Linux Kernel vulnerabilities
14,483 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,483
CISA KEV
29
actively exploited
Public exploits
288
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3698MEDIUM8486LOW419UNKNOWN1768
Vulnerabilities
Page 19 of 725
CVE-2026-23117MEDIUMCVSS 5.5≥ 6.18.2, < 6.18.8v6.192026-02-14
CVE-2026-23117 [MEDIUM] CWE-476 CVE-2026-23117: In the Linux kernel, the following vulnerability has been resolved:
ice: add missing ice_deinit_hw(
In the Linux kernel, the following vulnerability has been resolved:
ice: add missing ice_deinit_hw() in devlink reinit path
devlink-reload results in ice_init_hw failed error, and then removing
the ice driver causes a NULL pointer dereference.
[ +0.102213] ice 0000:ca:00.0: ice_init_hw failed: -16
...
[ +0.000001] Call Trace:
[ +0.000003]
[ +0.00
nvdosv
CVE-2026-23125MEDIUMCVSS 5.5≥ 2.6.24, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-14
CVE-2026-23125 [MEDIUM] CWE-476 CVE-2026-23125: In the Linux kernel, the following vulnerability has been resolved:
sctp: move SCTP_CMD_ASSOC_SHKEY
In the Linux kernel, the following vulnerability has been resolved:
sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT
A null-ptr-deref was reported in the SCTP transmit path when SCTP-AUTH key
initialization fails:
KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]
CPU: 0 PID: 16 Comm: ksoftirqd/0 Tainted: G W 6.6
nvdosv
CVE-2025-71223MEDIUMCVSS 5.5≥ 6.6.32, < 6.6.124≥ 6.9, < 6.12.70+2 more2026-02-14
CVE-2025-71223 [MEDIUM] CVE-2025-71223: In the Linux kernel, the following vulnerability has been resolved:
smb/server: fix refcount leak i
In the Linux kernel, the following vulnerability has been resolved:
smb/server: fix refcount leak in smb2_open()
When ksmbd_vfs_getattr() fails, the reference count of ksmbd_file
must be released.
nvdosv
CVE-2026-23138MEDIUMCVSS 5.5≥ 5.8, < 6.18.6v6.192026-02-14
CVE-2026-23138 [MEDIUM] CVE-2026-23138: In the Linux kernel, the following vulnerability has been resolved:
tracing: Add recursion protecti
In the Linux kernel, the following vulnerability has been resolved:
tracing: Add recursion protection in kernel stack trace recording
A bug was reported about an infinite recursion caused by tracing the rcu
events with the kernel stack trace trigger enabled. The stack trace code
called back into RCU which then called the stack trace again.
Expand the ftr
nvdosv
CVE-2026-23161MEDIUMCVSS 4.7≥ 6.12, < 6.12.69≥ 6.13, < 6.18.9+1 more2026-02-14
CVE-2026-23161 [MEDIUM] CWE-362 CVE-2026-23161: In the Linux kernel, the following vulnerability has been resolved:
mm/shmem, swap: fix race of tru
In the Linux kernel, the following vulnerability has been resolved:
mm/shmem, swap: fix race of truncate and swap entry split
The helper for shmem swap freeing is not handling the order of swap
entries correctly. It uses xa_cmpxchg_irq to erase the swap entry, but it
gets the entry order before that using xa_get_order without lock
protection, and
nvdosv
CVE-2026-23124MEDIUMCVSS 5.5≥ 5.15, < 5.15.199≥ 5.16, < 6.1.162+4 more2026-02-14
CVE-2026-23124 [MEDIUM] CVE-2026-23124: In the Linux kernel, the following vulnerability has been resolved:
ipv6: annotate data-race in ndi
In the Linux kernel, the following vulnerability has been resolved:
ipv6: annotate data-race in ndisc_router_discovery()
syzbot found that ndisc_router_discovery() could read and write
in6_dev->ra_mtu without holding a lock [1]
This looks fine, IFLA_INET6_RA_MTU is best effort.
Add READ_ONCE()/WRITE_ONCE() to document the race.
Note that we might also
nvdosv
CVE-2026-23121MEDIUMCVSS 5.5≥ 2.6.27, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-14
CVE-2026-23121 [MEDIUM] CVE-2026-23121: In the Linux kernel, the following vulnerability has been resolved:
mISDN: annotate data-race aroun
In the Linux kernel, the following vulnerability has been resolved:
mISDN: annotate data-race around dev->work
dev->work can re read locklessly in mISDN_read()
and mISDN_poll(). Add READ_ONCE()/WRITE_ONCE() annotations.
BUG: KCSAN: data-race in mISDN_ioctl / mISDN_read
write to 0xffff88812d848280 of 4 bytes by task 10864 on cpu 1:
misdn_add_timer driver
nvdosv
CVE-2026-23190MEDIUMCVSS 5.5≥ 5.8, < 5.10.250≥ 5.11, < 5.15.200+5 more2026-02-14
CVE-2026-23190 [MEDIUM] CWE-401 CVE-2026-23190: In the Linux kernel, the following vulnerability has been resolved:
ASoC: amd: fix memory leak in a
In the Linux kernel, the following vulnerability has been resolved:
ASoC: amd: fix memory leak in acp3x pdm dma ops
nvdosv
CVE-2026-23159MEDIUMCVSS 5.5≥ 6.6.116, < 6.6.123≥ 6.12.57, < 6.12.69+2 more2026-02-14
CVE-2026-23159 [MEDIUM] CWE-476 CVE-2026-23159: In the Linux kernel, the following vulnerability has been resolved:
perf: sched: Fix perf crash wit
In the Linux kernel, the following vulnerability has been resolved:
perf: sched: Fix perf crash with new is_user_task() helper
In order to do a user space stacktrace the current task needs to be a user
task that has executed in user space. It use to be possible to test if a
task is a user task or not by simply checking the task_struct mm field. If
nvdosv
CVE-2026-23200MEDIUMCVSS 5.5≥ 6.6.120, < 6.6.124≥ 6.12.63, < 6.12.70+3 more2026-02-14
CVE-2026-23200 [MEDIUM] CWE-476 CVE-2026-23200: In the Linux kernel, the following vulnerability has been resolved:
ipv6: Fix ECMP sibling count mi
In the Linux kernel, the following vulnerability has been resolved:
ipv6: Fix ECMP sibling count mismatch when clearing RTF_ADDRCONF
syzbot reported a kernel BUG in fib6_add_rt2node() when adding an IPv6
route. [0]
Commit f72514b3c569 ("ipv6: clear RA flags when adding a static
route") introduced logic to clear RTF_ADDRCONF from existing routes
w
nvdosv
CVE-2026-23166MEDIUMCVSS 5.5≥ 6.10.10, < 6.11≥ 6.11.1, < 6.12.69+3 more2026-02-14
CVE-2026-23166 [MEDIUM] CWE-476 CVE-2026-23166: In the Linux kernel, the following vulnerability has been resolved:
ice: Fix NULL pointer dereferen
In the Linux kernel, the following vulnerability has been resolved:
ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues
Add NULL pointer checks in ice_vsi_set_napi_queues() to prevent crashes
during resume from suspend when rings[q_idx]->q_vector is NULL.
Tested adaptor:
60:00.0 Ethernet controller [0200]: Intel Corporation Ethernet Cont
nvdosv
CVE-2026-23188MEDIUMCVSS 5.5≥ 6.11, < 6.12.70≥ 6.13, < 6.18.10+1 more2026-02-14
CVE-2026-23188 [MEDIUM] CWE-667 CVE-2026-23188: In the Linux kernel, the following vulnerability has been resolved:
net: usb: r8152: fix resume res
In the Linux kernel, the following vulnerability has been resolved:
net: usb: r8152: fix resume reset deadlock
rtl8152 can trigger device reset during reset which
potentially can result in a deadlock:
**** DPM device timeout after 10 seconds; 15 seconds until panic ****
Call Trace:
schedule+0x483/0x1370
schedule_preempt_disabled+0x15/0x30
__mute
nvdosv
CVE-2025-71202MEDIUMCVSS 5.5≥ 4.4, < 6.18.72026-02-14
CVE-2025-71202 [MEDIUM] CVE-2025-71202: In the Linux kernel, the following vulnerability has been resolved:
iommu/sva: invalidate stale IOT
In the Linux kernel, the following vulnerability has been resolved:
iommu/sva: invalidate stale IOTLB entries for kernel address space
Introduce a new IOMMU interface to flush IOTLB paging cache entries for
the CPU kernel address space. This interface is invoked from the x86
architecture code that manages combined user and kernel page tables,
specifically
nvdosv
CVE-2026-23207MEDIUMCVSS 4.7≥ 5.15.198, < 5.16≥ 6.1.160, < 6.2+5 more2026-02-14
CVE-2026-23207 [MEDIUM] CWE-362 CVE-2026-23207: In the Linux kernel, the following vulnerability has been resolved:
spi: tegra210-quad: Protect cur
In the Linux kernel, the following vulnerability has been resolved:
spi: tegra210-quad: Protect curr_xfer check in IRQ handler
Now that all other accesses to curr_xfer are done under the lock,
protect the curr_xfer NULL check in tegra_qspi_isr_thread() with the
spinlock. Without this protection, the following race can occur:
CPU0 (ISR thread) CPU
nvdosv
CVE-2026-23128MEDIUMCVSS 5.5≥ 6.1, < 6.1.162≥ 6.2, < 6.6.122+3 more2026-02-14
CVE-2026-23128 [MEDIUM] CVE-2026-23128: In the Linux kernel, the following vulnerability has been resolved:
arm64: Set __nocfi on swsusp_ar
In the Linux kernel, the following vulnerability has been resolved:
arm64: Set __nocfi on swsusp_arch_resume()
A DABT is reported[1] on an android based system when resume from hiberate.
This happens because swsusp_arch_suspend_exit() is marked with SYM_CODE_*()
and does not have a CFI hash, but swsusp_arch_resume() will attempt to
verify the CFI hash whe
nvdosv
CVE-2026-23167MEDIUMCVSS 4.7≥ 3.2, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-14
CVE-2026-23167 [MEDIUM] CWE-362 CVE-2026-23167: In the Linux kernel, the following vulnerability has been resolved:
nfc: nci: Fix race between rfki
In the Linux kernel, the following vulnerability has been resolved:
nfc: nci: Fix race between rfkill and nci_unregister_device().
syzbot reported the splat below [0] without a repro.
It indicates that struct nci_dev.cmd_wq had been destroyed before
nci_close_device() was called via rfkill.
nci_dev.cmd_wq is only destroyed in nci_unregister_devi
nvdosv
CVE-2026-23173MEDIUMCVSS 5.5≥ 6.5, < 6.6.123≥ 6.7, < 6.12.69+2 more2026-02-14
CVE-2026-23173 [MEDIUM] CWE-476 CVE-2026-23173: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: TC, delete flows onl
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: TC, delete flows only for existing peers
When deleting TC steering flows, iterate only over actual devcom
peers instead of assuming all possible ports exist. This avoids
touching non-existent peers and ensures cleanup is limited to
devices the driver is currently connec
nvdosv
CVE-2026-23140MEDIUMCVSS 5.5≥ 5.18, < 6.1.161≥ 6.2, < 6.6.121+3 more2026-02-14
CVE-2026-23140 [MEDIUM] CVE-2026-23140: In the Linux kernel, the following vulnerability has been resolved:
bpf, test_run: Subtract size of
In the Linux kernel, the following vulnerability has been resolved:
bpf, test_run: Subtract size of xdp_frame from allowed metadata size
The xdp_frame structure takes up part of the XDP frame headroom,
limiting the size of the metadata. However, in bpf_test_run, we don't
take this into account, which makes it possible for userspace to supply
a metadata si
nvdosv
CVE-2026-23123MEDIUMCVSS 5.5≥ 6.6, < 6.6.122≥ 6.7, < 6.12.68+2 more2026-02-14
CVE-2026-23123 [MEDIUM] CWE-908 CVE-2026-23123: In the Linux kernel, the following vulnerability has been resolved:
interconnect: debugfs: initiali
In the Linux kernel, the following vulnerability has been resolved:
interconnect: debugfs: initialize src_node and dst_node to empty strings
The debugfs_create_str() API assumes that the string pointer is either NULL
or points to valid kmalloc() memory. Leaving the pointer uninitialized can
cause problems.
Initialize src_node and dst_node to empt
nvdosv
CVE-2026-23116MEDIUMCVSS 5.5≥ 5.18, < 6.1.162≥ 6.2, < 6.6.122+3 more2026-02-14
CVE-2026-23116 [MEDIUM] CVE-2026-23116: In the Linux kernel, the following vulnerability has been resolved:
pmdomain: imx8m-blk-ctrl: Remov
In the Linux kernel, the following vulnerability has been resolved:
pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu
For i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset
and clock enable bits, but is ungated and reset together with the VPUs.
So we can't reset G1 or G2 separately, it may led to the system hang.
Rem
nvdosv