Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-23184 (GCVE-0-2026-23184)
Vulnerability from cvelistv5 – Published: 2026-02-14 16:27 – Updated: 2026-02-14 16:27{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/android/binder.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "a6050dedb6f1cc23e518e3a132ab74a0aad6df90",
"status": "affected",
"version": "63740349eba78f242bcbf60d5244d7f2b2600853",
"versionType": "git"
},
{
"lessThan": "5e8a3d01544282e50d887d76f30d1496a0a53562",
"status": "affected",
"version": "63740349eba78f242bcbf60d5244d7f2b2600853",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/android/binder.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.18"
},
{
"lessThan": "6.18",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.10",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.19",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.10",
"versionStartIncluding": "6.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19",
"versionStartIncluding": "6.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix UAF in binder_netlink_report()\n\nOneway transactions sent to frozen targets via binder_proc_transaction()\nreturn a BR_TRANSACTION_PENDING_FROZEN error but they are still treated\nas successful since the target is expected to thaw at some point. It is\nthen not safe to access \u0027t\u0027 after BR_TRANSACTION_PENDING_FROZEN errors\nas the transaction could have been consumed by the now thawed target.\n\nThis is the case for binder_netlink_report() which derreferences \u0027t\u0027\nafter a pending frozen error, as pointed out by the following KASAN\nreport:\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in binder_netlink_report.isra.0+0x694/0x6c8\n Read of size 8 at addr ffff00000f98ba38 by task binder-util/522\n\n CPU: 4 UID: 0 PID: 522 Comm: binder-util Not tainted 6.19.0-rc6-00015-gc03e9c42ae8f #1 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n Call trace:\n binder_netlink_report.isra.0+0x694/0x6c8\n binder_transaction+0x66e4/0x79b8\n binder_thread_write+0xab4/0x4440\n binder_ioctl+0x1fd4/0x2940\n [...]\n\n Allocated by task 522:\n __kmalloc_cache_noprof+0x17c/0x50c\n binder_transaction+0x584/0x79b8\n binder_thread_write+0xab4/0x4440\n binder_ioctl+0x1fd4/0x2940\n [...]\n\n Freed by task 488:\n kfree+0x1d0/0x420\n binder_free_transaction+0x150/0x234\n binder_thread_read+0x2d08/0x3ce4\n binder_ioctl+0x488/0x2940\n [...]\n ==================================================================\n\nInstead, make a transaction copy so the data can be safely accessed by\nbinder_netlink_report() after a pending frozen error. While here, add a\ncomment about not using t-\u003ebuffer in binder_netlink_report()."
}
],
"providerMetadata": {
"dateUpdated": "2026-02-14T16:27:14.167Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/a6050dedb6f1cc23e518e3a132ab74a0aad6df90"
},
{
"url": "https://git.kernel.org/stable/c/5e8a3d01544282e50d887d76f30d1496a0a53562"
}
],
"title": "binder: fix UAF in binder_netlink_report()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-23184",
"datePublished": "2026-02-14T16:27:14.167Z",
"dateReserved": "2026-01-13T15:37:45.984Z",
"dateUpdated": "2026-02-14T16:27:14.167Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-23184\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-02-14T17:15:56.167\",\"lastModified\":\"2026-03-18T15:10:36.210\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nbinder: fix UAF in binder_netlink_report()\\n\\nOneway transactions sent to frozen targets via binder_proc_transaction()\\nreturn a BR_TRANSACTION_PENDING_FROZEN error but they are still treated\\nas successful since the target is expected to thaw at some point. It is\\nthen not safe to access \u0027t\u0027 after BR_TRANSACTION_PENDING_FROZEN errors\\nas the transaction could have been consumed by the now thawed target.\\n\\nThis is the case for binder_netlink_report() which derreferences \u0027t\u0027\\nafter a pending frozen error, as pointed out by the following KASAN\\nreport:\\n\\n ==================================================================\\n BUG: KASAN: slab-use-after-free in binder_netlink_report.isra.0+0x694/0x6c8\\n Read of size 8 at addr ffff00000f98ba38 by task binder-util/522\\n\\n CPU: 4 UID: 0 PID: 522 Comm: binder-util Not tainted 6.19.0-rc6-00015-gc03e9c42ae8f #1 PREEMPT\\n Hardware name: linux,dummy-virt (DT)\\n Call trace:\\n binder_netlink_report.isra.0+0x694/0x6c8\\n binder_transaction+0x66e4/0x79b8\\n binder_thread_write+0xab4/0x4440\\n binder_ioctl+0x1fd4/0x2940\\n [...]\\n\\n Allocated by task 522:\\n __kmalloc_cache_noprof+0x17c/0x50c\\n binder_transaction+0x584/0x79b8\\n binder_thread_write+0xab4/0x4440\\n binder_ioctl+0x1fd4/0x2940\\n [...]\\n\\n Freed by task 488:\\n kfree+0x1d0/0x420\\n binder_free_transaction+0x150/0x234\\n binder_thread_read+0x2d08/0x3ce4\\n binder_ioctl+0x488/0x2940\\n [...]\\n ==================================================================\\n\\nInstead, make a transaction copy so the data can be safely accessed by\\nbinder_netlink_report() after a pending frozen error. While here, add a\\ncomment about not using t-\u003ebuffer in binder_netlink_report().\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\\n\\nbinder: corregir UAF en binder_netlink_report()\\n\\nLas transacciones unidireccionales enviadas a objetivos congelados a trav\u00e9s de binder_proc_transaction() devuelven un error BR_TRANSACTION_PENDING_FROZEN pero a\u00fan se tratan como exitosas ya que se espera que el objetivo se descongele en alg\u00fan momento. Por lo tanto, no es seguro acceder a \u0027t\u0027 despu\u00e9s de errores BR_TRANSACTION_PENDING_FROZEN, ya que la transacci\u00f3n podr\u00eda haber sido consumida por el objetivo ahora descongelado.\\n\\nEste es el caso de binder_netlink_report() que desreferencia \u0027t\u0027 despu\u00e9s de un error de congelaci\u00f3n pendiente, como lo se\u00f1ala el siguiente informe KASAN:\\n\\n ==================================================================\\n ERROR: KASAN: uso despu\u00e9s de liberaci\u00f3n de slab en binder_netlink_report.isra.0+0x694/0x6c8\\n Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff00000f98ba38 por la tarea binder-util/522\\n\\n CPU: 4 UID: 0 PID: 522 Comm: binder-util No contaminado 6.19.0-rc6-00015-gc03e9c42ae8f #1 PREEMPT\\n Nombre del hardware: linux,dummy-virt (DT)\\n Rastro de llamada:\\n binder_netlink_report.isra.0+0x694/0x6c8\\n binder_transaction+0x66e4/0x79b8\\n binder_thread_write+0xab4/0x4440\\n binder_ioctl+0x1fd4/0x2940\\n [...]\\n\\n Asignado por la tarea 522:\\n __kmalloc_cache_noprof+0x17c/0x50c\\n binder_transaction+0x584/0x79b8\\n binder_thread_write+0xab4/0x4440\\n binder_ioctl+0x1fd4/0x2940\\n [...]\\n\\n Liberado por la tarea 488:\\n kfree+0x1d0/0x420\\n binder_free_transaction+0x150/0x234\\n binder_thread_read+0x2d08/0x3ce4\\n binder_ioctl+0x488/0x2940\\n [...]\\n ==================================================================\\n\\nEn su lugar, haga una copia de la transacci\u00f3n para que los datos puedan ser accedidos de forma segura por binder_netlink_report() despu\u00e9s de un error de congelaci\u00f3n pendiente. Ya que estamos, a\u00f1ada un comentario sobre no usar t-\u0026gt;buffer en binder_netlink_report().\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.18\",\"versionEndExcluding\":\"6.18.10\",\"matchCriteriaId\":\"32F6354D-FB80-4DEC-B5BD-29DA22C31C55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"17B67AA7-40D6-4AFA-8459-F200F3D7CFD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C47E4CC9-C826-4FA9-B014-7FE3D9B318B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F71D92C0-C023-48BD-B3B6-70B638EEE298\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"13580667-0A98-40CC-B29F-D12790B91BDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD1FED7-CF48-47BF-AC7D-7B6FA3C065FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EF854A1-ABB1-4E93-BE9A-44569EC76C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5DC0CA6-F0AF-4DDF-A882-3DADB9A886A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB5B7DFC-C36B-45D8-922C-877569FDDF43\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/5e8a3d01544282e50d887d76f30d1496a0a53562\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/a6050dedb6f1cc23e518e3a132ab74a0aad6df90\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
FKIE_CVE-2026-23184
Vulnerability from fkie_nvd - Published: 2026-02-14 17:15 - Updated: 2026-03-18 15:10| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "32F6354D-FB80-4DEC-B5BD-29DA22C31C55",
"versionEndExcluding": "6.18.10",
"versionStartIncluding": "6.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "17B67AA7-40D6-4AFA-8459-F200F3D7CFD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C47E4CC9-C826-4FA9-B014-7FE3D9B318B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F71D92C0-C023-48BD-B3B6-70B638EEE298",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "13580667-0A98-40CC-B29F-D12790B91BDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "CAD1FED7-CF48-47BF-AC7D-7B6FA3C065FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "3EF854A1-ABB1-4E93-BE9A-44569EC76C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "F5DC0CA6-F0AF-4DDF-A882-3DADB9A886A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*",
"matchCriteriaId": "EB5B7DFC-C36B-45D8-922C-877569FDDF43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix UAF in binder_netlink_report()\n\nOneway transactions sent to frozen targets via binder_proc_transaction()\nreturn a BR_TRANSACTION_PENDING_FROZEN error but they are still treated\nas successful since the target is expected to thaw at some point. It is\nthen not safe to access \u0027t\u0027 after BR_TRANSACTION_PENDING_FROZEN errors\nas the transaction could have been consumed by the now thawed target.\n\nThis is the case for binder_netlink_report() which derreferences \u0027t\u0027\nafter a pending frozen error, as pointed out by the following KASAN\nreport:\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in binder_netlink_report.isra.0+0x694/0x6c8\n Read of size 8 at addr ffff00000f98ba38 by task binder-util/522\n\n CPU: 4 UID: 0 PID: 522 Comm: binder-util Not tainted 6.19.0-rc6-00015-gc03e9c42ae8f #1 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n Call trace:\n binder_netlink_report.isra.0+0x694/0x6c8\n binder_transaction+0x66e4/0x79b8\n binder_thread_write+0xab4/0x4440\n binder_ioctl+0x1fd4/0x2940\n [...]\n\n Allocated by task 522:\n __kmalloc_cache_noprof+0x17c/0x50c\n binder_transaction+0x584/0x79b8\n binder_thread_write+0xab4/0x4440\n binder_ioctl+0x1fd4/0x2940\n [...]\n\n Freed by task 488:\n kfree+0x1d0/0x420\n binder_free_transaction+0x150/0x234\n binder_thread_read+0x2d08/0x3ce4\n binder_ioctl+0x488/0x2940\n [...]\n ==================================================================\n\nInstead, make a transaction copy so the data can be safely accessed by\nbinder_netlink_report() after a pending frozen error. While here, add a\ncomment about not using t-\u003ebuffer in binder_netlink_report()."
},
{
"lang": "es",
"value": "En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\nbinder: corregir UAF en binder_netlink_report()\n\nLas transacciones unidireccionales enviadas a objetivos congelados a trav\u00e9s de binder_proc_transaction() devuelven un error BR_TRANSACTION_PENDING_FROZEN pero a\u00fan se tratan como exitosas ya que se espera que el objetivo se descongele en alg\u00fan momento. Por lo tanto, no es seguro acceder a \u0027t\u0027 despu\u00e9s de errores BR_TRANSACTION_PENDING_FROZEN, ya que la transacci\u00f3n podr\u00eda haber sido consumida por el objetivo ahora descongelado.\n\nEste es el caso de binder_netlink_report() que desreferencia \u0027t\u0027 despu\u00e9s de un error de congelaci\u00f3n pendiente, como lo se\u00f1ala el siguiente informe KASAN:\n\n ==================================================================\n ERROR: KASAN: uso despu\u00e9s de liberaci\u00f3n de slab en binder_netlink_report.isra.0+0x694/0x6c8\n Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff00000f98ba38 por la tarea binder-util/522\n\n CPU: 4 UID: 0 PID: 522 Comm: binder-util No contaminado 6.19.0-rc6-00015-gc03e9c42ae8f #1 PREEMPT\n Nombre del hardware: linux,dummy-virt (DT)\n Rastro de llamada:\n binder_netlink_report.isra.0+0x694/0x6c8\n binder_transaction+0x66e4/0x79b8\n binder_thread_write+0xab4/0x4440\n binder_ioctl+0x1fd4/0x2940\n [...]\n\n Asignado por la tarea 522:\n __kmalloc_cache_noprof+0x17c/0x50c\n binder_transaction+0x584/0x79b8\n binder_thread_write+0xab4/0x4440\n binder_ioctl+0x1fd4/0x2940\n [...]\n\n Liberado por la tarea 488:\n kfree+0x1d0/0x420\n binder_free_transaction+0x150/0x234\n binder_thread_read+0x2d08/0x3ce4\n binder_ioctl+0x488/0x2940\n [...]\n ==================================================================\n\nEn su lugar, haga una copia de la transacci\u00f3n para que los datos puedan ser accedidos de forma segura por binder_netlink_report() despu\u00e9s de un error de congelaci\u00f3n pendiente. Ya que estamos, a\u00f1ada un comentario sobre no usar t-\u0026gt;buffer en binder_netlink_report()."
}
],
"id": "CVE-2026-23184",
"lastModified": "2026-03-18T15:10:36.210",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-02-14T17:15:56.167",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/5e8a3d01544282e50d887d76f30d1496a0a53562"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/a6050dedb6f1cc23e518e3a132ab74a0aad6df90"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-HG9W-RXWP-FW28
Vulnerability from github – Published: 2026-02-14 18:30 – Updated: 2026-03-18 15:30In the Linux kernel, the following vulnerability has been resolved:
binder: fix UAF in binder_netlink_report()
Oneway transactions sent to frozen targets via binder_proc_transaction() return a BR_TRANSACTION_PENDING_FROZEN error but they are still treated as successful since the target is expected to thaw at some point. It is then not safe to access 't' after BR_TRANSACTION_PENDING_FROZEN errors as the transaction could have been consumed by the now thawed target.
This is the case for binder_netlink_report() which derreferences 't' after a pending frozen error, as pointed out by the following KASAN report:
================================================================== BUG: KASAN: slab-use-after-free in binder_netlink_report.isra.0+0x694/0x6c8 Read of size 8 at addr ffff00000f98ba38 by task binder-util/522
CPU: 4 UID: 0 PID: 522 Comm: binder-util Not tainted 6.19.0-rc6-00015-gc03e9c42ae8f #1 PREEMPT Hardware name: linux,dummy-virt (DT) Call trace: binder_netlink_report.isra.0+0x694/0x6c8 binder_transaction+0x66e4/0x79b8 binder_thread_write+0xab4/0x4440 binder_ioctl+0x1fd4/0x2940 [...]
Allocated by task 522: __kmalloc_cache_noprof+0x17c/0x50c binder_transaction+0x584/0x79b8 binder_thread_write+0xab4/0x4440 binder_ioctl+0x1fd4/0x2940 [...]
Freed by task 488: kfree+0x1d0/0x420 binder_free_transaction+0x150/0x234 binder_thread_read+0x2d08/0x3ce4 binder_ioctl+0x488/0x2940 [...] ==================================================================
Instead, make a transaction copy so the data can be safely accessed by binder_netlink_report() after a pending frozen error. While here, add a comment about not using t->buffer in binder_netlink_report().
{
"affected": [],
"aliases": [
"CVE-2026-23184"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-02-14T17:15:56Z",
"severity": "HIGH"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbinder: fix UAF in binder_netlink_report()\n\nOneway transactions sent to frozen targets via binder_proc_transaction()\nreturn a BR_TRANSACTION_PENDING_FROZEN error but they are still treated\nas successful since the target is expected to thaw at some point. It is\nthen not safe to access \u0027t\u0027 after BR_TRANSACTION_PENDING_FROZEN errors\nas the transaction could have been consumed by the now thawed target.\n\nThis is the case for binder_netlink_report() which derreferences \u0027t\u0027\nafter a pending frozen error, as pointed out by the following KASAN\nreport:\n\n ==================================================================\n BUG: KASAN: slab-use-after-free in binder_netlink_report.isra.0+0x694/0x6c8\n Read of size 8 at addr ffff00000f98ba38 by task binder-util/522\n\n CPU: 4 UID: 0 PID: 522 Comm: binder-util Not tainted 6.19.0-rc6-00015-gc03e9c42ae8f #1 PREEMPT\n Hardware name: linux,dummy-virt (DT)\n Call trace:\n binder_netlink_report.isra.0+0x694/0x6c8\n binder_transaction+0x66e4/0x79b8\n binder_thread_write+0xab4/0x4440\n binder_ioctl+0x1fd4/0x2940\n [...]\n\n Allocated by task 522:\n __kmalloc_cache_noprof+0x17c/0x50c\n binder_transaction+0x584/0x79b8\n binder_thread_write+0xab4/0x4440\n binder_ioctl+0x1fd4/0x2940\n [...]\n\n Freed by task 488:\n kfree+0x1d0/0x420\n binder_free_transaction+0x150/0x234\n binder_thread_read+0x2d08/0x3ce4\n binder_ioctl+0x488/0x2940\n [...]\n ==================================================================\n\nInstead, make a transaction copy so the data can be safely accessed by\nbinder_netlink_report() after a pending frozen error. While here, add a\ncomment about not using t-\u003ebuffer in binder_netlink_report().",
"id": "GHSA-hg9w-rxwp-fw28",
"modified": "2026-03-18T15:30:41Z",
"published": "2026-02-14T18:30:16Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23184"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/5e8a3d01544282e50d887d76f30d1496a0a53562"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/a6050dedb6f1cc23e518e3a132ab74a0aad6df90"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2026-0421
Vulnerability from csaf_certbund - Published: 2026-02-15 23:00 - Updated: 2026-03-19 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu einer Denial-of-Service- Bedingung f\u00fchren oder eine Speicherbesch\u00e4digung verursachen k\u00f6nnen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0421 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0421.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0421 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0421"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71200",
"url": "https://lore.kernel.org/linux-cve-announce/2026021403-CVE-2025-71200-b7c7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71201",
"url": "https://lore.kernel.org/linux-cve-announce/2026021428-CVE-2025-71201-9d67@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71202",
"url": "https://lore.kernel.org/linux-cve-announce/2026021414-CVE-2025-71202-4c01@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71203",
"url": "https://lore.kernel.org/linux-cve-announce/2026021423-CVE-2025-71203-a81c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71204",
"url": "https://lore.kernel.org/linux-cve-announce/2026021425-CVE-2025-71204-88b2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71220",
"url": "https://lore.kernel.org/linux-cve-announce/2026021425-CVE-2025-71220-162f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71221",
"url": "https://lore.kernel.org/linux-cve-announce/2026021426-CVE-2025-71221-2987@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71222",
"url": "https://lore.kernel.org/linux-cve-announce/2026021426-CVE-2025-71222-1437@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71223",
"url": "https://lore.kernel.org/linux-cve-announce/2026021426-CVE-2025-71223-65b9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71224",
"url": "https://lore.kernel.org/linux-cve-announce/2026021427-CVE-2025-71224-318e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23111",
"url": "https://lore.kernel.org/linux-cve-announce/2026021300-CVE-2026-23111-9762@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23112",
"url": "https://lore.kernel.org/linux-cve-announce/2026021302-CVE-2026-23112-6499@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23113",
"url": "https://lore.kernel.org/linux-cve-announce/2026021405-CVE-2026-23113-a027@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23114",
"url": "https://lore.kernel.org/linux-cve-announce/2026021405-CVE-2026-23114-21a3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23115",
"url": "https://lore.kernel.org/linux-cve-announce/2026021406-CVE-2026-23115-64da@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23116",
"url": "https://lore.kernel.org/linux-cve-announce/2026021406-CVE-2026-23116-41e5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23117",
"url": "https://lore.kernel.org/linux-cve-announce/2026021406-CVE-2026-23117-0b29@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23118",
"url": "https://lore.kernel.org/linux-cve-announce/2026021407-CVE-2026-23118-7579@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23119",
"url": "https://lore.kernel.org/linux-cve-announce/2026021407-CVE-2026-23119-0f44@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23120",
"url": "https://lore.kernel.org/linux-cve-announce/2026021407-CVE-2026-23120-5f82@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23121",
"url": "https://lore.kernel.org/linux-cve-announce/2026021408-CVE-2026-23121-73e6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23123",
"url": "https://lore.kernel.org/linux-cve-announce/2026021408-CVE-2026-23123-9ee2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23124",
"url": "https://lore.kernel.org/linux-cve-announce/2026021409-CVE-2026-23124-2074@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23125",
"url": "https://lore.kernel.org/linux-cve-announce/2026021409-CVE-2026-23125-1ee3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23126",
"url": "https://lore.kernel.org/linux-cve-announce/2026021409-CVE-2026-23126-b259@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23127",
"url": "https://lore.kernel.org/linux-cve-announce/2026021410-CVE-2026-23127-d01a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23128",
"url": "https://lore.kernel.org/linux-cve-announce/2026021410-CVE-2026-23128-fab1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23129",
"url": "https://lore.kernel.org/linux-cve-announce/2026021410-CVE-2026-23129-81ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23130",
"url": "https://lore.kernel.org/linux-cve-announce/2026021411-CVE-2026-23130-4390@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23131",
"url": "https://lore.kernel.org/linux-cve-announce/2026021411-CVE-2026-23131-6201@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23132",
"url": "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23132-175d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23133",
"url": "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23133-19ce@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23134",
"url": "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23134-22cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23135",
"url": "https://lore.kernel.org/linux-cve-announce/2026021438-CVE-2026-23135-74c1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23136",
"url": "https://lore.kernel.org/linux-cve-announce/2026021428-CVE-2026-23136-f28c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23137",
"url": "https://lore.kernel.org/linux-cve-announce/2026021429-CVE-2026-23137-b77f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23138",
"url": "https://lore.kernel.org/linux-cve-announce/2026021429-CVE-2026-23138-9853@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23139",
"url": "https://lore.kernel.org/linux-cve-announce/2026021429-CVE-2026-23139-a7b4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23140",
"url": "https://lore.kernel.org/linux-cve-announce/2026021430-CVE-2026-23140-fed3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23141",
"url": "https://lore.kernel.org/linux-cve-announce/2026021415-CVE-2026-23141-c6bd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23142",
"url": "https://lore.kernel.org/linux-cve-announce/2026021416-CVE-2026-23142-f91e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23143",
"url": "https://lore.kernel.org/linux-cve-announce/2026021416-CVE-2026-23143-9346@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23144",
"url": "https://lore.kernel.org/linux-cve-announce/2026021417-CVE-2026-23144-297b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23145",
"url": "https://lore.kernel.org/linux-cve-announce/2026021417-CVE-2026-23145-0c0b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23146",
"url": "https://lore.kernel.org/linux-cve-announce/2026021411-CVE-2026-23146-3658@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23147",
"url": "https://lore.kernel.org/linux-cve-announce/2026021413-CVE-2026-23147-1f6d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23148",
"url": "https://lore.kernel.org/linux-cve-announce/2026021413-CVE-2026-23148-bb5d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23149",
"url": "https://lore.kernel.org/linux-cve-announce/2026021413-CVE-2026-23149-8329@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23150",
"url": "https://lore.kernel.org/linux-cve-announce/2026021414-CVE-2026-23150-5706@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23151",
"url": "https://lore.kernel.org/linux-cve-announce/2026021414-CVE-2026-23151-74d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23152",
"url": "https://lore.kernel.org/linux-cve-announce/2026021414-CVE-2026-23152-c2ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23153",
"url": "https://lore.kernel.org/linux-cve-announce/2026021415-CVE-2026-23153-9e56@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23154",
"url": "https://lore.kernel.org/linux-cve-announce/2026021415-CVE-2026-23154-f658@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23155",
"url": "https://lore.kernel.org/linux-cve-announce/2026021415-CVE-2026-23155-32be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23156",
"url": "https://lore.kernel.org/linux-cve-announce/2026021416-CVE-2026-23156-b2f4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23157",
"url": "https://lore.kernel.org/linux-cve-announce/2026021416-CVE-2026-23157-6214@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23158",
"url": "https://lore.kernel.org/linux-cve-announce/2026021417-CVE-2026-23158-052d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23159",
"url": "https://lore.kernel.org/linux-cve-announce/2026021417-CVE-2026-23159-7d2c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23160",
"url": "https://lore.kernel.org/linux-cve-announce/2026021417-CVE-2026-23160-d1e6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23161",
"url": "https://lore.kernel.org/linux-cve-announce/2026021418-CVE-2026-23161-d727@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23162",
"url": "https://lore.kernel.org/linux-cve-announce/2026021418-CVE-2026-23162-da25@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23163",
"url": "https://lore.kernel.org/linux-cve-announce/2026021418-CVE-2026-23163-abc8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23164",
"url": "https://lore.kernel.org/linux-cve-announce/2026021419-CVE-2026-23164-9874@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23165",
"url": "https://lore.kernel.org/linux-cve-announce/2026021419-CVE-2026-23165-3437@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23166",
"url": "https://lore.kernel.org/linux-cve-announce/2026021419-CVE-2026-23166-c1fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23167",
"url": "https://lore.kernel.org/linux-cve-announce/2026021420-CVE-2026-23167-1892@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23168",
"url": "https://lore.kernel.org/linux-cve-announce/2026021420-CVE-2026-23168-0630@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23169",
"url": "https://lore.kernel.org/linux-cve-announce/2026021420-CVE-2026-23169-38ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23170",
"url": "https://lore.kernel.org/linux-cve-announce/2026021421-CVE-2026-23170-7a51@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23171",
"url": "https://lore.kernel.org/linux-cve-announce/2026021421-CVE-2026-23171-5a73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23172",
"url": "https://lore.kernel.org/linux-cve-announce/2026021421-CVE-2026-23172-acf0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23173",
"url": "https://lore.kernel.org/linux-cve-announce/2026021422-CVE-2026-23173-4a20@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23174",
"url": "https://lore.kernel.org/linux-cve-announce/2026021427-CVE-2026-23174-0b41@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23175",
"url": "https://lore.kernel.org/linux-cve-announce/2026021427-CVE-2026-23175-8c89@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23176",
"url": "https://lore.kernel.org/linux-cve-announce/2026021428-CVE-2026-23176-4baf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23177",
"url": "https://lore.kernel.org/linux-cve-announce/2026021428-CVE-2026-23177-a343@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23178",
"url": "https://lore.kernel.org/linux-cve-announce/2026021428-CVE-2026-23178-ffd4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23179",
"url": "https://lore.kernel.org/linux-cve-announce/2026021429-CVE-2026-23179-6ff7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23180",
"url": "https://lore.kernel.org/linux-cve-announce/2026021429-CVE-2026-23180-19a8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23181",
"url": "https://lore.kernel.org/linux-cve-announce/2026021429-CVE-2026-23181-7c82@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23182",
"url": "https://lore.kernel.org/linux-cve-announce/2026021430-CVE-2026-23182-651e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23183",
"url": "https://lore.kernel.org/linux-cve-announce/2026021430-CVE-2026-23183-b758@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23184",
"url": "https://lore.kernel.org/linux-cve-announce/2026021430-CVE-2026-23184-a1f1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23185",
"url": "https://lore.kernel.org/linux-cve-announce/2026021431-CVE-2026-23185-7d56@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23186",
"url": "https://lore.kernel.org/linux-cve-announce/2026021431-CVE-2026-23186-c917@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23187",
"url": "https://lore.kernel.org/linux-cve-announce/2026021431-CVE-2026-23187-018e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23188",
"url": "https://lore.kernel.org/linux-cve-announce/2026021432-CVE-2026-23188-c03c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23189",
"url": "https://lore.kernel.org/linux-cve-announce/2026021432-CVE-2026-23189-3d9f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23190",
"url": "https://lore.kernel.org/linux-cve-announce/2026021433-CVE-2026-23190-0719@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23191",
"url": "https://lore.kernel.org/linux-cve-announce/2026021433-CVE-2026-23191-f990@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23192",
"url": "https://lore.kernel.org/linux-cve-announce/2026021433-CVE-2026-23192-72a9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23193",
"url": "https://lore.kernel.org/linux-cve-announce/2026021434-CVE-2026-23193-2c6c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23194",
"url": "https://lore.kernel.org/linux-cve-announce/2026021434-CVE-2026-23194-5976@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23195",
"url": "https://lore.kernel.org/linux-cve-announce/2026021434-CVE-2026-23195-6042@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23196",
"url": "https://lore.kernel.org/linux-cve-announce/2026021435-CVE-2026-23196-2812@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23197",
"url": "https://lore.kernel.org/linux-cve-announce/2026021435-CVE-2026-23197-59da@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23198",
"url": "https://lore.kernel.org/linux-cve-announce/2026021435-CVE-2026-23198-8a25@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23199",
"url": "https://lore.kernel.org/linux-cve-announce/2026021436-CVE-2026-23199-0dc0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23200",
"url": "https://lore.kernel.org/linux-cve-announce/2026021436-CVE-2026-23200-e35e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23201",
"url": "https://lore.kernel.org/linux-cve-announce/2026021436-CVE-2026-23201-4530@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23202",
"url": "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23202-0480@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23203",
"url": "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23203-de1a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23204",
"url": "https://lore.kernel.org/linux-cve-announce/2026021437-CVE-2026-23204-be85@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23205",
"url": "https://lore.kernel.org/linux-cve-announce/2026021438-CVE-2026-23205-a62a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23206",
"url": "https://lore.kernel.org/linux-cve-announce/2026021438-CVE-2026-23206-ed03@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23207",
"url": "https://lore.kernel.org/linux-cve-announce/2026021438-CVE-2026-23207-a80c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23208",
"url": "https://lore.kernel.org/linux-cve-announce/2026021439-CVE-2026-23208-cc9e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23209",
"url": "https://lore.kernel.org/linux-cve-announce/2026021439-CVE-2026-23209-9ad6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23210",
"url": "https://lore.kernel.org/linux-cve-announce/2026021439-CVE-2026-23210-7cac@gregkh/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4012 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4012"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-4012 vom 2026-03-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-4012.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50145 vom 2026-03-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-50145.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50144 vom 2026-03-11",
"url": "https://linux.oracle.com/errata/ELSA-2026-50144.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6163 vom 2026-03-13",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00071.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4498 vom 2026-03-13",
"url": "https://lists.debian.org/debian-lts-announce/2026/03/msg00002.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4499 vom 2026-03-13",
"url": "https://lists.debian.org/debian-lts-announce/2026/03/msg00003.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8100-1 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8100-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20711-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20667-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0928-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2026-099 vom 2026-03-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2026-099.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20720-1 vom 2026-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20713-1 vom 2026-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-114 vom 2026-03-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-114.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-19T23:00:00.000+00:00",
"generator": {
"date": "2026-03-20T08:43:06.014+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0421",
"initial_release_date": "2026-02-15T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-10T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-11T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-12T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-03-15T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-03-16T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-18T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T050933",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-23156",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23156"
},
{
"cve": "CVE-2026-23157",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23157"
},
{
"cve": "CVE-2026-23158",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23158"
},
{
"cve": "CVE-2026-23159",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23159"
},
{
"cve": "CVE-2026-23160",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23160"
},
{
"cve": "CVE-2026-23161",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23161"
},
{
"cve": "CVE-2026-23162",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23162"
},
{
"cve": "CVE-2026-23163",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23163"
},
{
"cve": "CVE-2026-23164",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23164"
},
{
"cve": "CVE-2026-23165",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23165"
},
{
"cve": "CVE-2026-23166",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23166"
},
{
"cve": "CVE-2026-23167",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23167"
},
{
"cve": "CVE-2026-23168",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23168"
},
{
"cve": "CVE-2026-23169",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23169"
},
{
"cve": "CVE-2026-23170",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23170"
},
{
"cve": "CVE-2026-23171",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23171"
},
{
"cve": "CVE-2026-23172",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23172"
},
{
"cve": "CVE-2026-23173",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23173"
},
{
"cve": "CVE-2026-23174",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23174"
},
{
"cve": "CVE-2026-23175",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23175"
},
{
"cve": "CVE-2026-23176",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23176"
},
{
"cve": "CVE-2026-23177",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23177"
},
{
"cve": "CVE-2026-23178",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23178"
},
{
"cve": "CVE-2026-23179",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23179"
},
{
"cve": "CVE-2026-23180",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23180"
},
{
"cve": "CVE-2026-23181",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23181"
},
{
"cve": "CVE-2026-23182",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23182"
},
{
"cve": "CVE-2026-23183",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23183"
},
{
"cve": "CVE-2026-23184",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23184"
},
{
"cve": "CVE-2026-23185",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23185"
},
{
"cve": "CVE-2026-23186",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23186"
},
{
"cve": "CVE-2026-23187",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23187"
},
{
"cve": "CVE-2026-23188",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23188"
},
{
"cve": "CVE-2026-23189",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23189"
},
{
"cve": "CVE-2026-23190",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23190"
},
{
"cve": "CVE-2026-23191",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23191"
},
{
"cve": "CVE-2026-23192",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23192"
},
{
"cve": "CVE-2026-23193",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23193"
},
{
"cve": "CVE-2026-23194",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23194"
},
{
"cve": "CVE-2026-23195",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23195"
},
{
"cve": "CVE-2026-23196",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23196"
},
{
"cve": "CVE-2026-23197",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23197"
},
{
"cve": "CVE-2026-23198",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23198"
},
{
"cve": "CVE-2026-23199",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23199"
},
{
"cve": "CVE-2026-23200",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23200"
},
{
"cve": "CVE-2026-23201",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23201"
},
{
"cve": "CVE-2026-23202",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23202"
},
{
"cve": "CVE-2026-23203",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23203"
},
{
"cve": "CVE-2026-23204",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23204"
},
{
"cve": "CVE-2026-23205",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23205"
},
{
"cve": "CVE-2026-23206",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23206"
},
{
"cve": "CVE-2026-23207",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23207"
},
{
"cve": "CVE-2026-23208",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23208"
},
{
"cve": "CVE-2026-23209",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23209"
},
{
"cve": "CVE-2026-23210",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23210"
},
{
"cve": "CVE-2025-71200",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71200"
},
{
"cve": "CVE-2025-71201",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71201"
},
{
"cve": "CVE-2025-71202",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71202"
},
{
"cve": "CVE-2025-71203",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71203"
},
{
"cve": "CVE-2025-71204",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71204"
},
{
"cve": "CVE-2025-71220",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71220"
},
{
"cve": "CVE-2025-71221",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71221"
},
{
"cve": "CVE-2025-71222",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71222"
},
{
"cve": "CVE-2025-71223",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71223"
},
{
"cve": "CVE-2025-71224",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2025-71224"
},
{
"cve": "CVE-2026-23111",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23111"
},
{
"cve": "CVE-2026-23112",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23112"
},
{
"cve": "CVE-2026-23113",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23113"
},
{
"cve": "CVE-2026-23114",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23114"
},
{
"cve": "CVE-2026-23115",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23115"
},
{
"cve": "CVE-2026-23116",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23116"
},
{
"cve": "CVE-2026-23117",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23117"
},
{
"cve": "CVE-2026-23118",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23118"
},
{
"cve": "CVE-2026-23119",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23119"
},
{
"cve": "CVE-2026-23120",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23120"
},
{
"cve": "CVE-2026-23121",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23121"
},
{
"cve": "CVE-2026-23123",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23123"
},
{
"cve": "CVE-2026-23124",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23124"
},
{
"cve": "CVE-2026-23125",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23125"
},
{
"cve": "CVE-2026-23126",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23126"
},
{
"cve": "CVE-2026-23127",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23127"
},
{
"cve": "CVE-2026-23128",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23128"
},
{
"cve": "CVE-2026-23129",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23129"
},
{
"cve": "CVE-2026-23130",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23130"
},
{
"cve": "CVE-2026-23131",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23131"
},
{
"cve": "CVE-2026-23132",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23132"
},
{
"cve": "CVE-2026-23133",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23133"
},
{
"cve": "CVE-2026-23134",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23134"
},
{
"cve": "CVE-2026-23135",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23135"
},
{
"cve": "CVE-2026-23136",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23136"
},
{
"cve": "CVE-2026-23137",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23137"
},
{
"cve": "CVE-2026-23138",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23138"
},
{
"cve": "CVE-2026-23139",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23139"
},
{
"cve": "CVE-2026-23140",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23140"
},
{
"cve": "CVE-2026-23141",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23141"
},
{
"cve": "CVE-2026-23142",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23142"
},
{
"cve": "CVE-2026-23143",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23143"
},
{
"cve": "CVE-2026-23144",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23144"
},
{
"cve": "CVE-2026-23145",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23145"
},
{
"cve": "CVE-2026-23146",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23146"
},
{
"cve": "CVE-2026-23147",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23147"
},
{
"cve": "CVE-2026-23148",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23148"
},
{
"cve": "CVE-2026-23149",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23149"
},
{
"cve": "CVE-2026-23150",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23150"
},
{
"cve": "CVE-2026-23151",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23151"
},
{
"cve": "CVE-2026-23152",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23152"
},
{
"cve": "CVE-2026-23153",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23153"
},
{
"cve": "CVE-2026-23154",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23154"
},
{
"cve": "CVE-2026-23155",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T050933",
"398363",
"T004914"
]
},
"release_date": "2026-02-15T23:00:00.000+00:00",
"title": "CVE-2026-23155"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.