Linux Kernel vulnerabilities

12,345 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
12,345
CISA KEV
25
actively exploited
Public exploits
277
Exploited in wild
26
Severity breakdown
CRITICAL108HIGH3529MEDIUM8298LOW410

Vulnerabilities

Page 1 of 618
CVE-2026-23231HIGHCVSS 7.8≥ 3.16, < 6.1.165≥ 6.2, < 6.6.128+3 more2026-03-04
CVE-2026-23231 [HIGH] CWE-416 CVE-2026-23231: In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix use-a In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() nf_tables_addchain() publishes the chain to table->chains via list_add_tail_rcu() (in nft_chain_add()) before registering hooks. If nf_tables_register_hook() then fails, the error path calls nft_chain_del() (list_del_r
nvd
CVE-2026-23233HIGHCVSS 7.8≥ 6.6.33, < 6.6.127≥ 6.9, < 6.12.74+2 more2026-03-04
CVE-2026-23233 [HIGH] CWE-787 CVE-2026-23233: In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid mapping wron In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid mapping wrong physical block for swapfile Xiaolong Guo reported a f2fs bug in bugzilla [1] [1] https://bugzilla.kernel.org/show_bug.cgi?id=220951 Quoted: "When using stress-ng's swap stress test on F2FS filesystem with kernel 6.6+, the system experiences data c
nvd
CVE-2026-23235HIGHCVSS 7.1≥ 3.12, < 5.10.251≥ 5.11, < 5.15.201+5 more2026-03-04
CVE-2026-23235 [HIGH] CWE-125 CVE-2026-23235: In the Linux kernel, the following vulnerability has been resolved: f2fs: fix out-of-bounds access In the Linux kernel, the following vulnerability has been resolved: f2fs: fix out-of-bounds access in sysfs attribute read/write Some f2fs sysfs attributes suffer from out-of-bounds memory access and incorrect handling of integer values whose size is not 4 bytes. For example: vm:~# echo 65537 > /sys/fs/f2fs/vde/carve_out vm:~# cat /sys/fs/f2fs/vde/c
nvd
CVE-2026-23234HIGHCVSS 7.8≥ 3.13, < 5.10.251≥ 5.11, < 5.15.201+5 more2026-03-04
CVE-2026-23234 [HIGH] CWE-416 CVE-2026-23234: In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid UAF in f2fs_ In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid UAF in f2fs_write_end_io() As syzbot reported an use-after-free issue in f2fs_write_end_io(). It is caused by below race condition: loop device umount - worker_thread - loop_process_work - do_req_filebacked - lo_rw_aio - lo_rw_aio_complete - blk_mq_end_request -
nvd
CVE-2025-71238HIGHCVSS 7.8≥ 5.7, < 5.10.251≥ 5.11, < 5.15.201+5 more2026-03-04
CVE-2025-71238 [HIGH] CWE-415 CVE-2025-71238: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix bsg_done() c In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix bsg_done() causing double free Kernel panic observed on system, [5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000 [5353358.825194] #PF: supervisor write access in kernel mode [5353358.825195] #PF: error_code(0x0002) - not-present pag
nvd
CVE-2026-23237MEDIUMCVSS 5.5≥ 2.6.33.1, < 5.10.251≥ 5.11, < 5.15.201+6 more2026-03-04
CVE-2026-23237 [MEDIUM] CWE-476 CVE-2026-23237: In the Linux kernel, the following vulnerability has been resolved: platform/x86: classmate-laptop: In the Linux kernel, the following vulnerability has been resolved: platform/x86: classmate-laptop: Add missing NULL pointer checks In a few places in the Classmate laptop driver, code using the accel object may run before that object's address is stored in the driver data of the input device using it. For example, cmpc_accel_sensitivity_store_v4
nvd
CVE-2026-23238MEDIUMCVSS 5.5≥ 2.6.12.1, < 5.10.251≥ 5.11, < 5.15.201+6 more2026-03-04
CVE-2026-23238 [MEDIUM] CWE-617 CVE-2026-23238: In the Linux kernel, the following vulnerability has been resolved: romfs: check sb_set_blocksize() In the Linux kernel, the following vulnerability has been resolved: romfs: check sb_set_blocksize() return value romfs_fill_super() ignores the return value of sb_set_blocksize(), which can fail if the requested block size is incompatible with the block device's configuration. This can be triggered by setting a loop device's block size larger tha
nvd
CVE-2026-23232MEDIUMCVSS 5.5≥ 6.19, < 6.19.32026-03-04
CVE-2026-23232 [MEDIUM] CWE-667 CVE-2026-23232: In the Linux kernel, the following vulnerability has been resolved: Revert "f2fs: block cache/dio w In the Linux kernel, the following vulnerability has been resolved: Revert "f2fs: block cache/dio write during f2fs_enable_checkpoint()" This reverts commit 196c81fdd438f7ac429d5639090a9816abb9760a. Original patch may cause below deadlock, revert it. write remount - write_begin - lock_page --- lock A - prepare_write_begin - f2fs_map_lock - f2fs_
nvd
CVE-2026-23236MEDIUMCVSS 5.5≥ 3.2, < 5.10.251≥ 5.11, < 5.15.201+5 more2026-03-04
CVE-2026-23236 [HIGH] CVE-2026-23236: In the Linux kernel, the following vulnerability has been resolved: fbdev: smscufx: properly copy i In the Linux kernel, the following vulnerability has been resolved: fbdev: smscufx: properly copy ioctl memory to kernelspace The UFX_IOCTL_REPORT_DAMAGE ioctl does not properly copy data from userspace to kernelspace, and instead directly references the memory, which can cause problems if invalid data is passed from userspace. Fix this all up by correctly
nvd
CVE-2026-23221HIGHCVSS 7.8≥ 5.10, < 5.15.201≥ 5.16, < 6.1.164+4 more2026-02-18
CVE-2026-23221 [HIGH] CWE-416 CVE-2026-23221: In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc: fix use-after-free In the Linux kernel, the following vulnerability has been resolved: bus: fsl-mc: fix use-after-free in driver_override_show() The driver_override_show() function reads the driver_override string without holding the device_lock. However, driver_override_store() uses driver_set_override(), which modifies and frees the string while holding the device_l
nvd
CVE-2025-71231HIGHCVSS 7.1≥ 6.8, < 6.12.72≥ 6.13, < 6.18.11+1 more2026-02-18
CVE-2025-71231 [HIGH] CWE-125 CVE-2025-71231: In the Linux kernel, the following vulnerability has been resolved: crypto: iaa - Fix out-of-bounds In the Linux kernel, the following vulnerability has been resolved: crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode The local variable 'i' is initialized with -EINVAL, but the for loop immediately overwrites it and -EINVAL is never returned. If no empty compression mode can be found, the function would return the out-of-bou
nvd
CVE-2026-23227HIGHCVSS 7.8≥ 3.6, < 6.12.77≥ 6.13, < 6.18.11+1 more2026-02-18
CVE-2026-23227 [HIGH] CWE-416 CVE-2026-23227: In the Linux kernel, the following vulnerability has been resolved: drm/exynos: vidi: use ctx->lock In the Linux kernel, the following vulnerability has been resolved: drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free Exynos Virtual Display driver performs memory alloc/free operations without lock protection, which easily causes concurrency problem. For example, use-after-free can occur i
nvd
CVE-2025-71234HIGHCVSS 7.8≥ 6.9, < 6.12.72≥ 6.13, < 6.18.11+1 more2026-02-18
CVE-2025-71234 [HIGH] CWE-787 CVE-2025-71234: In the Linux kernel, the following vulnerability has been resolved: wifi: rtl8xxxu: fix slab-out-of In the Linux kernel, the following vulnerability has been resolved: wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add The driver does not set hw->sta_data_size, which causes mac80211 to allocate insufficient space for driver private station data in __sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of struct rtl8xxxu_sta_info thro
nvd
CVE-2026-23216HIGHCVSS 7.8≥ 3.1, < 5.10.250≥ 5.11, < 5.15.200+5 more2026-02-18
CVE-2026-23216 [HIGH] CWE-416 CVE-2026-23216: In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-af In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() In iscsit_dec_conn_usage_count(), the function calls complete() while holding the conn->conn_usage_lock. As soon as complete() is invoked, the waiter (such as iscsit_close_connection()) may wake up and proceed
nvd
CVE-2026-23223HIGHCVSS 7.8≥ 6.9, < 6.12.72≥ 6.13, < 6.18.11+1 more2026-02-18
CVE-2026-23223 [HIGH] CWE-416 CVE-2026-23223: In the Linux kernel, the following vulnerability has been resolved: xfs: fix UAF in xchk_btree_chec In the Linux kernel, the following vulnerability has been resolved: xfs: fix UAF in xchk_btree_check_block_owner We cannot dereference bs->cur when trying to determine if bs->cur aliases bs->sc->sa.{bno,rmap}_cur after the latter has been freed. Fix this by sampling before type before any freeing could happen. The correct temporal ordering was broke
nvd
CVE-2026-23226HIGHCVSS 7.8≥ 6.3, < 6.18.11≥ 6.19, < 6.19.12026-02-18
CVE-2026-23226 [HIGH] CWE-416 CVE-2026-23226: In the Linux kernel, the following vulnerability has been resolved: ksmbd: add chann_lock to protec In the Linux kernel, the following vulnerability has been resolved: ksmbd: add chann_lock to protect ksmbd_chann_list xarray ksmbd_chann_list xarray lacks synchronization, allowing use-after-free in multi-channel sessions (between lookup_chann_list() and ksmbd_chann_del). Adds rw_semaphore chann_lock to struct ksmbd_session and protects all xa_load
nvd
CVE-2026-23224HIGHCVSS 7.8≥ 6.12, < 6.12.72≥ 6.13, < 6.18.11+1 more2026-02-18
CVE-2026-23224 [HIGH] CWE-416 CVE-2026-23224: In the Linux kernel, the following vulnerability has been resolved: erofs: fix UAF issue for file-b In the Linux kernel, the following vulnerability has been resolved: erofs: fix UAF issue for file-backed mounts w/ directio option [ 9.269940][ T3222] Call trace: [ 9.269948][ T3222] ext4_file_read_iter+0xac/0x108 [ 9.269979][ T3222] vfs_iocb_iter_read+0xac/0x198 [ 9.269993][ T3222] erofs_fileio_rq_submit+0x12c/0x180 [ 9.270008][ T3222] erofs_fileio
nvd
CVE-2026-23212MEDIUMCVSS 4.7≥ 2.6.19, < 6.1.162≥ 6.2, < 6.6.123+3 more2026-02-18
CVE-2026-23212 [MEDIUM] CWE-367 CVE-2026-23212: In the Linux kernel, the following vulnerability has been resolved: bonding: annotate data-races ar In the Linux kernel, the following vulnerability has been resolved: bonding: annotate data-races around slave->last_rx slave->last_rx and slave->target_last_arp_rx[...] can be read and written locklessly. Add READ_ONCE() and WRITE_ONCE() annotations. syzbot reported: BUG: KCSAN: data-race in bond_rcv_validate / bond_rcv_validate write to 0xffff
nvd
CVE-2025-71232MEDIUMCVSS 5.5≥ 4.16, < 5.10.251≥ 5.11, < 5.15.201+5 more2026-02-18
CVE-2025-71232 [MEDIUM] CWE-772 CVE-2025-71232: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Free sp in error In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Free sp in error path to fix system crash System crash seen during load/unload test in a loop, [61110.449331] qla2xxx [0000:27:00.0]-0042:0: Disabled MSI-X. [61110.467494] ============================================================================= [61110.467498]
nvd
CVE-2026-23217MEDIUMCVSS 5.5≥ 6.10.10, < 6.11≥ 6.11.1, < 6.18.10+2 more2026-02-18
CVE-2026-23217 [MEDIUM] CWE-667 CVE-2026-23217: In the Linux kernel, the following vulnerability has been resolved: riscv: trace: fix snapshot dead In the Linux kernel, the following vulnerability has been resolved: riscv: trace: fix snapshot deadlock with sbi ecall If sbi_ecall.c's functions are traceable, echo "__sbi_ecall:snapshot" > /sys/kernel/tracing/set_ftrace_filter may get the kernel into a deadlock. (Functions in sbi_ecall.c are excluded from tracing if CONFIG_RISCV_ALTERNATIVE_E
nvd
1 / 618Next →