Linux Kernel vulnerabilities

14,483 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,483
CISA KEV
29
actively exploited
Public exploits
288
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3698MEDIUM8486LOW419UNKNOWN1768

Vulnerabilities

Page 16 of 725
CVE-2025-71225MEDIUMCVSS 5.3≥ 3.4.59, < 3.5≥ 3.9.7, < 3.10+4 more2026-02-18
CVE-2025-71225 [MEDIUM] CWE-367 CVE-2025-71225: In the Linux kernel, the following vulnerability has been resolved: md: suspend array while updatin In the Linux kernel, the following vulnerability has been resolved: md: suspend array while updating raid_disks via sysfs In raid1_reshape(), freeze_array() is called before modifying the r1bio memory pool (conf->r1bio_pool) and conf->raid_disks, and unfreeze_array() is called after the update is completed. However, freeze_array() only waits unti
nvdosv
CVE-2025-71226UNKNOWN≥ 0, < 6.18.10-12026-02-18
CVE-2025-71226 CVE-2025-71226: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP Since commit dfb073d32c In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP Since commit dfb073d32cac ("ptp: Return -EINVAL on ptp_clock_register if required ops are NULL"), PTP clock registered through ptp_clock_register is required to have ptp_clock_info.settime64
osv
CVE-2025-71228UNKNOWN≥ 0, < 6.1.163≥ 6.2.0, < 6.6.124+2 more2026-02-18
CVE-2025-71228 LoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED LoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED In the Linux kernel, the following vulnerability has been resolved: LoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED For 32BIT platform _PAGE_PROTNONE is 0, so set a VMA to be VM_NONE or VM_SHARED will make pages non-present, then cause Oops with kernel page fault. Fix it by set correct protection_map[] for VM_NONE/VM_SHARED, replacing _PAGE_
osv
CVE-2026-23175HIGHCVSS 7.0≥ 6.17.0, < 6.18.102026-02-14
CVE-2026-23175 [HIGH] net: cpsw: Execute ndo_set_rx_mode callback in a work queue net: cpsw: Execute ndo_set_rx_mode callback in a work queue In the Linux kernel, the following vulnerability has been resolved: net: cpsw: Execute ndo_set_rx_mode callback in a work queue Commit 1767bb2d47b7 ("ipv6: mcast: Don't hold RTNL for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP.") removed the RTNL lock for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP operations. However, this change triggered the following call
osv
CVE-2026-23191HIGHCVSS 7.0≥ 2.6.37, < 6.12.70≥ 6.13, < 6.18.10+1 more2026-02-14
CVE-2026-23191 [HIGH] CWE-416 CVE-2026-23191: In the Linux kernel, the following vulnerability has been resolved: ALSA: aloop: Fix racy access at In the Linux kernel, the following vulnerability has been resolved: ALSA: aloop: Fix racy access at PCM trigger The PCM trigger callback of aloop driver tries to check the PCM state and stop the stream of the tied substream in the corresponding cable. Since both check and stop operations are performed outside the cable lock, this may result in UAF w
nvdosv
CVE-2026-23158HIGHCVSS 7.8≥ 6.11, < 6.12.69≥ 6.13, < 6.18.9+1 more2026-02-14
CVE-2026-23158 [HIGH] CWE-416 CVE-2026-23158: In the Linux kernel, the following vulnerability has been resolved: gpio: virtuser: fix UAF in conf In the Linux kernel, the following vulnerability has been resolved: gpio: virtuser: fix UAF in configfs release path The gpio-virtuser configfs release path uses guard(mutex) to protect the device structure. However, the device is freed before the guard cleanup runs, causing mutex_unlock() to operate on freed memory. Specifically, gpio_virtuser_dev
nvdosv
CVE-2025-71220HIGHCVSS 7.8≥ 5.15.145, < 5.15.200≥ 6.1.71, < 6.1.163+4 more2026-02-14
CVE-2025-71220 [HIGH] CVE-2025-71220: In the Linux kernel, the following vulnerability has been resolved: smb/server: call ksmbd_session_ In the Linux kernel, the following vulnerability has been resolved: smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe() When ksmbd_iov_pin_rsp() fails, we should call ksmbd_session_rpc_close().
nvdosv
CVE-2026-23184HIGHCVSS 7.8≥ 6.18, < 6.18.10v6.192026-02-14
CVE-2026-23184 [HIGH] CWE-416 CVE-2026-23184: In the Linux kernel, the following vulnerability has been resolved: binder: fix UAF in binder_netli In the Linux kernel, the following vulnerability has been resolved: binder: fix UAF in binder_netlink_report() Oneway transactions sent to frozen targets via binder_proc_transaction() return a BR_TRANSACTION_PENDING_FROZEN error but they are still treated as successful since the target is expected to thaw at some point. It is then not safe to access
nvdosv
CVE-2026-23156HIGHCVSS 7.8≥ 6.0, < 6.1.162≥ 6.2, < 6.6.123+3 more2026-02-14
CVE-2026-23156 [HIGH] CVE-2026-23156: In the Linux kernel, the following vulnerability has been resolved: efivarfs: fix error propagation In the Linux kernel, the following vulnerability has been resolved: efivarfs: fix error propagation in efivar_entry_get() efivar_entry_get() always returns success even if the underlying __efivar_entry_get() fails, masking errors. This may result in uninitialized heap memory being copied to userspace in the efivarfs_file_read() path. Fix it by returning t
nvdosv
CVE-2025-71203HIGHCVSS 7.0≥ 6.4, < 6.12.70≥ 6.13, < 6.18.10+1 more2026-02-14
CVE-2025-71203 [HIGH] CWE-129 CVE-2025-71203: In the Linux kernel, the following vulnerability has been resolved: riscv: Sanitize syscall table i In the Linux kernel, the following vulnerability has been resolved: riscv: Sanitize syscall table indexing under speculation The syscall number is a user-controlled value used to index into the syscall table. Use array_index_nospec() to clamp this value after the bounds check to prevent speculative out-of-bounds access and subsequent data leakage vi
nvdosv
CVE-2026-23204HIGHCVSS 7.1≥ 2.6.35.1, < 6.6.124≥ 6.7, < 6.12.70+3 more2026-02-14
CVE-2026-23204 [HIGH] CWE-125 CVE-2026-23204: In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_hea In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provided a report and a repro fooling u32_classify(): BUG: KASAN: slab-out-of-bounds in u32_classify+0x
nvdosv
CVE-2026-23187HIGHCVSS 7.1≥ 5.16, < 6.1.163≥ 6.2, < 6.6.124+3 more2026-02-14
CVE-2026-23187 [HIGH] CWE-125 CVE-2026-23187: In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8m-blk-ctrl: fix o In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc->domains Fix out-of-range access of bc->domains in imx8m_blk_ctrl_remove().
nvdosv
CVE-2026-23209HIGHCVSS 7.8≥ 4.9.1, < 5.10.250≥ 5.11, < 5.15.200+6 more2026-02-14
CVE-2026-23209 [HIGH] CWE-416 CVE-2026-23209: In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in macvlan_common_newlink() valis provided a nice repro to crash the kernel: ip link add p1 type veth peer p2 ip link set address 00:00:00:00:00:20 dev p1 ip link set up dev p1 ip link set up dev p2 ip link add mv0 link p2 type macvlan mode source ip lin
nvdosv
CVE-2026-23171HIGHCVSS 7.8≥ 5.15, < 6.18.9v6.192026-02-14
CVE-2026-23171 [HIGH] CWE-416 CVE-2026-23171: In the Linux kernel, the following vulnerability has been resolved: bonding: fix use-after-free due In the Linux kernel, the following vulnerability has been resolved: bonding: fix use-after-free due to enslave fail after slave array update Fix a use-after-free which happens due to enslave failure after the new slave has been added to the array. Since the new slave can be used for Tx immediately, we can use it after it has been freed by the enslav
nvdosv
CVE-2026-23185HIGHCVSS 7.8≥ 6.17, < 6.18.10v6.192026-02-14
CVE-2026-23185 [HIGH] CWE-416 CVE-2026-23185: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mld: cancel mlo_ In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mld: cancel mlo_scan_start_wk mlo_scan_start_wk is not canceled on disconnection. In fact, it is not canceled anywhere except in the restart cleanup, where we don't really have to. This can cause an init-after-queue issue: if, for example, the work was queued and the
nvdosv
CVE-2025-71201HIGHCVSS 7.1≥ 6.14, < 6.18.6v6.192026-02-14
CVE-2025-71201 [HIGH] CWE-125 CVE-2025-71201: In the Linux kernel, the following vulnerability has been resolved: netfs: Fix early read unlock of In the Linux kernel, the following vulnerability has been resolved: netfs: Fix early read unlock of page with EOF in middle The read result collection for buffered reads seems to run ahead of the completion of subrequests under some circumstances, as can be seen in the following log snippet: 9p_client_res: client 18446612686390831168 response P9_TR
nvdosv
CVE-2026-23194HIGHCVSS 7.8≥ 6.18, < 6.18.10v6.192026-02-14
CVE-2026-23194 [HIGH] CWE-787 CVE-2026-23194: In the Linux kernel, the following vulnerability has been resolved: rust_binder: correctly handle F In the Linux kernel, the following vulnerability has been resolved: rust_binder: correctly handle FDA objects of length zero Fix a bug where an empty FDA (fd array) object with 0 fds would cause an out-of-bounds error. The previous implementation used `skip == 0` to mean "this is a pointer fixup", but 0 is also the correct skip length for an empty F
nvdosv
CVE-2026-23208HIGHCVSS 7.8≥ 4.14.186, < 4.14.188≥ 4.19.130, < 4.19.132+6 more2026-02-14
CVE-2026-23208 [HIGH] CWE-787 CVE-2026-23208: In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Prevent excess In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Prevent excessive number of frames In this case, the user constructed the parameters with maxpacksize 40 for rate 22050 / pps 1000, and packsize[0] 22 packsize[1] 23. The buffer size for each data URB is maxpacksize * packets, which in this example is 40 * 6 = 240;
nvdosv
CVE-2026-23193HIGHCVSS 7.8≥ 3.1, < 5.10.250≥ 5.11, < 5.15.200+5 more2026-02-14
CVE-2026-23193 [HIGH] CWE-416 CVE-2026-23193: In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-af In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() In iscsit_dec_session_usage_count(), the function calls complete() while holding the sess->session_usage_lock. Similar to the connection usage count logic, the waiter signaled by complete() (e.g., in the ses
nvdosv
CVE-2026-23178HIGHCVSS 7.8≥ 0, < 6.1.164-1≥ 0, < 6.12.73-1+1 more2026-02-14
CVE-2026-23178 [HIGH] CVE-2026-23178: In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report() `i2c_hid_xfer` In the Linux kernel, the following vulnerability has been resolved: HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report() `i2c_hid_xfer` is used to read `recv_len + sizeof(__le16)` bytes of data into `ihid->rawbuf`. The former can come from the userspace in the hidraw driver and is only bounded b
osv