Linux Kernel vulnerabilities

14,483 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,483
CISA KEV
29
actively exploited
Public exploits
288
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3698MEDIUM8486LOW419UNKNOWN1768

Vulnerabilities

Page 11 of 725
CVE-2026-23327UNKNOWN≥ 5.19.0, < 6.19.72026-03-25
CVE-2026-23327 cxl/mbox: validate payload size before accessing contents in cxl_payload_from_user_allowed() cxl/mbox: validate payload size before accessing contents in cxl_payload_from_user_allowed() In the Linux kernel, the following vulnerability has been resolved: cxl/mbox: validate payload size before accessing contents in cxl_payload_from_user_allowed() cxl_payload_from_user_allowed() casts and dereferences the input payload without first verifying its size. When a raw mailbox command i
osv
CVE-2026-23356UNKNOWN≥ 0, < 6.19.8-12026-03-25
CVE-2026-23356 CVE-2026-23356: In the Linux kernel, the following vulnerability has been resolved: drbd: fix "LOGIC BUG" in drbd_al_begin_io_nonblock() Even though we check that we In the Linux kernel, the following vulnerability has been resolved: drbd: fix "LOGIC BUG" in drbd_al_begin_io_nonblock() Even though we check that we "should" be able to do lc_get_cumulative() while holding the device->al_lock spinlock, it may still fail, if some other code path decided to do lc_try_lock() with bad ti
osv
CVE-2026-23354UNKNOWN≥ 0, < 6.19.8-12026-03-25
CVE-2026-23354 CVE-2026-23354: In the Linux kernel, the following vulnerability has been resolved: x86/fred: Correct speculative safety in fred_extint() array_index_nospec() is no u In the Linux kernel, the following vulnerability has been resolved: x86/fred: Correct speculative safety in fred_extint() array_index_nospec() is no use if the result gets spilled to the stack, as it makes the believed safe-under-speculation value subject to memory predictions. For all practical purposes, this means
osv
CVE-2026-23297UNKNOWN≥ 0, < 6.19.8-12026-03-25
CVE-2026-23297 CVE-2026-23297: In the Linux kernel, the following vulnerability has been resolved: nfsd: Fix cred ref leak in nfsd_nl_threads_set_doit() In the Linux kernel, the following vulnerability has been resolved: nfsd: Fix cred ref leak in nfsd_nl_threads_set_doit(). syzbot reported memory leak of struct cred. [0] nfsd_nl_threads_set_doit() passes get_current_cred() to nfsd_svc(), but put_cred() is not called after that. The cred is finally passed down to _svc_xprt_create(), which calls
osv
CVE-2026-23312UNKNOWN≥ 0, < 6.19.8-12026-03-25
CVE-2026-23312 CVE-2026-23312: In the Linux kernel, the following vulnerability has been resolved: net: usb: kaweth: validate USB endpoints The kaweth driver should validate that th In the Linux kernel, the following vulnerability has been resolved: net: usb: kaweth: validate USB endpoints The kaweth driver should validate that the device it is probing has the proper number and types of USB endpoints it is expecting before it binds to it. If a malicious device were to not have the same urbs the
osv
CVE-2026-23281UNKNOWN≥ 0, < 6.19.8-12026-03-25
CVE-2026-23281 CVE-2026-23281: In the Linux kernel, the following vulnerability has been resolved: wifi: libertas: fix use-after-free in lbs_free_adapter() The lbs_free_adapter() fu In the Linux kernel, the following vulnerability has been resolved: wifi: libertas: fix use-after-free in lbs_free_adapter() The lbs_free_adapter() function uses timer_delete() (non-synchronous) for both command_timer and tx_lockup_timer before the structure is freed. This is incorrect because timer_delete() does not
osv
CVE-2026-23343UNKNOWN≥ 0, < 6.19.8-12026-03-25
CVE-2026-23343 CVE-2026-23343: In the Linux kernel, the following vulnerability has been resolved: xdp: produce a warning when calculated tailroom is negative Many ethernet drivers In the Linux kernel, the following vulnerability has been resolved: xdp: produce a warning when calculated tailroom is negative Many ethernet drivers report xdp Rx queue frag size as being the same as DMA write size. However, the only user of this field, namely bpf_xdp_frags_increase_tail(), clearly expects a truesize
osv
CVE-2026-23331UNKNOWN≥ 0, < 6.19.8-12026-03-25
CVE-2026-23331 CVE-2026-23331: In the Linux kernel, the following vulnerability has been resolved: udp: Unhash auto-bound connected sk from 4-tuple hash table when disconnected In the Linux kernel, the following vulnerability has been resolved: udp: Unhash auto-bound connected sk from 4-tuple hash table when disconnected. Let's say we bind() an UDP socket to the wildcard address with a non-zero port, connect() it to an address, and disconnect it from the address. bind() sets SOCK_BINDPORT_LOCK o
osv
CVE-2026-23345UNKNOWN≥ 6.13.0, < 6.18.17≥ 6.19.0, < 6.19.72026-03-25
CVE-2026-23345 arm64: gcs: Do not set PTE_SHARED on GCS mappings if FEAT_LPA2 is enabled arm64: gcs: Do not set PTE_SHARED on GCS mappings if FEAT_LPA2 is enabled In the Linux kernel, the following vulnerability has been resolved: arm64: gcs: Do not set PTE_SHARED on GCS mappings if FEAT_LPA2 is enabled When FEAT_LPA2 is enabled, bits 8-9 of the PTE replace the shareability attribute with bits 50-51 of the output address. The _PAGE_GCS{,_RO} definitions include the PTE_SHARED bits as 0b11 (th
osv
CVE-2026-23299UNKNOWN≥ 0, < 6.19.8-12026-03-25
CVE-2026-23299 CVE-2026-23299: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: purge error queues in socket destructors When TX timestamping is enable In the Linux kernel, the following vulnerability has been resolved: Bluetooth: purge error queues in socket destructors When TX timestamping is enabled via SO_TIMESTAMPING, SKBs may be queued into sk_error_queue and will stay there until consumed. If userspace never gets to read the timestamps, or if the controller i
osv
CVE-2026-23303UNKNOWN≥ 3.3.0, < 6.1.167≥ 6.2.0, < 6.6.130+3 more2026-03-25
CVE-2026-23303 smb: client: Don't log plaintext credentials in cifs_set_cifscreds smb: client: Don't log plaintext credentials in cifs_set_cifscreds In the Linux kernel, the following vulnerability has been resolved: smb: client: Don't log plaintext credentials in cifs_set_cifscreds When debug logging is enabled, cifs_set_cifscreds() logs the key payload and exposes the plaintext username and password. Remove the debug log to avoid exposing credentials.
osv
CVE-2026-23311UNKNOWN≥ 6.15.0, < 6.18.17≥ 6.19.0, < 6.19.72026-03-25
CVE-2026-23311 perf/core: Fix invalid wait context in ctx_sched_in() perf/core: Fix invalid wait context in ctx_sched_in() In the Linux kernel, the following vulnerability has been resolved: perf/core: Fix invalid wait context in ctx_sched_in() Lockdep found a bug in the event scheduling when a pinned event was failed and wakes up the threads in the ring buffer like below. It seems it should not grab a wait-queue lock under perf-context lock. Let's do it with irq_work. [ 39.913691] ========
osv
CVE-2026-23273HIGHCVSS 7.8≥ 0, < 5.10.252≥ 5.11.0, < 5.15.202+5 more2026-03-20
CVE-2026-23273 [HIGH] macvlan: observe an RCU grace period in macvlan_common_newlink() error path macvlan: observe an RCU grace period in macvlan_common_newlink() error path In the Linux kernel, the following vulnerability has been resolved: macvlan: observe an RCU grace period in macvlan_common_newlink() error path valis reported that a race condition still happens after my prior patch. macvlan_common_newlink() might have made @dev visible before detecting an error, and its caller will dire
osv
CVE-2026-23278HIGHCVSS 7.8≥ 0, < 6.19.10-12026-03-20
CVE-2026-23278 [HIGH] CVE-2026-23278: In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: always walk all pending catchall elements During transaction In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: always walk all pending catchall elements During transaction processing we might have more than one catchall element: 1 live catchall element and 1 pending element that is coming as part of the new batch. If the map holdi
osv
CVE-2026-23271HIGHCVSS 7.8≥ 2.6.31, < 6.1.167≥ 6.2.0, < 6.6.130+3 more2026-03-20
CVE-2026-23271 [HIGH] perf: Fix __perf_event_overflow() vs perf_remove_from_context() race perf: Fix __perf_event_overflow() vs perf_remove_from_context() race In the Linux kernel, the following vulnerability has been resolved: perf: Fix __perf_event_overflow() vs perf_remove_from_context() race Make sure that __perf_event_overflow() runs with IRQs disabled for all possible callchains. Specifically the software events can end up running it with only preemption disabled. This opens up a race
osv
CVE-2026-23274HIGHCVSS 7.8≥ 5.7.0, < 6.1.167≥ 6.2.0, < 6.6.130+3 more2026-03-20
CVE-2026-23274 [HIGH] netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels In the Linux kernel, the following vulnerability has been resolved: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels IDLETIMER revision 0 rules reuse existing timers by label and always call mod_timer() on timer->timer. If the label was created first by revision 1 with XT_IDLETIMER_ALARM, the object uses alarm timer semantics
osv
CVE-2026-23275HIGHCVSS 7.8≥ 6.13.0, < 6.18.19≥ 6.19.0, < 6.19.92026-03-20
CVE-2026-23275 [HIGH] io_uring: ensure ctx->rings is stable for task work flags manipulation io_uring: ensure ctx->rings is stable for task work flags manipulation In the Linux kernel, the following vulnerability has been resolved: io_uring: ensure ctx->rings is stable for task work flags manipulation If DEFER_TASKRUN | SETUP_TASKRUN is used and task work is added while the ring is being resized, it's possible for the OR'ing of IORING_SQ_TASKRUN to happen in the small window of swapping into
osv
CVE-2026-23272HIGHCVSS 7.8≥ 4.10.0, < 6.18.17≥ 6.19.0, < 6.19.72026-03-20
CVE-2026-23272 [HIGH] netfilter: nf_tables: unconditionally bump set->nelems before insertion netfilter: nf_tables: unconditionally bump set->nelems before insertion In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: unconditionally bump set->nelems before insertion In case that the set is full, a new element gets published then removed without waiting for the RCU grace period, while RCU reader can be walking over it already. To address this issue, add
osv
CVE-2026-23277UNKNOWN≥ 4.5.0, < 6.1.167≥ 6.2.0, < 6.6.130+3 more2026-03-20
CVE-2026-23277 net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit In the Linux kernel, the following vulnerability has been resolved: net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit teql_master_xmit() calls netdev_start_xmit(skb, slave) to transmit through slave devices, but does not update skb->dev to the slave device beforehand. When a gretap tu
osv
CVE-2026-23276UNKNOWN≥ 0, < 6.19.10-12026-03-20
CVE-2026-23276 CVE-2026-23276: In the Linux kernel, the following vulnerability has been resolved: net: add xmit recursion limit to tunnel xmit functions Tunnel xmit functions (iptu In the Linux kernel, the following vulnerability has been resolved: net: add xmit recursion limit to tunnel xmit functions Tunnel xmit functions (iptunnel_xmit, ip6tunnel_xmit) lack their own recursion limit. When a bond device in broadcast mode has GRE tap interfaces as slaves, and those GRE tunnels route back throu
osv