Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 29 of 724
CVE-2025-71146MEDIUMCVSS 5.5≥ 6.17.13, < 6.18v6.12.63+2 more2026-01-23
CVE-2025-71146 [MEDIUM] CWE-401 CVE-2025-71146: In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conncount: fix le In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conncount: fix leaked ct in error paths There are some situations where ct might be leaked as error paths are skipping the refcounted check and return immediately. In order to solve it make sure that the check is always called.
nvdosv
CVE-2026-22988MEDIUMCVSS 5.5≥ 6.12.64, < 6.12.66≥ 6.18.4, < 6.18.6+3 more2026-01-23
CVE-2026-22988 [MEDIUM] CVE-2026-22988: In the Linux kernel, the following vulnerability has been resolved: arp: do not assume dev_hard_hea In the Linux kernel, the following vulnerability has been resolved: arp: do not assume dev_hard_header() does not change skb->head arp_create() is the only dev_hard_header() caller making assumption about skb->head being unchanged. A recent commit broke this assumption. Initialize @arp pointer after dev_hard_header() call.
nvdosv
CVE-2026-22987MEDIUMCVSS 5.5≥ 6.17, < 6.18.6v6.192026-01-23
CVE-2026-22987 [MEDIUM] CWE-476 CVE-2026-22987: In the Linux kernel, the following vulnerability has been resolved: net/sched: act_api: avoid deref In the Linux kernel, the following vulnerability has been resolved: net/sched: act_api: avoid dereferencing ERR_PTR in tcf_idrinfo_destroy syzbot reported a crash in tc_act_in_hw() during netns teardown where tcf_idrinfo_destroy() passed an ERR_PTR(-EBUSY) value as a tc_action pointer, leading to an invalid dereference. Guard against ERR_PTR entr
nvdosv
CVE-2026-22979MEDIUMCVSS 5.5≥ 5.15.154, < 5.16≥ 6.1.85, < 6.1.161+6 more2026-01-23
CVE-2026-22979 [MEDIUM] CWE-401 CVE-2026-22979: In the Linux kernel, the following vulnerability has been resolved: net: fix memory leak in skb_seg In the Linux kernel, the following vulnerability has been resolved: net: fix memory leak in skb_segment_list for GRO packets When skb_segment_list() is called during packet forwarding, it handles packets that were aggregated by the GRO engine. Historically, the segmentation logic in skb_segment_list assumes that individual segments are split from
nvdosv
CVE-2026-22986MEDIUMCVSS 4.7≥ 6.9, < 6.18.6v6.192026-01-23
CVE-2026-22986 [MEDIUM] CWE-362 CVE-2026-22986: In the Linux kernel, the following vulnerability has been resolved: gpiolib: fix race condition for In the Linux kernel, the following vulnerability has been resolved: gpiolib: fix race condition for gdev->srcu If two drivers were calling gpiochip_add_data_with_key(), one may be traversing the srcu-protected list in gpio_name_to_desc(), meanwhile other has just added its gdev in gpiodev_add_to_list_unlocked(). This creates a non-mutexed and non-
nvdosv
CVE-2025-71147MEDIUMCVSS 5.5≥ 5.13, < 5.15.198≥ 5.16, < 6.1.160+3 more2026-01-23
CVE-2025-71147 [MEDIUM] CWE-401 CVE-2025-71147: In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: Fix a memory lea In the Linux kernel, the following vulnerability has been resolved: KEYS: trusted: Fix a memory leak in tpm2_load_cmd 'tpm2_load_cmd' allocates a tempoary blob indirectly via 'tpm2_key_decode' but it is not freed in the failure paths. Address this by wrapping the blob into with a cleanup helper.
nvdosv
CVE-2026-22993MEDIUMCVSS 5.5≥ 6.7, < 6.18.6v6.192026-01-23
CVE-2026-22993 [MEDIUM] CWE-476 CVE-2026-22993: In the Linux kernel, the following vulnerability has been resolved: idpf: Fix RSS LUT NULL ptr issu In the Linux kernel, the following vulnerability has been resolved: idpf: Fix RSS LUT NULL ptr issue after soft reset During soft reset, the RSS LUT is freed and not restored unless the interface is up. If an ethtool command that accesses the rss lut is attempted immediately after reset, it will result in NULL ptr dereference. Also, there is no ne
nvdosv
CVE-2026-22981MEDIUMCVSS 5.5≥ 6.7, < 6.18.6v6.192026-01-23
CVE-2026-22981 [MEDIUM] CWE-476 CVE-2026-22981: In the Linux kernel, the following vulnerability has been resolved: idpf: detach and close netdevs In the Linux kernel, the following vulnerability has been resolved: idpf: detach and close netdevs while handling a reset Protect the reset path from callbacks by setting the netdevs to detached state and close any netdevs in UP state until the reset handling has completed. During a reset, the driver will de-allocate resources for the vport, and th
nvdosv
CVE-2026-22989MEDIUMCVSS 5.5≥ 6.9, < 6.12.66≥ 6.13, < 6.18.6+1 more2026-01-23
CVE-2026-22989 [MEDIUM] CVE-2026-22989: In the Linux kernel, the following vulnerability has been resolved: nfsd: check that server is runn In the Linux kernel, the following vulnerability has been resolved: nfsd: check that server is running in unlock_filesystem If we are trying to unlock the filesystem via an administrative interface and nfsd isn't running, it crashes the server. This happens currently because nfsd4_revoke_states() access state structures (eg., conf_id_hashtbl) that has bee
nvdosv
CVE-2026-22983MEDIUMCVSS 5.5≥ 6.18.4, < 6.18.6v6.192026-01-23
CVE-2026-22983 [MEDIUM] CWE-476 CVE-2026-22983: In the Linux kernel, the following vulnerability has been resolved: net: do not write to msg_get_in In the Linux kernel, the following vulnerability has been resolved: net: do not write to msg_get_inq in callee NULL pointer dereference fix. msg_get_inq is an input field from caller to callee. Don't set it in the callee, as the caller may not clear it on struct reuse. This is a kernel-internal variant of msghdr only, and the only user does rein
nvdosv
CVE-2025-71151MEDIUMCVSS 5.5≥ 6.6.64, < 6.6.120≥ 6.11.11, < 6.12+3 more2026-01-23
CVE-2025-71151 [MEDIUM] CWE-401 CVE-2025-71151: In the Linux kernel, the following vulnerability has been resolved: cifs: Fix memory and informatio In the Linux kernel, the following vulnerability has been resolved: cifs: Fix memory and information leak in smb3_reconfigure() In smb3_reconfigure(), if smb3_sync_session_ctx_passwords() fails, the function returns immediately without freeing and erasing the newly allocated new_password and new_password2. This causes both a memory leak and a pote
nvdosv
CVE-2026-22985MEDIUMCVSS 5.5≥ 6.7, < 6.18.6v6.192026-01-23
CVE-2026-22985 [MEDIUM] CWE-476 CVE-2026-22985: In the Linux kernel, the following vulnerability has been resolved: idpf: Fix RSS LUT NULL pointer In the Linux kernel, the following vulnerability has been resolved: idpf: Fix RSS LUT NULL pointer crash on early ethtool operations The RSS LUT is not initialized until the interface comes up, causing the following NULL pointer crash when ethtool operations like rxhash on/off are performed before the interface is brought up for the first time. Mo
nvdosv
CVE-2025-71161MEDIUMCVSS 5.5≥ 4.5, < 6.18.62026-01-23
CVE-2025-71161 [MEDIUM] CWE-193 CVE-2025-71161: In the Linux kernel, the following vulnerability has been resolved: dm-verity: disable recursive fo In the Linux kernel, the following vulnerability has been resolved: dm-verity: disable recursive forward error correction There are two problems with the recursive correction: 1. It may cause denial-of-service. In fec_read_bufs, there is a loop that has 253 iterations. For each iteration, we may call verity_hash_for_block recursively. There is a
nvdosv
CVE-2026-22982MEDIUMCVSS 5.5≥ 5.12, < 5.15.198≥ 5.16, < 6.1.161+4 more2026-01-23
CVE-2026-22982 [MEDIUM] CWE-476 CVE-2026-22982: In the Linux kernel, the following vulnerability has been resolved: net: mscc: ocelot: Fix crash wh In the Linux kernel, the following vulnerability has been resolved: net: mscc: ocelot: Fix crash when adding interface under a lag Commit 15faa1f67ab4 ("lan966x: Fix crash when adding interface under a lag") fixed a similar issue in the lan966x driver caused by a NULL pointer dereference. The ocelot_set_aggr_pgids() function in the ocelot driver h
nvdosv
CVE-2025-71153MEDIUMCVSS 5.5≥ 6.6.24, < 6.6.120≥ 6.7.12, < 6.8+3 more2026-01-23
CVE-2025-71153 [MEDIUM] CWE-401 CVE-2025-71153: In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix memory leak in get_f In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix memory leak in get_file_all_info() In get_file_all_info(), if vfs_getattr() fails, the function returns immediately without freeing the allocated filename, leading to a memory leak. Fix this by freeing the filename before returning in this error case.
nvdosv
CVE-2026-22994MEDIUMCVSS 5.5≥ 5.18, < 6.1.161≥ 6.2, < 6.6.121+3 more2026-01-23
CVE-2026-22994 [MEDIUM] CVE-2026-22994: In the Linux kernel, the following vulnerability has been resolved: bpf: Fix reference count leak i In the Linux kernel, the following vulnerability has been resolved: bpf: Fix reference count leak in bpf_prog_test_run_xdp() syzbot is reporting unregister_netdevice: waiting for sit0 to become free. Usage count = 2 problem. A debug printk() patch found that a refcount is obtained at xdp_convert_md_to_buff() from bpf_prog_test_run_xdp(). According to c
nvdosv
CVE-2025-71158MEDIUMCVSS 5.5≥ 6.13, < 6.18.62026-01-23
CVE-2025-71158 [MEDIUM] CVE-2025-71158: In the Linux kernel, the following vulnerability has been resolved: gpio: mpsse: ensure worker is t In the Linux kernel, the following vulnerability has been resolved: gpio: mpsse: ensure worker is torn down When an IRQ worker is running, unplugging the device would cause a crash. The sealevel hardware this driver was written for was not hotpluggable, so I never realized it. This change uses a spinlock to protect a list of workers, which it tears down
nvdosv
CVE-2026-22992MEDIUMCVSS 5.5≥ 5.11, < 5.15.198≥ 5.16, < 6.1.161+4 more2026-01-23
CVE-2026-22992 [MEDIUM] CWE-476 CVE-2026-22992: In the Linux kernel, the following vulnerability has been resolved: libceph: return the handler err In the Linux kernel, the following vulnerability has been resolved: libceph: return the handler error from mon_handle_auth_done() Currently any error from ceph_auth_handle_reply_done() is propagated via finish_auth() but isn't returned from mon_handle_auth_done(). This results in higher layers learning that (despite the monitor considering us to b
nvdosv
CVE-2025-71150MEDIUMCVSS 5.5≥ 5.15.176, < 5.16≥ 6.1.121, < 6.1.160+5 more2026-01-23
CVE-2025-71150 [MEDIUM] CVE-2025-71150: In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix refcount leak when i In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix refcount leak when invalid session is found on session lookup When a session is found but its state is not SMB2_SESSION_VALID, It indicates that no valid session was found, but it is missing to decrement the reference count acquired by the session lookup, which results in a ref
nvdosv
CVE-2026-22990MEDIUMCVSS 5.5≥ 2.6.34.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-23
CVE-2026-22990 [MEDIUM] CWE-617 CVE-2026-22990: In the Linux kernel, the following vulnerability has been resolved: libceph: replace overzealous BU In the Linux kernel, the following vulnerability has been resolved: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() If the osdmap is (maliciously) corrupted such that the incremental osdmap epoch is different from what is expected, there is no need to BUG. Instead, just declare the incremental osdmap to be invalid.
nvdosv