Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-68790 (GCVE-0-2025-68790)
Vulnerability from cvelistv5 – Published: 2026-01-13 15:29 – Updated: 2026-02-09 08:33{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/mellanox/mlx5/core/lag/lag.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "d2495f529d60e8e8c43e6ad524089c38b8be7bc4",
"status": "affected",
"version": "5a977b5833b7a261bfa6094595ffa73c1071588c",
"versionType": "git"
},
{
"lessThan": "6a107cfe9c99a079e578a4c5eb70038101a3599f",
"status": "affected",
"version": "5a977b5833b7a261bfa6094595ffa73c1071588c",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/net/ethernet/mellanox/mlx5/core/lag/lag.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.18"
},
{
"lessThan": "6.18",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.19",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.3",
"versionStartIncluding": "6.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19",
"versionStartIncluding": "6.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix double unregister of HCA_PORTS component\n\nClear hca_devcom_comp in device\u0027s private data after unregistering it in\nLAG teardown. Otherwise a slightly lagging second pass through\nmlx5_unload_one() might try to unregister it again and trip over\nuse-after-free.\n\nOn s390 almost all PCI level recovery events trigger two passes through\nmxl5_unload_one() - one through the poll_health() method and one through\nmlx5_pci_err_detected() as callback from generic PCI error recovery.\nWhile testing PCI error recovery paths with more kernel debug features\nenabled, this issue reproducibly led to kernel panics with the following\ncall chain:\n\n Unable to handle kernel pointer dereference in virtual kernel address space\n Failing address: 6b6b6b6b6b6b6000 TEID: 6b6b6b6b6b6b6803 ESOP-2 FSI\n Fault in home space mode while using kernel ASCE.\n AS:00000000705c4007 R3:0000000000000024\n Oops: 0038 ilc:3 [#1]SMP\n\n CPU: 14 UID: 0 PID: 156 Comm: kmcheck Kdump: loaded Not tainted\n 6.18.0-20251130.rc7.git0.16131a59cab1.300.fc43.s390x+debug #1 PREEMPT\n\n Krnl PSW : 0404e00180000000 0000020fc86aa1dc (__lock_acquire+0x5c/0x15f0)\n R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3\n Krnl GPRS: 0000000000000000 0000020f00000001 6b6b6b6b6b6b6c33 0000000000000000\n 0000000000000000 0000000000000000 0000000000000001 0000000000000000\n 0000000000000000 0000020fca28b820 0000000000000000 0000010a1ced8100\n 0000010a1ced8100 0000020fc9775068 0000018fce14f8b8 0000018fce14f7f8\n Krnl Code: 0000020fc86aa1cc: e3b003400004 lg %r11,832\n 0000020fc86aa1d2: a7840211 brc 8,0000020fc86aa5f4\n *0000020fc86aa1d6: c09000df0b25 larl %r9,0000020fca28b820\n \u003e0000020fc86aa1dc: d50790002000 clc 0(8,%r9),0(%r2)\n 0000020fc86aa1e2: a7840209 brc 8,0000020fc86aa5f4\n 0000020fc86aa1e6: c0e001100401 larl %r14,0000020fca8aa9e8\n 0000020fc86aa1ec: c01000e25a00 larl %r1,0000020fca2f55ec\n 0000020fc86aa1f2: a7eb00e8 aghi %r14,232\n\n Call Trace:\n __lock_acquire+0x5c/0x15f0\n lock_acquire.part.0+0xf8/0x270\n lock_acquire+0xb0/0x1b0\n down_write+0x5a/0x250\n mlx5_detach_device+0x42/0x110 [mlx5_core]\n mlx5_unload_one_devl_locked+0x50/0xc0 [mlx5_core]\n mlx5_unload_one+0x42/0x60 [mlx5_core]\n mlx5_pci_err_detected+0x94/0x150 [mlx5_core]\n zpci_event_attempt_error_recovery+0xcc/0x388"
}
],
"providerMetadata": {
"dateUpdated": "2026-02-09T08:33:37.206Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/d2495f529d60e8e8c43e6ad524089c38b8be7bc4"
},
{
"url": "https://git.kernel.org/stable/c/6a107cfe9c99a079e578a4c5eb70038101a3599f"
}
],
"title": "net/mlx5: Fix double unregister of HCA_PORTS component",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-68790",
"datePublished": "2026-01-13T15:29:02.907Z",
"dateReserved": "2025-12-24T10:30:51.037Z",
"dateUpdated": "2026-02-09T08:33:37.206Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-68790\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-01-13T16:16:00.880\",\"lastModified\":\"2026-01-14T16:26:00.933\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnet/mlx5: Fix double unregister of HCA_PORTS component\\n\\nClear hca_devcom_comp in device\u0027s private data after unregistering it in\\nLAG teardown. Otherwise a slightly lagging second pass through\\nmlx5_unload_one() might try to unregister it again and trip over\\nuse-after-free.\\n\\nOn s390 almost all PCI level recovery events trigger two passes through\\nmxl5_unload_one() - one through the poll_health() method and one through\\nmlx5_pci_err_detected() as callback from generic PCI error recovery.\\nWhile testing PCI error recovery paths with more kernel debug features\\nenabled, this issue reproducibly led to kernel panics with the following\\ncall chain:\\n\\n Unable to handle kernel pointer dereference in virtual kernel address space\\n Failing address: 6b6b6b6b6b6b6000 TEID: 6b6b6b6b6b6b6803 ESOP-2 FSI\\n Fault in home space mode while using kernel ASCE.\\n AS:00000000705c4007 R3:0000000000000024\\n Oops: 0038 ilc:3 [#1]SMP\\n\\n CPU: 14 UID: 0 PID: 156 Comm: kmcheck Kdump: loaded Not tainted\\n 6.18.0-20251130.rc7.git0.16131a59cab1.300.fc43.s390x+debug #1 PREEMPT\\n\\n Krnl PSW : 0404e00180000000 0000020fc86aa1dc (__lock_acquire+0x5c/0x15f0)\\n R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3\\n Krnl GPRS: 0000000000000000 0000020f00000001 6b6b6b6b6b6b6c33 0000000000000000\\n 0000000000000000 0000000000000000 0000000000000001 0000000000000000\\n 0000000000000000 0000020fca28b820 0000000000000000 0000010a1ced8100\\n 0000010a1ced8100 0000020fc9775068 0000018fce14f8b8 0000018fce14f7f8\\n Krnl Code: 0000020fc86aa1cc: e3b003400004 lg %r11,832\\n 0000020fc86aa1d2: a7840211 brc 8,0000020fc86aa5f4\\n *0000020fc86aa1d6: c09000df0b25 larl %r9,0000020fca28b820\\n \u003e0000020fc86aa1dc: d50790002000 clc 0(8,%r9),0(%r2)\\n 0000020fc86aa1e2: a7840209 brc 8,0000020fc86aa5f4\\n 0000020fc86aa1e6: c0e001100401 larl %r14,0000020fca8aa9e8\\n 0000020fc86aa1ec: c01000e25a00 larl %r1,0000020fca2f55ec\\n 0000020fc86aa1f2: a7eb00e8 aghi %r14,232\\n\\n Call Trace:\\n __lock_acquire+0x5c/0x15f0\\n lock_acquire.part.0+0xf8/0x270\\n lock_acquire+0xb0/0x1b0\\n down_write+0x5a/0x250\\n mlx5_detach_device+0x42/0x110 [mlx5_core]\\n mlx5_unload_one_devl_locked+0x50/0xc0 [mlx5_core]\\n mlx5_unload_one+0x42/0x60 [mlx5_core]\\n mlx5_pci_err_detected+0x94/0x150 [mlx5_core]\\n zpci_event_attempt_error_recovery+0xcc/0x388\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/6a107cfe9c99a079e578a4c5eb70038101a3599f\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d2495f529d60e8e8c43e6ad524089c38b8be7bc4\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
BDU:2026-01050
Vulnerability from fstec - Published: 02.12.2025{
"CVSS 2.0": "AV:L/AC:H/Au:S/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 6.18 \u0434\u043e 6.18.3 (Linux), \u043e\u0442 6.19 \u0434\u043e 6.19 rc2 (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://git.kernel.org/stable/c/6a107cfe9c99a079e578a4c5eb70038101a3599f\nhttps://git.kernel.org/stable/c/d2495f529d60e8e8c43e6ad524089c38b8be7bc4",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "02.12.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "30.01.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "30.01.2026",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2026-01050",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-68790",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.18 \u0434\u043e 6.18.3 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.19 \u0434\u043e 6.19 rc2 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 mlx5_unload_one() \u043c\u043e\u0434\u0443\u043b\u044f drivers/net/ethernet/mellanox/mlx5/core/lag/lag.c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 mlx5_unload_one() \u043c\u043e\u0434\u0443\u043b\u044f drivers/net/ethernet/mellanox/mlx5/core/lag/lag.c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u0435\u0451 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://lore.kernel.org/linux-cve-announce/2026011304-CVE-2025-68790-6166@gregkh/\nhttps://git.kernel.org/stable/c/6a107cfe9c99a079e578a4c5eb70038101a3599f\nhttps://git.kernel.org/stable/c/d2495f529d60e8e8c43e6ad524089c38b8be7bc4\nhttps://www.cybersecurity-help.cz/vdb/SB2026011433",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-416",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7)"
}
GHSA-R4V9-6RCF-WHC8
Vulnerability from github – Published: 2026-01-13 18:31 – Updated: 2026-01-13 18:31In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Fix double unregister of HCA_PORTS component
Clear hca_devcom_comp in device's private data after unregistering it in LAG teardown. Otherwise a slightly lagging second pass through mlx5_unload_one() might try to unregister it again and trip over use-after-free.
On s390 almost all PCI level recovery events trigger two passes through mxl5_unload_one() - one through the poll_health() method and one through mlx5_pci_err_detected() as callback from generic PCI error recovery. While testing PCI error recovery paths with more kernel debug features enabled, this issue reproducibly led to kernel panics with the following call chain:
Unable to handle kernel pointer dereference in virtual kernel address space Failing address: 6b6b6b6b6b6b6000 TEID: 6b6b6b6b6b6b6803 ESOP-2 FSI Fault in home space mode while using kernel ASCE. AS:00000000705c4007 R3:0000000000000024 Oops: 0038 ilc:3 [#1]SMP
CPU: 14 UID: 0 PID: 156 Comm: kmcheck Kdump: loaded Not tainted 6.18.0-20251130.rc7.git0.16131a59cab1.300.fc43.s390x+debug #1 PREEMPT
Krnl PSW : 0404e00180000000 0000020fc86aa1dc (__lock_acquire+0x5c/0x15f0) R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3 Krnl GPRS: 0000000000000000 0000020f00000001 6b6b6b6b6b6b6c33 0000000000000000 0000000000000000 0000000000000000 0000000000000001 0000000000000000 0000000000000000 0000020fca28b820 0000000000000000 0000010a1ced8100 0000010a1ced8100 0000020fc9775068 0000018fce14f8b8 0000018fce14f7f8 Krnl Code: 0000020fc86aa1cc: e3b003400004 lg %r11,832 0000020fc86aa1d2: a7840211 brc 8,0000020fc86aa5f4 *0000020fc86aa1d6: c09000df0b25 larl %r9,0000020fca28b820 >0000020fc86aa1dc: d50790002000 clc 0(8,%r9),0(%r2) 0000020fc86aa1e2: a7840209 brc 8,0000020fc86aa5f4 0000020fc86aa1e6: c0e001100401 larl %r14,0000020fca8aa9e8 0000020fc86aa1ec: c01000e25a00 larl %r1,0000020fca2f55ec 0000020fc86aa1f2: a7eb00e8 aghi %r14,232
Call Trace: __lock_acquire+0x5c/0x15f0 lock_acquire.part.0+0xf8/0x270 lock_acquire+0xb0/0x1b0 down_write+0x5a/0x250 mlx5_detach_device+0x42/0x110 [mlx5_core] mlx5_unload_one_devl_locked+0x50/0xc0 [mlx5_core] mlx5_unload_one+0x42/0x60 [mlx5_core] mlx5_pci_err_detected+0x94/0x150 [mlx5_core] zpci_event_attempt_error_recovery+0xcc/0x388
{
"affected": [],
"aliases": [
"CVE-2025-68790"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-01-13T16:16:00Z",
"severity": null
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix double unregister of HCA_PORTS component\n\nClear hca_devcom_comp in device\u0027s private data after unregistering it in\nLAG teardown. Otherwise a slightly lagging second pass through\nmlx5_unload_one() might try to unregister it again and trip over\nuse-after-free.\n\nOn s390 almost all PCI level recovery events trigger two passes through\nmxl5_unload_one() - one through the poll_health() method and one through\nmlx5_pci_err_detected() as callback from generic PCI error recovery.\nWhile testing PCI error recovery paths with more kernel debug features\nenabled, this issue reproducibly led to kernel panics with the following\ncall chain:\n\n Unable to handle kernel pointer dereference in virtual kernel address space\n Failing address: 6b6b6b6b6b6b6000 TEID: 6b6b6b6b6b6b6803 ESOP-2 FSI\n Fault in home space mode while using kernel ASCE.\n AS:00000000705c4007 R3:0000000000000024\n Oops: 0038 ilc:3 [#1]SMP\n\n CPU: 14 UID: 0 PID: 156 Comm: kmcheck Kdump: loaded Not tainted\n 6.18.0-20251130.rc7.git0.16131a59cab1.300.fc43.s390x+debug #1 PREEMPT\n\n Krnl PSW : 0404e00180000000 0000020fc86aa1dc (__lock_acquire+0x5c/0x15f0)\n R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3\n Krnl GPRS: 0000000000000000 0000020f00000001 6b6b6b6b6b6b6c33 0000000000000000\n 0000000000000000 0000000000000000 0000000000000001 0000000000000000\n 0000000000000000 0000020fca28b820 0000000000000000 0000010a1ced8100\n 0000010a1ced8100 0000020fc9775068 0000018fce14f8b8 0000018fce14f7f8\n Krnl Code: 0000020fc86aa1cc: e3b003400004 lg %r11,832\n 0000020fc86aa1d2: a7840211 brc 8,0000020fc86aa5f4\n *0000020fc86aa1d6: c09000df0b25 larl %r9,0000020fca28b820\n \u003e0000020fc86aa1dc: d50790002000 clc 0(8,%r9),0(%r2)\n 0000020fc86aa1e2: a7840209 brc 8,0000020fc86aa5f4\n 0000020fc86aa1e6: c0e001100401 larl %r14,0000020fca8aa9e8\n 0000020fc86aa1ec: c01000e25a00 larl %r1,0000020fca2f55ec\n 0000020fc86aa1f2: a7eb00e8 aghi %r14,232\n\n Call Trace:\n __lock_acquire+0x5c/0x15f0\n lock_acquire.part.0+0xf8/0x270\n lock_acquire+0xb0/0x1b0\n down_write+0x5a/0x250\n mlx5_detach_device+0x42/0x110 [mlx5_core]\n mlx5_unload_one_devl_locked+0x50/0xc0 [mlx5_core]\n mlx5_unload_one+0x42/0x60 [mlx5_core]\n mlx5_pci_err_detected+0x94/0x150 [mlx5_core]\n zpci_event_attempt_error_recovery+0xcc/0x388",
"id": "GHSA-r4v9-6rcf-whc8",
"modified": "2026-01-13T18:31:04Z",
"published": "2026-01-13T18:31:03Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68790"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/6a107cfe9c99a079e578a4c5eb70038101a3599f"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d2495f529d60e8e8c43e6ad524089c38b8be7bc4"
}
],
"schema_version": "1.4.0",
"severity": []
}
WID-SEC-W-2026-0086
Vulnerability from csaf_certbund - Published: 2026-01-13 23:00 - Updated: 2026-04-09 22:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu einer Denial-of-Service- Bedingung f\u00fchren oder eine Speicherbesch\u00e4digung verursachen k\u00f6nnen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0086 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0086.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0086 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0086"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68767",
"url": "https://lore.kernel.org/linux-cve-announce/2026011353-CVE-2025-68767-cd16@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68768",
"url": "https://lore.kernel.org/linux-cve-announce/2026011356-CVE-2025-68768-d458@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68769",
"url": "https://lore.kernel.org/linux-cve-announce/2026011357-CVE-2025-68769-e471@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68770",
"url": "https://lore.kernel.org/linux-cve-announce/2026011357-CVE-2025-68770-6464@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68771",
"url": "https://lore.kernel.org/linux-cve-announce/2026011357-CVE-2025-68771-cf0d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68772",
"url": "https://lore.kernel.org/linux-cve-announce/2026011358-CVE-2025-68772-9d70@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68773",
"url": "https://lore.kernel.org/linux-cve-announce/2026011358-CVE-2025-68773-bd5d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68774",
"url": "https://lore.kernel.org/linux-cve-announce/2026011358-CVE-2025-68774-f2fd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68775",
"url": "https://lore.kernel.org/linux-cve-announce/2026011359-CVE-2025-68775-6e68@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68776",
"url": "https://lore.kernel.org/linux-cve-announce/2026011359-CVE-2025-68776-5aed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68777",
"url": "https://lore.kernel.org/linux-cve-announce/2026011359-CVE-2025-68777-2073@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68778",
"url": "https://lore.kernel.org/linux-cve-announce/2026011300-CVE-2025-68778-c392@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68779",
"url": "https://lore.kernel.org/linux-cve-announce/2026011300-CVE-2025-68779-726e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68780",
"url": "https://lore.kernel.org/linux-cve-announce/2026011300-CVE-2025-68780-f5c8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68781",
"url": "https://lore.kernel.org/linux-cve-announce/2026011301-CVE-2025-68781-f30f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68782",
"url": "https://lore.kernel.org/linux-cve-announce/2026011301-CVE-2025-68782-a72f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68783",
"url": "https://lore.kernel.org/linux-cve-announce/2026011302-CVE-2025-68783-e807@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68784",
"url": "https://lore.kernel.org/linux-cve-announce/2026011302-CVE-2025-68784-b1e0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68785",
"url": "https://lore.kernel.org/linux-cve-announce/2026011302-CVE-2025-68785-c96c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68786",
"url": "https://lore.kernel.org/linux-cve-announce/2026011303-CVE-2025-68786-d145@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68787",
"url": "https://lore.kernel.org/linux-cve-announce/2026011303-CVE-2025-68787-af6d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68788",
"url": "https://lore.kernel.org/linux-cve-announce/2026011303-CVE-2025-68788-05bd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68789",
"url": "https://lore.kernel.org/linux-cve-announce/2026011304-CVE-2025-68789-cca8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68790",
"url": "https://lore.kernel.org/linux-cve-announce/2026011304-CVE-2025-68790-6166@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68791",
"url": "https://lore.kernel.org/linux-cve-announce/2026011304-CVE-2025-68791-e739@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68792",
"url": "https://lore.kernel.org/linux-cve-announce/2026011305-CVE-2025-68792-9a3f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68793",
"url": "https://lore.kernel.org/linux-cve-announce/2026011305-CVE-2025-68793-bb5f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68794",
"url": "https://lore.kernel.org/linux-cve-announce/2026011305-CVE-2025-68794-32db@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68795",
"url": "https://lore.kernel.org/linux-cve-announce/2026011306-CVE-2025-68795-4e3e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68796",
"url": "https://lore.kernel.org/linux-cve-announce/2026011306-CVE-2025-68796-9eee@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68797",
"url": "https://lore.kernel.org/linux-cve-announce/2026011306-CVE-2025-68797-b45e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68798",
"url": "https://lore.kernel.org/linux-cve-announce/2026011307-CVE-2025-68798-ea9c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68799",
"url": "https://lore.kernel.org/linux-cve-announce/2026011307-CVE-2025-68799-b0dd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68800",
"url": "https://lore.kernel.org/linux-cve-announce/2026011307-CVE-2025-68800-39d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68801",
"url": "https://lore.kernel.org/linux-cve-announce/2026011308-CVE-2025-68801-d3d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68802",
"url": "https://lore.kernel.org/linux-cve-announce/2026011308-CVE-2025-68802-a7f9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68803",
"url": "https://lore.kernel.org/linux-cve-announce/2026011309-CVE-2025-68803-d897@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68804",
"url": "https://lore.kernel.org/linux-cve-announce/2026011309-CVE-2025-68804-f10e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68805",
"url": "https://lore.kernel.org/linux-cve-announce/2026011309-CVE-2025-68805-3284@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68806",
"url": "https://lore.kernel.org/linux-cve-announce/2026011310-CVE-2025-68806-a2fb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68807",
"url": "https://lore.kernel.org/linux-cve-announce/2026011310-CVE-2025-68807-0fd6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68808",
"url": "https://lore.kernel.org/linux-cve-announce/2026011310-CVE-2025-68808-4cb9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68809",
"url": "https://lore.kernel.org/linux-cve-announce/2026011311-CVE-2025-68809-e875@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68810",
"url": "https://lore.kernel.org/linux-cve-announce/2026011311-CVE-2025-68810-308a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68811",
"url": "https://lore.kernel.org/linux-cve-announce/2026011311-CVE-2025-68811-7e46@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68812",
"url": "https://lore.kernel.org/linux-cve-announce/2026011312-CVE-2025-68812-4098@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68813",
"url": "https://lore.kernel.org/linux-cve-announce/2026011312-CVE-2025-68813-13a5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68814",
"url": "https://lore.kernel.org/linux-cve-announce/2026011312-CVE-2025-68814-146a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68815",
"url": "https://lore.kernel.org/linux-cve-announce/2026011313-CVE-2025-68815-2112@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68816",
"url": "https://lore.kernel.org/linux-cve-announce/2026011313-CVE-2025-68816-e773@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68817",
"url": "https://lore.kernel.org/linux-cve-announce/2026011313-CVE-2025-68817-03ab@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68818",
"url": "https://lore.kernel.org/linux-cve-announce/2026011314-CVE-2025-68818-08ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68819",
"url": "https://lore.kernel.org/linux-cve-announce/2026011314-CVE-2025-68819-64a3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68820",
"url": "https://lore.kernel.org/linux-cve-announce/2026011315-CVE-2025-68820-7a4f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68821",
"url": "https://lore.kernel.org/linux-cve-announce/2026011315-CVE-2025-68821-b515@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68822",
"url": "https://lore.kernel.org/linux-cve-announce/2026011315-CVE-2025-68822-a75d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-68823",
"url": "https://lore.kernel.org/linux-cve-announce/2026011316-CVE-2025-68823-8bf1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71064",
"url": "https://lore.kernel.org/linux-cve-announce/2026011322-CVE-2025-71064-94ea@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71065",
"url": "https://lore.kernel.org/linux-cve-announce/2026011322-CVE-2025-71065-6818@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71066",
"url": "https://lore.kernel.org/linux-cve-announce/2026011323-CVE-2025-71066-f1fa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71067",
"url": "https://lore.kernel.org/linux-cve-announce/2026011323-CVE-2025-71067-9c81@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71068",
"url": "https://lore.kernel.org/linux-cve-announce/2026011323-CVE-2025-71068-f1a9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71069",
"url": "https://lore.kernel.org/linux-cve-announce/2026011324-CVE-2025-71069-33d4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71070",
"url": "https://lore.kernel.org/linux-cve-announce/2026011324-CVE-2025-71070-b6c2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71071",
"url": "https://lore.kernel.org/linux-cve-announce/2026011325-CVE-2025-71071-67e9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71072",
"url": "https://lore.kernel.org/linux-cve-announce/2026011325-CVE-2025-71072-b52b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71073",
"url": "https://lore.kernel.org/linux-cve-announce/2026011325-CVE-2025-71073-b002@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71074",
"url": "https://lore.kernel.org/linux-cve-announce/2026011326-CVE-2025-71074-f3ed@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71075",
"url": "https://lore.kernel.org/linux-cve-announce/2026011326-CVE-2025-71075-c85d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71076",
"url": "https://lore.kernel.org/linux-cve-announce/2026011326-CVE-2025-71076-19ff@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71077",
"url": "https://lore.kernel.org/linux-cve-announce/2026011327-CVE-2025-71077-6e08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71078",
"url": "https://lore.kernel.org/linux-cve-announce/2026011337-CVE-2025-71078-9a51@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71079",
"url": "https://lore.kernel.org/linux-cve-announce/2026011338-CVE-2025-71079-9f24@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71080",
"url": "https://lore.kernel.org/linux-cve-announce/2026011338-CVE-2025-71080-f9ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71081",
"url": "https://lore.kernel.org/linux-cve-announce/2026011338-CVE-2025-71081-df43@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71082",
"url": "https://lore.kernel.org/linux-cve-announce/2026011339-CVE-2025-71082-ef8a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71083",
"url": "https://lore.kernel.org/linux-cve-announce/2026011339-CVE-2025-71083-ddb3@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71084",
"url": "https://lore.kernel.org/linux-cve-announce/2026011339-CVE-2025-71084-52a2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71085",
"url": "https://lore.kernel.org/linux-cve-announce/2026011340-CVE-2025-71085-e6c1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71086",
"url": "https://lore.kernel.org/linux-cve-announce/2026011340-CVE-2025-71086-18be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71087",
"url": "https://lore.kernel.org/linux-cve-announce/2026011340-CVE-2025-71087-53c4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71088",
"url": "https://lore.kernel.org/linux-cve-announce/2026011341-CVE-2025-71088-9436@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71089",
"url": "https://lore.kernel.org/linux-cve-announce/2026011341-CVE-2025-71089-a642@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71090",
"url": "https://lore.kernel.org/linux-cve-announce/2026011341-CVE-2025-71090-6e3a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71091",
"url": "https://lore.kernel.org/linux-cve-announce/2026011342-CVE-2025-71091-860d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71092",
"url": "https://lore.kernel.org/linux-cve-announce/2026011342-CVE-2025-71092-9f73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71093",
"url": "https://lore.kernel.org/linux-cve-announce/2026011343-CVE-2025-71093-387f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71094",
"url": "https://lore.kernel.org/linux-cve-announce/2026011343-CVE-2025-71094-087b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71095",
"url": "https://lore.kernel.org/linux-cve-announce/2026011343-CVE-2025-71095-6fad@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71096",
"url": "https://lore.kernel.org/linux-cve-announce/2026011344-CVE-2025-71096-fb73@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71097",
"url": "https://lore.kernel.org/linux-cve-announce/2026011344-CVE-2025-71097-7cfc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71098",
"url": "https://lore.kernel.org/linux-cve-announce/2026011344-CVE-2025-71098-ef6d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71099",
"url": "https://lore.kernel.org/linux-cve-announce/2026011345-CVE-2025-71099-b6f8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71100",
"url": "https://lore.kernel.org/linux-cve-announce/2026011345-CVE-2025-71100-537f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71101",
"url": "https://lore.kernel.org/linux-cve-announce/2026011345-CVE-2025-71101-1886@gregkh/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0350-1 vom 2026-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20145-1 vom 2026-02-03",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FIKVKDA42VXBWDNHA6WP345IDVA2E3XU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0369-1 vom 2026-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20207-1 vom 2026-02-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20220-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20228-1 vom 2026-02-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2282 vom 2026-02-09",
"url": "https://access.redhat.com/errata/RHSA-2026:2282"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6127 vom 2026-02-10",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00036.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6126 vom 2026-02-09",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00035.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0411-1 vom 2026-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2282 vom 2026-02-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-2282.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4476 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00017.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0447-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4475 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00016.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0471-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0472-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0474-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0475-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0495-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2282 vom 2026-02-15",
"url": "https://errata.build.resf.org/RLSA-2026:2282"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0496-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:2722 vom 2026-02-16",
"url": "https://access.redhat.com/errata/RHSA-2026:2722"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-2722 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-2722.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50113 vom 2026-02-17",
"url": "https://linux.oracle.com/errata/ELSA-2026-50113.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-113 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-113.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0587-1 vom 2026-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50112 vom 2026-02-23",
"url": "https://linux.oracle.com/errata/ELSA-2026-50112.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3110 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3110"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3083 vom 2026-02-23",
"url": "https://access.redhat.com/errata/RHSA-2026:3083"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:2722 vom 2026-02-24",
"url": "https://errata.build.resf.org/RLSA-2026:2722"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0617-1 vom 2026-02-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3275 vom 2026-02-25",
"url": "https://access.redhat.com/errata/RHSA-2026:3275"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3083 vom 2026-02-25",
"url": "https://linux.oracle.com/errata/ELSA-2026-3083.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3275 vom 2026-02-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-3275.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20477-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20479-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3488 vom 2026-03-02",
"url": "https://access.redhat.com/errata/RHSA-2026:3488"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20287-1 vom 2026-02-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K7KIWX7XP3UMVFSHT47OOZ24TQQYNNHI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20520-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20498-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50133 vom 2026-03-02",
"url": "https://linux.oracle.com/errata/ELSA-2026-50133.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3488 vom 2026-03-02",
"url": "https://linux.oracle.com/errata/ELSA-2026-3488.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3488 vom 2026-03-05",
"url": "https://errata.build.resf.org/RLSA-2026:3488"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20615-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20570-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2026-098 vom 2026-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2026-098.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20564-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20555-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024590.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20599-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3963 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:3963"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:3964 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:3964"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4012 vom 2026-03-09",
"url": "https://access.redhat.com/errata/RHSA-2026:4012"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3963 vom 2026-03-09",
"url": "https://linux.oracle.com/errata/ELSA-2026-3963.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4246 vom 2026-03-11",
"url": "https://access.redhat.com/errata/RHSA-2026:4246"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-4012 vom 2026-03-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-4012.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-3966 vom 2026-03-10",
"url": "https://linux.oracle.com/errata/ELSA-2026-3966.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50145 vom 2026-03-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-50145.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50144 vom 2026-03-11",
"url": "https://linux.oracle.com/errata/ELSA-2026-50144.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6163 vom 2026-03-13",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00071.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4499 vom 2026-03-13",
"url": "https://lists.debian.org/debian-lts-announce/2026/03/msg00003.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-1 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-2 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4759 vom 2026-03-17",
"url": "https://access.redhat.com/errata/RHSA-2026:4759"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:4745 vom 2026-03-17",
"url": "https://access.redhat.com/errata/RHSA-2026:4745"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-4 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-3 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-3"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-4759 vom 2026-03-18",
"url": "https://linux.oracle.com/errata/ELSA-2026-4759.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20711-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20667-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0928-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20720-1 vom 2026-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2026-099 vom 2026-03-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2026-099.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20713-1 vom 2026-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0943-1 vom 2026-03-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0953-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0941-1 vom 2026-03-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0939-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0945-1 vom 2026-03-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024778.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0946-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0951-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0944-1 vom 2026-03-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0940-1 vom 2026-03-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0958-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8116-1 vom 2026-03-23",
"url": "https://ubuntu.com/security/notices/USN-8116-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0961-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0970-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0954-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-5 vom 2026-03-23",
"url": "https://ubuntu.com/security/notices/USN-8096-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0967-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024808.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0964-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024809.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0983-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0962-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20772-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20773-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20774-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20775-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0984-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5732 vom 2026-03-25",
"url": "https://access.redhat.com/errata/RHSA-2026:5732"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0985-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5689 vom 2026-03-25",
"url": "https://access.redhat.com/errata/RHSA-2026:5689"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5690 vom 2026-03-25",
"url": "https://access.redhat.com/errata/RHSA-2026:5690"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5693 vom 2026-03-25",
"url": "https://access.redhat.com/errata/RHSA-2026:5693"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5691 vom 2026-03-25",
"url": "https://access.redhat.com/errata/RHSA-2026:5691"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5727 vom 2026-03-25",
"url": "https://access.redhat.com/errata/RHSA-2026:5727"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20792-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20791-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20790-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20789-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024845.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20788-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20780-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20781-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20782-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024852.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20783-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024851.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20784-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20785-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20786-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20787-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0997-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20794-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20807-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20806-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20805-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20804-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024885.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20803-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20802-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20801-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20800-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20799-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20798-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024891.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20819-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20817-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024872.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20815-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0992-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20814-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20816-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20813-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20812-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024877.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20811-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024878.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20810-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20809-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20808-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20779-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20778-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024856.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20777-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20776-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1039-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1041-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:5813 vom 2026-03-25",
"url": "https://access.redhat.com/errata/RHSA-2026:5813"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1000-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1003-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1002-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1046-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1044-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3964 vom 2026-03-26",
"url": "https://errata.build.resf.org/RLSA-2026:3964"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:3963 vom 2026-03-26",
"url": "https://errata.build.resf.org/RLSA-2026:3963"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1049-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1073-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:4759 vom 2026-03-26",
"url": "https://errata.build.resf.org/RLSA-2026:4759"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1077-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1083-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1059-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1078-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1081-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1048-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1089-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1088-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20872-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20838-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1131-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025031.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20864-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20865-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20866-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1136-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025028.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20873-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20847-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20845-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1099-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20828-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1102-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025010.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1101-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1100-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1096-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1125-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20837-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20852-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024988.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20836-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025001.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20853-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20832-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20854-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20831-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20855-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20856-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20857-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20858-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20859-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20860-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024980.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20861-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024979.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20840-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20848-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20841-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20849-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20842-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20850-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1132-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025029.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20851-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024989.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20862-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20863-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20830-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025007.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20829-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20876-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20891-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025041.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20892-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025040.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20893-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025039.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20894-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025038.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20895-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025037.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20896-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025036.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20897-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025035.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6164 vom 2026-03-30",
"url": "https://access.redhat.com/errata/RHSA-2026:6164"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20898-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025034.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20899-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025033.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20900-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025032.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6193 vom 2026-03-30",
"url": "https://access.redhat.com/errata/RHSA-2026:6193"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20880-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20881-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20882-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20883-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025048.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20884-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025047.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20885-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20886-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20887-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025044.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20888-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025043.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20889-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025042.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50171 vom 2026-03-31",
"url": "https://oss.oracle.com/pipermail/el-errata/2026-March/020110.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7268179 vom 2026-03-31",
"url": "https://www.ibm.com/support/pages/node/7268179"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20945-1 vom 2026-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025075.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20946-1 vom 2026-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025074.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20944-1 vom 2026-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025076.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20943-1 vom 2026-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025077.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20947-1 vom 2026-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025073.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20931-1 vom 2026-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025086.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8141-1 vom 2026-04-01",
"url": "https://ubuntu.com/security/notices/USN-8141-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6692 vom 2026-04-06",
"url": "https://access.redhat.com/errata/RHSA-2026:6692"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:7003 vom 2026-04-08",
"url": "https://access.redhat.com/errata/RHSA-2026:7003"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8163-1 vom 2026-04-10",
"url": "https://ubuntu.com/security/notices/USN-8163-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8162-1 vom 2026-04-10",
"url": "https://ubuntu.com/security/notices/USN-8162-1"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-04-09T22:00:00.000+00:00",
"generator": {
"date": "2026-04-10T07:46:05.932+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0086",
"initial_release_date": "2026-01-13T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE und SUSE aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-05T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat und Debian aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Debian und SUSE aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-17T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-23T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Rocky Enterprise Software Foundation, SUSE und Red Hat aufgenommen"
},
{
"date": "2026-02-25T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat, openSUSE und SUSE aufgenommen"
},
{
"date": "2026-03-02T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2026-03-08T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-03-09T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-10T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-03-11T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-12T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-03-15T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-03-16T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-17T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2026-03-18T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2026-03-22T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-23T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2026-03-24T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-03-25T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-03-26T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von SUSE und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-03-29T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-30T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von SUSE und Red Hat aufgenommen"
},
{
"date": "2026-03-31T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Oracle Linux und IBM aufgenommen"
},
{
"date": "2026-04-01T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2026-04-06T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-04-07T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-04-09T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "43"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM QRadar SIEM",
"product": {
"name": "IBM QRadar SIEM",
"product_id": "T021415",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:-"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T049905",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-68767",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68767"
},
{
"cve": "CVE-2025-68768",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68768"
},
{
"cve": "CVE-2025-68769",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68769"
},
{
"cve": "CVE-2025-68770",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68770"
},
{
"cve": "CVE-2025-68771",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68771"
},
{
"cve": "CVE-2025-68772",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68772"
},
{
"cve": "CVE-2025-68773",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68773"
},
{
"cve": "CVE-2025-68774",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68774"
},
{
"cve": "CVE-2025-68775",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68775"
},
{
"cve": "CVE-2025-68776",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68776"
},
{
"cve": "CVE-2025-68777",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68777"
},
{
"cve": "CVE-2025-68778",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68778"
},
{
"cve": "CVE-2025-68779",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68779"
},
{
"cve": "CVE-2025-68780",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68780"
},
{
"cve": "CVE-2025-68781",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68781"
},
{
"cve": "CVE-2025-68782",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68782"
},
{
"cve": "CVE-2025-68783",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68783"
},
{
"cve": "CVE-2025-68784",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68784"
},
{
"cve": "CVE-2025-68785",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68785"
},
{
"cve": "CVE-2025-68786",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68786"
},
{
"cve": "CVE-2025-68787",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68787"
},
{
"cve": "CVE-2025-68788",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68788"
},
{
"cve": "CVE-2025-68789",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68789"
},
{
"cve": "CVE-2025-68790",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68790"
},
{
"cve": "CVE-2025-68791",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68791"
},
{
"cve": "CVE-2025-68792",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68792"
},
{
"cve": "CVE-2025-68793",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68793"
},
{
"cve": "CVE-2025-68794",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68794"
},
{
"cve": "CVE-2025-68795",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68795"
},
{
"cve": "CVE-2025-68796",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68796"
},
{
"cve": "CVE-2025-68797",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68797"
},
{
"cve": "CVE-2025-68798",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68798"
},
{
"cve": "CVE-2025-68799",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68799"
},
{
"cve": "CVE-2025-68800",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68800"
},
{
"cve": "CVE-2025-68801",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68801"
},
{
"cve": "CVE-2025-68802",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68802"
},
{
"cve": "CVE-2025-68803",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68803"
},
{
"cve": "CVE-2025-68804",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68804"
},
{
"cve": "CVE-2025-68805",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68805"
},
{
"cve": "CVE-2025-68806",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68806"
},
{
"cve": "CVE-2025-68807",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68807"
},
{
"cve": "CVE-2025-68808",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68808"
},
{
"cve": "CVE-2025-68809",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68809"
},
{
"cve": "CVE-2025-68810",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68810"
},
{
"cve": "CVE-2025-68811",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68811"
},
{
"cve": "CVE-2025-68812",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68812"
},
{
"cve": "CVE-2025-68813",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68813"
},
{
"cve": "CVE-2025-68814",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68814"
},
{
"cve": "CVE-2025-68815",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68815"
},
{
"cve": "CVE-2025-68816",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68816"
},
{
"cve": "CVE-2025-68817",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68817"
},
{
"cve": "CVE-2025-68818",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68818"
},
{
"cve": "CVE-2025-68819",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68819"
},
{
"cve": "CVE-2025-68820",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68820"
},
{
"cve": "CVE-2025-68821",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68821"
},
{
"cve": "CVE-2025-68822",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68822"
},
{
"cve": "CVE-2025-68823",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-68823"
},
{
"cve": "CVE-2025-71064",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71064"
},
{
"cve": "CVE-2025-71065",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71065"
},
{
"cve": "CVE-2025-71066",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71066"
},
{
"cve": "CVE-2025-71067",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71067"
},
{
"cve": "CVE-2025-71068",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71068"
},
{
"cve": "CVE-2025-71069",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71069"
},
{
"cve": "CVE-2025-71070",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71070"
},
{
"cve": "CVE-2025-71071",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71071"
},
{
"cve": "CVE-2025-71072",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71072"
},
{
"cve": "CVE-2025-71073",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71073"
},
{
"cve": "CVE-2025-71074",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71074"
},
{
"cve": "CVE-2025-71075",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71075"
},
{
"cve": "CVE-2025-71076",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71076"
},
{
"cve": "CVE-2025-71077",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71077"
},
{
"cve": "CVE-2025-71078",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71078"
},
{
"cve": "CVE-2025-71079",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71079"
},
{
"cve": "CVE-2025-71080",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71080"
},
{
"cve": "CVE-2025-71081",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71081"
},
{
"cve": "CVE-2025-71082",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71082"
},
{
"cve": "CVE-2025-71083",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71083"
},
{
"cve": "CVE-2025-71084",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71084"
},
{
"cve": "CVE-2025-71085",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71085"
},
{
"cve": "CVE-2025-71086",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71086"
},
{
"cve": "CVE-2025-71087",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71087"
},
{
"cve": "CVE-2025-71088",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71088"
},
{
"cve": "CVE-2025-71089",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71089"
},
{
"cve": "CVE-2025-71090",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71090"
},
{
"cve": "CVE-2025-71091",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71091"
},
{
"cve": "CVE-2025-71092",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71092"
},
{
"cve": "CVE-2025-71093",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71093"
},
{
"cve": "CVE-2025-71094",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71094"
},
{
"cve": "CVE-2025-71095",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71095"
},
{
"cve": "CVE-2025-71096",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71096"
},
{
"cve": "CVE-2025-71097",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71097"
},
{
"cve": "CVE-2025-71098",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71098"
},
{
"cve": "CVE-2025-71099",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71099"
},
{
"cve": "CVE-2025-71100",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71100"
},
{
"cve": "CVE-2025-71101",
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T021415",
"T049905",
"T027843",
"398363",
"T004914",
"T032255"
]
},
"release_date": "2026-01-13T23:00:00.000+00:00",
"title": "CVE-2025-71101"
}
]
}
FKIE_CVE-2025-68790
Vulnerability from fkie_nvd - Published: 2026-01-13 16:16 - Updated: 2026-01-14 16:26| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix double unregister of HCA_PORTS component\n\nClear hca_devcom_comp in device\u0027s private data after unregistering it in\nLAG teardown. Otherwise a slightly lagging second pass through\nmlx5_unload_one() might try to unregister it again and trip over\nuse-after-free.\n\nOn s390 almost all PCI level recovery events trigger two passes through\nmxl5_unload_one() - one through the poll_health() method and one through\nmlx5_pci_err_detected() as callback from generic PCI error recovery.\nWhile testing PCI error recovery paths with more kernel debug features\nenabled, this issue reproducibly led to kernel panics with the following\ncall chain:\n\n Unable to handle kernel pointer dereference in virtual kernel address space\n Failing address: 6b6b6b6b6b6b6000 TEID: 6b6b6b6b6b6b6803 ESOP-2 FSI\n Fault in home space mode while using kernel ASCE.\n AS:00000000705c4007 R3:0000000000000024\n Oops: 0038 ilc:3 [#1]SMP\n\n CPU: 14 UID: 0 PID: 156 Comm: kmcheck Kdump: loaded Not tainted\n 6.18.0-20251130.rc7.git0.16131a59cab1.300.fc43.s390x+debug #1 PREEMPT\n\n Krnl PSW : 0404e00180000000 0000020fc86aa1dc (__lock_acquire+0x5c/0x15f0)\n R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3\n Krnl GPRS: 0000000000000000 0000020f00000001 6b6b6b6b6b6b6c33 0000000000000000\n 0000000000000000 0000000000000000 0000000000000001 0000000000000000\n 0000000000000000 0000020fca28b820 0000000000000000 0000010a1ced8100\n 0000010a1ced8100 0000020fc9775068 0000018fce14f8b8 0000018fce14f7f8\n Krnl Code: 0000020fc86aa1cc: e3b003400004 lg %r11,832\n 0000020fc86aa1d2: a7840211 brc 8,0000020fc86aa5f4\n *0000020fc86aa1d6: c09000df0b25 larl %r9,0000020fca28b820\n \u003e0000020fc86aa1dc: d50790002000 clc 0(8,%r9),0(%r2)\n 0000020fc86aa1e2: a7840209 brc 8,0000020fc86aa5f4\n 0000020fc86aa1e6: c0e001100401 larl %r14,0000020fca8aa9e8\n 0000020fc86aa1ec: c01000e25a00 larl %r1,0000020fca2f55ec\n 0000020fc86aa1f2: a7eb00e8 aghi %r14,232\n\n Call Trace:\n __lock_acquire+0x5c/0x15f0\n lock_acquire.part.0+0xf8/0x270\n lock_acquire+0xb0/0x1b0\n down_write+0x5a/0x250\n mlx5_detach_device+0x42/0x110 [mlx5_core]\n mlx5_unload_one_devl_locked+0x50/0xc0 [mlx5_core]\n mlx5_unload_one+0x42/0x60 [mlx5_core]\n mlx5_pci_err_detected+0x94/0x150 [mlx5_core]\n zpci_event_attempt_error_recovery+0xcc/0x388"
},
{
"lang": "es",
"value": "En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\nnet/mlx5: Solucionar el doble desregistro del componente HCA_PORTS\n\nBorrar hca_devcom_comp en los datos privados del dispositivo despu\u00e9s de desregistrarlo en la desactivaci\u00f3n de LAG. De lo contrario, una segunda pasada ligeramente retrasada a trav\u00e9s de mlx5_unload_one() podr\u00eda intentar desregistrarlo de nuevo y tropezar con un uso despu\u00e9s de liberaci\u00f3n.\n\nEn s390, casi todos los eventos de recuperaci\u00f3n a nivel de PCI desencadenan dos pasadas a trav\u00e9s de mxl5_unload_one(): una a trav\u00e9s del m\u00e9todo poll_health() y otra a trav\u00e9s de mlx5_pci_err_detected() como devoluci\u00f3n de llamada de la recuperaci\u00f3n gen\u00e9rica de errores de PCI. Mientras se probaban las rutas de recuperaci\u00f3n de errores de PCI con m\u00e1s funciones de depuraci\u00f3n del kernel habilitadas, este problema condujo de forma reproducible a p\u00e1nicos del kernel con la siguiente cadena de llamadas:\n\nUnable to handle kernel pointer dereference in virtual kernel address space\nFailing address: 6b6b6b6b6b6b6000 TEID: 6b6b6b6b6b6b6803 ESOP-2 FSI\nFault in home space mode while using kernel ASCE.\nAS:00000000705c4007 R3:0000000000000024\nOops: 0038 ilc:3 [#1]SMP\n\nCPU: 14 UID: 0 PID: 156 Comm: kmcheck Kdump: loaded Not tainted\n 6.18.0-20251130.rc7.git0.16131a59cab1.300.fc43.s390x+debug #1 PREEMPT\n\nKrnl PSW : 0404e00180000000 0000020fc86aa1dc (__lock_acquire+0x5c/0x15f0)\n R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3\nKrnl GPRS: 0000000000000000 0000020f00000001 6b6b6b6b6b6b6c33 0000000000000000\n 0000000000000000 0000000000000000 0000000000000001 0000000000000000\n 0000000000000000 0000020fca28b820 0000000000000000 0000010a1ced8100\n 0000010a1ced8100 0000020fc9775068 0000018fce14f8b8 0000018fce14f7f8\nKrnl Code: 0000020fc86aa1cc: e3b003400004 lg %r11,832\n 0000020fc86aa1d2: a7840211 brc 8,0000020fc86aa5f4\n *0000020fc86aa1d6: c09000df0b25 larl %r9,0000020fca28b820\n \u0026gt;0000020fc86aa1dc: d50790002000 clc 0(8,%r9),0(%r2)\n 0000020fc86aa1e2: a7840209 brc 8,0000020fc86aa5f4\n 0000020fc86aa1e6: c0e001100401 larl %r14,0000020fca8aa9e8\n 0000020fc86aa1ec: c01000e25a00 larl %r1,0000020fca2f55ec\n 0000020fc86aa1f2: a7eb00e8 aghi %r14,232\n\nCall Trace:\n __lock_acquire+0x5c/0x15f0\n lock_acquire.part.0+0xf8/0x270\n lock_acquire+0xb0/0x1b0\n down_write+0x5a/0x250\n mlx5_detach_device+0x42/0x110 [mlx5_core]\n mlx5_unload_one_devl_locked+0x50/0xc0 [mlx5_core]\n mlx5_unload_one+0x42/0x60 [mlx5_core]\n mlx5_pci_err_detected+0x94/0x150 [mlx5_core]\n zpci_event_attempt_error_recovery+0xcc/0x388"
}
],
"id": "CVE-2025-68790",
"lastModified": "2026-01-14T16:26:00.933",
"metrics": {},
"published": "2026-01-13T16:16:00.880",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/6a107cfe9c99a079e578a4c5eb70038101a3599f"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/d2495f529d60e8e8c43e6ad524089c38b8be7bc4"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.