Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 22 of 724
CVE-2026-23102HIGHCVSS 7.1≥ 5.19, < 6.1.162≥ 6.2, < 6.6.123+2 more2026-02-04
CVE-2026-23102 [HIGH] CWE-125 CVE-2026-23102: In the Linux kernel, the following vulnerability has been resolved:
arm64/fpsimd: signal: Fix resto
In the Linux kernel, the following vulnerability has been resolved:
arm64/fpsimd: signal: Fix restoration of SVE context
When SME is supported, Restoring SVE signal context can go wrong in a
few ways, including placing the task into an invalid state where the
kernel may read from out-of-bounds memory (and may potentially take a
fatal fault) and/or m
nvdosv
CVE-2026-23068HIGHCVSS 7.8≥ 4.17, < 6.1.162≥ 6.2, < 6.6.122+3 more2026-02-04
CVE-2026-23068 [HIGH] CWE-415 CVE-2026-23068: In the Linux kernel, the following vulnerability has been resolved:
spi: spi-sprd-adi: Fix double f
In the Linux kernel, the following vulnerability has been resolved:
spi: spi-sprd-adi: Fix double free in probe error path
The driver currently uses spi_alloc_host() to allocate the controller
but registers it using devm_spi_register_controller().
If devm_register_restart_handler() fails, the code jumps to the
put_ctlr label and calls spi_controlle
nvdosv
CVE-2026-23099HIGHCVSS 7.1≥ 2.6.24, < 5.15.199≥ 5.16, < 6.1.162+4 more2026-02-04
CVE-2026-23099 [HIGH] CWE-125 CVE-2026-23099: In the Linux kernel, the following vulnerability has been resolved:
bonding: limit BOND_MODE_8023AD
In the Linux kernel, the following vulnerability has been resolved:
bonding: limit BOND_MODE_8023AD to Ethernet devices
BOND_MODE_8023AD makes sense for ARPHRD_ETHER only.
syzbot reported:
BUG: KASAN: global-out-of-bounds in __hw_addr_create net/core/dev_addr_lists.c:63 [inline]
BUG: KASAN: global-out-of-bounds in __hw_addr_add_ex+0x25d/0x760 net/
nvdosv
CVE-2026-23074HIGHCVSS 7.8≥ 2.6.12.1, < 5.10.249≥ 5.11, < 5.15.199+6 more2026-02-04
CVE-2026-23074 [HIGH] CWE-416 CVE-2026-23074: In the Linux kernel, the following vulnerability has been resolved:
net/sched: Enforce that teql ca
In the Linux kernel, the following vulnerability has been resolved:
net/sched: Enforce that teql can only be used as root qdisc
Design intent of teql is that it is only supposed to be used as root qdisc.
We need to check for that constraint.
Although not important, I will describe the scenario that unearthed this
issue for the curious.
GangMin Kim
nvdosv
CVE-2026-23077HIGHCVSS 7.8≥ 6.16, < 6.18.8v6.192026-02-04
CVE-2026-23077 [HIGH] CWE-416 CVE-2026-23077: In the Linux kernel, the following vulnerability has been resolved:
mm/vma: fix anon_vma UAF on mre
In the Linux kernel, the following vulnerability has been resolved:
mm/vma: fix anon_vma UAF on mremap() faulted, unfaulted merge
Patch series "mm/vma: fix anon_vma UAF on mremap() faulted, unfaulted
merge", v2.
Commit 879bca0a2c4f ("mm/vma: fix incorrectly disallowed anonymous VMA
merges") introduced the ability to merge previously unavailable VMA
nvdosv
CVE-2026-23073HIGHCVSS 7.8≥ 3.15, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-04
CVE-2026-23073 [HIGH] CWE-787 CVE-2026-23073: In the Linux kernel, the following vulnerability has been resolved:
wifi: rsi: Fix memory corruptio
In the Linux kernel, the following vulnerability has been resolved:
wifi: rsi: Fix memory corruption due to not set vif driver data size
The struct ieee80211_vif contains trailing space for vif driver data,
when struct ieee80211_vif is allocated, the total memory size that is
allocated is sizeof(struct ieee80211_vif) + size of vif driver data.
The s
nvdosv
CVE-2026-23063MEDIUMCVSS 5.5≥ 5.7, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-04
CVE-2026-23063 [MEDIUM] CWE-476 CVE-2026-23063: In the Linux kernel, the following vulnerability has been resolved:
uacce: ensure safe queue releas
In the Linux kernel, the following vulnerability has been resolved:
uacce: ensure safe queue release with state management
Directly calling `put_queue` carries risks since it cannot
guarantee that resources of `uacce_queue` have been fully released
beforehand. So adding a `stop_queue` operation for the
UACCE_CMD_PUT_Q command and leaving the `put_
nvdosv
CVE-2026-23093MEDIUMCVSS 5.5≥ 5.15, < 5.15.199≥ 5.16, < 6.1.162+4 more2026-02-04
CVE-2026-23093 [MEDIUM] CVE-2026-23093: In the Linux kernel, the following vulnerability has been resolved:
ksmbd: smbd: fix dma_unmap_sg()
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: smbd: fix dma_unmap_sg() nents
The dma_unmap_sg() functions should be called with the same nents as the
dma_map_sg(), not the value the map function returned.
nvdosv
CVE-2026-23070MEDIUMCVSS 5.5≥ 6.9, < 6.18.8v6.192026-02-04
CVE-2026-23070 [MEDIUM] CVE-2026-23070: In the Linux kernel, the following vulnerability has been resolved:
Octeontx2-af: Add proper checks
In the Linux kernel, the following vulnerability has been resolved:
Octeontx2-af: Add proper checks for fwdata
firmware populates MAC address, link modes (supported, advertised)
and EEPROM data in shared firmware structure which kernel access
via MAC block(CGX/RPM).
Accessing fwdata, on boards booted with out MAC block leading to
kernel panics.
Internal
nvdosv
CVE-2026-23079MEDIUMCVSS 5.5≥ 6.17.10, < 6.18≥ 6.18.1, < 6.18.8+2 more2026-02-04
CVE-2026-23079 [MEDIUM] CWE-401 CVE-2026-23079: In the Linux kernel, the following vulnerability has been resolved:
gpio: cdev: Fix resource leaks
In the Linux kernel, the following vulnerability has been resolved:
gpio: cdev: Fix resource leaks on errors in lineinfo_changed_notify()
On error handling paths, lineinfo_changed_notify() doesn't free the
allocated resources which results leaks. Fix it.
nvdosv
CVE-2026-23075MEDIUMCVSS 5.5≥ 2.6.36, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-04
CVE-2026-23075 [MEDIUM] CWE-401 CVE-2026-23075: In the Linux kernel, the following vulnerability has been resolved:
can: esd_usb: esd_usb_read_bulk
In the Linux kernel, the following vulnerability has been resolved:
can: esd_usb: esd_usb_read_bulk_callback(): fix URB memory leak
Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb:
gs_usb_receive_bulk_callback(): fix URB memory leak").
In esd_usb_open(), the URBs for USB-in transfers are allocated, added to
the dev->rx_submitted a
nvdosv
CVE-2026-23107MEDIUMCVSS 5.5≥ 5.19, < 6.1.162≥ 6.2, < 6.6.122+3 more2026-02-04
CVE-2026-23107 [MEDIUM] CWE-476 CVE-2026-23107: In the Linux kernel, the following vulnerability has been resolved:
arm64/fpsimd: signal: Allocate
In the Linux kernel, the following vulnerability has been resolved:
arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA
The code to restore a ZA context doesn't attempt to allocate the task's
sve_state before setting TIF_SME. Consequently, restoring a ZA context
can place a task into an invalid state where TIF_SME is set but the
task's sv
nvdosv
CVE-2026-23064MEDIUMCVSS 5.5≥ 4.11, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-04
CVE-2026-23064 [MEDIUM] CWE-476 CVE-2026-23064: In the Linux kernel, the following vulnerability has been resolved:
net/sched: act_ife: avoid possi
In the Linux kernel, the following vulnerability has been resolved:
net/sched: act_ife: avoid possible NULL deref
tcf_ife_encode() must make sure ife_encode() does not return NULL.
syzbot reported:
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x00
nvdosv
CVE-2026-23097MEDIUMCVSS 5.5≥ 5.9.9, < 5.10≥ 5.10.1, < 5.10.249+7 more2026-02-04
CVE-2026-23097 [MEDIUM] CVE-2026-23097: In the Linux kernel, the following vulnerability has been resolved:
migrate: correct lock ordering
In the Linux kernel, the following vulnerability has been resolved:
migrate: correct lock ordering for hugetlb file folios
Syzbot has found a deadlock (analyzed by Lance Yang):
1) Task (5749): Holds folio_lock, then tries to acquire i_mmap_rwsem(read lock).
2) Task (5754): Holds i_mmap_rwsem(write lock), then tries to acquire
folio_lock.
migrate_pages()
nvdosv
CVE-2026-23060MEDIUMCVSS 5.5≥ 4.3, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-04
CVE-2026-23060 [MEDIUM] CWE-476 CVE-2026-23060: In the Linux kernel, the following vulnerability has been resolved:
crypto: authencesn - reject too
In the Linux kernel, the following vulnerability has been resolved:
crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec
authencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than
the minimum expected length, crypto_authenc_esn_decrypt() can advance past
the end of the destination scatterlist and trigger a N
nvdosv
CVE-2026-23096MEDIUMCVSS 5.5≥ 5.7, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-04
CVE-2026-23096 [MEDIUM] CVE-2026-23096: In the Linux kernel, the following vulnerability has been resolved:
uacce: fix cdev handling in the
In the Linux kernel, the following vulnerability has been resolved:
uacce: fix cdev handling in the cleanup path
When cdev_device_add fails, it internally releases the cdev memory,
and if cdev_device_del is then executed, it will cause a hang error.
To fix it, we check the return value of cdev_device_add() and clear
uacce->cdev to avoid calling cdev_devic
nvdosv
CVE-2026-23094MEDIUMCVSS 5.5≥ 6.3, < 6.6.122≥ 6.7, < 6.12.68+2 more2026-02-04
CVE-2026-23094 [MEDIUM] CVE-2026-23094: In the Linux kernel, the following vulnerability has been resolved:
uacce: fix isolate sysfs check
In the Linux kernel, the following vulnerability has been resolved:
uacce: fix isolate sysfs check condition
uacce supports the device isolation feature. If the driver
implements the isolate_err_threshold_read and
isolate_err_threshold_write callback functions, uacce will create
sysfs files now. Users can read and configure the isolation policy
through sys
nvdosv
CVE-2026-23104MEDIUMCVSS 5.5≥ 6.8, < 6.18.8v6.192026-02-04
CVE-2026-23104 [MEDIUM] CVE-2026-23104: In the Linux kernel, the following vulnerability has been resolved:
ice: fix devlink reload call tr
In the Linux kernel, the following vulnerability has been resolved:
ice: fix devlink reload call trace
Commit 4da71a77fc3b ("ice: read internal temperature sensor") introduced
internal temperature sensor reading via HWMON. ice_hwmon_init() was added
to ice_init_feature() and ice_hwmon_exit() was added to ice_remove(). As a
result if devlink reload is used
nvdosv
CVE-2026-23081MEDIUMCVSS 5.5≥ 6.13, < 6.18.8v6.192026-02-04
CVE-2026-23081 [MEDIUM] CVE-2026-23081: In the Linux kernel, the following vulnerability has been resolved:
net: phy: intel-xway: fix OF no
In the Linux kernel, the following vulnerability has been resolved:
net: phy: intel-xway: fix OF node refcount leakage
Automated review spotted am OF node reference count leakage when
checking if the 'leds' child node exists.
Call of_put_node() to correctly maintain the refcount.
nvdosv
CVE-2026-23109MEDIUMCVSS 5.5≥ 6.16, < 6.18.8v6.192026-02-04
CVE-2026-23109 [MEDIUM] CWE-835 CVE-2026-23109: In the Linux kernel, the following vulnerability has been resolved:
fs/writeback: skip AS_NO_DATA_I
In the Linux kernel, the following vulnerability has been resolved:
fs/writeback: skip AS_NO_DATA_INTEGRITY mappings in wait_sb_inodes()
Above the while() loop in wait_sb_inodes(), we document that we must wait
for all pages under writeback for data integrity. Consequently, if a
mapping, like fuse, traditionally does not have data integrity semant
nvdosv