Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 26 of 724
CVE-2026-23018MEDIUMCVSS 5.5≥ 6.16.9, < 6.17≥ 6.17.1, < 6.18.6+2 more2026-01-31
CVE-2026-23018 [MEDIUM] CVE-2026-23018: In the Linux kernel, the following vulnerability has been resolved:
btrfs: release path before init
In the Linux kernel, the following vulnerability has been resolved:
btrfs: release path before initializing extent tree in btrfs_read_locked_inode()
In btrfs_read_locked_inode() we are calling btrfs_init_file_extent_tree()
while holding a path with a read locked leaf from a subvolume tree, and
btrfs_init_file_extent_tree() may do a GFP_KERNEL allocation,
nvdosv
CVE-2026-23017MEDIUMCVSS 5.5≥ 6.7.1, < 6.18.6v6.7+1 more2026-01-31
CVE-2026-23017 [MEDIUM] CWE-476 CVE-2026-23017: In the Linux kernel, the following vulnerability has been resolved:
idpf: fix error handling in the
In the Linux kernel, the following vulnerability has been resolved:
idpf: fix error handling in the init_task on load
If the init_task fails during a driver load, we end up without vports and
netdevs, effectively failing the entire process. In that state a
subsequent reset will result in a crash as the service task attempts to
access uninitialized
nvdosv
CVE-2026-23016MEDIUMCVSS 5.5≥ 6.18.1, < 6.18.6v6.18+1 more2026-01-31
CVE-2026-23016 [MEDIUM] CVE-2026-23016: In the Linux kernel, the following vulnerability has been resolved:
inet: frags: drop fraglist conn
In the Linux kernel, the following vulnerability has been resolved:
inet: frags: drop fraglist conntrack references
Jakub added a warning in nf_conntrack_cleanup_net_list() to make debugging
leaked skbs/conntrack references more obvious.
syzbot reports this as triggering, and I can also reproduce this via
ip_defrag.sh selftest:
conntrack cleanup blocked
nvdosv
CVE-2026-23019MEDIUMCVSS 5.5≥ 5.10.1, < 5.15.198≥ 5.16, < 6.1.161+5 more2026-01-31
CVE-2026-23019 [MEDIUM] CWE-476 CVE-2026-23019: In the Linux kernel, the following vulnerability has been resolved:
net: marvell: prestera: fix NUL
In the Linux kernel, the following vulnerability has been resolved:
net: marvell: prestera: fix NULL dereference on devlink_alloc() failure
devlink_alloc() may return NULL on allocation failure, but
prestera_devlink_alloc() unconditionally calls devlink_priv() on
the returned pointer.
This leads to a NULL pointer dereference if devlink allocation
nvdosv
CVE-2025-71183MEDIUMCVSS 5.5≥ 3.18.32, < 3.19≥ 4.1.23, < 4.2+8 more2026-01-31
CVE-2025-71183 [MEDIUM] CVE-2025-71183: In the Linux kernel, the following vulnerability has been resolved:
btrfs: always detect conflictin
In the Linux kernel, the following vulnerability has been resolved:
btrfs: always detect conflicting inodes when logging inode refs
After rename exchanging (either with the rename exchange operation or
regular renames in multiple non-atomic steps) two inodes and at least
one of them is a directory, we can end up with a log tree that contains
only of the i
nvdosv
CVE-2025-71181MEDIUMCVSS 5.5≥ 6.18.1, < 6.18.6v6.18+1 more2026-01-31
CVE-2025-71181 [MEDIUM] CWE-667 CVE-2025-71181: In the Linux kernel, the following vulnerability has been resolved:
rust_binder: remove spin_lock()
In the Linux kernel, the following vulnerability has been resolved:
rust_binder: remove spin_lock() in rust_shrink_free_page()
When forward-porting Rust Binder to 6.18, I neglected to take commit
fb56fdf8b9a2 ("mm/list_lru: split the lock to per-cgroup scope") into
account, and apparently I did not end up running the shrinker callback
when I sanit
nvdosv
CVE-2025-71187MEDIUMCVSS 5.5≥ 6.16.1, < 6.18.7v6.16+1 more2026-01-31
CVE-2025-71187 [MEDIUM] CWE-401 CVE-2025-71187: In the Linux kernel, the following vulnerability has been resolved:
dmaengine: sh: rz-dmac: fix dev
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: sh: rz-dmac: fix device leak on probe failure
Make sure to drop the reference taken when looking up the ICU device
during probe also on probe failures (e.g. probe deferral).
nvdosv
CVE-2025-71184MEDIUMCVSS 5.5≥ 2.6.39.1, < 6.6.130≥ 6.7, < 6.12.66+3 more2026-01-31
CVE-2025-71184 [MEDIUM] CWE-476 CVE-2025-71184: In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix NULL dereference on
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix NULL dereference on root when tracing inode eviction
When evicting an inode the first thing we do is to setup tracing for it,
which implies fetching the root's id. But in btrfs_evict_inode() the
root might be NULL, as implied in the next check that we do in
btrfs_evict_i
nvdosv
CVE-2026-23026MEDIUMCVSS 5.5≥ 5.11.1, < 5.15.199≥ 5.16, < 6.1.162+5 more2026-01-31
CVE-2026-23026 [MEDIUM] CWE-401 CVE-2026-23026: In the Linux kernel, the following vulnerability has been resolved:
dmaengine: qcom: gpi: Fix memor
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config()
Fix a memory leak in gpi_peripheral_config() where the original memory
pointed to by gchan->config could be lost if krealloc() fails.
The issue occurs when:
1. gchan->config points to previously allocated memory
2.
nvdosv
CVE-2025-71191MEDIUMCVSS 5.5≥ 3.10.1, < 5.10.249≥ 5.11, < 5.15.199+6 more2026-01-31
CVE-2025-71191 [MEDIUM] CVE-2025-71191: In the Linux kernel, the following vulnerability has been resolved:
dmaengine: at_hdmac: fix device
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: at_hdmac: fix device leak on of_dma_xlate()
Make sure to drop the reference taken when looking up the DMA platform
device during of_dma_xlate() when releasing channel resources.
Note that commit 3832b78b3ec2 ("dmaengine: at_hdmac: add missing
put_device() call in at_dma_xlate(
nvdosv
CVE-2026-23015MEDIUMCVSS 5.5≥ 6.13.1, < 6.18.6v6.13+1 more2026-01-31
CVE-2026-23015 [MEDIUM] CVE-2026-23015: In the Linux kernel, the following vulnerability has been resolved:
gpio: mpsse: fix reference leak
In the Linux kernel, the following vulnerability has been resolved:
gpio: mpsse: fix reference leak in gpio_mpsse_probe() error paths
The reference obtained by calling usb_get_dev() is not released in the
gpio_mpsse_probe() error paths. Fix that by using device managed helper
functions. Also remove the usb_put_dev() call in the disconnect function
since n
nvdosv
CVE-2026-23021MEDIUMCVSS 5.5≥ 3.10.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-31
CVE-2026-23021 [MEDIUM] CWE-401 CVE-2026-23021: In the Linux kernel, the following vulnerability has been resolved:
net: usb: pegasus: fix memory l
In the Linux kernel, the following vulnerability has been resolved:
net: usb: pegasus: fix memory leak in update_eth_regs_async()
When asynchronously writing to the device registers and if usb_submit_urb()
fail, the code fail to release allocated to this point resources.
nvdosv
CVE-2025-71189MEDIUMCVSS 5.5≥ 5.19.1, < 6.1.162≥ 6.2, < 6.6.122+4 more2026-01-31
CVE-2025-71189 [MEDIUM] CWE-401 CVE-2025-71189: In the Linux kernel, the following vulnerability has been resolved:
dmaengine: dw: dmamux: fix OF n
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: dw: dmamux: fix OF node leak on route allocation failure
Make sure to drop the reference taken to the DMA master OF node also on
late route allocation failures.
nvdosv
CVE-2025-71190MEDIUMCVSS 5.5≥ 4.13.1, < 5.10.249≥ 5.11, < 5.15.199+6 more2026-01-31
CVE-2025-71190 [MEDIUM] CVE-2025-71190: In the Linux kernel, the following vulnerability has been resolved:
dmaengine: bcm-sba-raid: fix de
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: bcm-sba-raid: fix device leak on probe
Make sure to drop the reference taken when looking up the mailbox device
during probe on probe failures and on driver unbind.
nvdosv
CVE-2026-23024MEDIUMCVSS 5.5≥ 6.17.1, < 6.18.6v6.17+1 more2026-01-31
CVE-2026-23024 [MEDIUM] CWE-401 CVE-2026-23024: In the Linux kernel, the following vulnerability has been resolved:
idpf: fix memory leak of flow s
In the Linux kernel, the following vulnerability has been resolved:
idpf: fix memory leak of flow steer list on rmmod
The flow steering list maintains entries that are added and removed as
ethtool creates and deletes flow steering rules. Module removal with active
entries causes memory leak as the list is not properly cleaned up.
Prevent this by
nvdosv
CVE-2025-71182MEDIUMCVSS 5.5≥ 5.4.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-31
CVE-2025-71182 [MEDIUM] CVE-2025-71182: In the Linux kernel, the following vulnerability has been resolved:
can: j1939: make j1939_session_
In the Linux kernel, the following vulnerability has been resolved:
can: j1939: make j1939_session_activate() fail if device is no longer registered
syzbot is still reporting
unregister_netdevice: waiting for vcan0 to become free. Usage count = 2
even after commit 93a27b5891b8 ("can: j1939: add missing calls in
NETDEV_UNREGISTER notification handler") w
nvdosv
CVE-2026-23020MEDIUMCVSS 5.5≥ 4.16.12, < 4.17≥ 4.17.1, < 5.10.248+7 more2026-01-31
CVE-2026-23020 [MEDIUM] CWE-476 CVE-2026-23020: In the Linux kernel, the following vulnerability has been resolved:
net: 3com: 3c59x: fix possible
In the Linux kernel, the following vulnerability has been resolved:
net: 3com: 3c59x: fix possible null dereference in vortex_probe1()
pdev can be null and free_ring: can be called in 1297 with a null
pdev.
nvdosv
CVE-2026-23028UNKNOWN≥ 6.13.0, < 6.18.72026-01-31
CVE-2026-23028 LoongArch: KVM: Fix kvm_device leak in kvm_ipi_destroy()
LoongArch: KVM: Fix kvm_device leak in kvm_ipi_destroy()
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: KVM: Fix kvm_device leak in kvm_ipi_destroy()
In kvm_ioctl_create_device(), kvm_device has allocated memory,
kvm_device->destroy() seems to be supposed to free its kvm_device
struct, but kvm_ipi_destroy() is not currently doing this, that
would lead to a memory leak.
So, fix it.
osv
CVE-2026-23034UNKNOWN≥ 0, < 6.18.8-12026-01-31
CVE-2026-23034 CVE-2026-23034: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/userq: Fix fence reference leak on queue teardown v2 The user mode queu
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/userq: Fix fence reference leak on queue teardown v2 The user mode queue keeps a pointer to the most recent fence in userq->last_fence. This pointer holds an extra dma_fence reference. When the queue is destroyed, we free the fence driver
osv
CVE-2026-23031UNKNOWN≥ 3.16.0, < 6.1.162≥ 6.2.0, < 6.6.122+2 more2026-01-31
CVE-2026-23031 can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak
can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak
In the Linux kernel, the following vulnerability has been resolved:
can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak
In gs_can_open(), the URBs for USB-in transfers are allocated, added to the
parent->rx_submitted anchor and submitted. In the complete callback
gs_usb_receive_bulk_callback(), the URB is processed and resubmitted. In
gs
osv