Ein Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um unter anderem einen Denial of Service-Angriff auszuführen oder um Sicherheitsmechanismen zu umgehen.
[UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen
Kurzinfo
Metadaten
- Original (extern): Link oeffnen
- Veroeffentlicht: 2026-05-13 07:46 UTC
- Importiert: 2026-05-15 01:45 UTC
- Quelle-ID:
cert_bund - uid_hash:
33925ee891c6cc2298df3dcd89ce9e7d53407fba48e36721b705e63aa7e94705
Inhalt
Verknuepfte CVEs
| CVE-ID | CVE-Schwere | CVSS (CVE.org) | EPSS | EPSS-Pctl | Veroeffentlicht (CVE.org) |
|---|---|---|---|---|---|
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - | ||
| - | - | - | - |
Externe Referenzen
| Bezeichnung | Typ | CVE | Quelle |
|---|---|---|---|
| POC | - | wid_csaf | |
Oracle Linux Security Advisory ELSA-2026-13565 vom 2026-05-07 |
EXTERNAL | - | wid_csaf |
Oracle Linux Security Advisory ELSA-2026-13577 vom 2026-05-07 |
EXTERNAL | - | wid_csaf |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| VENDOR | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
Rocky Linux Security Advisory RLSA-2026:13565 vom 2026-05-06 |
EXTERNAL | - | wid_csaf |
Rocky Linux Security Advisory RLSA-2026:13566 vom 2026-05-06 |
EXTERNAL | - | wid_csaf |
Rocky Linux Security Advisory RLSA-2026:13577 vom 2026-05-06 |
EXTERNAL | - | wid_csaf |
Rocky Linux Security Advisory RLSA-2026:13578 vom 2026-05-06 |
EXTERNAL | - | wid_csaf |
Oracle Linux Security Advisory ELSA-2026-13566 vom 2026-05-06 |
EXTERNAL | - | wid_csaf |
Oracle Linux Security Advisory ELSA-2026-50260 vom 2026-05-12 |
EXTERNAL | - | wid_csaf |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
openSUSE Security Update OPENSUSE-SU-2026:20572-1 vom 2026-04-21 |
EXTERNAL | - | wid_csaf |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf | |
| EXTERNAL | - | wid_csaf |
Quellen-Details
| Bezeichnung | Name | Kategorie | Tags | Zielgruppe | Sprache | Feed-URL |
|---|---|---|---|---|---|---|
| CERT-Bund (BSI) | government_cert | - | de | https://wid.cert-bund.de/content/public/securityAdvisory/rss |