Linux Kernel vulnerabilities

12,345 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
12,345
CISA KEV
25
actively exploited
Public exploits
277
Exploited in wild
26
Severity breakdown
CRITICAL108HIGH3529MEDIUM8298LOW410

Vulnerabilities

Page 2 of 618
CVE-2025-71230MEDIUMCVSS 5.5≥ 6.13, < 6.18.11≥ 6.19, < 6.19.12026-02-18
CVE-2025-71230 [MEDIUM] CVE-2025-71230: In the Linux kernel, the following vulnerability has been resolved: hfs: ensure sb->s_fs_info is al In the Linux kernel, the following vulnerability has been resolved: hfs: ensure sb->s_fs_info is always cleaned up When hfs was converted to the new mount api a bug was introduced by changing the allocation pattern of sb->s_fs_info. If setup_bdev_super() fails after a new superblock has been allocated by sget_fc(), but before hfs_fill_super() takes owners
nvd
CVE-2025-71229MEDIUMCVSS 5.5≥ 6.5, < 6.6.125≥ 6.7, < 6.12.72+2 more2026-02-18
CVE-2025-71229 [MEDIUM] CVE-2025-71229: In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: Fix alignment faul In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon() rtw_core_enable_beacon() reads 4 bytes from an address that is not a multiple of 4. This results in a crash on some systems. Do 1 byte reads/writes instead. Unable to handle kernel paging request at virtual address ffff8000827
nvd
CVE-2026-23229MEDIUMCVSS 5.5≥ 4.19.306, < 4.20≥ 5.4.268, < 5.5+7 more2026-02-18
CVE-2026-23229 [MEDIUM] CVE-2026-23229: In the Linux kernel, the following vulnerability has been resolved: crypto: virtio - Add spinlock p In the Linux kernel, the following vulnerability has been resolved: crypto: virtio - Add spinlock protection with virtqueue notification When VM boots with one virtio-crypto PCI device and builtin backend, run openssl benchmark command with multiple processes, such as openssl speed -evp aes-128-cbc -engine afalg -seconds 10 -multi 32 openssl processes wi
nvd
CVE-2026-23211MEDIUMCVSS 5.5≥ 6.18, < 6.18.9v6.192026-02-18
CVE-2026-23211 [MEDIUM] CVE-2026-23211: In the Linux kernel, the following vulnerability has been resolved: mm, swap: restore swap_space at In the Linux kernel, the following vulnerability has been resolved: mm, swap: restore swap_space attr aviod kernel panic commit 8b47299a411a ("mm, swap: mark swap address space ro and add context debug check") made the swap address space read-only. It may lead to kernel panic if arch_prepare_to_swap returns a failure under heavy memory pressure as follows
nvd
CVE-2025-71235MEDIUMCVSS 5.5≥ 4.8, < 5.10.251≥ 5.11, < 5.15.201+5 more2026-02-18
CVE-2025-71235 [MEDIUM] CVE-2025-71235: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Delay module unl In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Delay module unload while fabric scan in progress System crash seen during load/unload test in a loop. [105954.384919] RBP: ffff914589838dc0 R08: 0000000000000000 R09: 0000000000000086 [105954.384920] R10: 000000000000000f R11: ffffa31240904be5 R12: ffff914605f868e0 [10595
nvd
CVE-2025-71236MEDIUMCVSS 5.5≥ 4.16, < 5.10.251≥ 5.11, < 5.15.201+5 more2026-02-18
CVE-2025-71236 [MEDIUM] CWE-476 CVE-2025-71236: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Validate sp befo In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Validate sp before freeing associated memory System crash with the following signature [154563.214890] nvme nvme2: NVME-FC{1}: controller connect complete [154564.169363] qla2xxx [0000:b0:00.1]-3002:2: nvme: Sched: Set ZIO exchange threshold to 3. [154564.169405] ql
nvd
CVE-2025-71227MEDIUMCVSS 5.5≥ 3.8, < 6.18.10v6.192026-02-18
CVE-2025-71227 [MEDIUM] CVE-2025-71227: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't WARN for In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't WARN for connections on invalid channels It's not clear (to me) how exactly syzbot managed to hit this, but it seems conceivable that e.g. regulatory changed and has disabled a channel between scanning (channel is checked to be usable by cfg80211_get_ies_channel_numbe
nvd
CVE-2026-23222MEDIUMCVSS 5.5≥ 4.13, < 5.10.251≥ 5.11, < 5.15.201+5 more2026-02-18
CVE-2026-23222 [HIGH] CVE-2026-23222: In the Linux kernel, the following vulnerability has been resolved: crypto: omap - Allocate OMAP_CR In the Linux kernel, the following vulnerability has been resolved: crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly The existing allocation of scatterlists in omap_crypto_copy_sg_lists() was allocating an array of scatterlist pointers, not scatterlist objects, resulting in a 4x too small allocation. Use sizeof(*new_sg) to get the corr
nvd
CVE-2025-71237MEDIUMCVSS 5.5≥ 3.15, < 5.10.251≥ 5.11, < 5.15.201+5 more2026-02-18
CVE-2025-71237 [MEDIUM] CVE-2025-71237: In the Linux kernel, the following vulnerability has been resolved: nilfs2: Fix potential block ove In the Linux kernel, the following vulnerability has been resolved: nilfs2: Fix potential block overflow that cause system hang When a user executes the FITRIM command, an underflow can occur when calculating nblocks if end_block is too small. Since nblocks is of type sector_t, which is u64, a negative nblocks value will become a very large positive integ
nvd
CVE-2026-23214MEDIUMCVSS 5.5≥ 5.11, < 6.12.70≥ 6.13, < 6.18.10+1 more2026-02-18
CVE-2026-23214 [MEDIUM] CVE-2026-23214: In the Linux kernel, the following vulnerability has been resolved: btrfs: reject new transactions In the Linux kernel, the following vulnerability has been resolved: btrfs: reject new transactions if the fs is fully read-only [BUG] There is a bug report where a heavily fuzzed fs is mounted with all rescue mount options, which leads to the following warnings during unmount: BTRFS: Transaction aborted (error -22) Modules linked in: CPU: 0 UID: 0 PID: 97
nvd
CVE-2026-23219MEDIUMCVSS 5.5≥ 6.10, < 6.12.70≥ 6.13, < 6.18.10+1 more2026-02-18
CVE-2026-23219 [MEDIUM] CWE-772 CVE-2026-23219: In the Linux kernel, the following vulnerability has been resolved: mm/slab: Add alloc_tagging_slab In the Linux kernel, the following vulnerability has been resolved: mm/slab: Add alloc_tagging_slab_free_hook for memcg_alloc_abort_single When CONFIG_MEM_ALLOC_PROFILING_DEBUG is enabled, the following warning may be noticed: [ 3959.023862] ------------[ cut here ]------------ [ 3959.023891] alloc_tag was not cleared (got tag for lib/xarray.c:37
nvd
CVE-2026-23215MEDIUMCVSS 5.5≥ 6.11, < 6.12.70≥ 6.13, < 6.18.10+1 more2026-02-18
CVE-2026-23215 [MEDIUM] CVE-2026-23215: In the Linux kernel, the following vulnerability has been resolved: x86/vmware: Fix hypercall clobb In the Linux kernel, the following vulnerability has been resolved: x86/vmware: Fix hypercall clobbers Fedora QA reported the following panic: BUG: unable to handle page fault for address: 0000000040003e54 #PF: supervisor write access in kernel mode #PF: error_code(0x0002) - not-present page Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-2
nvd
CVE-2026-23218MEDIUMCVSS 5.5≥ 6.18, < 6.18.10v6.192026-02-18
CVE-2026-23218 [MEDIUM] CWE-476 CVE-2026-23218: In the Linux kernel, the following vulnerability has been resolved: gpio: loongson-64bit: Fix incor In the Linux kernel, the following vulnerability has been resolved: gpio: loongson-64bit: Fix incorrect NULL check after devm_kcalloc() Fix incorrect NULL check in loongson_gpio_init_irqchip(). The function checks chip->parent instead of chip->irq.parents.
nvd
CVE-2026-23230MEDIUMCVSS 5.5≥ 6.1, < 6.1.164≥ 6.2, < 6.6.125+3 more2026-02-18
CVE-2026-23230 [HIGH] CVE-2026-23230: In the Linux kernel, the following vulnerability has been resolved: smb: client: split cached_fid b In the Linux kernel, the following vulnerability has been resolved: smb: client: split cached_fid bitfields to avoid shared-byte RMW races is_open, has_lease and on_list are stored in the same bitfield byte in struct cached_fid but are updated in different code paths that may run concurrently. Bitfield assignments generate byte read–modify–write operations
nvd
CVE-2025-71233MEDIUMCVSS 5.5≥ 5.12, < 5.15.201≥ 5.16, < 6.1.164+4 more2026-02-18
CVE-2025-71233 [MEDIUM] CWE-476 CVE-2025-71233: In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: Avoid creating s In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: Avoid creating sub-groups asynchronously The asynchronous creation of sub-groups by a delayed work could lead to a NULL pointer dereference when the driver directory is removed before the work completes. The crash can be easily reproduced with the following command
nvd
CVE-2026-23220MEDIUMCVSS 5.5≥ 5.15.145, < 5.16≥ 6.1.71, < 6.1.164+5 more2026-02-18
CVE-2026-23220 [MEDIUM] CWE-835 CVE-2026-23220: In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix infinite loop caused In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths The problem occurs when a signed request fails smb2 signature verification check. In __process_request(), if check_sign_req() returns an error, set_smb2_rsp_status(work, STATUS_ACCESS_DENIED) is called.
nvd
CVE-2026-23213MEDIUMCVSS 5.5≥ 5.9, < 6.12.70≥ 6.13, < 6.18.10+1 more2026-02-18
CVE-2026-23213 [MEDIUM] CVE-2026-23213: In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Disable MMIO access In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset During Mode 1 reset, the ASIC undergoes a reset cycle and becomes temporarily inaccessible via PCIe. Any attempt to access MMIO registers during this window (e.g., from interrupt handlers or other driver threads) can result in uncomp
nvd
CVE-2026-23228MEDIUMCVSS 5.5≥ 5.15.91, < 5.15.201≥ 6.1.9, < 6.1.164+5 more2026-02-18
CVE-2026-23228 [MEDIUM] CWE-401 CVE-2026-23228: In the Linux kernel, the following vulnerability has been resolved: smb: server: fix leak of active In the Linux kernel, the following vulnerability has been resolved: smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection() On kthread_run() failure in ksmbd_tcp_new_connection(), the transport is freed via free_transport(), which does not decrement active_num_conn, leaking this counter. Replace free_transport() with ksmbd_tcp_disc
nvd
CVE-2025-71225MEDIUMCVSS 5.3≥ 3.4.59, < 3.5≥ 3.9.7, < 3.10+4 more2026-02-18
CVE-2025-71225 [MEDIUM] CWE-367 CVE-2025-71225: In the Linux kernel, the following vulnerability has been resolved: md: suspend array while updatin In the Linux kernel, the following vulnerability has been resolved: md: suspend array while updating raid_disks via sysfs In raid1_reshape(), freeze_array() is called before modifying the r1bio memory pool (conf->r1bio_pool) and conf->raid_disks, and unfreeze_array() is called after the update is completed. However, freeze_array() only waits unti
nvd
CVE-2026-23158HIGHCVSS 7.8≥ 6.11, < 6.12.69≥ 6.13, < 6.18.9+1 more2026-02-14
CVE-2026-23158 [HIGH] CWE-416 CVE-2026-23158: In the Linux kernel, the following vulnerability has been resolved: gpio: virtuser: fix UAF in conf In the Linux kernel, the following vulnerability has been resolved: gpio: virtuser: fix UAF in configfs release path The gpio-virtuser configfs release path uses guard(mutex) to protect the device structure. However, the device is freed before the guard cleanup runs, causing mutex_unlock() to operate on freed memory. Specifically, gpio_virtuser_dev
nvd
Linux Kernel vulnerabilities | cvebase