Linux Kernel vulnerabilities
14,483 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,483
CISA KEV
29
actively exploited
Public exploits
288
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3698MEDIUM8486LOW419UNKNOWN1768
Vulnerabilities
Page 10 of 725
CVE-2026-23344UNKNOWN≥ 6.19.0, < 6.19.72026-03-25
CVE-2026-23344 crypto: ccp - Fix use-after-free on error path
crypto: ccp - Fix use-after-free on error path
In the Linux kernel, the following vulnerability has been resolved:
crypto: ccp - Fix use-after-free on error path
In the error path of sev_tsm_init_locked(), the code dereferences 't'
after it has been freed with kfree(). The pr_err() statement attempts
to access t->tio_en and t->tio_init_done after the memory has been
released.
Move the pr_err() call before kfree(t) to access the fi
osv
CVE-2026-23347UNKNOWN≥ 6.5.0, < 6.6.130≥ 6.7.0, < 6.12.77+2 more2026-03-25
CVE-2026-23347 can: usb: f81604: correctly anchor the urb in the read bulk callback
can: usb: f81604: correctly anchor the urb in the read bulk callback
In the Linux kernel, the following vulnerability has been resolved:
can: usb: f81604: correctly anchor the urb in the read bulk callback
When submitting an urb, that is using the anchor pattern, it needs to be
anchored before submitting it otherwise it could be leaked if
usb_kill_anchored_urbs() is called. This logic is correctly done
elsewhe
osv
CVE-2026-23313UNKNOWN≥ 0, < 6.19.8-12026-03-25
CVE-2026-23313 CVE-2026-23313: In the Linux kernel, the following vulnerability has been resolved: i40e: Fix preempt count leak in napi poll tracepoint Using get_cpu() in the tracep
In the Linux kernel, the following vulnerability has been resolved: i40e: Fix preempt count leak in napi poll tracepoint Using get_cpu() in the tracepoint assignment causes an obvious preempt count leak because nothing invokes put_cpu() to undo it: softirq: huh, entered softirq 3 NET_RX with preempt_count 00000100, e
osv
CVE-2026-23308UNKNOWN≥ 6.4.0, < 6.6.130≥ 6.7.0, < 6.12.77+2 more2026-03-25
CVE-2026-23308 pinctrl: equilibrium: fix warning trace on load
pinctrl: equilibrium: fix warning trace on load
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: equilibrium: fix warning trace on load
The callback functions 'eqbr_irq_mask()' and 'eqbr_irq_ack()' are also
called in the callback function 'eqbr_irq_mask_ack()'. This is done to
avoid source code duplication. The problem, is that in the function
'eqbr_irq_mask()' also calles the gpiolib function 'gpiochip
osv
CVE-2026-23382UNKNOWN≥ 2.6.35, < 6.1.167≥ 6.2.0, < 6.6.130+3 more2026-03-25
CVE-2026-23382 HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them
HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them
In the Linux kernel, the following vulnerability has been resolved:
HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them
In commit 2ff5baa9b527 ("HID: appleir: Fix potential NULL dereference at
raw event handle"), we handle the fact that raw event callbacks
can happen even for a HID device that has not been "claimed" causin
osv
CVE-2026-23338UNKNOWN≥ 6.16.0, < 6.18.17≥ 6.19.0, < 6.19.72026-03-25
CVE-2026-23338 drm/amdgpu/userq: Do not allow userspace to trivially triger kernel warnings
drm/amdgpu/userq: Do not allow userspace to trivially triger kernel warnings
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu/userq: Do not allow userspace to trivially triger kernel warnings
Userspace can either deliberately pass in the too small num_fences, or the
required number can legitimately grow between the two calls to the userq
wait ioctl. In both cases we do not
osv
CVE-2026-23342UNKNOWN≥ 0, < 6.19.8-12026-03-25
CVE-2026-23342 CVE-2026-23342: In the Linux kernel, the following vulnerability has been resolved: bpf: Fix race in cpumap on PREEMPT_RT On PREEMPT_RT kernels, the per-CPU xdp_bulk_
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix race in cpumap on PREEMPT_RT On PREEMPT_RT kernels, the per-CPU xdp_bulk_queue (bq) can be accessed concurrently by multiple preemptible tasks on the same CPU. The original code assumes bq_enqueue() and __cpu_map_flush() run atomically with
osv
CVE-2026-23346UNKNOWN≥ 6.0.0, < 6.18.17≥ 6.19.0, < 6.19.72026-03-25
CVE-2026-23346 arm64: io: Extract user memory type in ioremap_prot()
arm64: io: Extract user memory type in ioremap_prot()
In the Linux kernel, the following vulnerability has been resolved:
arm64: io: Extract user memory type in ioremap_prot()
The only caller of ioremap_prot() outside of the generic ioremap()
implementation is generic_access_phys(), which passes a 'pgprot_t' value
determined from the user mapping of the target 'pfn' being accessed by
the kernel. On arm64, the 'pgprot_t' cont
osv
CVE-2026-23290UNKNOWN≥ 0, < 6.19.8-12026-03-25
CVE-2026-23290 CVE-2026-23290: In the Linux kernel, the following vulnerability has been resolved: net: usb: pegasus: validate USB endpoints The pegasus driver should validate that
In the Linux kernel, the following vulnerability has been resolved: net: usb: pegasus: validate USB endpoints The pegasus driver should validate that the device it is probing has the proper number and types of USB endpoints it is expecting before it binds to it. If a malicious device were to not have the same urbs the
osv
CVE-2026-23341UNKNOWN≥ 0, < 6.19.72026-03-25
CVE-2026-23341 accel/amdxdna: Fix crash when destroying a suspended hardware context
accel/amdxdna: Fix crash when destroying a suspended hardware context
In the Linux kernel, the following vulnerability has been resolved:
accel/amdxdna: Fix crash when destroying a suspended hardware context
If userspace issues an ioctl to destroy a hardware context that has
already been automatically suspended, the driver may crash because the
mailbox channel pointer is NULL for the suspended context.
Fix t
osv
CVE-2026-23289UNKNOWN≥ 2.6.14, < 6.1.167≥ 6.2.0, < 6.6.130+3 more2026-03-25
CVE-2026-23289 IB/mthca: Add missed mthca_unmap_user_db() for mthca_create_srq()
IB/mthca: Add missed mthca_unmap_user_db() for mthca_create_srq()
In the Linux kernel, the following vulnerability has been resolved:
IB/mthca: Add missed mthca_unmap_user_db() for mthca_create_srq()
Fix a user triggerable leak on the system call failure path.
osv
CVE-2026-23320UNKNOWN≥ 0, < 6.19.8-12026-03-25
CVE-2026-23320 CVE-2026-23320: In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ncm: align net_device lifecycle with bind/unbind Currently, the net
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_ncm: align net_device lifecycle with bind/unbind Currently, the net_device is allocated in ncm_alloc_inst() and freed in ncm_free_inst(). This ties the network interface's lifetime to the configuration instance rather than the USB conn
osv
CVE-2026-23388UNKNOWN≥ 0, < 6.19.8-12026-03-25
CVE-2026-23388 CVE-2026-23388: In the Linux kernel, the following vulnerability has been resolved: Squashfs: check metadata block offset is within range Syzkaller reports a "general
In the Linux kernel, the following vulnerability has been resolved: Squashfs: check metadata block offset is within range Syzkaller reports a "general protection fault in squashfs_copy_data" This is ultimately caused by a corrupted index look-up table, which produces a negative metadata block offset. This is subseque
osv
CVE-2026-23349UNKNOWN≥ 6.18.0, < 6.18.17≥ 6.19.0, < 6.19.72026-03-25
CVE-2026-23349 HID: pidff: Fix condition effect bit clearing
HID: pidff: Fix condition effect bit clearing
In the Linux kernel, the following vulnerability has been resolved:
HID: pidff: Fix condition effect bit clearing
As reported by MPDarkGuy on discord, NULL pointer dereferences were
happening because not all the conditional effects bits were cleared.
Properly clear all conditional effect bits from ffbit
osv
CVE-2026-23339UNKNOWN≥ 3.2.0, < 6.1.167≥ 6.2.0, < 6.6.130+3 more2026-03-25
CVE-2026-23339 nfc: nci: free skb on nci_transceive early error paths
nfc: nci: free skb on nci_transceive early error paths
In the Linux kernel, the following vulnerability has been resolved:
nfc: nci: free skb on nci_transceive early error paths
nci_transceive() takes ownership of the skb passed by the caller,
but the -EPROTO, -EINVAL, and -EBUSY error paths return without
freeing it.
Due to issues clearing NCI_DATA_EXCHANGE fixed by subsequent changes
the nci/nci_dev selftest hits the err
osv
CVE-2026-23330UNKNOWN≥ 0, < 6.19.8-12026-03-25
CVE-2026-23330 CVE-2026-23330: In the Linux kernel, the following vulnerability has been resolved: nfc: nci: complete pending data exchange on device close In nci_close_device(), co
In the Linux kernel, the following vulnerability has been resolved: nfc: nci: complete pending data exchange on device close In nci_close_device(), complete any pending data exchange before closing. The data exchange callback (e.g. rawsock_data_exchange_complete) holds a socket reference. NIPA occasionally hits this
osv
CVE-2026-23389UNKNOWN≥ 4.17.0, < 6.19.72026-03-25
CVE-2026-23389 ice: Fix memory leak in ice_set_ringparam()
ice: Fix memory leak in ice_set_ringparam()
In the Linux kernel, the following vulnerability has been resolved:
ice: Fix memory leak in ice_set_ringparam()
In ice_set_ringparam, tx_rings and xdp_rings are allocated before
rx_rings. If the allocation of rx_rings fails, the code jumps to
the done label leaking both tx_rings and xdp_rings. Furthermore, if
the setup of an individual Rx ring fails during the loop, the code jumps
to the fre
osv
CVE-2026-23315UNKNOWN≥ 5.10.0, < 6.1.167≥ 6.2.0, < 6.6.130+3 more2026-03-25
CVE-2026-23315 wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211()
wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211()
In the Linux kernel, the following vulnerability has been resolved:
wifi: mt76: Fix possible oob access in mt76_connac2_mac_write_txwi_80211()
Check frame length before accessing the mgmt fields in
mt76_connac2_mac_write_txwi_80211 in order to avoid a possible oob
access.
[fix check to also cover mgmt->u.action.u.addba_req.capab,
osv
CVE-2026-23333UNKNOWN≥ 5.6.0, < 6.19.42026-03-25
CVE-2026-23333 netfilter: nft_set_rbtree: validate open interval overlap
netfilter: nft_set_rbtree: validate open interval overlap
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_set_rbtree: validate open interval overlap
[ Upstream commit 648946966a08e4cb1a71619e3d1b12bd7642de7b ]
Open intervals do not have an end element, in particular an open
interval at the end of the set is hard to validate because of it is
lacking the end element, and interval validat
osv
CVE-2026-23324UNKNOWN≥ 5.13.0, < 6.1.167≥ 6.2.0, < 6.6.130+3 more2026-03-25
CVE-2026-23324 can: usb: etas_es58x: correctly anchor the urb in the read bulk callback
can: usb: etas_es58x: correctly anchor the urb in the read bulk callback
In the Linux kernel, the following vulnerability has been resolved:
can: usb: etas_es58x: correctly anchor the urb in the read bulk callback
When submitting an urb, that is using the anchor pattern, it needs to be
anchored before submitting it otherwise it could be leaked if
usb_kill_anchored_urbs() is called. This logic is correctly
osv