1:2\ntc -s qdisc ls dev $DEV\n\nping -I \"$DEV\" -f -c \"$PING_COUNT\" -s \"$PING_BYTES\" -W 0.001 \"$PING_DST\" \\\n \u003e/dev/null 2\u003e\u00261 \u0026\ntc qdisc change dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 0\ntc qdisc change dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 2\ntc -s qdisc ls dev $DEV\ntc qdisc del dev \"$DEV\" parent \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71066",
"url": "https://www.suse.com/security/cve/CVE-2025-71066"
},
{
"category": "external",
"summary": "SUSE Bug 1256645 for CVE-2025-71066",
"url": "https://bugzilla.suse.com/1256645"
},
{
"category": "external",
"summary": "SUSE Bug 1258005 for CVE-2025-71066",
"url": "https://bugzilla.suse.com/1258005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "important"
}
],
"title": "CVE-2025-71066"
},
{
"cve": "CVE-2025-71125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71125"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Do not register unsupported perf events\n\nSynthetic events currently do not have a function to register perf events.\nThis leads to calling the tracepoint register functions with a NULL\nfunction pointer which triggers:\n\n ------------[ cut here ]------------\n WARNING: kernel/tracepoint.c:175 at tracepoint_add_func+0x357/0x370, CPU#2: perf/2272\n Modules linked in: kvm_intel kvm irqbypass\n CPU: 2 UID: 0 PID: 2272 Comm: perf Not tainted 6.18.0-ftest-11964-ge022764176fc-dirty #323 PREEMPTLAZY\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-debian-1.17.0-1 04/01/2014\n RIP: 0010:tracepoint_add_func+0x357/0x370\n Code: 28 9c e8 4c 0b f5 ff eb 0f 4c 89 f7 48 c7 c6 80 4d 28 9c e8 ab 89 f4 ff 31 c0 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc \u003c0f\u003e 0b 49 c7 c6 ea ff ff ff e9 ee fe ff ff 0f 0b e9 f9 fe ff ff 0f\n RSP: 0018:ffffabc0c44d3c40 EFLAGS: 00010246\n RAX: 0000000000000001 RBX: ffff9380aa9e4060 RCX: 0000000000000000\n RDX: 000000000000000a RSI: ffffffff9e1d4a98 RDI: ffff937fcf5fd6c8\n RBP: 0000000000000001 R08: 0000000000000007 R09: ffff937fcf5fc780\n R10: 0000000000000003 R11: ffffffff9c193910 R12: 000000000000000a\n R13: ffffffff9e1e5888 R14: 0000000000000000 R15: ffffabc0c44d3c78\n FS: 00007f6202f5f340(0000) GS:ffff93819f00f000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000055d3162281a8 CR3: 0000000106a56003 CR4: 0000000000172ef0\n Call Trace:\n \u003cTASK\u003e\n tracepoint_probe_register+0x5d/0x90\n synth_event_reg+0x3c/0x60\n perf_trace_event_init+0x204/0x340\n perf_trace_init+0x85/0xd0\n perf_tp_event_init+0x2e/0x50\n perf_try_init_event+0x6f/0x230\n ? perf_event_alloc+0x4bb/0xdc0\n perf_event_alloc+0x65a/0xdc0\n __se_sys_perf_event_open+0x290/0x9f0\n do_syscall_64+0x93/0x7b0\n ? entry_SYSCALL_64_after_hwframe+0x76/0x7e\n ? trace_hardirqs_off+0x53/0xc0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nInstead, have the code return -ENODEV, which doesn\u0027t warn and has perf\nerror out with:\n\n # perf record -e synthetic:futex_wait\nError:\nThe sys_perf_event_open() syscall returned with 19 (No such device) for event (synthetic:futex_wait).\n\"dmesg | grep -i perf\" may provide additional information.\n\nIdeally perf should support synthetic events, but for now just fix the\nwarning. The support can come later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71125",
"url": "https://www.suse.com/security/cve/CVE-2025-71125"
},
{
"category": "external",
"summary": "SUSE Bug 1256784 for CVE-2025-71125",
"url": "https://bugzilla.suse.com/1256784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "low"
}
],
"title": "CVE-2025-71125"
},
{
"cve": "CVE-2025-71231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode\n\nThe local variable \u0027i\u0027 is initialized with -EINVAL, but the for loop\nimmediately overwrites it and -EINVAL is never returned.\n\nIf no empty compression mode can be found, the function would return the\nout-of-bounds index IAA_COMP_MODES_MAX, which would cause an invalid\narray access in add_iaa_compression_mode().\n\nFix both issues by returning either a valid index or -EINVAL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71231",
"url": "https://www.suse.com/security/cve/CVE-2025-71231"
},
{
"category": "external",
"summary": "SUSE Bug 1258424 for CVE-2025-71231",
"url": "https://bugzilla.suse.com/1258424"
},
{
"category": "external",
"summary": "SUSE Bug 1258425 for CVE-2025-71231",
"url": "https://bugzilla.suse.com/1258425"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "important"
}
],
"title": "CVE-2025-71231"
},
{
"cve": "CVE-2025-71268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71268"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix reservation leak in some error paths when inserting inline extent\n\nIf we fail to allocate a path or join a transaction, we return from\n__cow_file_range_inline() without freeing the reserved qgroup data,\nresulting in a leak. Fix this by ensuring we call btrfs_qgroup_free_data()\nin such cases.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71268",
"url": "https://www.suse.com/security/cve/CVE-2025-71268"
},
{
"category": "external",
"summary": "SUSE Bug 1259865 for CVE-2025-71268",
"url": "https://bugzilla.suse.com/1259865"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-71268"
},
{
"cve": "CVE-2025-71269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71269"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not free data reservation in fallback from inline due to -ENOSPC\n\nIf we fail to create an inline extent due to -ENOSPC, we will attempt to\ngo through the normal COW path, reserve an extent, create an ordered\nextent, etc. However we were always freeing the reserved qgroup data,\nwhich is wrong since we will use data. Fix this by freeing the reserved\nqgroup data in __cow_file_range_inline() only if we are not doing the\nfallback (ret is \u003c= 0).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71269",
"url": "https://www.suse.com/security/cve/CVE-2025-71269"
},
{
"category": "external",
"summary": "SUSE Bug 1259889 for CVE-2025-71269",
"url": "https://bugzilla.suse.com/1259889"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-71269"
},
{
"cve": "CVE-2026-23030",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23030"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: rockchip: inno-usb2: Fix a double free bug in rockchip_usb2phy_probe()\n\nThe for_each_available_child_of_node() calls of_node_put() to\nrelease child_np in each success loop. After breaking from the\nloop with the child_np has been released, the code will jump to\nthe put_child label and will call the of_node_put() again if the\ndevm_request_threaded_irq() fails. These cause a double free bug.\n\nFix by returning directly to avoid the duplicate of_node_put().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23030",
"url": "https://www.suse.com/security/cve/CVE-2026-23030"
},
{
"category": "external",
"summary": "SUSE Bug 1257561 for CVE-2026-23030",
"url": "https://bugzilla.suse.com/1257561"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23030"
},
{
"cve": "CVE-2026-23047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23047"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: make calc_target() set t-\u003epaused, not just clear it\n\nCurrently calc_target() clears t-\u003epaused if the request shouldn\u0027t be\npaused anymore, but doesn\u0027t ever set t-\u003epaused even though it\u0027s able to\ndetermine when the request should be paused. Setting t-\u003epaused is left\nto __submit_request() which is fine for regular requests but doesn\u0027t\nwork for linger requests -- since __submit_request() doesn\u0027t operate\non linger requests, there is nowhere for lreq-\u003et.paused to be set.\nOne consequence of this is that watches don\u0027t get reestablished on\npaused -\u003e unpaused transitions in cases where requests have been paused\nlong enough for the (paused) unwatch request to time out and for the\nsubsequent (re)watch request to enter the paused state. On top of the\nwatch not getting reestablished, rbd_reregister_watch() gets stuck with\nrbd_dev-\u003ewatch_mutex held:\n\n rbd_register_watch\n __rbd_register_watch\n ceph_osdc_watch\n linger_reg_commit_wait\n\nIt\u0027s waiting for lreq-\u003ereg_commit_wait to be completed, but for that to\nhappen the respective request needs to end up on need_resend_linger list\nand be kicked when requests are unpaused. There is no chance for that\nif the request in question is never marked paused in the first place.\n\nThe fact that rbd_dev-\u003ewatch_mutex remains taken out forever then\nprevents the image from getting unmapped -- \"rbd unmap\" would inevitably\nhang in D state on an attempt to grab the mutex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23047",
"url": "https://www.suse.com/security/cve/CVE-2026-23047"
},
{
"category": "external",
"summary": "SUSE Bug 1257682 for CVE-2026-23047",
"url": "https://bugzilla.suse.com/1257682"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23047"
},
{
"cve": "CVE-2026-23054",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23054"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hv_netvsc: reject RSS hash key programming without RX indirection table\n\nRSS configuration requires a valid RX indirection table. When the device\nreports a single receive queue, rndis_filter_device_add() does not\nallocate an indirection table, accepting RSS hash key updates in this\nstate leads to a hang.\n\nFix this by gating netvsc_set_rxfh() on ndc-\u003erx_table_sz and return\n-EOPNOTSUPP when the table is absent. This aligns set_rxfh with the device\ncapabilities and prevents incorrect behavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23054",
"url": "https://www.suse.com/security/cve/CVE-2026-23054"
},
{
"category": "external",
"summary": "SUSE Bug 1257732 for CVE-2026-23054",
"url": "https://bugzilla.suse.com/1257732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23054"
},
{
"cve": "CVE-2026-23069",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23069"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvsock/virtio: fix potential underflow in virtio_transport_get_credit()\n\nThe credit calculation in virtio_transport_get_credit() uses unsigned\narithmetic:\n\n ret = vvs-\u003epeer_buf_alloc - (vvs-\u003etx_cnt - vvs-\u003epeer_fwd_cnt);\n\nIf the peer shrinks its advertised buffer (peer_buf_alloc) while bytes\nare in flight, the subtraction can underflow and produce a large\npositive value, potentially allowing more data to be queued than the\npeer can handle.\n\nReuse virtio_transport_has_space() which already handles this case and\nadd a comment to make it clear why we are doing that.\n\n[Stefano: use virtio_transport_has_space() instead of duplicating the code]\n[Stefano: tweak the commit message]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23069",
"url": "https://www.suse.com/security/cve/CVE-2026-23069"
},
{
"category": "external",
"summary": "SUSE Bug 1257755 for CVE-2026-23069",
"url": "https://bugzilla.suse.com/1257755"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23069"
},
{
"cve": "CVE-2026-23088",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23088"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix crash on synthetic stacktrace field usage\n\nWhen creating a synthetic event based on an existing synthetic event that\nhad a stacktrace field and the new synthetic event used that field a\nkernel crash occurred:\n\n ~# cd /sys/kernel/tracing\n ~# echo \u0027s:stack unsigned long stack[];\u0027 \u003e dynamic_events\n ~# echo \u0027hist:keys=prev_pid:s0=common_stacktrace if prev_state \u0026 3\u0027 \u003e\u003e events/sched/sched_switch/trigger\n ~# echo \u0027hist:keys=next_pid:s1=$s0:onmatch(sched.sched_switch).trace(stack,$s1)\u0027 \u003e\u003e events/sched/sched_switch/trigger\n\nThe above creates a synthetic event that takes a stacktrace when a task\nschedules out in a non-running state and passes that stacktrace to the\nsched_switch event when that task schedules back in. It triggers the\n\"stack\" synthetic event that has a stacktrace as its field (called \"stack\").\n\n ~# echo \u0027s:syscall_stack s64 id; unsigned long stack[];\u0027 \u003e\u003e dynamic_events\n ~# echo \u0027hist:keys=common_pid:s2=stack\u0027 \u003e\u003e events/synthetic/stack/trigger\n ~# echo \u0027hist:keys=common_pid:s3=$s2,i0=id:onmatch(synthetic.stack).trace(syscall_stack,$i0,$s3)\u0027 \u003e\u003e events/raw_syscalls/sys_exit/trigger\n\nThe above makes another synthetic event called \"syscall_stack\" that\nattaches the first synthetic event (stack) to the sys_exit trace event and\nrecords the stacktrace from the stack event with the id of the system call\nthat is exiting.\n\nWhen enabling this event (or using it in a historgram):\n\n ~# echo 1 \u003e events/synthetic/syscall_stack/enable\n\nProduces a kernel crash!\n\n BUG: unable to handle page fault for address: 0000000000400010\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: Oops: 0000 [#1] SMP PTI\n CPU: 6 UID: 0 PID: 1257 Comm: bash Not tainted 6.16.3+deb14-amd64 #1 PREEMPT(lazy) Debian 6.16.3-1\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-debian-1.17.0-1 04/01/2014\n RIP: 0010:trace_event_raw_event_synth+0x90/0x380\n Code: c5 00 00 00 00 85 d2 0f 84 e1 00 00 00 31 db eb 34 0f 1f 00 66 66 2e 0f 1f 84 00 00 00 00 00 66 66 2e 0f 1f 84 00 00 00 00 00 \u003c49\u003e 8b 04 24 48 83 c3 01 8d 0c c5 08 00 00 00 01 cd 41 3b 5d 40 0f\n RSP: 0018:ffffd2670388f958 EFLAGS: 00010202\n RAX: ffff8ba1065cc100 RBX: 0000000000000000 RCX: 0000000000000000\n RDX: 0000000000000001 RSI: fffff266ffda7b90 RDI: ffffd2670388f9b0\n RBP: 0000000000000010 R08: ffff8ba104e76000 R09: ffffd2670388fa50\n R10: ffff8ba102dd42e0 R11: ffffffff9a908970 R12: 0000000000400010\n R13: ffff8ba10a246400 R14: ffff8ba10a710220 R15: fffff266ffda7b90\n FS: 00007fa3bc63f740(0000) GS:ffff8ba2e0f48000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000400010 CR3: 0000000107f9e003 CR4: 0000000000172ef0\n Call Trace:\n \u003cTASK\u003e\n ? __tracing_map_insert+0x208/0x3a0\n action_trace+0x67/0x70\n event_hist_trigger+0x633/0x6d0\n event_triggers_call+0x82/0x130\n trace_event_buffer_commit+0x19d/0x250\n trace_event_raw_event_sys_exit+0x62/0xb0\n syscall_exit_work+0x9d/0x140\n do_syscall_64+0x20a/0x2f0\n ? trace_event_raw_event_sched_switch+0x12b/0x170\n ? save_fpregs_to_fpstate+0x3e/0x90\n ? _raw_spin_unlock+0xe/0x30\n ? finish_task_switch.isra.0+0x97/0x2c0\n ? __rseq_handle_notify_resume+0xad/0x4c0\n ? __schedule+0x4b8/0xd00\n ? restore_fpregs_from_fpstate+0x3c/0x90\n ? switch_fpu_return+0x5b/0xe0\n ? do_syscall_64+0x1ef/0x2f0\n ? do_fault+0x2e9/0x540\n ? __handle_mm_fault+0x7d1/0xf70\n ? count_memcg_events+0x167/0x1d0\n ? handle_mm_fault+0x1d7/0x2e0\n ? do_user_addr_fault+0x2c3/0x7f0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThe reason is that the stacktrace field is not labeled as such, and is\ntreated as a normal field and not as a dynamic event that it is.\n\nIn trace_event_raw_event_synth() the event is field is still treated as a\ndynamic array, but the retrieval of the data is considered a normal field,\nand the reference is just the meta data:\n\n// Meta data is retrieved instead of a dynamic array\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23088",
"url": "https://www.suse.com/security/cve/CVE-2026-23088"
},
{
"category": "external",
"summary": "SUSE Bug 1257814 for CVE-2026-23088",
"url": "https://bugzilla.suse.com/1257814"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23088"
},
{
"cve": "CVE-2026-23103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23103"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: Make the addrs_lock be per port\n\nMake the addrs_lock be per port, not per ipvlan dev.\n\nInitial code seems to be written in the assumption,\nthat any address change must occur under RTNL.\nBut it is not so for the case of IPv6. So\n\n1) Introduce per-port addrs_lock.\n\n2) It was needed to fix places where it was forgotten\nto take lock (ipvlan_open/ipvlan_close)\n\nThis appears to be a very minor problem though.\nSince it\u0027s highly unlikely that ipvlan_add_addr() will\nbe called on 2 CPU simultaneously. But nevertheless,\nthis could cause:\n\n1) False-negative of ipvlan_addr_busy(): one interface\niterated through all port-\u003eipvlans + ipvlan-\u003eaddrs\nunder some ipvlan spinlock, and another added IP\nunder its own lock. Though this is only possible\nfor IPv6, since looks like only ipvlan_addr6_event() can be\ncalled without rtnl_lock.\n\n2) Race since ipvlan_ht_addr_add(port) is called under\ndifferent ipvlan-\u003eaddrs_lock locks\n\nThis should not affect performance, since add/remove IP\nis a rare situation and spinlock is not taken on fast\npaths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23103",
"url": "https://www.suse.com/security/cve/CVE-2026-23103"
},
{
"category": "external",
"summary": "SUSE Bug 1257773 for CVE-2026-23103",
"url": "https://bugzilla.suse.com/1257773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23103"
},
{
"cve": "CVE-2026-23120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: avoid one data-race in l2tp_tunnel_del_work()\n\nWe should read sk-\u003esk_socket only when dealing with kernel sockets.\n\nsyzbot reported the following data-race:\n\nBUG: KCSAN: data-race in l2tp_tunnel_del_work / sk_common_release\n\nwrite to 0xffff88811c182b20 of 8 bytes by task 5365 on cpu 0:\n sk_set_socket include/net/sock.h:2092 [inline]\n sock_orphan include/net/sock.h:2118 [inline]\n sk_common_release+0xae/0x230 net/core/sock.c:4003\n udp_lib_close+0x15/0x20 include/net/udp.h:325\n inet_release+0xce/0xf0 net/ipv4/af_inet.c:437\n __sock_release net/socket.c:662 [inline]\n sock_close+0x6b/0x150 net/socket.c:1455\n __fput+0x29b/0x650 fs/file_table.c:468\n ____fput+0x1c/0x30 fs/file_table.c:496\n task_work_run+0x131/0x1a0 kernel/task_work.c:233\n resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]\n __exit_to_user_mode_loop kernel/entry/common.c:44 [inline]\n exit_to_user_mode_loop+0x1fe/0x740 kernel/entry/common.c:75\n __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline]\n syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline]\n syscall_exit_to_user_mode_work include/linux/entry-common.h:159 [inline]\n syscall_exit_to_user_mode include/linux/entry-common.h:194 [inline]\n do_syscall_64+0x1e1/0x2b0 arch/x86/entry/syscall_64.c:100\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nread to 0xffff88811c182b20 of 8 bytes by task 827 on cpu 1:\n l2tp_tunnel_del_work+0x2f/0x1a0 net/l2tp/l2tp_core.c:1418\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0x4ce/0x9d0 kernel/workqueue.c:3340\n worker_thread+0x582/0x770 kernel/workqueue.c:3421\n kthread+0x489/0x510 kernel/kthread.c:463\n ret_from_fork+0x149/0x290 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246\n\nvalue changed: 0xffff88811b818000 -\u003e 0x0000000000000000",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23120",
"url": "https://www.suse.com/security/cve/CVE-2026-23120"
},
{
"category": "external",
"summary": "SUSE Bug 1258280 for CVE-2026-23120",
"url": "https://bugzilla.suse.com/1258280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23120"
},
{
"cve": "CVE-2026-23125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23125"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT\n\nA null-ptr-deref was reported in the SCTP transmit path when SCTP-AUTH key\ninitialization fails:\n\n ==================================================================\n KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]\n CPU: 0 PID: 16 Comm: ksoftirqd/0 Tainted: G W 6.6.0 #2\n RIP: 0010:sctp_packet_bundle_auth net/sctp/output.c:264 [inline]\n RIP: 0010:sctp_packet_append_chunk+0xb36/0x1260 net/sctp/output.c:401\n Call Trace:\n\n sctp_packet_transmit_chunk+0x31/0x250 net/sctp/output.c:189\n sctp_outq_flush_data+0xa29/0x26d0 net/sctp/outqueue.c:1111\n sctp_outq_flush+0xc80/0x1240 net/sctp/outqueue.c:1217\n sctp_cmd_interpreter.isra.0+0x19a5/0x62c0 net/sctp/sm_sideeffect.c:1787\n sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]\n sctp_do_sm+0x1a3/0x670 net/sctp/sm_sideeffect.c:1169\n sctp_assoc_bh_rcv+0x33e/0x640 net/sctp/associola.c:1052\n sctp_inq_push+0x1dd/0x280 net/sctp/inqueue.c:88\n sctp_rcv+0x11ae/0x3100 net/sctp/input.c:243\n sctp6_rcv+0x3d/0x60 net/sctp/ipv6.c:1127\n\nThe issue is triggered when sctp_auth_asoc_init_active_key() fails in\nsctp_sf_do_5_1C_ack() while processing an INIT_ACK. In this case, the\ncommand sequence is currently:\n\n- SCTP_CMD_PEER_INIT\n- SCTP_CMD_TIMER_STOP (T1_INIT)\n- SCTP_CMD_TIMER_START (T1_COOKIE)\n- SCTP_CMD_NEW_STATE (COOKIE_ECHOED)\n- SCTP_CMD_ASSOC_SHKEY\n- SCTP_CMD_GEN_COOKIE_ECHO\n\nIf SCTP_CMD_ASSOC_SHKEY fails, asoc-\u003eshkey remains NULL, while\nasoc-\u003epeer.auth_capable and asoc-\u003epeer.peer_chunks have already been set by\nSCTP_CMD_PEER_INIT. This allows a DATA chunk with auth = 1 and shkey = NULL\nto be queued by sctp_datamsg_from_user().\n\nSince command interpretation stops on failure, no COOKIE_ECHO should been\nsent via SCTP_CMD_GEN_COOKIE_ECHO. However, the T1_COOKIE timer has already\nbeen started, and it may enqueue a COOKIE_ECHO into the outqueue later. As\na result, the DATA chunk can be transmitted together with the COOKIE_ECHO\nin sctp_outq_flush_data(), leading to the observed issue.\n\nSimilar to the other places where it calls sctp_auth_asoc_init_active_key()\nright after sctp_process_init(), this patch moves the SCTP_CMD_ASSOC_SHKEY\nimmediately after SCTP_CMD_PEER_INIT, before stopping T1_INIT and starting\nT1_COOKIE. This ensures that if shared key generation fails, authenticated\nDATA cannot be sent. It also allows the T1_INIT timer to retransmit INIT,\ngiving the client another chance to process INIT_ACK and retry key setup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23125",
"url": "https://www.suse.com/security/cve/CVE-2026-23125"
},
{
"category": "external",
"summary": "SUSE Bug 1258293 for CVE-2026-23125",
"url": "https://bugzilla.suse.com/1258293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23125"
},
{
"cve": "CVE-2026-23136",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23136"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: reset sparse-read state in osd_fault()\n\nWhen a fault occurs, the connection is abandoned, reestablished, and any\npending operations are retried. The OSD client tracks the progress of a\nsparse-read reply using a separate state machine, largely independent of\nthe messenger\u0027s state.\n\nIf a connection is lost mid-payload or the sparse-read state machine\nreturns an error, the sparse-read state is not reset. The OSD client\nwill then interpret the beginning of a new reply as the continuation of\nthe old one. If this makes the sparse-read machinery enter a failure\nstate, it may never recover, producing loops like:\n\n libceph: [0] got 0 extents\n libceph: data len 142248331 != extent len 0\n libceph: osd0 (1)...:6801 socket error on read\n libceph: data len 142248331 != extent len 0\n libceph: osd0 (1)...:6801 socket error on read\n\nTherefore, reset the sparse-read state in osd_fault(), ensuring retries\nstart from a clean state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23136",
"url": "https://www.suse.com/security/cve/CVE-2026-23136"
},
{
"category": "external",
"summary": "SUSE Bug 1258303 for CVE-2026-23136",
"url": "https://bugzilla.suse.com/1258303"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23136"
},
{
"cve": "CVE-2026-23140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, test_run: Subtract size of xdp_frame from allowed metadata size\n\nThe xdp_frame structure takes up part of the XDP frame headroom,\nlimiting the size of the metadata. However, in bpf_test_run, we don\u0027t\ntake this into account, which makes it possible for userspace to supply\na metadata size that is too large (taking up the entire headroom).\n\nIf userspace supplies such a large metadata size in live packet mode,\nthe xdp_update_frame_from_buff() call in xdp_test_run_init_page() call\nwill fail, after which packet transmission proceeds with an\nuninitialised frame structure, leading to the usual Bad Stuff.\n\nThe commit in the Fixes tag fixed a related bug where the second check\nin xdp_update_frame_from_buff() could fail, but did not add any\nadditional constraints on the metadata size. Complete the fix by adding\nan additional check on the metadata size. Reorder the checks slightly to\nmake the logic clearer and add a comment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23140",
"url": "https://www.suse.com/security/cve/CVE-2026-23140"
},
{
"category": "external",
"summary": "SUSE Bug 1258305 for CVE-2026-23140",
"url": "https://bugzilla.suse.com/1258305"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23140"
},
{
"cve": "CVE-2026-23154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23154"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix segmentation of forwarding fraglist GRO\n\nThis patch enhances GSO segment handling by properly checking\nthe SKB_GSO_DODGY flag for frag_list GSO packets, addressing\nlow throughput issues observed when a station accesses IPv4\nservers via hotspots with an IPv6-only upstream interface.\n\nSpecifically, it fixes a bug in GSO segmentation when forwarding\nGRO packets containing a frag_list. The function skb_segment_list\ncannot correctly process GRO skbs that have been converted by XLAT,\nsince XLAT only translates the header of the head skb. Consequently,\nskbs in the frag_list may remain untranslated, resulting in protocol\ninconsistencies and reduced throughput.\n\nTo address this, the patch explicitly sets the SKB_GSO_DODGY flag\nfor GSO packets in XLAT\u0027s IPv4/IPv6 protocol translation helpers\n(bpf_skb_proto_4_to_6 and bpf_skb_proto_6_to_4). This marks GSO\npackets as potentially modified after protocol translation. As a\nresult, GSO segmentation will avoid using skb_segment_list and\ninstead falls back to skb_segment for packets with the SKB_GSO_DODGY\nflag. This ensures that only safe and fully translated frag_list\npackets are processed by skb_segment_list, resolving protocol\ninconsistencies and improving throughput when forwarding GRO packets\nconverted by XLAT.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23154",
"url": "https://www.suse.com/security/cve/CVE-2026-23154"
},
{
"category": "external",
"summary": "SUSE Bug 1258286 for CVE-2026-23154",
"url": "https://bugzilla.suse.com/1258286"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23154"
},
{
"cve": "CVE-2026-23157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not strictly require dirty metadata threshold for metadata writepages\n\n[BUG]\nThere is an internal report that over 1000 processes are\nwaiting at the io_schedule_timeout() of balance_dirty_pages(), causing\na system hang and trigger a kernel coredump.\n\nThe kernel is v6.4 kernel based, but the root problem still applies to\nany upstream kernel before v6.18.\n\n[CAUSE]\nFrom Jan Kara for his wisdom on the dirty page balance behavior first.\n\n This cgroup dirty limit was what was actually playing the role here\n because the cgroup had only a small amount of memory and so the dirty\n limit for it was something like 16MB.\n\n Dirty throttling is responsible for enforcing that nobody can dirty\n (significantly) more dirty memory than there\u0027s dirty limit. Thus when\n a task is dirtying pages it periodically enters into balance_dirty_pages()\n and we let it sleep there to slow down the dirtying.\n\n When the system is over dirty limit already (either globally or within\n a cgroup of the running task), we will not let the task exit from\n balance_dirty_pages() until the number of dirty pages drops below the\n limit.\n\n So in this particular case, as I already mentioned, there was a cgroup\n with relatively small amount of memory and as a result with dirty limit\n set at 16MB. A task from that cgroup has dirtied about 28MB worth of\n pages in btrfs btree inode and these were practically the only dirty\n pages in that cgroup.\n\nSo that means the only way to reduce the dirty pages of that cgroup is\nto writeback the dirty pages of btrfs btree inode, and only after that\nthose processes can exit balance_dirty_pages().\n\nNow back to the btrfs part, btree_writepages() is responsible for\nwriting back dirty btree inode pages.\n\nThe problem here is, there is a btrfs internal threshold that if the\nbtree inode\u0027s dirty bytes are below the 32M threshold, it will not\ndo any writeback.\n\nThis behavior is to batch as much metadata as possible so we won\u0027t write\nback those tree blocks and then later re-COW them again for another\nmodification.\n\nThis internal 32MiB is higher than the existing dirty page size (28MiB),\nmeaning no writeback will happen, causing a deadlock between btrfs and\ncgroup:\n\n- Btrfs doesn\u0027t want to write back btree inode until more dirty pages\n\n- Cgroup/MM doesn\u0027t want more dirty pages for btrfs btree inode\n Thus any process touching that btree inode is put into sleep until\n the number of dirty pages is reduced.\n\nThanks Jan Kara a lot for the analysis of the root cause.\n\n[ENHANCEMENT]\nSince kernel commit b55102826d7d (\"btrfs: set AS_KERNEL_FILE on the\nbtree_inode\"), btrfs btree inode pages will only be charged to the root\ncgroup which should have a much larger limit than btrfs\u0027 32MiB\nthreshold.\nSo it should not affect newer kernels.\n\nBut for all current LTS kernels, they are all affected by this problem,\nand backporting the whole AS_KERNEL_FILE may not be a good idea.\n\nEven for newer kernels I still think it\u0027s a good idea to get\nrid of the internal threshold at btree_writepages(), since for most cases\ncgroup/MM has a better view of full system memory usage than btrfs\u0027 fixed\nthreshold.\n\nFor internal callers using btrfs_btree_balance_dirty() since that\nfunction is already doing internal threshold check, we don\u0027t need to\nbother them.\n\nBut for external callers of btree_writepages(), just respect their\nrequests and write back whatever they want, ignoring the internal\nbtrfs threshold to avoid such deadlock on btree inode dirty page\nbalancing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23157",
"url": "https://www.suse.com/security/cve/CVE-2026-23157"
},
{
"category": "external",
"summary": "SUSE Bug 1258376 for CVE-2026-23157",
"url": "https://bugzilla.suse.com/1258376"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23157"
},
{
"cve": "CVE-2026-23169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23169"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix race in mptcp_pm_nl_flush_addrs_doit()\n\nsyzbot and Eulgyu Kim reported crashes in mptcp_pm_nl_get_local_id()\nand/or mptcp_pm_nl_is_backup()\n\nRoot cause is list_splice_init() in mptcp_pm_nl_flush_addrs_doit()\nwhich is not RCU ready.\n\nlist_splice_init_rcu() can not be called here while holding pernet-\u003elock\nspinlock.\n\nMany thanks to Eulgyu Kim for providing a repro and testing our patches.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23169",
"url": "https://www.suse.com/security/cve/CVE-2026-23169"
},
{
"category": "external",
"summary": "SUSE Bug 1258389 for CVE-2026-23169",
"url": "https://bugzilla.suse.com/1258389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23169"
},
{
"cve": "CVE-2026-23187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23187"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npmdomain: imx8m-blk-ctrl: fix out-of-range access of bc-\u003edomains\n\nFix out-of-range access of bc-\u003edomains in imx8m_blk_ctrl_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23187",
"url": "https://www.suse.com/security/cve/CVE-2026-23187"
},
{
"category": "external",
"summary": "SUSE Bug 1258330 for CVE-2026-23187",
"url": "https://bugzilla.suse.com/1258330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23187"
},
{
"cve": "CVE-2026-23193",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23193"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()\n\nIn iscsit_dec_session_usage_count(), the function calls complete() while\nholding the sess-\u003esession_usage_lock. Similar to the connection usage count\nlogic, the waiter signaled by complete() (e.g., in the session release\npath) may wake up and free the iscsit_session structure immediately.\n\nThis creates a race condition where the current thread may attempt to\nexecute spin_unlock_bh() on a session structure that has already been\ndeallocated, resulting in a KASAN slab-use-after-free.\n\nTo resolve this, release the session_usage_lock before calling complete()\nto ensure all dereferences of the sess pointer are finished before the\nwaiter is allowed to proceed with deallocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23193",
"url": "https://www.suse.com/security/cve/CVE-2026-23193"
},
{
"category": "external",
"summary": "SUSE Bug 1258414 for CVE-2026-23193",
"url": "https://bugzilla.suse.com/1258414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23193"
},
{
"cve": "CVE-2026-23201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: fix oops due to invalid pointer for kfree() in parse_longname()\n\nThis fixes a kernel oops when reading ceph snapshot directories (.snap),\nfor example by simply running `ls /mnt/my_ceph/.snap`.\n\nThe variable str is guarded by __free(kfree), but advanced by one for\nskipping the initial \u0027_\u0027 in snapshot names. Thus, kfree() is called\nwith an invalid pointer. This patch removes the need for advancing the\npointer so kfree() is called with correct memory pointer.\n\nSteps to reproduce:\n\n1. Create snapshots on a cephfs volume (I\u0027ve 63 snaps in my testcase)\n\n2. Add cephfs mount to fstab\n$ echo \"samba-fileserver@.files=/volumes/datapool/stuff/3461082b-ecc9-4e82-8549-3fd2590d3fb6 /mnt/test/stuff ceph acl,noatime,_netdev 0 0\" \u003e\u003e /etc/fstab\n\n3. Reboot the system\n$ systemctl reboot\n\n4. Check if it\u0027s really mounted\n$ mount | grep stuff\n\n5. List snapshots (expected 63 snapshots on my system)\n$ ls /mnt/test/stuff/.snap\n\nNow ls hangs forever and the kernel log shows the oops.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23201",
"url": "https://www.suse.com/security/cve/CVE-2026-23201"
},
{
"category": "external",
"summary": "SUSE Bug 1258337 for CVE-2026-23201",
"url": "https://bugzilla.suse.com/1258337"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23201"
},
{
"cve": "CVE-2026-23202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer\n\nThe curr_xfer field is read by the IRQ handler without holding the lock\nto check if a transfer is in progress. When clearing curr_xfer in the\ncombined sequence transfer loop, protect it with the spinlock to prevent\na race with the interrupt handler.\n\nProtect the curr_xfer clearing at the exit path of\ntegra_qspi_combined_seq_xfer() with the spinlock to prevent a race\nwith the interrupt handler that reads this field.\n\nWithout this protection, the IRQ handler could read a partially updated\ncurr_xfer value, leading to NULL pointer dereference or use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23202",
"url": "https://www.suse.com/security/cve/CVE-2026-23202"
},
{
"category": "external",
"summary": "SUSE Bug 1258338 for CVE-2026-23202",
"url": "https://bugzilla.suse.com/1258338"
},
{
"category": "external",
"summary": "SUSE Bug 1261033 for CVE-2026-23202",
"url": "https://bugzilla.suse.com/1261033"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "important"
}
],
"title": "CVE-2026-23202"
},
{
"cve": "CVE-2026-23204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: cls_u32: use skb_header_pointer_careful()\n\nskb_header_pointer() does not fully validate negative @offset values.\n\nUse skb_header_pointer_careful() instead.\n\nGangMin Kim provided a report and a repro fooling u32_classify():\n\nBUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0\nnet/sched/cls_u32.c:221",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23204",
"url": "https://www.suse.com/security/cve/CVE-2026-23204"
},
{
"category": "external",
"summary": "SUSE Bug 1258340 for CVE-2026-23204",
"url": "https://bugzilla.suse.com/1258340"
},
{
"category": "external",
"summary": "SUSE Bug 1259126 for CVE-2026-23204",
"url": "https://bugzilla.suse.com/1259126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "important"
}
],
"title": "CVE-2026-23204"
},
{
"cve": "CVE-2026-23207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer check in IRQ handler\n\nNow that all other accesses to curr_xfer are done under the lock,\nprotect the curr_xfer NULL check in tegra_qspi_isr_thread() with the\nspinlock. Without this protection, the following race can occur:\n\n CPU0 (ISR thread) CPU1 (timeout path)\n ---------------- -------------------\n if (!tqspi-\u003ecurr_xfer)\n // sees non-NULL\n spin_lock()\n tqspi-\u003ecurr_xfer = NULL\n spin_unlock()\n handle_*_xfer()\n spin_lock()\n t = tqspi-\u003ecurr_xfer // NULL!\n ... t-\u003elen ... // NULL dereference!\n\nWith this patch, all curr_xfer accesses are now properly synchronized.\n\nAlthough all accesses to curr_xfer are done under the lock, in\ntegra_qspi_isr_thread() it checks for NULL, releases the lock and\nreacquires it later in handle_cpu_based_xfer()/handle_dma_based_xfer().\nThere is a potential for an update in between, which could cause a NULL\npointer dereference.\n\nTo handle this, add a NULL check inside the handlers after acquiring\nthe lock. This ensures that if the timeout path has already cleared\ncurr_xfer, the handler will safely return without dereferencing the\nNULL pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23207",
"url": "https://www.suse.com/security/cve/CVE-2026-23207"
},
{
"category": "external",
"summary": "SUSE Bug 1258524 for CVE-2026-23207",
"url": "https://bugzilla.suse.com/1258524"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23207"
},
{
"cve": "CVE-2026-23216",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23216"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()\n\nIn iscsit_dec_conn_usage_count(), the function calls complete() while\nholding the conn-\u003econn_usage_lock. As soon as complete() is invoked, the\nwaiter (such as iscsit_close_connection()) may wake up and proceed to free\nthe iscsit_conn structure.\n\nIf the waiter frees the memory before the current thread reaches\nspin_unlock_bh(), it results in a KASAN slab-use-after-free as the function\nattempts to release a lock within the already-freed connection structure.\n\nFix this by releasing the spinlock before calling complete().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23216",
"url": "https://www.suse.com/security/cve/CVE-2026-23216"
},
{
"category": "external",
"summary": "SUSE Bug 1258447 for CVE-2026-23216",
"url": "https://bugzilla.suse.com/1258447"
},
{
"category": "external",
"summary": "SUSE Bug 1258448 for CVE-2026-23216",
"url": "https://bugzilla.suse.com/1258448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23216"
},
{
"cve": "CVE-2026-23231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix use-after-free in nf_tables_addchain()\n\nnf_tables_addchain() publishes the chain to table-\u003echains via\nlist_add_tail_rcu() (in nft_chain_add()) before registering hooks.\nIf nf_tables_register_hook() then fails, the error path calls\nnft_chain_del() (list_del_rcu()) followed by nf_tables_chain_destroy()\nwith no RCU grace period in between.\n\nThis creates two use-after-free conditions:\n\n 1) Control-plane: nf_tables_dump_chains() traverses table-\u003echains\n under rcu_read_lock(). A concurrent dump can still be walking\n the chain when the error path frees it.\n\n 2) Packet path: for NFPROTO_INET, nf_register_net_hook() briefly\n installs the IPv4 hook before IPv6 registration fails. Packets\n entering nft_do_chain() via the transient IPv4 hook can still be\n dereferencing chain-\u003eblob_gen_X when the error path frees the\n chain.\n\nAdd synchronize_rcu() between nft_chain_del() and the chain destroy\nso that all RCU readers -- both dump threads and in-flight packet\nevaluation -- have finished before the chain is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23231",
"url": "https://www.suse.com/security/cve/CVE-2026-23231"
},
{
"category": "external",
"summary": "SUSE Bug 1259188 for CVE-2026-23231",
"url": "https://bugzilla.suse.com/1259188"
},
{
"category": "external",
"summary": "SUSE Bug 1259189 for CVE-2026-23231",
"url": "https://bugzilla.suse.com/1259189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "important"
}
],
"title": "CVE-2026-23231"
},
{
"cve": "CVE-2026-23242",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23242"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/siw: Fix potential NULL pointer dereference in header processing\n\nIf siw_get_hdr() returns -EINVAL before set_rx_fpdu_context(),\nqp-\u003erx_fpdu can be NULL. The error path in siw_tcp_rx_data()\ndereferences qp-\u003erx_fpdu-\u003emore_ddp_segs without checking, which\nmay lead to a NULL pointer deref. Only check more_ddp_segs when\nrx_fpdu is present.\n\nKASAN splat:\n[ 101.384271] KASAN: null-ptr-deref in range [0x00000000000000c0-0x00000000000000c7]\n[ 101.385869] RIP: 0010:siw_tcp_rx_data+0x13ad/0x1e50",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23242",
"url": "https://www.suse.com/security/cve/CVE-2026-23242"
},
{
"category": "external",
"summary": "SUSE Bug 1259795 for CVE-2026-23242",
"url": "https://bugzilla.suse.com/1259795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23242"
},
{
"cve": "CVE-2026-23243",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23243"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/umad: Reject negative data_len in ib_umad_write\n\nib_umad_write computes data_len from user-controlled count and the\nMAD header sizes. With a mismatched user MAD header size and RMPP\nheader length, data_len can become negative and reach ib_create_send_mad().\nThis can make the padding calculation exceed the segment size and trigger\nan out-of-bounds memset in alloc_send_rmpp_list().\n\nAdd an explicit check to reject negative data_len before creating the\nsend buffer.\n\nKASAN splat:\n[ 211.363464] BUG: KASAN: slab-out-of-bounds in ib_create_send_mad+0xa01/0x11b0\n[ 211.364077] Write of size 220 at addr ffff88800c3fa1f8 by task spray_thread/102\n[ 211.365867] ib_create_send_mad+0xa01/0x11b0\n[ 211.365887] ib_umad_write+0x853/0x1c80",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23243",
"url": "https://www.suse.com/security/cve/CVE-2026-23243"
},
{
"category": "external",
"summary": "SUSE Bug 1259797 for CVE-2026-23243",
"url": "https://bugzilla.suse.com/1259797"
},
{
"category": "external",
"summary": "SUSE Bug 1259798 for CVE-2026-23243",
"url": "https://bugzilla.suse.com/1259798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "important"
}
],
"title": "CVE-2026-23243"
},
{
"cve": "CVE-2026-23255",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23255"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: add proper RCU protection to /proc/net/ptype\n\nYin Fengwei reported an RCU stall in ptype_seq_show() and provided\na patch.\n\nReal issue is that ptype_seq_next() and ptype_seq_show() violate\nRCU rules.\n\nptype_seq_show() runs under rcu_read_lock(), and reads pt-\u003edev\nto get device name without any barrier.\n\nAt the same time, concurrent writers can remove a packet_type structure\n(which is correctly freed after an RCU grace period) and clear pt-\u003edev\nwithout an RCU grace period.\n\nDefine ptype_iter_state to carry a dev pointer along seq_net_private:\n\nstruct ptype_iter_state {\n\tstruct seq_net_private\tp;\n\tstruct net_device\t*dev; // added in this patch\n};\n\nWe need to record the device pointer in ptype_get_idx() and\nptype_seq_next() so that ptype_seq_show() is safe against\nconcurrent pt-\u003edev changes.\n\nWe also need to add full RCU protection in ptype_seq_next().\n(Missing READ_ONCE() when reading list.next values)\n\nMany thanks to Dong Chenchen for providing a repro.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23255",
"url": "https://www.suse.com/security/cve/CVE-2026-23255"
},
{
"category": "external",
"summary": "SUSE Bug 1259891 for CVE-2026-23255",
"url": "https://bugzilla.suse.com/1259891"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23255"
},
{
"cve": "CVE-2026-23262",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23262"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: Fix stats report corruption on queue count change\n\nThe driver and the NIC share a region in memory for stats reporting.\nThe NIC calculates its offset into this region based on the total size\nof the stats region and the size of the NIC\u0027s stats.\n\nWhen the number of queues is changed, the driver\u0027s stats region is\nresized. If the queue count is increased, the NIC can write past\nthe end of the allocated stats region, causing memory corruption.\nIf the queue count is decreased, there is a gap between the driver\nand NIC stats, leading to incorrect stats reporting.\n\nThis change fixes the issue by allocating stats region with maximum\nsize, and the offset calculation for NIC stats is changed to match\nwith the calculation of the NIC.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23262",
"url": "https://www.suse.com/security/cve/CVE-2026-23262"
},
{
"category": "external",
"summary": "SUSE Bug 1259870 for CVE-2026-23262",
"url": "https://bugzilla.suse.com/1259870"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23262"
},
{
"cve": "CVE-2026-23270",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23270"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks\n\nAs Paolo said earlier [1]:\n\n\"Since the blamed commit below, classify can return TC_ACT_CONSUMED while\nthe current skb being held by the defragmentation engine. As reported by\nGangMin Kim, if such packet is that may cause a UaF when the defrag engine\nlater on tries to tuch again such packet.\"\n\nact_ct was never meant to be used in the egress path, however some users\nare attaching it to egress today [2]. Attempting to reach a middle\nground, we noticed that, while most qdiscs are not handling\nTC_ACT_CONSUMED, clsact/ingress qdiscs are. With that in mind, we\naddress the issue by only allowing act_ct to bind to clsact/ingress\nqdiscs and shared blocks. That way it\u0027s still possible to attach act_ct to\negress (albeit only with clsact).\n\n[1] https://lore.kernel.org/netdev/674b8cbfc385c6f37fb29a1de08d8fe5c2b0fbee.1771321118.git.pabeni@redhat.com/\n[2] https://lore.kernel.org/netdev/cc6bfb4a-4a2b-42d8-b9ce-7ef6644fb22b@ovn.org/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23270",
"url": "https://www.suse.com/security/cve/CVE-2026-23270"
},
{
"category": "external",
"summary": "SUSE Bug 1259886 for CVE-2026-23270",
"url": "https://bugzilla.suse.com/1259886"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23270"
},
{
"cve": "CVE-2026-23272",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23272"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: unconditionally bump set-\u003enelems before insertion\n\nIn case that the set is full, a new element gets published then removed\nwithout waiting for the RCU grace period, while RCU reader can be\nwalking over it already.\n\nTo address this issue, add the element transaction even if set is full,\nbut toggle the set_full flag to report -ENFILE so the abort path safely\nunwinds the set to its previous state.\n\nAs for element updates, decrement set-\u003enelems to restore it.\n\nA simpler fix is to call synchronize_rcu() in the error path.\nHowever, with a large batch adding elements to already maxed-out set,\nthis could cause noticeable slowdown of such batches.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23272",
"url": "https://www.suse.com/security/cve/CVE-2026-23272"
},
{
"category": "external",
"summary": "SUSE Bug 1260009 for CVE-2026-23272",
"url": "https://bugzilla.suse.com/1260009"
},
{
"category": "external",
"summary": "SUSE Bug 1260909 for CVE-2026-23272",
"url": "https://bugzilla.suse.com/1260909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "important"
}
],
"title": "CVE-2026-23272"
},
{
"cve": "CVE-2026-23274",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23274"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels\n\nIDLETIMER revision 0 rules reuse existing timers by label and always call\nmod_timer() on timer-\u003etimer.\n\nIf the label was created first by revision 1 with XT_IDLETIMER_ALARM,\nthe object uses alarm timer semantics and timer-\u003etimer is never initialized.\nReusing that object from revision 0 causes mod_timer() on an uninitialized\ntimer_list, triggering debugobjects warnings and possible panic when\npanic_on_warn=1.\n\nFix this by rejecting revision 0 rule insertion when an existing timer with\nthe same label is of ALARM type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23274",
"url": "https://www.suse.com/security/cve/CVE-2026-23274"
},
{
"category": "external",
"summary": "SUSE Bug 1260005 for CVE-2026-23274",
"url": "https://bugzilla.suse.com/1260005"
},
{
"category": "external",
"summary": "SUSE Bug 1260908 for CVE-2026-23274",
"url": "https://bugzilla.suse.com/1260908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "important"
}
],
"title": "CVE-2026-23274"
},
{
"cve": "CVE-2026-23277",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23277"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit\n\nteql_master_xmit() calls netdev_start_xmit(skb, slave) to transmit\nthrough slave devices, but does not update skb-\u003edev to the slave device\nbeforehand.\n\nWhen a gretap tunnel is a TEQL slave, the transmit path reaches\niptunnel_xmit() which saves dev = skb-\u003edev (still pointing to teql0\nmaster) and later calls iptunnel_xmit_stats(dev, pkt_len). This\nfunction does:\n\n get_cpu_ptr(dev-\u003etstats)\n\nSince teql_master_setup() does not set dev-\u003epcpu_stat_type to\nNETDEV_PCPU_STAT_TSTATS, the core network stack never allocates tstats\nfor teql0, so dev-\u003etstats is NULL. get_cpu_ptr(NULL) computes\nNULL + __per_cpu_offset[cpu], resulting in a page fault.\n\n BUG: unable to handle page fault for address: ffff8880e6659018\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 68bc067 P4D 68bc067 PUD 0\n Oops: Oops: 0002 [#1] SMP KASAN PTI\n RIP: 0010:iptunnel_xmit (./include/net/ip_tunnels.h:664 net/ipv4/ip_tunnel_core.c:89)\n Call Trace:\n \u003cTASK\u003e\n ip_tunnel_xmit (net/ipv4/ip_tunnel.c:847)\n __gre_xmit (net/ipv4/ip_gre.c:478)\n gre_tap_xmit (net/ipv4/ip_gre.c:779)\n teql_master_xmit (net/sched/sch_teql.c:319)\n dev_hard_start_xmit (net/core/dev.c:3887)\n sch_direct_xmit (net/sched/sch_generic.c:347)\n __dev_queue_xmit (net/core/dev.c:4802)\n neigh_direct_output (net/core/neighbour.c:1660)\n ip_finish_output2 (net/ipv4/ip_output.c:237)\n __ip_finish_output.part.0 (net/ipv4/ip_output.c:315)\n ip_mc_output (net/ipv4/ip_output.c:369)\n ip_send_skb (net/ipv4/ip_output.c:1508)\n udp_send_skb (net/ipv4/udp.c:1195)\n udp_sendmsg (net/ipv4/udp.c:1485)\n inet_sendmsg (net/ipv4/af_inet.c:859)\n __sys_sendto (net/socket.c:2206)\n\nFix this by setting skb-\u003edev = slave before calling\nnetdev_start_xmit(), so that tunnel xmit functions see the correct\nslave device with properly allocated tstats.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23277",
"url": "https://www.suse.com/security/cve/CVE-2026-23277"
},
{
"category": "external",
"summary": "SUSE Bug 1259997 for CVE-2026-23277",
"url": "https://bugzilla.suse.com/1259997"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23277"
},
{
"cve": "CVE-2026-23278",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23278"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: always walk all pending catchall elements\n\nDuring transaction processing we might have more than one catchall element:\n1 live catchall element and 1 pending element that is coming as part of the\nnew batch.\n\nIf the map holding the catchall elements is also going away, its\nrequired to toggle all catchall elements and not just the first viable\ncandidate.\n\nOtherwise, we get:\n WARNING: ./include/net/netfilter/nf_tables.h:1281 at nft_data_release+0xb7/0xe0 [nf_tables], CPU#2: nft/1404\n RIP: 0010:nft_data_release+0xb7/0xe0 [nf_tables]\n [..]\n __nft_set_elem_destroy+0x106/0x380 [nf_tables]\n nf_tables_abort_release+0x348/0x8d0 [nf_tables]\n nf_tables_abort+0xcf2/0x3ac0 [nf_tables]\n nfnetlink_rcv_batch+0x9c9/0x20e0 [..]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23278",
"url": "https://www.suse.com/security/cve/CVE-2026-23278"
},
{
"category": "external",
"summary": "SUSE Bug 1259998 for CVE-2026-23278",
"url": "https://bugzilla.suse.com/1259998"
},
{
"category": "external",
"summary": "SUSE Bug 1260907 for CVE-2026-23278",
"url": "https://bugzilla.suse.com/1260907"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "important"
}
],
"title": "CVE-2026-23278"
},
{
"cve": "CVE-2026-23281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23281"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: libertas: fix use-after-free in lbs_free_adapter()\n\nThe lbs_free_adapter() function uses timer_delete() (non-synchronous)\nfor both command_timer and tx_lockup_timer before the structure is\nfreed. This is incorrect because timer_delete() does not wait for\nany running timer callback to complete.\n\nIf a timer callback is executing when lbs_free_adapter() is called,\nthe callback will access freed memory since lbs_cfg_free() frees the\ncontaining structure immediately after lbs_free_adapter() returns.\n\nBoth timer callbacks (lbs_cmd_timeout_handler and lbs_tx_lockup_handler)\naccess priv-\u003edriver_lock, priv-\u003ecur_cmd, priv-\u003edev, and other fields,\nwhich would all be use-after-free violations.\n\nUse timer_delete_sync() instead to ensure any running timer callback\nhas completed before returning.\n\nThis bug was introduced in commit 8f641d93c38a (\"libertas: detect TX\nlockups and reset hardware\") where del_timer() was used instead of\ndel_timer_sync() in the cleanup path. The command_timer has had the\nsame issue since the driver was first written.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23281",
"url": "https://www.suse.com/security/cve/CVE-2026-23281"
},
{
"category": "external",
"summary": "SUSE Bug 1260464 for CVE-2026-23281",
"url": "https://bugzilla.suse.com/1260464"
},
{
"category": "external",
"summary": "SUSE Bug 1260466 for CVE-2026-23281",
"url": "https://bugzilla.suse.com/1260466"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23281"
},
{
"cve": "CVE-2026-23292",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23292"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: Fix recursive locking in __configfs_open_file()\n\nIn flush_write_buffer, \u0026p-\u003efrag_sem is acquired and then the loaded store\nfunction is called, which, here, is target_core_item_dbroot_store(). This\nfunction called filp_open(), following which these functions were called\n(in reverse order), according to the call trace:\n\n down_read\n __configfs_open_file\n do_dentry_open\n vfs_open\n do_open\n path_openat\n do_filp_open\n file_open_name\n filp_open\n target_core_item_dbroot_store\n flush_write_buffer\n configfs_write_iter\n\ntarget_core_item_dbroot_store() tries to validate the new file path by\ntrying to open the file path provided to it; however, in this case, the bug\nreport shows:\n\ndb_root: not a directory: /sys/kernel/config/target/dbroot\n\nindicating that the same configfs file was tried to be opened, on which it\nis currently working on. Thus, it is trying to acquire frag_sem semaphore\nof the same file of which it already holds the semaphore obtained in\nflush_write_buffer(), leading to acquiring the semaphore in a nested manner\nand a possibility of recursive locking.\n\nFix this by modifying target_core_item_dbroot_store() to use kern_path()\ninstead of filp_open() to avoid opening the file using filesystem-specific\nfunction __configfs_open_file(), and further modifying it to make this fix\ncompatible.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23292",
"url": "https://www.suse.com/security/cve/CVE-2026-23292"
},
{
"category": "external",
"summary": "SUSE Bug 1260500 for CVE-2026-23292",
"url": "https://bugzilla.suse.com/1260500"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23292"
},
{
"cve": "CVE-2026-23293",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23293"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled\n\nWhen booting with the \u0027ipv6.disable=1\u0027 parameter, the nd_tbl is never\ninitialized because inet6_init() exits before ndisc_init() is called\nwhich initializes it. If an IPv6 packet is injected into the interface,\nroute_shortcircuit() is called and a NULL pointer dereference happens on\nneigh_lookup().\n\n BUG: kernel NULL pointer dereference, address: 0000000000000380\n Oops: Oops: 0000 [#1] SMP NOPTI\n [...]\n RIP: 0010:neigh_lookup+0x20/0x270\n [...]\n Call Trace:\n \u003cTASK\u003e\n vxlan_xmit+0x638/0x1ef0 [vxlan]\n dev_hard_start_xmit+0x9e/0x2e0\n __dev_queue_xmit+0xbee/0x14e0\n packet_sendmsg+0x116f/0x1930\n __sys_sendto+0x1f5/0x200\n __x64_sys_sendto+0x24/0x30\n do_syscall_64+0x12f/0x1590\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFix this by adding an early check on route_shortcircuit() when protocol\nis ETH_P_IPV6. Note that ipv6_mod_enabled() cannot be used here because\nVXLAN can be built-in even when IPv6 is built as a module.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23293",
"url": "https://www.suse.com/security/cve/CVE-2026-23293"
},
{
"category": "external",
"summary": "SUSE Bug 1260486 for CVE-2026-23293",
"url": "https://bugzilla.suse.com/1260486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23293"
},
{
"cve": "CVE-2026-23304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23304"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu()\n\nl3mdev_master_dev_rcu() can return NULL when the slave device is being\nun-slaved from a VRF. All other callers deal with this, but we lost\nthe fallback to loopback in ip6_rt_pcpu_alloc() -\u003e ip6_rt_get_dev_rcu()\nwith commit 4832c30d5458 (\"net: ipv6: put host and anycast routes on\ndevice with address\").\n\n KASAN: null-ptr-deref in range [0x0000000000000108-0x000000000000010f]\n RIP: 0010:ip6_rt_pcpu_alloc (net/ipv6/route.c:1418)\n Call Trace:\n ip6_pol_route (net/ipv6/route.c:2318)\n fib6_rule_lookup (net/ipv6/fib6_rules.c:115)\n ip6_route_output_flags (net/ipv6/route.c:2607)\n vrf_process_v6_outbound (drivers/net/vrf.c:437)\n\nI was tempted to rework the un-slaving code to clear the flag first\nand insert synchronize_rcu() before we remove the upper. But looks like\nthe explicit fallback to loopback_dev is an established pattern.\nAnd I guess avoiding the synchronize_rcu() is nice, too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23304",
"url": "https://www.suse.com/security/cve/CVE-2026-23304"
},
{
"category": "external",
"summary": "SUSE Bug 1260544 for CVE-2026-23304",
"url": "https://bugzilla.suse.com/1260544"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23304"
},
{
"cve": "CVE-2026-23317",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23317"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Return the correct value in vmw_translate_ptr functions\n\nBefore the referenced fixes these functions used a lookup function that\nreturned a pointer. This was changed to another lookup function that\nreturned an error code with the pointer becoming an out parameter.\n\nThe error path when the lookup failed was not changed to reflect this\nchange and the code continued to return the PTR_ERR of the now\nuninitialized pointer. This could cause the vmw_translate_ptr functions\nto return success when they actually failed causing further uninitialized\nand OOB accesses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23317",
"url": "https://www.suse.com/security/cve/CVE-2026-23317"
},
{
"category": "external",
"summary": "SUSE Bug 1260562 for CVE-2026-23317",
"url": "https://bugzilla.suse.com/1260562"
},
{
"category": "external",
"summary": "SUSE Bug 1260563 for CVE-2026-23317",
"url": "https://bugzilla.suse.com/1260563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "important"
}
],
"title": "CVE-2026-23317"
},
{
"cve": "CVE-2026-23319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23319"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim\n\nThe root cause of this bug is that when \u0027bpf_link_put\u0027 reduces the\nrefcount of \u0027shim_link-\u003elink.link\u0027 to zero, the resource is considered\nreleased but may still be referenced via \u0027tr-\u003eprogs_hlist\u0027 in\n\u0027cgroup_shim_find\u0027. The actual cleanup of \u0027tr-\u003eprogs_hlist\u0027 in\n\u0027bpf_shim_tramp_link_release\u0027 is deferred. During this window, another\nprocess can cause a use-after-free via \u0027bpf_trampoline_link_cgroup_shim\u0027.\n\nBased on Martin KaFai Lau\u0027s suggestions, I have created a simple patch.\n\nTo fix this:\n Add an atomic non-zero check in \u0027bpf_trampoline_link_cgroup_shim\u0027.\n Only increment the refcount if it is not already zero.\n\nTesting:\n I verified the fix by adding a delay in\n \u0027bpf_shim_tramp_link_release\u0027 to make the bug easier to trigger:\n\nstatic void bpf_shim_tramp_link_release(struct bpf_link *link)\n{\n\t/* ... */\n\tif (!shim_link-\u003etrampoline)\n\t\treturn;\n\n+\tmsleep(100);\n\tWARN_ON_ONCE(bpf_trampoline_unlink_prog(\u0026shim_link-\u003elink,\n\t\tshim_link-\u003etrampoline, NULL));\n\tbpf_trampoline_put(shim_link-\u003etrampoline);\n}\n\nBefore the patch, running a PoC easily reproduced the crash(almost 100%)\nwith a call trace similar to KaiyanM\u0027s report.\nAfter the patch, the bug no longer occurs even after millions of\niterations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23319",
"url": "https://www.suse.com/security/cve/CVE-2026-23319"
},
{
"category": "external",
"summary": "SUSE Bug 1260735 for CVE-2026-23319",
"url": "https://bugzilla.suse.com/1260735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23319"
},
{
"cve": "CVE-2026-23335",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23335"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix kernel stack leak in irdma_create_user_ah()\n\nstruct irdma_create_ah_resp { // 8 bytes, no padding\n __u32 ah_id; // offset 0 - SET (uresp.ah_id = ah-\u003esc_ah.ah_info.ah_idx)\n __u8 rsvd[4]; // offset 4 - NEVER SET \u003c- LEAK\n};\n\nrsvd[4]: 4 bytes of stack memory leaked unconditionally. Only ah_id is assigned before ib_respond_udata().\n\nThe reserved members of the structure were not zeroed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23335",
"url": "https://www.suse.com/security/cve/CVE-2026-23335"
},
{
"category": "external",
"summary": "SUSE Bug 1260550 for CVE-2026-23335",
"url": "https://bugzilla.suse.com/1260550"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "low"
}
],
"title": "CVE-2026-23335"
},
{
"cve": "CVE-2026-23343",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23343"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxdp: produce a warning when calculated tailroom is negative\n\nMany ethernet drivers report xdp Rx queue frag size as being the same as\nDMA write size. However, the only user of this field, namely\nbpf_xdp_frags_increase_tail(), clearly expects a truesize.\n\nSuch difference leads to unspecific memory corruption issues under certain\ncircumstances, e.g. in ixgbevf maximum DMA write size is 3 KB, so when\nrunning xskxceiver\u0027s XDP_ADJUST_TAIL_GROW_MULTI_BUFF, 6K packet fully uses\nall DMA-writable space in 2 buffers. This would be fine, if only\nrxq-\u003efrag_size was properly set to 4K, but value of 3K results in a\nnegative tailroom, because there is a non-zero page offset.\n\nWe are supposed to return -EINVAL and be done with it in such case, but due\nto tailroom being stored as an unsigned int, it is reported to be somewhere\nnear UINT_MAX, resulting in a tail being grown, even if the requested\noffset is too much (it is around 2K in the abovementioned test). This later\nleads to all kinds of unspecific calltraces.\n\n[ 7340.337579] xskxceiver[1440]: segfault at 1da718 ip 00007f4161aeac9d sp 00007f41615a6a00 error 6\n[ 7340.338040] xskxceiver[1441]: segfault at 7f410000000b ip 00000000004042b5 sp 00007f415bffecf0 error 4\n[ 7340.338179] in libc.so.6[61c9d,7f4161aaf000+160000]\n[ 7340.339230] in xskxceiver[42b5,400000+69000]\n[ 7340.340300] likely on CPU 6 (core 0, socket 6)\n[ 7340.340302] Code: ff ff 01 e9 f4 fe ff ff 0f 1f 44 00 00 4c 39 f0 74 73 31 c0 ba 01 00 00 00 f0 0f b1 17 0f 85 ba 00 00 00 49 8b 87 88 00 00 00 \u003c4c\u003e 89 70 08 eb cc 0f 1f 44 00 00 48 8d bd f0 fe ff ff 89 85 ec fe\n[ 7340.340888] likely on CPU 3 (core 0, socket 3)\n[ 7340.345088] Code: 00 00 00 ba 00 00 00 00 be 00 00 00 00 89 c7 e8 31 ca ff ff 89 45 ec 8b 45 ec 85 c0 78 07 b8 00 00 00 00 eb 46 e8 0b c8 ff ff \u003c8b\u003e 00 83 f8 69 74 24 e8 ff c7 ff ff 8b 00 83 f8 0b 74 18 e8 f3 c7\n[ 7340.404334] Oops: general protection fault, probably for non-canonical address 0x6d255010bdffc: 0000 [#1] SMP NOPTI\n[ 7340.405972] CPU: 7 UID: 0 PID: 1439 Comm: xskxceiver Not tainted 6.19.0-rc1+ #21 PREEMPT(lazy)\n[ 7340.408006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014\n[ 7340.409716] RIP: 0010:lookup_swap_cgroup_id+0x44/0x80\n[ 7340.410455] Code: 83 f8 1c 73 39 48 ba ff ff ff ff ff ff ff 03 48 8b 04 c5 20 55 fa bd 48 21 d1 48 89 ca 83 e1 01 48 d1 ea c1 e1 04 48 8d 04 90 \u003c8b\u003e 00 48 83 c4 10 d3 e8 c3 cc cc cc cc 31 c0 e9 98 b7 dd 00 48 89\n[ 7340.412787] RSP: 0018:ffffcc5c04f7f6d0 EFLAGS: 00010202\n[ 7340.413494] RAX: 0006d255010bdffc RBX: ffff891f477895a8 RCX: 0000000000000010\n[ 7340.414431] RDX: 0001c17e3fffffff RSI: 00fa070000000000 RDI: 000382fc7fffffff\n[ 7340.415354] RBP: 00fa070000000000 R08: ffffcc5c04f7f8f8 R09: ffffcc5c04f7f7d0\n[ 7340.416283] R10: ffff891f4c1a7000 R11: ffffcc5c04f7f9c8 R12: ffffcc5c04f7f7d0\n[ 7340.417218] R13: 03ffffffffffffff R14: 00fa06fffffffe00 R15: ffff891f47789500\n[ 7340.418229] FS: 0000000000000000(0000) GS:ffff891ffdfaa000(0000) knlGS:0000000000000000\n[ 7340.419489] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 7340.420286] CR2: 00007f415bfffd58 CR3: 0000000103f03002 CR4: 0000000000772ef0\n[ 7340.421237] PKRU: 55555554\n[ 7340.421623] Call Trace:\n[ 7340.421987] \u003cTASK\u003e\n[ 7340.422309] ? softleaf_from_pte+0x77/0xa0\n[ 7340.422855] swap_pte_batch+0xa7/0x290\n[ 7340.423363] zap_nonpresent_ptes.constprop.0.isra.0+0xd1/0x270\n[ 7340.424102] zap_pte_range+0x281/0x580\n[ 7340.424607] zap_pmd_range.isra.0+0xc9/0x240\n[ 7340.425177] unmap_page_range+0x24d/0x420\n[ 7340.425714] unmap_vmas+0xa1/0x180\n[ 7340.426185] exit_mmap+0xe1/0x3b0\n[ 7340.426644] __mmput+0x41/0x150\n[ 7340.427098] exit_mm+0xb1/0x110\n[ 7340.427539] do_exit+0x1b2/0x460\n[ 7340.427992] do_group_exit+0x2d/0xc0\n[ 7340.428477] get_signal+0x79d/0x7e0\n[ 7340.428957] arch_do_signal_or_restart+0x34/0x100\n[ 7340.429571] exit_to_user_mode_loop+0x8e/0x4c0\n[ 7340.430159] do_syscall_64+0x188/\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23343",
"url": "https://www.suse.com/security/cve/CVE-2026-23343"
},
{
"category": "external",
"summary": "SUSE Bug 1260527 for CVE-2026-23343",
"url": "https://bugzilla.suse.com/1260527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23343"
},
{
"cve": "CVE-2026-23361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry\n\nEndpoint drivers use dw_pcie_ep_raise_msix_irq() to raise an MSI-X\ninterrupt to the host using a writel(), which generates a PCI posted write\ntransaction. There\u0027s no completion for posted writes, so the writel() may\nreturn before the PCI write completes. dw_pcie_ep_raise_msix_irq() also\nunmaps the outbound ATU entry used for the PCI write, so the write races\nwith the unmap.\n\nIf the PCI write loses the race with the ATU unmap, the write may corrupt\nhost memory or cause IOMMU errors, e.g., these when running fio with a\nlarger queue depth against nvmet-pci-epf:\n\n arm-smmu-v3 fc900000.iommu: 0x0000010000000010\n arm-smmu-v3 fc900000.iommu: 0x0000020000000000\n arm-smmu-v3 fc900000.iommu: 0x000000090000f040\n arm-smmu-v3 fc900000.iommu: 0x0000000000000000\n arm-smmu-v3 fc900000.iommu: event: F_TRANSLATION client: 0000:01:00.0 sid: 0x100 ssid: 0x0 iova: 0x90000f040 ipa: 0x0\n arm-smmu-v3 fc900000.iommu: unpriv data write s1 \"Input address caused fault\" stag: 0x0\n\nFlush the write by performing a readl() of the same address to ensure that\nthe write has reached the destination before the ATU entry is unmapped.\n\nThe same problem was solved for dw_pcie_ep_raise_msi_irq() in commit\n8719c64e76bf (\"PCI: dwc: ep: Cache MSI outbound iATU mapping\"), but there\nit was solved by dedicating an outbound iATU only for MSI. We can\u0027t do the\nsame for MSI-X because each vector can have a different msg_addr and the\nmsg_addr may be changed while the vector is masked.\n\n[bhelgaas: commit log]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23361",
"url": "https://www.suse.com/security/cve/CVE-2026-23361"
},
{
"category": "external",
"summary": "SUSE Bug 1260732 for CVE-2026-23361",
"url": "https://bugzilla.suse.com/1260732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23361"
},
{
"cve": "CVE-2026-23379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23379"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: ets: fix divide by zero in the offload path\n\nOffloading ETS requires computing each class\u0027 WRR weight: this is done by\naveraging over the sums of quanta as \u0027q_sum\u0027 and \u0027q_psum\u0027. Using unsigned\nint, the same integer size as the individual DRR quanta, can overflow and\neven cause division by zero, like it happened in the following splat:\n\n Oops: divide error: 0000 [#1] SMP PTI\n CPU: 13 UID: 0 PID: 487 Comm: tc Tainted: G E 6.19.0-virtme #45 PREEMPT(full)\n Tainted: [E]=UNSIGNED_MODULE\n Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011\n RIP: 0010:ets_offload_change+0x11f/0x290 [sch_ets]\n Code: e4 45 31 ff eb 03 41 89 c7 41 89 cb 89 ce 83 f9 0f 0f 87 b7 00 00 00 45 8b 08 31 c0 45 01 cc 45 85 c9 74 09 41 6b c4 64 31 d2 \u003c41\u003e f7 f2 89 c2 44 29 fa 45 89 df 41 83 fb 0f 0f 87 c7 00 00 00 44\n RSP: 0018:ffffd0a180d77588 EFLAGS: 00010246\n RAX: 00000000ffffff38 RBX: ffff8d3d482ca000 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffd0a180d77660\n RBP: ffffd0a180d77690 R08: ffff8d3d482ca2d8 R09: 00000000fffffffe\n R10: 0000000000000000 R11: 0000000000000000 R12: 00000000fffffffe\n R13: ffff8d3d472f2000 R14: 0000000000000003 R15: 0000000000000000\n FS: 00007f440b6c2740(0000) GS:ffff8d3dc9803000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000003cdd2000 CR3: 0000000007b58002 CR4: 0000000000172ef0\n Call Trace:\n \u003cTASK\u003e\n ets_qdisc_change+0x870/0xf40 [sch_ets]\n qdisc_create+0x12b/0x540\n tc_modify_qdisc+0x6d7/0xbd0\n rtnetlink_rcv_msg+0x168/0x6b0\n netlink_rcv_skb+0x5c/0x110\n netlink_unicast+0x1d6/0x2b0\n netlink_sendmsg+0x22e/0x470\n ____sys_sendmsg+0x38a/0x3c0\n ___sys_sendmsg+0x99/0xe0\n __sys_sendmsg+0x8a/0xf0\n do_syscall_64+0x111/0xf80\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x7f440b81c77e\n Code: 4d 89 d8 e8 d4 bc 00 00 4c 8b 5d f8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 11 c9 c3 0f 1f 80 00 00 00 00 48 8b 45 10 0f 05 \u003cc9\u003e c3 83 e2 39 83 fa 08 75 e7 e8 13 ff ff ff 0f 1f 00 f3 0f 1e fa\n RSP: 002b:00007fff951e4c10 EFLAGS: 00000202 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 0000000000481820 RCX: 00007f440b81c77e\n RDX: 0000000000000000 RSI: 00007fff951e4cd0 RDI: 0000000000000003\n RBP: 00007fff951e4c20 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000202 R12: 00007fff951f4fa8\n R13: 00000000699ddede R14: 00007f440bb01000 R15: 0000000000486980\n \u003c/TASK\u003e\n Modules linked in: sch_ets(E) netdevsim(E)\n ---[ end trace 0000000000000000 ]---\n RIP: 0010:ets_offload_change+0x11f/0x290 [sch_ets]\n Code: e4 45 31 ff eb 03 41 89 c7 41 89 cb 89 ce 83 f9 0f 0f 87 b7 00 00 00 45 8b 08 31 c0 45 01 cc 45 85 c9 74 09 41 6b c4 64 31 d2 \u003c41\u003e f7 f2 89 c2 44 29 fa 45 89 df 41 83 fb 0f 0f 87 c7 00 00 00 44\n RSP: 0018:ffffd0a180d77588 EFLAGS: 00010246\n RAX: 00000000ffffff38 RBX: ffff8d3d482ca000 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffd0a180d77660\n RBP: ffffd0a180d77690 R08: ffff8d3d482ca2d8 R09: 00000000fffffffe\n R10: 0000000000000000 R11: 0000000000000000 R12: 00000000fffffffe\n R13: ffff8d3d472f2000 R14: 0000000000000003 R15: 0000000000000000\n FS: 00007f440b6c2740(0000) GS:ffff8d3dc9803000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000003cdd2000 CR3: 0000000007b58002 CR4: 0000000000172ef0\n Kernel panic - not syncing: Fatal exception\n Kernel Offset: 0x30000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)\n ---[ end Kernel panic - not syncing: Fatal exception ]---\n\nFix this using 64-bit integers for \u0027q_sum\u0027 and \u0027q_psum\u0027.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23379",
"url": "https://www.suse.com/security/cve/CVE-2026-23379"
},
{
"category": "external",
"summary": "SUSE Bug 1260481 for CVE-2026-23379",
"url": "https://bugzilla.suse.com/1260481"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23379"
},
{
"cve": "CVE-2026-23381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23381"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: fix nd_tbl NULL dereference when IPv6 is disabled\n\nWhen booting with the \u0027ipv6.disable=1\u0027 parameter, the nd_tbl is never\ninitialized because inet6_init() exits before ndisc_init() is called\nwhich initializes it. Then, if neigh_suppress is enabled and an ICMPv6\nNeighbor Discovery packet reaches the bridge, br_do_suppress_nd() will\ndereference ipv6_stub-\u003end_tbl which is NULL, passing it to\nneigh_lookup(). This causes a kernel NULL pointer dereference.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000268\n Oops: 0000 [#1] PREEMPT SMP NOPTI\n [...]\n RIP: 0010:neigh_lookup+0x16/0xe0\n [...]\n Call Trace:\n \u003cIRQ\u003e\n ? neigh_lookup+0x16/0xe0\n br_do_suppress_nd+0x160/0x290 [bridge]\n br_handle_frame_finish+0x500/0x620 [bridge]\n br_handle_frame+0x353/0x440 [bridge]\n __netif_receive_skb_core.constprop.0+0x298/0x1110\n __netif_receive_skb_one_core+0x3d/0xa0\n process_backlog+0xa0/0x140\n __napi_poll+0x2c/0x170\n net_rx_action+0x2c4/0x3a0\n handle_softirqs+0xd0/0x270\n do_softirq+0x3f/0x60\n\nFix this by replacing IS_ENABLED(IPV6) call with ipv6_mod_enabled() in\nthe callers. This is in essence disabling NS/NA suppression when IPv6 is\ndisabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23381",
"url": "https://www.suse.com/security/cve/CVE-2026-23381"
},
{
"category": "external",
"summary": "SUSE Bug 1260471 for CVE-2026-23381",
"url": "https://bugzilla.suse.com/1260471"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23381"
},
{
"cve": "CVE-2026-23383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23383"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing\n\nstruct bpf_plt contains a u64 target field. Currently, the BPF JIT\nallocator requests an alignment of 4 bytes (sizeof(u32)) for the JIT\nbuffer.\n\nBecause the base address of the JIT buffer can be 4-byte aligned (e.g.,\nending in 0x4 or 0xc), the relative padding logic in build_plt() fails\nto ensure that target lands on an 8-byte boundary.\n\nThis leads to two issues:\n1. UBSAN reports misaligned-access warnings when dereferencing the\n structure.\n2. More critically, target is updated concurrently via WRITE_ONCE() in\n bpf_arch_text_poke() while the JIT\u0027d code executes ldr. On arm64,\n 64-bit loads/stores are only guaranteed to be single-copy atomic if\n they are 64-bit aligned. A misaligned target risks a torn read,\n causing the JIT to jump to a corrupted address.\n\nFix this by increasing the allocation alignment requirement to 8 bytes\n(sizeof(u64)) in bpf_jit_binary_pack_alloc(). This anchors the base of\nthe JIT buffer to an 8-byte boundary, allowing the relative padding math\nin build_plt() to correctly align the target field.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23383",
"url": "https://www.suse.com/security/cve/CVE-2026-23383"
},
{
"category": "external",
"summary": "SUSE Bug 1260497 for CVE-2026-23383",
"url": "https://bugzilla.suse.com/1260497"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23383"
},
{
"cve": "CVE-2026-23386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23386"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL\n\nIn DQ-QPL mode, gve_tx_clean_pending_packets() incorrectly uses the RDA\nbuffer cleanup path. It iterates num_bufs times and attempts to unmap\nentries in the dma array.\n\nThis leads to two issues:\n1. The dma array shares storage with tx_qpl_buf_ids (union).\n Interpreting buffer IDs as DMA addresses results in attempting to\n unmap incorrect memory locations.\n2. num_bufs in QPL mode (counting 2K chunks) can significantly exceed\n the size of the dma array, causing out-of-bounds access warnings\n(trace below is how we noticed this issue).\n\nUBSAN: array-index-out-of-bounds in\ndrivers/net/ethernet/drivers/net/ethernet/google/gve/gve_tx_dqo.c:178:5 index 18 is out of\nrange for type \u0027dma_addr_t[18]\u0027 (aka \u0027unsigned long long[18]\u0027)\nWorkqueue: gve gve_service_task [gve]\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x33/0xa0\n__ubsan_handle_out_of_bounds+0xdc/0x110\ngve_tx_stop_ring_dqo+0x182/0x200 [gve]\ngve_close+0x1be/0x450 [gve]\ngve_reset+0x99/0x120 [gve]\ngve_service_task+0x61/0x100 [gve]\nprocess_scheduled_works+0x1e9/0x380\n\nFix this by properly checking for QPL mode and delegating to\ngve_free_tx_qpl_bufs() to reclaim the buffers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23386",
"url": "https://www.suse.com/security/cve/CVE-2026-23386"
},
{
"category": "external",
"summary": "SUSE Bug 1260799 for CVE-2026-23386",
"url": "https://bugzilla.suse.com/1260799"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23386"
},
{
"cve": "CVE-2026-23395",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23395"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix accepting multiple L2CAP_ECRED_CONN_REQ\n\nCurrently the code attempts to accept requests regardless of the\ncommand identifier which may cause multiple requests to be marked\nas pending (FLAG_DEFER_SETUP) which can cause more than\nL2CAP_ECRED_MAX_CID(5) to be allocated in l2cap_ecred_rsp_defer\ncausing an overflow.\n\nThe spec is quite clear that the same identifier shall not be used on\nsubsequent requests:\n\n\u0027Within each signaling channel a different Identifier shall be used\nfor each successive request or indication.\u0027\nhttps://www.bluetooth.com/wp-content/uploads/Files/Specification/HTML/Core-62/out/en/host/logical-link-control-and-adaptation-protocol-specification.html#UUID-32a25a06-4aa4-c6c7-77c5-dcfe3682355d\n\nSo this attempts to check if there are any channels pending with the\nsame identifier and rejects if any are found.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23395",
"url": "https://www.suse.com/security/cve/CVE-2026-23395"
},
{
"category": "external",
"summary": "SUSE Bug 1260580 for CVE-2026-23395",
"url": "https://bugzilla.suse.com/1260580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23395"
},
{
"cve": "CVE-2026-23398",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23398"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nicmp: fix NULL pointer dereference in icmp_tag_validation()\n\nicmp_tag_validation() unconditionally dereferences the result of\nrcu_dereference(inet_protos[proto]) without checking for NULL.\nThe inet_protos[] array is sparse -- only about 15 of 256 protocol\nnumbers have registered handlers. When ip_no_pmtu_disc is set to 3\n(hardened PMTU mode) and the kernel receives an ICMP Fragmentation\nNeeded error with a quoted inner IP header containing an unregistered\nprotocol number, the NULL dereference causes a kernel panic in\nsoftirq context.\n\n Oops: general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] SMP KASAN NOPTI\n KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\n RIP: 0010:icmp_unreach (net/ipv4/icmp.c:1085 net/ipv4/icmp.c:1143)\n Call Trace:\n \u003cIRQ\u003e\n icmp_rcv (net/ipv4/icmp.c:1527)\n ip_protocol_deliver_rcu (net/ipv4/ip_input.c:207)\n ip_local_deliver_finish (net/ipv4/ip_input.c:242)\n ip_local_deliver (net/ipv4/ip_input.c:262)\n ip_rcv (net/ipv4/ip_input.c:573)\n __netif_receive_skb_one_core (net/core/dev.c:6164)\n process_backlog (net/core/dev.c:6628)\n handle_softirqs (kernel/softirq.c:561)\n \u003c/IRQ\u003e\n\nAdd a NULL check before accessing icmp_strict_tag_validation. If the\nprotocol has no registered handler, return false since it cannot\nperform strict tag validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23398",
"url": "https://www.suse.com/security/cve/CVE-2026-23398"
},
{
"category": "external",
"summary": "SUSE Bug 1260730 for CVE-2026-23398",
"url": "https://bugzilla.suse.com/1260730"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23398"
},
{
"cve": "CVE-2026-23412",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23412"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: bpf: defer hook memory release until rcu readers are done\n\nYiming Qian reports UaF when concurrent process is dumping hooks via\nnfnetlink_hooks:\n\nBUG: KASAN: slab-use-after-free in nfnl_hook_dump_one.isra.0+0xe71/0x10f0\nRead of size 8 at addr ffff888003edbf88 by task poc/79\nCall Trace:\n \u003cTASK\u003e\n nfnl_hook_dump_one.isra.0+0xe71/0x10f0\n netlink_dump+0x554/0x12b0\n nfnl_hook_get+0x176/0x230\n [..]\n\nDefer release until after concurrent readers have completed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23412",
"url": "https://www.suse.com/security/cve/CVE-2026-23412"
},
{
"category": "external",
"summary": "SUSE Bug 1261412 for CVE-2026-23412",
"url": "https://bugzilla.suse.com/1261412"
},
{
"category": "external",
"summary": "SUSE Bug 1261579 for CVE-2026-23412",
"url": "https://bugzilla.suse.com/1261579"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "important"
}
],
"title": "CVE-2026-23412"
},
{
"cve": "CVE-2026-23413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23413"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclsact: Fix use-after-free in init/destroy rollback asymmetry\n\nFix a use-after-free in the clsact qdisc upon init/destroy rollback asymmetry.\nThe latter is achieved by first fully initializing a clsact instance, and\nthen in a second step having a replacement failure for the new clsact qdisc\ninstance. clsact_init() initializes ingress first and then takes care of the\negress part. This can fail midway, for example, via tcf_block_get_ext(). Upon\nfailure, the kernel will trigger the clsact_destroy() callback.\n\nCommit 1cb6f0bae504 (\"bpf: Fix too early release of tcx_entry\") details the\nway how the transition is happening. If tcf_block_get_ext on the q-\u003eingress_block\nends up failing, we took the tcx_miniq_inc reference count on the ingress\nside, but not yet on the egress side. clsact_destroy() tests whether the\n{ingress,egress}_entry was non-NULL. However, even in midway failure on the\nreplacement, both are in fact non-NULL with a valid egress_entry from the\nprevious clsact instance.\n\nWhat we really need to test for is whether the qdisc instance-specific ingress\nor egress side previously got initialized. This adds a small helper for checking\nthe miniq initialization called mini_qdisc_pair_inited, and utilizes that upon\nclsact_destroy() in order to fix the use-after-free scenario. Convert the\ningress_destroy() side as well so both are consistent to each other.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23413",
"url": "https://www.suse.com/security/cve/CVE-2026-23413"
},
{
"category": "external",
"summary": "SUSE Bug 1261498 for CVE-2026-23413",
"url": "https://bugzilla.suse.com/1261498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23413"
},
{
"cve": "CVE-2026-23414",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23414"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Purge async_hold in tls_decrypt_async_wait()\n\nThe async_hold queue pins encrypted input skbs while\nthe AEAD engine references their scatterlist data. Once\ntls_decrypt_async_wait() returns, every AEAD operation\nhas completed and the engine no longer references those\nskbs, so they can be freed unconditionally.\n\nA subsequent patch adds batch async decryption to\ntls_sw_read_sock(), introducing a new call site that\nmust drain pending AEAD operations and release held\nskbs. Move __skb_queue_purge(\u0026ctx-\u003easync_hold) into\ntls_decrypt_async_wait() so the purge is centralized\nand every caller -- recvmsg\u0027s drain path, the -EBUSY\nfallback in tls_do_decryption(), and the new read_sock\nbatch path -- releases held skbs on synchronization\nwithout each site managing the purge independently.\n\nThis fixes a leak when tls_strp_msg_hold() fails part-way through,\nafter having added some cloned skbs to the async_hold\nqueue. tls_decrypt_sg() will then call tls_decrypt_async_wait() to\nprocess all pending decrypts, and drop back to synchronous mode, but\ntls_sw_recvmsg() only flushes the async_hold queue when one record has\nbeen processed in \"fully-async\" mode, which may not be the case here.\n\n[pabeni@redhat.com: added leak comment]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23414",
"url": "https://www.suse.com/security/cve/CVE-2026-23414"
},
{
"category": "external",
"summary": "SUSE Bug 1261496 for CVE-2026-23414",
"url": "https://bugzilla.suse.com/1261496"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23414"
},
{
"cve": "CVE-2026-23419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23419"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/rds: Fix circular locking dependency in rds_tcp_tune\n\nsyzbot reported a circular locking dependency in rds_tcp_tune() where\nsk_net_refcnt_upgrade() is called while holding the socket lock:\n\n======================================================\nWARNING: possible circular locking dependency detected\n======================================================\nkworker/u10:8/15040 is trying to acquire lock:\nffffffff8e9aaf80 (fs_reclaim){+.+.}-{0:0},\nat: __kmalloc_cache_noprof+0x4b/0x6f0\n\nbut task is already holding lock:\nffff88805a3c1ce0 (k-sk_lock-AF_INET6){+.+.}-{0:0},\nat: rds_tcp_tune+0xd7/0x930\n\nThe issue occurs because sk_net_refcnt_upgrade() performs memory\nallocation (via get_net_track() -\u003e ref_tracker_alloc()) while the\nsocket lock is held, creating a circular dependency with fs_reclaim.\n\nFix this by moving sk_net_refcnt_upgrade() outside the socket lock\ncritical section. This is safe because the fields modified by the\nsk_net_refcnt_upgrade() call (sk_net_refcnt, ns_tracker) are not\naccessed by any concurrent code path at this point.\n\nv2:\n - Corrected fixes tag\n - check patch line wrap nits\n - ai commentary nits",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23419",
"url": "https://www.suse.com/security/cve/CVE-2026-23419"
},
{
"category": "external",
"summary": "SUSE Bug 1261507 for CVE-2026-23419",
"url": "https://bugzilla.suse.com/1261507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "moderate"
}
],
"title": "CVE-2026-23419"
},
{
"cve": "CVE-2026-31788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/privcmd: restrict usage in unprivileged domU\n\nThe Xen privcmd driver allows to issue arbitrary hypercalls from\nuser space processes. This is normally no problem, as access is\nusually limited to root and the hypervisor will deny any hypercalls\naffecting other domains.\n\nIn case the guest is booted using secure boot, however, the privcmd\ndriver would be enabling a root user process to modify e.g. kernel\nmemory contents, thus breaking the secure boot feature.\n\nThe only known case where an unprivileged domU is really needing to\nuse the privcmd driver is the case when it is acting as the device\nmodel for another guest. In this case all hypercalls issued via the\nprivcmd driver will target that other guest.\n\nFortunately the privcmd driver can already be locked down to allow\nonly hypercalls targeting a specific domain, but this mode can be\nactivated from user land only today.\n\nThe target domain can be obtained from Xenstore, so when not running\nin dom0 restrict the privcmd driver to that target domain from the\nbeginning, resolving the potential problem of breaking secure boot.\n\nThis is XSA-482\n\n---\nV2:\n- defer reading from Xenstore if Xenstore isn\u0027t ready yet (Jan Beulich)\n- wait in open() if target domain isn\u0027t known yet\n- issue message in case no target domain found (Jan Beulich)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31788",
"url": "https://www.suse.com/security/cve/CVE-2026-31788"
},
{
"category": "external",
"summary": "SUSE Bug 1259707 for CVE-2026-31788",
"url": "https://bugzilla.suse.com/1259707"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.aarch64",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-base-6.4.0-41.1.21.18.x86_64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.aarch64",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.ppc64le",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-devel-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.s390x",
"SUSE Linux Micro 6.1:kernel-default-livepatch-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-devel-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-kvmsmall-6.4.0-41.1.x86_64",
"SUSE Linux Micro 6.1:kernel-macros-6.4.0-41.1.noarch",
"SUSE Linux Micro 6.1:kernel-source-6.4.0-41.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-13T17:04:49Z",
"details": "important"
}
],
"title": "CVE-2026-31788"
}
]
}
GHSA-3C24-C79W-QW24
Vulnerability from github – Published: 2026-01-13 18:31 – Updated: 2026-01-13 18:31In the Linux kernel, the following vulnerability has been resolved:
iomap: adjust read range correctly for non-block-aligned positions
iomap_adjust_read_range() assumes that the position and length passed in are block-aligned. This is not always the case however, as shown in the syzbot generated case for erofs. This causes too many bytes to be skipped for uptodate blocks, which results in returning the incorrect position and length to read in. If all the blocks are uptodate, this underflows length and returns a position beyond the folio.
Fix the calculation to also take into account the block offset when calculating how many bytes can be skipped for uptodate blocks.
{
"affected": [],
"aliases": [
"CVE-2025-68794"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-01-13T16:16:01Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\niomap: adjust read range correctly for non-block-aligned positions\n\niomap_adjust_read_range() assumes that the position and length passed in\nare block-aligned. This is not always the case however, as shown in the\nsyzbot generated case for erofs. This causes too many bytes to be\nskipped for uptodate blocks, which results in returning the incorrect\nposition and length to read in. If all the blocks are uptodate, this\nunderflows length and returns a position beyond the folio.\n\nFix the calculation to also take into account the block offset when\ncalculating how many bytes can be skipped for uptodate blocks.",
"id": "GHSA-3c24-c79w-qw24",
"modified": "2026-01-13T18:31:04Z",
"published": "2026-01-13T18:31:04Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68794"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/12053695c8ef5410e8cc6c9ed4c0db9cd9c82b3e"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/142194fb21afe964d2d194cab1fc357cbf87e899"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/7aa6bc3e8766990824f66ca76c19596ce10daf3e"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/82b60ffbb532d919959702768dca04c3c0500ae5"
}
],
"schema_version": "1.4.0",
"severity": []
}
BDU:2026-00712
Vulnerability from fstec - Published: 22.09.2025{
"CVSS 2.0": "AV:L/AC:H/Au:S/C:C/I:N/A:C",
"CVSS 3.0": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "8 (Red Hat Enterprise Linux), 9 (Red Hat Enterprise Linux), - (\u0410\u041b\u042c\u0422 \u0421\u041f 10), 10 (Red Hat Enterprise Linux), \u0434\u043e 6.6.120 (Linux), \u0434\u043e 6.12.64 (Linux), \u0434\u043e 6.18.3 (Linux), \u0434\u043e 6.19 rc1 (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://lore.kernel.org/linux-cve-announce/2026011305-CVE-2025-68794-32db@gregkh/\nhttps://git.kernel.org/stable/c/12053695c8ef5410e8cc6c9ed4c0db9cd9c82b3e\t\nhttps://git.kernel.org/stable/c/142194fb21afe964d2d194cab1fc357cbf87e899\t\nhttps://git.kernel.org/stable/c/7aa6bc3e8766990824f66ca76c19596ce10daf3e\t\nhttps://git.kernel.org/stable/c/82b60ffbb532d919959702768dca04c3c0500ae5\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/cve-2025-68794\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u041b\u042c\u0422 \u0421\u041f 10: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430: https://altsp.su/obnovleniya-bezopasnosti/",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "22.09.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "27.01.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "23.01.2026",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2026-00712",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-68794",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, \u0410\u041b\u042c\u0422 \u0421\u041f 10, Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 8 , Red Hat Inc. Red Hat Enterprise Linux 9 , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u041b\u042c\u0422 \u0421\u041f 10 - , Red Hat Inc. Red Hat Enterprise Linux 10 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 6.6.120 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 6.12.64 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 6.18.3 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u0434\u043e 6.19 rc1 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 iomap_adjust_read_range() \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 (CWE-200)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 iomap_adjust_read_range() \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u0437\u0430\u0449\u0438\u0442\u043e\u0439 \u0441\u043b\u0443\u0436\u0435\u0431\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://lore.kernel.org/linux-cve-announce/2026011305-CVE-2025-68794-32db@gregkh/\nhttps://git.kernel.org/stable/c/12053695c8ef5410e8cc6c9ed4c0db9cd9c82b3e\t\nhttps://git.kernel.org/stable/c/142194fb21afe964d2d194cab1fc357cbf87e899\t\nhttps://git.kernel.org/stable/c/7aa6bc3e8766990824f66ca76c19596ce10daf3e\t\nhttps://git.kernel.org/stable/c/82b60ffbb532d919959702768dca04c3c0500ae5\nhttps://altsp.su/obnovleniya-bezopasnosti/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-200",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,3)"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.