Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-71103 (GCVE-0-2025-71103)
Vulnerability from cvelistv5 – Published: 2026-01-14 15:05 – Updated: 2026-02-09 08:34{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/gpu/drm/msm/adreno/a6xx_gpu.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "19648135e904bce447d368ecb6136e5da809639c",
"status": "affected",
"version": "a6a0157cc68ec561392fc81f603b5b9de1a20e4e",
"versionType": "git"
},
{
"lessThan": "129049d4fe22c998ae9fd1ec479fbb4ed5338c15",
"status": "affected",
"version": "a6a0157cc68ec561392fc81f603b5b9de1a20e4e",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/gpu/drm/msm/adreno/a6xx_gpu.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.18"
},
{
"lessThan": "6.18",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.19",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.3",
"versionStartIncluding": "6.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19",
"versionStartIncluding": "6.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: adreno: fix deferencing ifpc_reglist when not declared\n\nOn plaforms with an a7xx GPU not supporting IFPC, the ifpc_reglist\nif still deferenced in a7xx_patch_pwrup_reglist() which causes\na kernel crash:\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000008\n...\npc : a6xx_hw_init+0x155c/0x1e4c [msm]\nlr : a6xx_hw_init+0x9a8/0x1e4c [msm]\n...\nCall trace:\n a6xx_hw_init+0x155c/0x1e4c [msm] (P)\n msm_gpu_hw_init+0x58/0x88 [msm]\n adreno_load_gpu+0x94/0x1fc [msm]\n msm_open+0xe4/0xf4 [msm]\n drm_file_alloc+0x1a0/0x2e4 [drm]\n drm_client_init+0x7c/0x104 [drm]\n drm_fbdev_client_setup+0x94/0xcf0 [drm_client_lib]\n drm_client_setup+0xb4/0xd8 [drm_client_lib]\n msm_drm_kms_post_init+0x2c/0x3c [msm]\n msm_drm_init+0x1a4/0x228 [msm]\n msm_drm_bind+0x30/0x3c [msm]\n...\n\nCheck the validity of ifpc_reglist before deferencing the table\nto setup the register values.\n\nPatchwork: https://patchwork.freedesktop.org/patch/688944/"
}
],
"providerMetadata": {
"dateUpdated": "2026-02-09T08:34:56.136Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/19648135e904bce447d368ecb6136e5da809639c"
},
{
"url": "https://git.kernel.org/stable/c/129049d4fe22c998ae9fd1ec479fbb4ed5338c15"
}
],
"title": "drm/msm: adreno: fix deferencing ifpc_reglist when not declared",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-71103",
"datePublished": "2026-01-14T15:05:53.116Z",
"dateReserved": "2026-01-13T15:30:19.651Z",
"dateUpdated": "2026-02-09T08:34:56.136Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-71103\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-01-14T15:15:59.323\",\"lastModified\":\"2026-03-25T18:55:52.080\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ndrm/msm: adreno: fix deferencing ifpc_reglist when not declared\\n\\nOn plaforms with an a7xx GPU not supporting IFPC, the ifpc_reglist\\nif still deferenced in a7xx_patch_pwrup_reglist() which causes\\na kernel crash:\\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000008\\n...\\npc : a6xx_hw_init+0x155c/0x1e4c [msm]\\nlr : a6xx_hw_init+0x9a8/0x1e4c [msm]\\n...\\nCall trace:\\n a6xx_hw_init+0x155c/0x1e4c [msm] (P)\\n msm_gpu_hw_init+0x58/0x88 [msm]\\n adreno_load_gpu+0x94/0x1fc [msm]\\n msm_open+0xe4/0xf4 [msm]\\n drm_file_alloc+0x1a0/0x2e4 [drm]\\n drm_client_init+0x7c/0x104 [drm]\\n drm_fbdev_client_setup+0x94/0xcf0 [drm_client_lib]\\n drm_client_setup+0xb4/0xd8 [drm_client_lib]\\n msm_drm_kms_post_init+0x2c/0x3c [msm]\\n msm_drm_init+0x1a4/0x228 [msm]\\n msm_drm_bind+0x30/0x3c [msm]\\n...\\n\\nCheck the validity of ifpc_reglist before deferencing the table\\nto setup the register values.\\n\\nPatchwork: https://patchwork.freedesktop.org/patch/688944/\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.18.1\",\"versionEndExcluding\":\"6.18.3\",\"matchCriteriaId\":\"A3586EB6-087D-41EA-AD79-2AA54D44AAA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.18:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCE57113-2223-4308-A0F2-5E6ECFBB3C23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"17B67AA7-40D6-4AFA-8459-F200F3D7CFD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C47E4CC9-C826-4FA9-B014-7FE3D9B318B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F71D92C0-C023-48BD-B3B6-70B638EEE298\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"13580667-0A98-40CC-B29F-D12790B91BDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD1FED7-CF48-47BF-AC7D-7B6FA3C065FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EF854A1-ABB1-4E93-BE9A-44569EC76C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5DC0CA6-F0AF-4DDF-A882-3DADB9A886A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB5B7DFC-C36B-45D8-922C-877569FDDF43\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/129049d4fe22c998ae9fd1ec479fbb4ed5338c15\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/19648135e904bce447d368ecb6136e5da809639c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
WID-SEC-W-2026-0119
Vulnerability from csaf_certbund - Published: 2026-01-14 23:00 - Updated: 2026-04-09 22:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu einer Denial-of-Service- Bedingung f\u00fchren oder eine Speicherbesch\u00e4digung verursachen k\u00f6nnen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0119 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0119.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0119 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0119"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71102",
"url": "https://lore.kernel.org/linux-cve-announce/2026011407-CVE-2025-71102-f4be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71103",
"url": "https://lore.kernel.org/linux-cve-announce/2026011410-CVE-2025-71103-f516@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71104",
"url": "https://lore.kernel.org/linux-cve-announce/2026011410-CVE-2025-71104-6882@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71105",
"url": "https://lore.kernel.org/linux-cve-announce/2026011410-CVE-2025-71105-2fbe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71106",
"url": "https://lore.kernel.org/linux-cve-announce/2026011411-CVE-2025-71106-731c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71107",
"url": "https://lore.kernel.org/linux-cve-announce/2026011411-CVE-2025-71107-01b5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71108",
"url": "https://lore.kernel.org/linux-cve-announce/2026011411-CVE-2025-71108-2969@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71109",
"url": "https://lore.kernel.org/linux-cve-announce/2026011412-CVE-2025-71109-f2d9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71110",
"url": "https://lore.kernel.org/linux-cve-announce/2026011412-CVE-2025-71110-c354@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71111",
"url": "https://lore.kernel.org/linux-cve-announce/2026011412-CVE-2025-71111-1547@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71112",
"url": "https://lore.kernel.org/linux-cve-announce/2026011413-CVE-2025-71112-ca37@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71113",
"url": "https://lore.kernel.org/linux-cve-announce/2026011413-CVE-2025-71113-a5ec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71114",
"url": "https://lore.kernel.org/linux-cve-announce/2026011413-CVE-2025-71114-2866@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71115",
"url": "https://lore.kernel.org/linux-cve-announce/2026011414-CVE-2025-71115-7c28@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71116",
"url": "https://lore.kernel.org/linux-cve-announce/2026011414-CVE-2025-71116-e57d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71117",
"url": "https://lore.kernel.org/linux-cve-announce/2026011414-CVE-2025-71117-0e3e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71118",
"url": "https://lore.kernel.org/linux-cve-announce/2026011415-CVE-2025-71118-1a69@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71119",
"url": "https://lore.kernel.org/linux-cve-announce/2026011415-CVE-2025-71119-287a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71120",
"url": "https://lore.kernel.org/linux-cve-announce/2026011415-CVE-2025-71120-d0a6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71121",
"url": "https://lore.kernel.org/linux-cve-announce/2026011416-CVE-2025-71121-bf23@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71122",
"url": "https://lore.kernel.org/linux-cve-announce/2026011416-CVE-2025-71122-1921@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71123",
"url": "https://lore.kernel.org/linux-cve-announce/2026011416-CVE-2025-71123-221d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71124",
"url": "https://lore.kernel.org/linux-cve-announce/2026011417-CVE-2025-71124-5da0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71125",
"url": "https://lore.kernel.org/linux-cve-announce/2026011417-CVE-2025-71125-8435@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71126",
"url": "https://lore.kernel.org/linux-cve-announce/2026011418-CVE-2025-71126-8538@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71127",
"url": "https://lore.kernel.org/linux-cve-announce/2026011450-CVE-2025-71127-29a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71128",
"url": "https://lore.kernel.org/linux-cve-announce/2026011451-CVE-2025-71128-3c25@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71129",
"url": "https://lore.kernel.org/linux-cve-announce/2026011451-CVE-2025-71129-a6d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71130",
"url": "https://lore.kernel.org/linux-cve-announce/2026011451-CVE-2025-71130-5a08@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71131",
"url": "https://lore.kernel.org/linux-cve-announce/2026011452-CVE-2025-71131-c844@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71132",
"url": "https://lore.kernel.org/linux-cve-announce/2026011452-CVE-2025-71132-b03b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71133",
"url": "https://lore.kernel.org/linux-cve-announce/2026011453-CVE-2025-71133-6435@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71134",
"url": "https://lore.kernel.org/linux-cve-announce/2026011453-CVE-2025-71134-0136@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71135",
"url": "https://lore.kernel.org/linux-cve-announce/2026011453-CVE-2025-71135-9522@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71136",
"url": "https://lore.kernel.org/linux-cve-announce/2026011454-CVE-2025-71136-0f59@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71137",
"url": "https://lore.kernel.org/linux-cve-announce/2026011454-CVE-2025-71137-6471@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71138",
"url": "https://lore.kernel.org/linux-cve-announce/2026011454-CVE-2025-71138-d052@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71139",
"url": "https://lore.kernel.org/linux-cve-announce/2026011455-CVE-2025-71139-5d93@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71140",
"url": "https://lore.kernel.org/linux-cve-announce/2026011455-CVE-2025-71140-a6fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71141",
"url": "https://lore.kernel.org/linux-cve-announce/2026011455-CVE-2025-71141-5d19@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71142",
"url": "https://lore.kernel.org/linux-cve-announce/2026011456-CVE-2025-71142-c3d0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71143",
"url": "https://lore.kernel.org/linux-cve-announce/2026011456-CVE-2025-71143-5787@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71144",
"url": "https://lore.kernel.org/linux-cve-announce/2026011459-CVE-2025-71144-8a18@gregkh/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0350-1 vom 2026-01-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0369-1 vom 2026-02-03",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6126 vom 2026-02-09",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00035.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6127 vom 2026-02-10",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00036.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0411-1 vom 2026-02-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4476 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00017.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4475 vom 2026-02-11",
"url": "https://lists.debian.org/debian-lts-announce/2026/02/msg00016.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0447-1 vom 2026-02-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0474-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0471-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0473-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0472-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0475-1 vom 2026-02-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0496-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0495-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-113 vom 2026-02-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-113.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0587-1 vom 2026-02-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50112 vom 2026-02-23",
"url": "https://linux.oracle.com/errata/ELSA-2026-50112.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0617-1 vom 2026-02-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20477-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20479-1 vom 2026-02-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20520-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20287-1 vom 2026-02-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K7KIWX7XP3UMVFSHT47OOZ24TQQYNNHI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20498-1 vom 2026-02-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20570-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.15-2026-098 vom 2026-03-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.15-2026-098.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20555-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024590.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20599-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20615-1 vom 2026-03-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50144 vom 2026-03-11",
"url": "https://linux.oracle.com/errata/ELSA-2026-50144.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50145 vom 2026-03-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-50145.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6163 vom 2026-03-13",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00071.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4499 vom 2026-03-13",
"url": "https://lists.debian.org/debian-lts-announce/2026/03/msg00003.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-2 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8094-1 vom 2026-03-16",
"url": "https://ubuntu.com/security/notices/USN-8094-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-1 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-4 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-3 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8096-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8094-2 vom 2026-03-17",
"url": "https://ubuntu.com/security/notices/USN-8094-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20711-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20667-1 vom 2026-03-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20720-1 vom 2026-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20713-1 vom 2026-03-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8116-1 vom 2026-03-23",
"url": "https://ubuntu.com/security/notices/USN-8116-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8094-3 vom 2026-03-23",
"url": "https://ubuntu.com/security/notices/USN-8094-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8096-5 vom 2026-03-23",
"url": "https://ubuntu.com/security/notices/USN-8096-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0962-1 vom 2026-03-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20819-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20772-1 vom 2026-03-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20794-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8094-4 vom 2026-03-25",
"url": "https://ubuntu.com/security/notices/USN-8094-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1041-1 vom 2026-03-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1078-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1081-1 vom 2026-03-26",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20872-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20845-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20838-1 vom 2026-03-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20873-1 vom 2026-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1131-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025031.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20876-1 vom 2026-03-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50171 vom 2026-03-31",
"url": "https://oss.oracle.com/pipermail/el-errata/2026-March/020110.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8141-1 vom 2026-04-01",
"url": "https://ubuntu.com/security/notices/USN-8141-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20931-1 vom 2026-04-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025086.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8094-5 vom 2026-04-01",
"url": "https://ubuntu.com/security/notices/USN-8094-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8152-1 vom 2026-04-07",
"url": "https://ubuntu.com/security/notices/USN-8152-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1180-1 vom 2026-04-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025132.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1185-1 vom 2026-04-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025131.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1189-1 vom 2026-04-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025130.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1188-1 vom 2026-04-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025128.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1212-1 vom 2026-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025162.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1221-1 vom 2026-04-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025169.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1236-1 vom 2026-04-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025190.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1222-1 vom 2026-04-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025172.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:1225-1 vom 2026-04-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-April/025171.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8163-1 vom 2026-04-10",
"url": "https://ubuntu.com/security/notices/USN-8163-1"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-04-09T22:00:00.000+00:00",
"generator": {
"date": "2026-04-10T07:46:07.777+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0119",
"initial_release_date": "2026-01-14T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-02-01T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-09T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-02-11T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Debian und SUSE aufgenommen"
},
{
"date": "2026-02-12T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-18T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2026-02-22T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-24T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-26T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-01T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
},
{
"date": "2026-03-05T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von SUSE und Amazon aufgenommen"
},
{
"date": "2026-03-11T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-12T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-03-15T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-03-16T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-17T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-03-18T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-23T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2026-03-24T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-25T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2026-03-26T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-29T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-30T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-03-31T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-04-01T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2026-04-06T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2026-04-08T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-04-09T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
}
],
"status": "final",
"version": "31"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T050017",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-71102",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71102"
},
{
"cve": "CVE-2025-71103",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71103"
},
{
"cve": "CVE-2025-71104",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71104"
},
{
"cve": "CVE-2025-71105",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71105"
},
{
"cve": "CVE-2025-71106",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71106"
},
{
"cve": "CVE-2025-71107",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71107"
},
{
"cve": "CVE-2025-71108",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71108"
},
{
"cve": "CVE-2025-71109",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71109"
},
{
"cve": "CVE-2025-71110",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71110"
},
{
"cve": "CVE-2025-71111",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71111"
},
{
"cve": "CVE-2025-71112",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71112"
},
{
"cve": "CVE-2025-71113",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71113"
},
{
"cve": "CVE-2025-71114",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71114"
},
{
"cve": "CVE-2025-71115",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71115"
},
{
"cve": "CVE-2025-71116",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71116"
},
{
"cve": "CVE-2025-71117",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71117"
},
{
"cve": "CVE-2025-71118",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71118"
},
{
"cve": "CVE-2025-71119",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71119"
},
{
"cve": "CVE-2025-71120",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71120"
},
{
"cve": "CVE-2025-71121",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71121"
},
{
"cve": "CVE-2025-71122",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71122"
},
{
"cve": "CVE-2025-71123",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71123"
},
{
"cve": "CVE-2025-71124",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71124"
},
{
"cve": "CVE-2025-71125",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71125"
},
{
"cve": "CVE-2025-71126",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71126"
},
{
"cve": "CVE-2025-71127",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71127"
},
{
"cve": "CVE-2025-71128",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71128"
},
{
"cve": "CVE-2025-71129",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71129"
},
{
"cve": "CVE-2025-71130",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71130"
},
{
"cve": "CVE-2025-71131",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71131"
},
{
"cve": "CVE-2025-71132",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71132"
},
{
"cve": "CVE-2025-71133",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71133"
},
{
"cve": "CVE-2025-71134",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71134"
},
{
"cve": "CVE-2025-71135",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71135"
},
{
"cve": "CVE-2025-71136",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71136"
},
{
"cve": "CVE-2025-71137",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71137"
},
{
"cve": "CVE-2025-71138",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71138"
},
{
"cve": "CVE-2025-71139",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71139"
},
{
"cve": "CVE-2025-71140",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71140"
},
{
"cve": "CVE-2025-71141",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71141"
},
{
"cve": "CVE-2025-71142",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71142"
},
{
"cve": "CVE-2025-71143",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71143"
},
{
"cve": "CVE-2025-71144",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T050017",
"T004914"
]
},
"release_date": "2026-01-14T23:00:00.000+00:00",
"title": "CVE-2025-71144"
}
]
}
GHSA-P92R-XPJH-HCCH
Vulnerability from github – Published: 2026-01-14 15:32 – Updated: 2026-03-25 21:30In the Linux kernel, the following vulnerability has been resolved:
drm/msm: adreno: fix deferencing ifpc_reglist when not declared
On plaforms with an a7xx GPU not supporting IFPC, the ifpc_reglist if still deferenced in a7xx_patch_pwrup_reglist() which causes a kernel crash: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008 ... pc : a6xx_hw_init+0x155c/0x1e4c [msm] lr : a6xx_hw_init+0x9a8/0x1e4c [msm] ... Call trace: a6xx_hw_init+0x155c/0x1e4c [msm] (P) msm_gpu_hw_init+0x58/0x88 [msm] adreno_load_gpu+0x94/0x1fc [msm] msm_open+0xe4/0xf4 [msm] drm_file_alloc+0x1a0/0x2e4 [drm] drm_client_init+0x7c/0x104 [drm] drm_fbdev_client_setup+0x94/0xcf0 [drm_client_lib] drm_client_setup+0xb4/0xd8 [drm_client_lib] msm_drm_kms_post_init+0x2c/0x3c [msm] msm_drm_init+0x1a4/0x228 [msm] msm_drm_bind+0x30/0x3c [msm] ...
Check the validity of ifpc_reglist before deferencing the table to setup the register values.
Patchwork: https://patchwork.freedesktop.org/patch/688944/
{
"affected": [],
"aliases": [
"CVE-2025-71103"
],
"database_specific": {
"cwe_ids": [
"CWE-476"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-01-14T15:15:59Z",
"severity": "MODERATE"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: adreno: fix deferencing ifpc_reglist when not declared\n\nOn plaforms with an a7xx GPU not supporting IFPC, the ifpc_reglist\nif still deferenced in a7xx_patch_pwrup_reglist() which causes\na kernel crash:\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000008\n...\npc : a6xx_hw_init+0x155c/0x1e4c [msm]\nlr : a6xx_hw_init+0x9a8/0x1e4c [msm]\n...\nCall trace:\n a6xx_hw_init+0x155c/0x1e4c [msm] (P)\n msm_gpu_hw_init+0x58/0x88 [msm]\n adreno_load_gpu+0x94/0x1fc [msm]\n msm_open+0xe4/0xf4 [msm]\n drm_file_alloc+0x1a0/0x2e4 [drm]\n drm_client_init+0x7c/0x104 [drm]\n drm_fbdev_client_setup+0x94/0xcf0 [drm_client_lib]\n drm_client_setup+0xb4/0xd8 [drm_client_lib]\n msm_drm_kms_post_init+0x2c/0x3c [msm]\n msm_drm_init+0x1a4/0x228 [msm]\n msm_drm_bind+0x30/0x3c [msm]\n...\n\nCheck the validity of ifpc_reglist before deferencing the table\nto setup the register values.\n\nPatchwork: https://patchwork.freedesktop.org/patch/688944/",
"id": "GHSA-p92r-xpjh-hcch",
"modified": "2026-03-25T21:30:22Z",
"published": "2026-01-14T15:32:59Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71103"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/129049d4fe22c998ae9fd1ec479fbb4ed5338c15"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/19648135e904bce447d368ecb6136e5da809639c"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2025-71103
Vulnerability from fkie_nvd - Published: 2026-01-14 15:15 - Updated: 2026-03-25 18:55| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | 6.18 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 | |
| linux | linux_kernel | 6.19 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A3586EB6-087D-41EA-AD79-2AA54D44AAA1",
"versionEndExcluding": "6.18.3",
"versionStartIncluding": "6.18.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.18:-:*:*:*:*:*:*",
"matchCriteriaId": "DCE57113-2223-4308-A0F2-5E6ECFBB3C23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "17B67AA7-40D6-4AFA-8459-F200F3D7CFD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C47E4CC9-C826-4FA9-B014-7FE3D9B318B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F71D92C0-C023-48BD-B3B6-70B638EEE298",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "13580667-0A98-40CC-B29F-D12790B91BDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "CAD1FED7-CF48-47BF-AC7D-7B6FA3C065FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "3EF854A1-ABB1-4E93-BE9A-44569EC76C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "F5DC0CA6-F0AF-4DDF-A882-3DADB9A886A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.19:rc8:*:*:*:*:*:*",
"matchCriteriaId": "EB5B7DFC-C36B-45D8-922C-877569FDDF43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: adreno: fix deferencing ifpc_reglist when not declared\n\nOn plaforms with an a7xx GPU not supporting IFPC, the ifpc_reglist\nif still deferenced in a7xx_patch_pwrup_reglist() which causes\na kernel crash:\nUnable to handle kernel NULL pointer dereference at virtual address 0000000000000008\n...\npc : a6xx_hw_init+0x155c/0x1e4c [msm]\nlr : a6xx_hw_init+0x9a8/0x1e4c [msm]\n...\nCall trace:\n a6xx_hw_init+0x155c/0x1e4c [msm] (P)\n msm_gpu_hw_init+0x58/0x88 [msm]\n adreno_load_gpu+0x94/0x1fc [msm]\n msm_open+0xe4/0xf4 [msm]\n drm_file_alloc+0x1a0/0x2e4 [drm]\n drm_client_init+0x7c/0x104 [drm]\n drm_fbdev_client_setup+0x94/0xcf0 [drm_client_lib]\n drm_client_setup+0xb4/0xd8 [drm_client_lib]\n msm_drm_kms_post_init+0x2c/0x3c [msm]\n msm_drm_init+0x1a4/0x228 [msm]\n msm_drm_bind+0x30/0x3c [msm]\n...\n\nCheck the validity of ifpc_reglist before deferencing the table\nto setup the register values.\n\nPatchwork: https://patchwork.freedesktop.org/patch/688944/"
},
{
"lang": "es",
"value": "En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\ndrm/msm: adreno: corregir la desreferenciaci\u00f3n de ifpc_reglist cuando no est\u00e1 declarada\n\nEn plataformas con una GPU a7xx que no soportan IFPC, la ifpc_reglist a\u00fan es desreferenciada en a7xx_patch_pwrup_reglist() lo que causa una ca\u00edda del kernel:\nNo se puede manejar la desreferenciaci\u00f3n de puntero NULL del kernel en la direcci\u00f3n virtual 0000000000000008\n...\npc : a6xx_hw_init+0x155c/0x1e4c [msm]\nlr : a6xx_hw_init+0x9a8/0x1e4c [msm]\n...\nTraza de llamada:\n a6xx_hw_init+0x155c/0x1e4c [msm] (P)\n msm_gpu_hw_init+0x58/0x88 [msm]\n adreno_load_gpu+0x94/0x1fc [msm]\n msm_open+0xe4/0xf4 [msm]\n drm_file_alloc+0x1a0/0x2e4 [drm]\n drm_client_init+0x7c/0x104 [drm]\n drm_fbdev_client_setup+0x94/0xcf0 [drm_client_lib]\n drm_client_setup+0xb4/0xd8 [drm_client_lib]\n msm_drm_kms_post_init+0x2c/0x3c [msm]\n msm_drm_init+0x1a4/0x228 [msm]\n msm_drm_bind+0x30/0x3c [msm]\n...\n\nVerificar la validez de ifpc_reglist antes de desreferenciar la tabla para configurar los valores del registro.\n\nPatchwork: https://patchwork.freedesktop.org/patch/688944/"
}
],
"id": "CVE-2025-71103",
"lastModified": "2026-03-25T18:55:52.080",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-01-14T15:15:59.323",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/129049d4fe22c998ae9fd1ec479fbb4ed5338c15"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/19648135e904bce447d368ecb6136e5da809639c"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
BDU:2026-01570
Vulnerability from fstec - Published: 19.12.2025{
"CVSS 2.0": "AV:A/AC:H/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 6.18 \u0434\u043e 6.18.2 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\n\u0414\u043b\u044f Linux:\nhttps://lore.kernel.org/linux-cve-announce/2026011410-CVE-2025-71103-f516@gregkh/\nhttps://git.kernel.org/stable/c/19648135e904bce447d368ecb6136e5da809639c\nhttps://git.kernel.org/stable/c/129049d4fe22c998ae9fd1ec479fbb4ed5338c15",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "19.12.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "11.02.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "11.02.2026",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2026-01570",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-71103",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.18 \u0434\u043e 6.18.2 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 a7xx_patch_pwrup_reglist() \u043c\u043e\u0434\u0443\u043b\u044f drivers/gpu/drm/msm/adreno/a6xx_gpu.c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u043f\u0440\u044f\u043c\u043e\u0433\u043e \u0440\u0435\u043d\u0434\u0435\u0440\u0438\u043d\u0433\u0430 (DRI) \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f NULL (CWE-476)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 a7xx_patch_pwrup_reglist() \u043c\u043e\u0434\u0443\u043b\u044f drivers/gpu/drm/msm/adreno/a6xx_gpu.c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u043f\u0440\u044f\u043c\u043e\u0433\u043e \u0440\u0435\u043d\u0434\u0435\u0440\u0438\u043d\u0433\u0430 (DRI) \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0440\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u0435\u0439. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.cve.org/CVERecord?id=CVE-2025-71103\nhttps://git.kernel.org/stable/c/19648135e904bce447d368ecb6136e5da809639c\nhttps://git.kernel.org/stable/c/129049d4fe22c998ae9fd1ec479fbb4ed5338c15\nhttps://lore.kernel.org/linux-cve-announce/2026011410-CVE-2025-71103-f516@gregkh/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-476",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,3)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,8)"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.