ESB-2026.4184
PUBLISHED
CVSS 8.800000190734863 HIGH
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2026.4184
IBM QRadar SIEM is vulnerable to using components with known
vulnerabilities
24 April 2026
===========================================================================
AUSCERT Security Bulletin Summary
---------------------------------
Product: IBM Security QRadar SIEM
Publisher: IBM
Operating System: Linux
Resolution: Patch/Upgrade
CVE Names: CVE-2025-9820 CVE-2026-4519 CVE-2026-22695
CVE-2025-14831 CVE-2025-65018 CVE-2026-22801
CVE-2025-71238 CVE-2026-2447 CVE-2026-25646
CVE-2025-10158 CVE-2026-3497 CVE-2025-0938
CVE-2026-23193 CVE-2026-23231 CVE-2025-15281
CVE-2025-61662 CVE-2024-26984 CVE-2026-0915
Original Bulletin:
https://www.ibm.com/support/pages/node/7270594
Comment: CVSS (Max): 8.8 CVE-2026-2447 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVSS Source: IBM
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS (Max): 1.5% (81st) CVE-2025-0938 2026-04-23
- --------------------------BEGIN INCLUDED TEXT--------------------
IBM Support
Document Information
Document number : 7270594
Modified date : More support for: IBM Security QRadar SIEM
Product : IBM Security QRadar SIEM
Component : -
Software version : All
Operating system(s): Linux
Security Bulletin
Summary
Multiple components with known vulnerabilities were addressed in IBM QRadar
SIEM 7.5.0 UP15 IF02
Vulnerability Details
CVEID: CVE-2025-14831
DESCRIPTION: A flaw was found in GnuTLS. This vulnerability allows a denial of
service (DoS) by excessive CPU (Central Processing Unit) and memory consumption
via specially crafted malicious certificates containing a large number of name
constraints and subject alternative names (SANs).
CWE: CWE-407: Inefficient Algorithmic Complexity
CVSS Source: secalert@redhat.com
CVSS Base score: 5.3
CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
CVEID: CVE-2025-9820
DESCRIPTION: A flaw was found in the GnuTLS library, specifically in the
gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization.
When a token label longer than expected is processed, the function writes past
the end of a fixed-size stack buffer. This programming error can cause the
application using GnuTLS to crash or, in certain conditions, be exploited for
code execution. As a result, systems or applications relying on GnuTLS may be
vulnerable to a denial of service or local privilege escalation attacks.
CWE: CWE-121: Stack-based Buffer Overflow
CVSS Source: secalert@redhat.com
CVSS Base score: 4
CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
CVEID: CVE-2025-61662
DESCRIPTION: A Use-After-Free vulnerability has been discovered in GRUB's
gettext module. This flaw stems from a programming error where the gettext
command remains registered in memory after its module is unloaded. An attacker
can exploit this condition by invoking the orphaned command, causing the
application to access a memory location that is no longer valid. An attacker
could exploit this vulnerability to cause grub to crash, leading to a Denial of
Service. Possible data integrity or confidentiality compromise is not
discarded.
CWE: CWE-416: Use After Free
CVSS Source: secalert@redhat.com
CVSS Base score: 7.8
CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVEID: CVE-2026-3497
DESCRIPTION: Vulnerability in the OpenSSH GSSAPI delta included in various
Linux distributions. This vulnerability affects the GSSAPI patches added by
various Linux distributions and does not affect the OpenSSH upstream project
itself. The usage of sshpkt_disconnect() on an error, which does not terminate
the process, allows an attacker to send an unexpected GSSAPI message type
during the GSSAPI key exchange to the server, which will call the underlying
function and continue the execution of the program without setting the related
connection variables. As the variables are not initialized to NULL the code
later accesses those uninitialized variables, accessing random memory, which
could lead to undefined behavior. The recommended workaround is to use
ssh_packet_disconnect() instead, which does terminate the process. The impact
of the vulnerability depends heavily on the compiler flag hardening
configuration.
CWE: CWE-908: Use of Uninitialized Resource
CVSS Source: security@ubuntu.com
CVSS Base score: 6.9
CVSS Vector: (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/
E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/
MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X)
CVEID: CVE-2026-2447
DESCRIPTION: Heap buffer overflow in libvpx. This vulnerability was fixed in
Firefox 147.0.4, Firefox ESR 140.7.1, Firefox ESR 115.32.1, Thunderbird
140.7.2, and Thunderbird 147.0.2.
CWE: CWE-122: Heap-based Buffer Overflow
CVSS Source: CISA ADP
CVSS Base score: 8.8
CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVEID: CVE-2026-4519
DESCRIPTION: The webbrowser.open() API would accept leading dashes in the URL
which could be handled as command line options for certain web browsers. New
behavior rejects leading dashes. Users are recommended to sanitize URLs prior
to passing to webbrowser.open().
CWE: CWE-20: Improper Input Validation
CVSS Source: NVD
CVSS Base score: 3.3
CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)
CVEID: CVE-2025-15281
DESCRIPTION: Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in
the GNU C Library version 2.0 to version 2.42 may cause the interface to return
uninitialized memory in the we_wordv member, which on subsequent calls to
wordfree may abort the process.
CWE: CWE-908: Use of Uninitialized Resource
CVSS Source: CISA ADP
CVSS Base score: 7.5
CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVEID: CVE-2026-0915
DESCRIPTION: Calling getnetbyaddr or getnetbyaddr_r with a configured
nsswitch.conf that specifies the library's DNS backend for networks and queries
for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can
leak stack contents to the configured DNS resolver.
CWE: CWE-908: Use of Uninitialized Resource
CVSS Source: CISA ADP
CVSS Base score: 7.5
CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVEID: CVE-2026-22695
DESCRIPTION: LIBPNG is a reference library for use in applications that read,
create, and manipulate PNG (Portable Network Graphics) raster image files. From
1.6.51 to 1.6.53, there is a heap buffer over-read in the libpng simplified API
function png_image_finish_read when processing interlaced 16-bit PNGs with
8-bit output format and non-minimal row stride. This is a regression introduced
by the fix for CVE-2025-65018. This vulnerability is fixed in 1.6.54.
CWE: CWE-125: Out-of-bounds Read
CVSS Source: NVD
CVSS Base score: 7.1
CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H)
CVEID: CVE-2026-22801
DESCRIPTION: LIBPNG is a reference library for use in applications that read,
create, and manipulate PNG (Portable Network Graphics) raster image files. From
1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write
API functions png_write_image_16bit and png_write_image_8bit causes heap buffer
over-read when the caller provides a negative row stride (for bottom-up image
layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng
1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit
systems. This vulnerability is fixed in 1.6.54.
CWE: CWE-125: Out-of-bounds Read
CVSS Source: NVD
CVSS Base score: 7.8
CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVEID: CVE-2026-25646
DESCRIPTION: LIBPNG is a reference library for use in applications that read,
create, and manipulate PNG (Portable Network Graphics) raster image files.
Prior to 1.6.55, an out-of-bounds read vulnerability exists in the
png_set_quantize() API function. When the function is called with no histogram
and the number of colors in the palette is more than twice the maximum
supported by the user's display, certain palettes will cause the function to
enter into an infinite loop that reads past the end of an internal
heap-allocated buffer. The images that trigger this vulnerability are valid per
the PNG specification. This vulnerability is fixed in 1.6.55.
CWE: CWE-122: Heap-based Buffer Overflow
CVSS Source: NVD
CVSS Base score: 8.1
CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVEID: CVE-2025-10158
DESCRIPTION: A malicious client acting as the receiver of an rsync file
transfer can trigger an out of bounds read of a heap based buffer, via a
negative array index. The malicious rsync client requires at least read access
to the remote rsync module in order to trigger the issue.
CWE: CWE-129: Improper Validation of Array Index
CVSS Source: cve@rapid7.com
CVSS Base score: 4.3
CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)
CVEID: CVE-2025-0938
DESCRIPTION: The Python standard library functions `urllib.parse.urlsplit` and
`urlparse` accepted domain names that included square brackets which isn't
valid according to RFC 3986. Square brackets are only meant to be used as
delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result
in differential parsing across the Python URL parser and other
specification-compliant URL parsers.
CWE: CWE-20: Improper Input Validation
CVSS Source: IBM
CVSS Base score: 4
CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N)
CVEID: CVE-2024-26984
DESCRIPTION: In the Linux kernel, the following vulnerability has been
resolved: nouveau: fix instmem race condition around ptr stores Running a lot
of VK CTS in parallel against nouveau, once every few hours you might see
something like this crash. BUG: kernel NULL pointer dereference, address:
0000000000000008 PGD 8000000114e6e067 P4D 8000000114e6e067 PUD 109046067 PMD 0
Oops: 0000 [#1] PREEMPT SMP PTI CPU: 7 PID: 53891 Comm: deqp-vk Not tainted
6.8.0-rc6+ #27 Hardware name: Gigabyte Technology Co., Ltd. Z390 I AORUS PRO
WIFI/Z390 I AORUS PRO WIFI-CF, BIOS F8 11/05/2021 RIP:
0010:gp100_vmm_pgt_mem+0xe3/0x180 [nouveau] Code: c7 48 01 c8 49 89 45 58 85 d2
0f 84 95 00 00 00 41 0f b7 46 12 49 8b 7e 08 89 da 42 8d 2c f8 48 8b 47 08 41
83 c7 01 48 89 ee 48 8b 40 08 ff d0 0f 1f 00 49 8b 7e 08 48 89 d9 48 8d 75 04
48 c1 RSP: 0000:ffffac20c5857838 EFLAGS: 00010202 RAX: 0000000000000000 RBX:
00000000004d8001 RCX: 0000000000000001 RDX: 00000000004d8001 RSI:
00000000000006d8 RDI: ffffa07afe332180 RBP: 00000000000006d8 R08:
ffffac20c5857ad0 R09: 0000000000ffff10 R10: 0000000000000001 R11:
ffffa07af27e2de0 R12: 000000000000001c R13: ffffac20c5857ad0 R14:
ffffa07a96fe9040 R15: 000000000000001c FS: 00007fe395eed7c0(0000)
GS:ffffa07e2c980000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000
CR0: 0000000080050033 CR2: 0000000000000008 CR3: 000000011febe001 CR4:
00000000003706f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
0000000000000400 Call Trace: ... gp100_vmm_pgt_mem+0xe3/0x180 [nouveau]
gp100_vmm_pgt_mem+0x37/0x180 [nouveau] nvkm_vmm_iter+0x351/0xa20 [nouveau]
__pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau] __pfx_gp100_vmm_pgt_mem+0x10/0x10
[nouveau] __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau] __lock_acquire+0x3ed/
0x2170 __pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau] nvkm_vmm_ptes_get_map+0xc2
/0x100 [nouveau] __pfx_nvkm_vmm_ref_ptes+0x10/0x10 [nouveau]
__pfx_gp100_vmm_pgt_mem+0x10/0x10 [nouveau] nvkm_vmm_map_locked+0x224/0x3a0
[nouveau] Adding any sort of useful debug usually makes it go away, so I hand
wrote the function in a line, and debugged the asm. Every so often
pt-memory-ptrs is NULL. This ptrs ptr is set in the nv50_instobj_acquire called
from nvkm_kmap. If Thread A and Thread B both get to nv50_instobj_acquire
around the same time, and Thread A hits the refcount_set line, and in lockstep
thread B succeeds at refcount_inc_not_zero, there is a chance the ptrs value
won't have been stored since refcount_set is unordered. Force a memory barrier
here, I picked smp_mb, since we want it on all CPUs and it's write followed by
a read. v2: use paired smp_rmb/smp_wmb.
CWE: CWE-362: Concurrent Execution using Shared Resource with Improper
Synchronization ('Race Condition')
CVSS Source: IBM X-Force
CVSS Base score: 5.5
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
CVEID: CVE-2025-71238
DESCRIPTION: In the Linux kernel, the following vulnerability has been
resolved: scsi: qla2xxx: Fix bsg_done() causing double free Kernel panic
observed on system, [5353358.825191] BUG: unable to handle page fault for
address: ff5f5e897b024000 [5353358.825194] #PF: supervisor write access in
kernel mode [5353358.825195] #PF: error_code(0x0002) - not-present page
[5353358.825196] PGD 100006067 P4D 0 [5353358.825198] Oops: 0002 [#1] PREEMPT
SMP NOPTI [5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump:
loaded Tainted: G W L ------- --- 5.14.0-503.34.1.el9_5.x86_64 #1
[5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11,
BIOS 2.44 01/17/2025 [5353358.825204] RIP: 0010:memcpy_erms+0x6/0x10
[5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246 [5353358.825212]
RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000
[5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI:
ff5f5e897b024000 [5353358.825214] RBP: 0000000000010000 R08: ff5f5e897b024000
R09: 0000000000000000 [5353358.825215] R10: ff46cf8c40517000 R11:
0000000000000001 R12: 0000000000008090 [5353358.825216] R13: ff591da8f4f6b720
R14: 0000000000001000 R15: 0000000000000000 [5353358.825218] FS:
00007f1e88d47740(0000) GS:ff46cf935f940000(0000) knlGS:0000000000000000
[5353358.825219] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[5353358.825220] CR2: ff5f5e897b024000 CR3: 0000000231532004 CR4:
0000000000771ef0 [5353358.825221] PKRU: 55555554 [5353358.825222] Call Trace:
[5353358.825223] TASK [5353358.825224] show_trace_log_lvl+0x1c4/0x2df
[5353358.825229] show_trace_log_lvl+0x1c4/0x2df [5353358.825232]
sg_copy_buffer+0xc8/0x110 [5353358.825236] __die_body.cold+0x8/0xd
[5353358.825238] page_fault_oops+0x134/0x170 [5353358.825242]
kernelmode_fixup_or_oops+0x84/0x110 [5353358.825244] exc_page_fault+0xa8/
0x150 [5353358.825247] asm_exc_page_fault+0x22/0x30 [5353358.825252]
memcpy_erms+0x6/0x10 [5353358.825253] sg_copy_buffer+0xc8/0x110
[5353358.825259] qla2x00_process_vendor_specific+0x652/0x1320 [qla2xxx]
[5353358.825317] qla24xx_bsg_request+0x1b2/0x2d0 [qla2xxx] Most routines in
qla_bsg.c call bsg_done() only for success cases. However a few invoke it for
failure case as well leading to a double free. Validate before calling bsg_done
().
CWE: CWE-415: Double Free
CVSS Source: NVD
CVSS Base score: 7.8
CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVEID: CVE-2026-23193
DESCRIPTION: In the Linux kernel, the following vulnerability has been
resolved: scsi: target: iscsi: Fix use-after-free in
iscsit_dec_session_usage_count() In iscsit_dec_session_usage_count(), the
function calls complete() while holding the sess-session_usage_lock. Similar to
the connection usage count logic, the waiter signaled by complete() (e.g., in
the session release path) may wake up and free the iscsit_session structure
immediately. This creates a race condition where the current thread may attempt
to execute spin_unlock_bh() on a session structure that has already been
deallocated, resulting in a KASAN slab-use-after-free. To resolve this, release
the session_usage_lock before calling complete() to ensure all dereferences of
the sess pointer are finished before the waiter is allowed to proceed with
deallocation.
CWE: CWE-416: Use After Free
CVSS Source: NVD
CVSS Base score: 7.8
CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
CVEID: CVE-2026-23231
DESCRIPTION: In the Linux kernel, the following vulnerability has been
resolved: netfilter: nf_tables: fix use-after-free in nf_tables_addchain()
nf_tables_addchain() publishes the chain to table-chains via list_add_tail_rcu
() (in nft_chain_add()) before registering hooks. If nf_tables_register_hook()
then fails, the error path calls nft_chain_del() (list_del_rcu()) followed by
nf_tables_chain_destroy() with no RCU grace period in between. This creates two
use-after-free conditions: 1) Control-plane: nf_tables_dump_chains() traverses
table-chains under rcu_read_lock(). A concurrent dump can still be walking the
chain when the error path frees it. 2) Packet path: for NFPROTO_INET,
nf_register_net_hook() briefly installs the IPv4 hook before IPv6 registration
fails. Packets entering nft_do_chain() via the transient IPv4 hook can still be
dereferencing chain-blob_gen_X when the error path frees the chain. Add
synchronize_rcu() between nft_chain_del() and the chain destroy so that all RCU
readers -- both dump threads and in-flight packet evaluation -- have finished
before the chain is freed.
CWE: CWE-416: Use After Free
CVSS Source: NVD
CVSS Base score: 7.8
CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Affected Products and Versions
+-------------------+-----------------------+
|Affected Product(s)|Version(s) |
+-------------------+-----------------------+
|QRadar |7.5.0 - 7.5.0 UP15 IF01|
+-------------------+-----------------------+
Remediation/Fixes
IBM strongly encourages customers to update their systems promptly.
+---------------+-------+---------------+
|Product |Version|Fix |
+---------------+-------+---------------+
|IBM QRadar SIEM|7.5.0 |7.5.0 UP15 IF02|
+---------------+-------+---------------+
Workarounds and Mitigations
None
Acknowledgement
Change History
23 Apr 2026: Initial Publication
*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.
Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. In addition to other efforts to
address potential vulnerabilities, IBM periodically updates the record of
components contained in our product offerings. As part of that effort, if IBM
identifies previously unidentified packages in a product/service inventory, we
address relevant vulnerabilities regardless of CVE date. Inclusion of an older
CVEID does not demonstrate that the referenced product has been used by IBM
since that date, nor that IBM was aware of a vulnerability as of that date. We
are making clients aware of relevant vulnerabilities as we become aware of
them. "Affected Products and Versions" referenced in IBM Security Bulletins are
intended to be only products and versions that are supported by IBM and have
not passed their end-of-support or warranty date. Thus, failure to reference
unsupported or extended-support products and versions in this Security Bulletin
does not constitute a determination by IBM that they are unaffected by the
vulnerability. Reference to one or more unsupported versions in this Security
Bulletin shall not create an obligation for IBM to provide fixes for any
unsupported or extended-support products or versions.
- --------------------------END INCLUDED TEXT----------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AUSCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AUSCERT's members. As
AUSCERT did not write the document quoted above, AUSCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AUSCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://portal.auscert.org.au/bulletins/
===========================================================================
AUSCERT
The University of Queensland, Brisbane QLD 4072 Australia
e: auscert@auscert.org.au
t: +61 (0)7 3365 4417
Allies in Cyber Security
===========================================================================