Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 21 of 724
CVE-2026-23198MEDIUMCVSS 5.5≥ 4.4, < 5.10.250≥ 5.11, < 5.15.200+5 more2026-02-14
CVE-2026-23198 [MEDIUM] CWE-476 CVE-2026-23198: In the Linux kernel, the following vulnerability has been resolved: KVM: Don't clobber irqfd routin In the Linux kernel, the following vulnerability has been resolved: KVM: Don't clobber irqfd routing type when deassigning irqfd When deassigning a KVM_IRQFD, don't clobber the irqfd's copy of the IRQ's routing entry as doing so breaks kvm_arch_irq_bypass_del_producer() on x86 and arm64, which explicitly look for KVM_IRQ_ROUTING_MSI. Instead, to h
nvdosv
CVE-2026-23165MEDIUMCVSS 5.5≥ 6.17, < 6.18.9v6.192026-02-14
CVE-2026-23165 [MEDIUM] CWE-667 CVE-2026-23165: In the Linux kernel, the following vulnerability has been resolved: sfc: fix deadlock in RSS config In the Linux kernel, the following vulnerability has been resolved: sfc: fix deadlock in RSS config read Since cited commit, core locks the net_device's rss_lock when handling ethtool -x command, so driver's implementation should not lock it again. Remove the latter.
nvdosv
CVE-2026-23153MEDIUMCVSS 4.7≥ 6.18, < 6.18.9v6.192026-02-14
CVE-2026-23153 [MEDIUM] CWE-362 CVE-2026-23153: In the Linux kernel, the following vulnerability has been resolved: firewire: core: fix race condit In the Linux kernel, the following vulnerability has been resolved: firewire: core: fix race condition against transaction list The list of transaction is enumerated without acquiring card lock when processing AR response event. This causes a race condition bug when processing AT request completion event concurrently. This commit fixes the bug by
nvdosv
CVE-2026-23196MEDIUMCVSS 5.5≥ 6.14, < 6.18.10v6.192026-02-14
CVE-2026-23196 [MEDIUM] CWE-476 CVE-2026-23196: In the Linux kernel, the following vulnerability has been resolved: HID: Intel-thc-hid: Intel-thc: In the Linux kernel, the following vulnerability has been resolved: HID: Intel-thc-hid: Intel-thc: Add safety check for reading DMA buffer Add DMA buffer readiness check before reading DMA buffer to avoid unexpected NULL pointer accessing.
nvdosv
CVE-2026-23183UNKNOWN≥ 6.14.0, < 6.18.102026-02-14
CVE-2026-23183 cgroup/dmem: fix NULL pointer dereference when setting max cgroup/dmem: fix NULL pointer dereference when setting max In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: fix NULL pointer dereference when setting max An issue was triggered: BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] SMP NOPTI CPU: 15 UID: 0 PID
osv
CVE-2026-23174UNKNOWN≥ 0, < 6.18.10-12026-02-14
CVE-2026-23174 CVE-2026-23174: In the Linux kernel, the following vulnerability has been resolved: nvme-pci: handle changing device dma map requirements The initial state of dma_nee In the Linux kernel, the following vulnerability has been resolved: nvme-pci: handle changing device dma map requirements The initial state of dma_needs_unmap may be false, but change to true while mapping the data iterator. Enabling swiotlb is one such case that can change the result. The nvme driver needs to save t
osv
CVE-2025-71224UNKNOWN≥ 0, < 5.10.251-1≥ 0, < 6.1.164-1+2 more2026-02-14
CVE-2025-71224 CVE-2025-71224: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: ocb: skip rx_no_sta when interface is not joined ieee80211_ocb_rx_ In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: ocb: skip rx_no_sta when interface is not joined ieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only present after JOIN_OCB. RX may run before JOIN_OCB is executed, in which case the OCB interface is not operation
osv
CVE-2026-23179UNKNOWN≥ 0, < 6.12.73-1≥ 0, < 6.18.10-12026-02-14
CVE-2026-23179 CVE-2026-23179: In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() When the socket is closed w In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() When the socket is closed while in TCP_LISTEN a callback is run to flush all outstanding packets, which in turns calls nvmet_tcp_listen_data_ready() with the sk_callback_lock held. So we need to
osv
CVE-2026-23177UNKNOWN≥ 6.12.0, < 6.12.70≥ 6.13.0, < 6.18.102026-02-14
CVE-2026-23177 mm, shmem: prevent infinite loop on truncate race mm, shmem: prevent infinite loop on truncate race In the Linux kernel, the following vulnerability has been resolved: mm, shmem: prevent infinite loop on truncate race When truncating a large swap entry, shmem_free_swap() returns 0 when the entry's index doesn't match the given index due to lookup alignment. The failure fallback path checks if the entry crosses the end border and aborts when it happens, so truncate won't erase a
osv
CVE-2026-23182UNKNOWN≥ 0, < 5.15.200≥ 5.16.0, < 6.1.163+3 more2026-02-14
CVE-2026-23182 spi: tegra: Fix a memory leak in tegra_slink_probe() spi: tegra: Fix a memory leak in tegra_slink_probe() In the Linux kernel, the following vulnerability has been resolved: spi: tegra: Fix a memory leak in tegra_slink_probe() In tegra_slink_probe(), when platform_get_irq() fails, it directly returns from the function with an error code, which causes a memory leak. Replace it with a goto label to ensure proper cleanup.
osv
CVE-2026-23181UNKNOWN≥ 6.15.0, < 6.18.102026-02-14
CVE-2026-23181 btrfs: sync read disk super and set block size btrfs: sync read disk super and set block size In the Linux kernel, the following vulnerability has been resolved: btrfs: sync read disk super and set block size When the user performs a btrfs mount, the block device is not set correctly. The user sets the block size of the block device to 0x4000 by executing the BLKBSZSET command. Since the block size change also changes the mapping->flags value, this further affects the result of
osv
CVE-2026-23176UNKNOWN≥ 0, < 5.10.251-1≥ 0, < 6.1.164-1+2 more2026-02-14
CVE-2026-23176 CVE-2026-23176: In the Linux kernel, the following vulnerability has been resolved: platform/x86: toshiba_haps: Fix memory leaks in add/remove routines toshiba_haps_a In the Linux kernel, the following vulnerability has been resolved: platform/x86: toshiba_haps: Fix memory leaks in add/remove routines toshiba_haps_add() leaks the haps object allocated by it if it returns an error after allocating that object successfully. toshiba_haps_remove() does not free the object pointed to b
osv
CVE-2026-23112CRITICALCVSS 9.8≥ 5.0, < 5.10.250≥ 5.11, < 5.15.200+5 more2026-02-13
CVE-2026-23112 [CRITICAL] CWE-787 CVE-2026-23112: In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds checks in In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec nvmet_tcp_build_pdu_iovec() could walk past cmd->req.sg when a PDU length or offset exceeds sg_cnt and then use bogus sg->length/offset values, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining entries, and sg
nvdosv
CVE-2026-23111HIGHCVSS 7.8≥ 4.19.316, < 4.20≥ 5.4.262, < 5.5+9 more2026-02-13
CVE-2026-23111 [HIGH] CWE-416 CVE-2026-23111: In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix inver In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() nft_map_catchall_activate() has an inverted element activity check compared to its non-catchall counterpart nft_mapelem_activate() and compared to what is logically required. nft_map_catchall_activate()
nvdosv
CVE-2026-23089HIGHCVSS 7.8≥ 2.6.13, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-04
CVE-2026-23089 [HIGH] CWE-416 CVE-2026-23089: In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix use-after- In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() When snd_usb_create_mixer() fails, snd_usb_mixer_free() frees mixer->id_elems but the controls already added to the card still reference the freed memory. Later when snd_card_register() runs, the OSS mixer layer calls their
nvdosv
CVE-2026-23078HIGHCVSS 7.8≥ 5.14, < 5.15.199≥ 5.16, < 6.1.162+4 more2026-02-04
CVE-2026-23078 [HIGH] CWE-787 CVE-2026-23078: In the Linux kernel, the following vulnerability has been resolved: ALSA: scarlett2: Fix buffer ove In the Linux kernel, the following vulnerability has been resolved: ALSA: scarlett2: Fix buffer overflow in config retrieval The scarlett2_usb_get_config() function has a logic error in the endianness conversion code that can cause buffer overflows when count > 1. The code checks `if (size == 2)` where `size` is the total buffer size in bytes, then
nvdosv
CVE-2026-23076HIGHCVSS 7.1≥ 2.6.31, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-04
CVE-2026-23076 [HIGH] CWE-125 CVE-2026-23076: In the Linux kernel, the following vulnerability has been resolved: ALSA: ctxfi: Fix potential OOB In the Linux kernel, the following vulnerability has been resolved: ALSA: ctxfi: Fix potential OOB access in audio mixer handling In the audio mixer handling code of ctxfi driver, the conf field is used as a kind of loop index, and it's referred in the index callbacks (amixer_index() and sum_index()). As spotted recently by fuzzers, the current code
nvdosv
CVE-2026-23098HIGHCVSS 7.8≥ 2.6.12.1, < 5.10.249≥ 5.11, < 5.15.199+6 more2026-02-04
CVE-2026-23098 [HIGH] CWE-415 CVE-2026-23098: In the Linux kernel, the following vulnerability has been resolved: netrom: fix double-free in nr_r In the Linux kernel, the following vulnerability has been resolved: netrom: fix double-free in nr_route_frame() In nr_route_frame(), old_skb is immediately freed without checking if nr_neigh->ax25 pointer is NULL. Therefore, if nr_neigh->ax25 is NULL, the caller function will free old_skb again, causing a double-free bug. Therefore, to prevent this
nvdosv
CVE-2026-23092HIGHCVSS 7.8≥ 6.16, < 6.18.8v6.192026-02-04
CVE-2026-23092 [HIGH] CWE-787 CVE-2026-23092: In the Linux kernel, the following vulnerability has been resolved: iio: dac: ad3552r-hs: fix out-o In the Linux kernel, the following vulnerability has been resolved: iio: dac: ad3552r-hs: fix out-of-bound write in ad3552r_hs_write_data_source When simple_write_to_buffer() succeeds, it returns the number of bytes actually copied to the buffer. The code incorrectly uses 'count' as the index for null termination instead of the actual bytes copied.
nvdosv
CVE-2026-23083HIGHCVSS 7.8≥ 3.18, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-04
CVE-2026-23083 [HIGH] CVE-2026-23083: In the Linux kernel, the following vulnerability has been resolved: fou: Don't allow 0 for FOU_ATTR In the Linux kernel, the following vulnerability has been resolved: fou: Don't allow 0 for FOU_ATTR_IPPROTO. fou_udp_recv() has the same problem mentioned in the previous patch. If FOU_ATTR_IPPROTO is set to 0, skb is not freed by fou_udp_recv() nor "resubmit"-ted in ip_protocol_deliver_rcu(). Let's forbid 0 for FOU_ATTR_IPPROTO.
nvdosv