Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 28 of 724
CVE-2026-23000MEDIUMCVSS 5.5≥ 5.12, < 6.12.67≥ 6.13, < 6.18.7+1 more2026-01-25
CVE-2026-23000 [MEDIUM] CWE-476 CVE-2026-23000: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix crash on profile In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix crash on profile change rollback failure mlx5e_netdev_change_profile can fail to attach a new profile and can fail to rollback to old profile, in such case, we could end up with a dangling netdev with a fully reset netdev_priv. A retry to change profile, e.g. anothe
nvdosv
CVE-2026-23007MEDIUMCVSS 5.5≥ 6.11.1, < 6.18.7v6.11+1 more2026-01-25
CVE-2026-23007 [MEDIUM] CWE-908 CVE-2026-23007: In the Linux kernel, the following vulnerability has been resolved: block: zero non-PI portion of a In the Linux kernel, the following vulnerability has been resolved: block: zero non-PI portion of auto integrity buffer The auto-generated integrity buffer for writes needs to be fully initialized before being passed to the underlying block device, otherwise the uninitialized memory can be read back by userspace or anyone with physical access to t
nvdosv
CVE-2026-23005MEDIUMCVSS 5.5≥ 5.17.1, < 6.1.162≥ 6.2, < 6.6.122+4 more2026-01-25
CVE-2026-23005 [MEDIUM] CVE-2026-23005: In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Clear XSTATE_BV[i] in In the Linux kernel, the following vulnerability has been resolved: x86/fpu: Clear XSTATE_BV[i] in guest XSAVE state whenever XFD[i]=1 When loading guest XSAVE state via KVM_SET_XSAVE, and when updating XFD in response to a guest WRMSR, clear XFD-disabled features in the saved (or to be restored) XSTATE_BV to ensure KVM doesn't attempt to load state for fe
nvdosv
CVE-2026-23004MEDIUMCVSS 4.7≥ 3.6.1, < 6.6.130≥ 6.12, < 6.12.78+3 more2026-01-25
CVE-2026-23004 [MEDIUM] CWE-362 CVE-2026-23004: In the Linux kernel, the following vulnerability has been resolved: dst: fix races in rt6_uncached_ In the Linux kernel, the following vulnerability has been resolved: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() syzbot was able to crash the kernel in rt6_uncached_list_flush_dev() in an interesting way [1] Crash happens in list_del_init()/INIT_LIST_HEAD() while writing list->prev, while the prior write on list->next went
nvdosv
CVE-2026-23006MEDIUMCVSS 5.5≥ 6.1.1, < 6.1.162≥ 6.2, < 6.6.122+4 more2026-01-25
CVE-2026-23006 [MEDIUM] CWE-476 CVE-2026-23006: In the Linux kernel, the following vulnerability has been resolved: ASoC: tlv320adcx140: fix null p In the Linux kernel, the following vulnerability has been resolved: ASoC: tlv320adcx140: fix null pointer The "snd_soc_component" in "adcx140_priv" was only used once but never set. It was only used for reaching "dev" which is already present in "adcx140_priv".
nvdosv
CVE-2026-23002MEDIUMCVSS 5.5≥ 6.12.1, < 6.12.67≥ 6.13, < 6.18.7+2 more2026-01-25
CVE-2026-23002 [MEDIUM] CWE-476 CVE-2026-23002: In the Linux kernel, the following vulnerability has been resolved: lib/buildid: use __kernel_read( In the Linux kernel, the following vulnerability has been resolved: lib/buildid: use __kernel_read() for sleepable context Prevent a "BUG: unable to handle kernel NULL pointer dereference in filemap_read_folio". For the sleepable context, convert freader to use __kernel_read() instead of direct page cache access via read_cache_folio(). This simpl
nvdosv
CVE-2026-23003MEDIUMCVSS 5.5≥ 5.10.210, < 5.10.249≥ 5.15.149, < 5.15.199+7 more2026-01-25
CVE-2026-23003 [MEDIUM] CWE-908 CVE-2026-23003: In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: use skb_vlan_inet_p In the Linux kernel, the following vulnerability has been resolved: ip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv() Blamed commit did not take care of VLAN encapsulations as spotted by syzbot [1]. Use skb_vlan_inet_prepare() instead of pskb_inet_may_pull(). [1] BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:
nvdosv
CVE-2025-71163MEDIUMCVSS 5.5≥ 5.15, < 5.15.199≥ 5.16, < 6.1.162+4 more2026-01-25
CVE-2025-71163 [MEDIUM] CWE-401 CVE-2025-71163: In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: fix device lea In the Linux kernel, the following vulnerability has been resolved: dmaengine: idxd: fix device leaks on compat bind and unbind Make sure to drop the reference taken when looking up the idxd device as part of the compat bind and unbind sysfs interface.
nvdosv
CVE-2026-23008MEDIUMCVSS 5.5≥ 6.16.1, < 6.18.7v6.16+1 more2026-01-25
CVE-2026-23008 [MEDIUM] CWE-476 CVE-2026-23008: In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix KMS with 3D on In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix KMS with 3D on HW version 10 HW version 10 does not have GB Surfaces so there is no backing buffer for surface backed FBs. This would result in a nullptr dereference and crash the driver causing a black screen.
nvdosv
CVE-2026-22999MEDIUMCVSS 5.5≥ 3.8, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-01-25
CVE-2026-22999 [MEDIUM] CVE-2026-22999: In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: do not free In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: do not free existing class in qfq_change_class() Fixes qfq_change_class() error case. cl->qdisc and cl should only be freed if a new class and qdisc were allocated, or we risk various UAF.
nvdosv
CVE-2026-22996MEDIUMCVSS 5.5≥ 5.12, < 6.12.67≥ 6.13, < 6.18.7+1 more2026-01-25
CVE-2026-22996 [MEDIUM] CWE-476 CVE-2026-22996: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Don't store mlx5e_pr In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv mlx5e_priv is an unstable structure that can be memset(0) if profile attaching fails, mlx5e_priv in mlx5e_dev devlink private is used to reference the netdev and mdev associated with that struct. Instead, store netdev dir
nvdosv
CVE-2026-22980HIGHCVSS 7.8≥ 3.18, < 5.10.248≥ 5.11, < 5.15.198+5 more2026-01-23
CVE-2026-22980 [HIGH] CWE-416 CVE-2026-22980: In the Linux kernel, the following vulnerability has been resolved: nfsd: provide locking for v4_en In the Linux kernel, the following vulnerability has been resolved: nfsd: provide locking for v4_end_grace Writing to v4_end_grace can race with server shutdown and result in memory being accessed after it was freed - reclaim_str_hashtbl in particularly. We cannot hold nfsd_mutex across the nfsd4_end_grace() call as that is held while client_tracki
nvdosv
CVE-2025-71159HIGHCVSS 7.8≥ 6.18, < 6.18.6v6.192026-01-23
CVE-2025-71159 [HIGH] CWE-416 CVE-2025-71159: In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free warni In the Linux kernel, the following vulnerability has been resolved: btrfs: fix use-after-free warning in btrfs_get_or_create_delayed_node() Previously, btrfs_get_or_create_delayed_node() set the delayed_node's refcount before acquiring the root->delayed_nodes lock. Commit e8513c012de7 ("btrfs: implement ref_tracker for delayed_nodes") moved refcount
nvdosv
CVE-2025-71145HIGHCVSS 7.8≥ 5.10.248, < 5.112026-01-23
CVE-2025-71145 [HIGH] CVE-2025-71145: In the Linux kernel, the following vulnerability has been resolved: usb: phy: isp1301: fix non-OF d In the Linux kernel, the following vulnerability has been resolved: usb: phy: isp1301: fix non-OF device reference imbalance A recent change fixing a device reference leak in a UDC driver introduced a potential use-after-free in the non-OF case as the isp1301_get_client() helper only increases the reference count for the returned I2C device in the OF case.
nvd
CVE-2025-71157HIGHCVSS 7.8≥ 6.11, < 6.12.64≥ 6.13, < 6.18.4+1 more2026-01-23
CVE-2025-71157 [HIGH] CVE-2025-71157: In the Linux kernel, the following vulnerability has been resolved: RDMA/core: always drop device r In the Linux kernel, the following vulnerability has been resolved: RDMA/core: always drop device refcount in ib_del_sub_device_and_put() Since nldev_deldev() (introduced by commit 060c642b2ab8 ("RDMA/nldev: Add support to add/delete a sub IB device through netlink") grabs a reference using ib_device_get_by_index() before calling ib_del_sub_device_and_put()
nvdosv
CVE-2025-71156HIGHCVSS 7.8≥ 6.9, < 6.12.64≥ 6.13, < 6.18.4+1 more2026-01-23
CVE-2025-71156 [HIGH] CVE-2025-71156: In the Linux kernel, the following vulnerability has been resolved: gve: defer interrupt enabling u In the Linux kernel, the following vulnerability has been resolved: gve: defer interrupt enabling until NAPI registration Currently, interrupts are automatically enabled immediately upon request. This allows interrupt to fire before the associated NAPI context is fully initialized and cause failures like below: [ 0.946369] Call Trace: [ 0.946369] [ 0.94636
nvdosv
CVE-2025-71155HIGHCVSS 7.8≥ 6.17.4, < 6.18≥ 6.18, < 6.18.42026-01-23
CVE-2025-71155 [HIGH] CWE-787 CVE-2025-71155: In the Linux kernel, the following vulnerability has been resolved: KVM: s390: Fix gmap_helper_zap_ In the Linux kernel, the following vulnerability has been resolved: KVM: s390: Fix gmap_helper_zap_one_page() again A few checks were missing in gmap_helper_zap_one_page(), which can lead to memory corruption in the guest under specific circumstances. Add the missing checks.
nvdosv
CVE-2026-22995HIGHCVSS 7.8≥ 6.18.4, < 6.18.6v6.192026-01-23
CVE-2026-22995 [HIGH] CWE-416 CVE-2026-22995: In the Linux kernel, the following vulnerability has been resolved: ublk: fix use-after-free in ubl In the Linux kernel, the following vulnerability has been resolved: ublk: fix use-after-free in ublk_partition_scan_work A race condition exists between the async partition scan work and device teardown that can lead to a use-after-free of ub->ub_disk: 1. ublk_ctrl_start_dev() schedules partition_scan_work after add_disk() 2. ublk_stop_dev() calls
nvdosv
CVE-2025-71152HIGHCVSS 7.8≥ 4.8, < 6.18.4v6.192026-01-23
CVE-2025-71152 [HIGH] CVE-2025-71152: In the Linux kernel, the following vulnerability has been resolved: net: dsa: properly keep track o In the Linux kernel, the following vulnerability has been resolved: net: dsa: properly keep track of conduit reference Problem description DSA has a mumbo-jumbo of reference handling of the conduit net device and its kobject which, sadly, is just wrong and doesn't make sense. There are two distinct problems. 1. The OF path, which uses of_find_net_device_
nvdosv
CVE-2026-22984HIGHCVSS 7.1≥ 5.11, < 5.15.198≥ 5.16, < 6.1.161+4 more2026-01-23
CVE-2026-22984 [HIGH] CWE-125 CVE-2026-22984: In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out- In the Linux kernel, the following vulnerability has been resolved: libceph: prevent potential out-of-bounds reads in handle_auth_done() Perform an explicit bounds check on payload_len to avoid a possible out-of-bounds access in the callout. [ idryomov: changelog ]
nvdosv