Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 24 of 724
CVE-2026-23067MEDIUMCVSS 5.5≥ 6.16, < 6.18.8v6.192026-02-04
CVE-2026-23067 [MEDIUM] CWE-617 CVE-2026-23067: In the Linux kernel, the following vulnerability has been resolved: iommu/io-pgtable-arm: fix size_ In the Linux kernel, the following vulnerability has been resolved: iommu/io-pgtable-arm: fix size_t signedness bug in unmap path __arm_lpae_unmap() returns size_t but was returning -ENOENT (negative error code) when encountering an unmapped PTE. Since size_t is unsigned, -ENOENT (typically -2) becomes a huge positive value (0xFFFFFFFFFFFFFFFE on
nvdosv
CVE-2026-23095MEDIUMCVSS 5.5≥ 3.18, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-04
CVE-2026-23095 [MEDIUM] CWE-401 CVE-2026-23095: In the Linux kernel, the following vulnerability has been resolved: gue: Fix skb memleak with inner In the Linux kernel, the following vulnerability has been resolved: gue: Fix skb memleak with inner IP protocol 0. syzbot reported skb memleak below. [0] The repro generated a GUE packet with its inner protocol 0. gue_udp_recv() returns -guehdr->proto_ctype for "resubmit" in ip_protocol_deliver_rcu(), but this only works with non-zero protocol n
nvdosv
CVE-2026-23106MEDIUMCVSS 5.5≥ 6.17, < 6.18.8v6.192026-02-04
CVE-2026-23106 [MEDIUM] CVE-2026-23106: In the Linux kernel, the following vulnerability has been resolved: timekeeping: Adjust the leap st In the Linux kernel, the following vulnerability has been resolved: timekeeping: Adjust the leap state for the correct auxiliary timekeeper When __do_ajdtimex() was introduced to handle adjtimex for any timekeeper, this reference to tk_core was not updated. When called on an auxiliary timekeeper, the core timekeeper would be updated incorrectly. This get
nvdosv
CVE-2026-23062MEDIUMCVSS 5.5≥ 6.6, < 6.6.122≥ 6.7, < 6.12.68+2 more2026-02-04
CVE-2026-23062 [MEDIUM] CWE-476 CVE-2026-23062: In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix k In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix kernel panic in GET_INSTANCE_ID macro The GET_INSTANCE_ID macro that caused a kernel panic when accessing sysfs attributes: 1. Off-by-one error: The loop condition used 'name without checking if attr_name_kobj was NULL, causing a null pointer derefer
nvdosv
CVE-2026-23090MEDIUMCVSS 5.5≥ 4.16, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-04
CVE-2026-23090 [MEDIUM] CVE-2026-23090: In the Linux kernel, the following vulnerability has been resolved: slimbus: core: fix device refer In the Linux kernel, the following vulnerability has been resolved: slimbus: core: fix device reference leak on report present Slimbus devices can be allocated dynamically upon reception of report-present messages. Make sure to drop the reference taken when looking up already registered devices. Note that this requires taking an extra reference in case
nvdosv
CVE-2026-23051UNKNOWN≥ 0, < 6.18.8-12026-02-04
CVE-2026-23051 CVE-2026-23051: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix drm panic null pointer when driver not support atomic When driver In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix drm panic null pointer when driver not support atomic When driver not support atomic, fb using plane->fb rather than plane->state->fb. (cherry picked from commit 2f2a72de673513247cd6fae14e53f6c40c5841ef)
osv
CVE-2026-23057UNKNOWN≥ 6.7.0, < 6.12.68≥ 6.13.0, < 6.18.82026-02-04
CVE-2026-23057 vsock/virtio: Coalesce only linear skb vsock/virtio: Coalesce only linear skb In the Linux kernel, the following vulnerability has been resolved: vsock/virtio: Coalesce only linear skb vsock/virtio common tries to coalesce buffers in rx queue: if a linear skb (with a spare tail room) is followed by a small skb (length limited by GOOD_COPY_LEN = 128), an attempt is made to join them. Since the introduction of MSG_ZEROCOPY support, assumption that a small skb will always be line
osv
CVE-2025-71192UNKNOWN≥ 0, < 6.1.162-1≥ 0, < 6.12.69-1+1 more2026-02-04
CVE-2025-71192 CVE-2025-71192: In the Linux kernel, the following vulnerability has been resolved: ALSA: ac97: fix a double free in snd_ac97_controller_register() If ac97_add_adapte In the Linux kernel, the following vulnerability has been resolved: ALSA: ac97: fix a double free in snd_ac97_controller_register() If ac97_add_adapter() fails, put_device() is the correct way to drop the device reference. kfree() is not required. Add kfree() if idr_alloc() fails and in ac97_adapter_release() to do t
osv
CVE-2026-23056UNKNOWN≥ 5.7.0, < 5.10.249≥ 5.11.0, < 5.15.199+4 more2026-02-04
CVE-2026-23056 uacce: implement mremap in uacce_vm_ops to return -EPERM uacce: implement mremap in uacce_vm_ops to return -EPERM In the Linux kernel, the following vulnerability has been resolved: uacce: implement mremap in uacce_vm_ops to return -EPERM The current uacce_vm_ops does not support the mremap operation of vm_operations_struct. Implement .mremap to return -EPERM to remind users. The reason we need to explicitly disable mremap is that when the driver does not implement .mremap, it
osv
CVE-2026-23047UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-02-04
CVE-2026-23047 CVE-2026-23047: In the Linux kernel, the following vulnerability has been resolved: libceph: make calc_target() set t->paused, not just clear it Currently calc_target In the Linux kernel, the following vulnerability has been resolved: libceph: make calc_target() set t->paused, not just clear it Currently calc_target() clears t->paused if the request shouldn't be paused anymore, but doesn't ever set t->paused even though it's able to determine when the request should be paused. Set
osv
CVE-2026-23053UNKNOWN≥ 0, < 6.12.69-1≥ 0, < 6.18.8-12026-02-04
CVE-2026-23053 CVE-2026-23053: In the Linux kernel, the following vulnerability has been resolved: NFS: Fix a deadlock involving nfs_release_folio() Wang Zhaolong reports a deadlock In the Linux kernel, the following vulnerability has been resolved: NFS: Fix a deadlock involving nfs_release_folio() Wang Zhaolong reports a deadlock involving NFSv4.1 state recovery waiting on kthreadd, which is attempting to reclaim memory by calling nfs_release_folio(). The latter cannot make progress due to stat
osv
CVE-2026-23043UNKNOWN≥ 6.18.0, < 6.18.62026-02-04
CVE-2026-23043 btrfs: fix NULL pointer dereference in do_abort_log_replay() btrfs: fix NULL pointer dereference in do_abort_log_replay() In the Linux kernel, the following vulnerability has been resolved: btrfs: fix NULL pointer dereference in do_abort_log_replay() Coverity reported a NULL pointer dereference issue (CID 1666756) in do_abort_log_replay(). When btrfs_alloc_path() fails in replay_one_buffer(), wc->subvol_path is NULL, but btrfs_abort_log_replay() calls do_abort_log_replay() whic
osv
CVE-2025-71193UNKNOWN≥ 4.17.0, < 6.6.122≥ 6.7.0, < 6.12.67+1 more2026-02-04
CVE-2025-71193 phy: qcom-qusb2: Fix NULL pointer dereference on early suspend phy: qcom-qusb2: Fix NULL pointer dereference on early suspend In the Linux kernel, the following vulnerability has been resolved: phy: qcom-qusb2: Fix NULL pointer dereference on early suspend Enabling runtime PM before attaching the QPHY instance as driver data can lead to a NULL pointer dereference in runtime PM callbacks that expect valid driver data. There is a small window where the suspend callback may run af
osv
CVE-2026-23058UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-02-04
CVE-2026-23058 CVE-2026-23058: In the Linux kernel, the following vulnerability has been resolved: can: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak Fix similar memory In the Linux kernel, the following vulnerability has been resolved: can: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak"). In ems_usb_open(), the URBs for USB-in transfers are allocated, ad
osv
CVE-2026-23050UNKNOWN≥ 0, < 6.12.69-1≥ 0, < 6.18.8-12026-02-04
CVE-2026-23050 CVE-2026-23050: In the Linux kernel, the following vulnerability has been resolved: pNFS: Fix a deadlock when returning a delegation during open() Ben Coddington repo In the Linux kernel, the following vulnerability has been resolved: pNFS: Fix a deadlock when returning a delegation during open() Ben Coddington reports seeing a hang in the following stack trace: 0 [ffffd0b50e1774e0] __schedule at ffffffff9ca05415 1 [ffffd0b50e177548] schedule at ffffffff9ca05717 2 [ffffd0b50e17755
osv
CVE-2026-23040UNKNOWN≥ 0, < 6.18.8-12026-02-04
CVE-2026-23040 CVE-2026-23040: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211_hwsim: fix typo in frequency notification The NAN notification is f In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211_hwsim: fix typo in frequency notification The NAN notification is for 5745 MHz which corresponds to channel 149 and not 5475 which is not actually a valid channel. This could result in a NULL pointer dereference in cfg80211_next_nan_dw
osv
CVE-2026-23059UNKNOWN≥ 6.6.0, < 6.6.122≥ 6.7.0, < 6.12.68+1 more2026-02-04
CVE-2026-23059 scsi: qla2xxx: Sanitize payload size to prevent member overflow scsi: qla2xxx: Sanitize payload size to prevent member overflow In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Sanitize payload size to prevent member overflow In qla27xx_copy_fpin_pkt() and qla27xx_copy_multiple_pkt(), the frame_size reported by firmware is used to calculate the copy length into item->iocb. However, the iocb member is defined as a fixed-size 64-byte array within
osv
CVE-2025-71197UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-02-04
CVE-2025-71197 CVE-2025-71197: In the Linux kernel, the following vulnerability has been resolved: w1: therm: Fix off-by-one buffer overflow in alarms_store The sysfs buffer passed In the Linux kernel, the following vulnerability has been resolved: w1: therm: Fix off-by-one buffer overflow in alarms_store The sysfs buffer passed to alarms_store() is allocated with 'size + 1' bytes and a NUL terminator is appended. However, the 'size' argument does not account for this extra byte. The original co
osv
CVE-2025-71195UNKNOWN≥ 0, < 6.12.69-1≥ 0, < 6.18.8-12026-02-04
CVE-2025-71195 CVE-2025-71195: In the Linux kernel, the following vulnerability has been resolved: dmaengine: xilinx: xdma: Fix regmap max_register The max_register field is assigne In the Linux kernel, the following vulnerability has been resolved: dmaengine: xilinx: xdma: Fix regmap max_register The max_register field is assigned the size of the register memory region instead of the offset of the last register. The result is that reading from the regmap via debugfs can cause a segmentation fau
osv
CVE-2025-71198UNKNOWN≥ 5.5.0, < 6.6.122≥ 6.7.0, < 6.12.68+1 more2026-02-04
CVE-2025-71198 iio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection iio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection In the Linux kernel, the following vulnerability has been resolved: iio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection The st_lsm6dsx_acc_channels array of struct iio_chan_spec has a non-NULL event_spec field, indicating support for IIO events. However, event detection is not supported for all sensors, a
osv