Linux Kernel vulnerabilities
12,345 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
12,345
CISA KEV
25
actively exploited
Public exploits
277
Exploited in wild
26
Severity breakdown
CRITICAL108HIGH3529MEDIUM8298LOW410
Vulnerabilities
Page 3 of 618
CVE-2025-71220HIGHCVSS 7.8≥ 5.15.145, < 5.15.200≥ 6.1.71, < 6.1.163+4 more2026-02-14
CVE-2025-71220 [HIGH] CVE-2025-71220: In the Linux kernel, the following vulnerability has been resolved:
smb/server: call ksmbd_session_
In the Linux kernel, the following vulnerability has been resolved:
smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe()
When ksmbd_iov_pin_rsp() fails, we should call ksmbd_session_rpc_close().
nvd
CVE-2025-71203HIGHCVSS 7.0≥ 6.4, < 6.12.70≥ 6.13, < 6.18.10+1 more2026-02-14
CVE-2025-71203 [HIGH] CWE-129 CVE-2025-71203: In the Linux kernel, the following vulnerability has been resolved:
riscv: Sanitize syscall table i
In the Linux kernel, the following vulnerability has been resolved:
riscv: Sanitize syscall table indexing under speculation
The syscall number is a user-controlled value used to index into the
syscall table. Use array_index_nospec() to clamp this value after the
bounds check to prevent speculative out-of-bounds access and subsequent
data leakage vi
nvd
CVE-2026-23204HIGHCVSS 7.1≥ 2.6.35.1, < 6.6.124≥ 6.7, < 6.12.70+3 more2026-02-14
CVE-2026-23204 [HIGH] CWE-125 CVE-2026-23204: In the Linux kernel, the following vulnerability has been resolved:
net/sched: cls_u32: use skb_hea
In the Linux kernel, the following vulnerability has been resolved:
net/sched: cls_u32: use skb_header_pointer_careful()
skb_header_pointer() does not fully validate negative @offset values.
Use skb_header_pointer_careful() instead.
GangMin Kim provided a report and a repro fooling u32_classify():
BUG: KASAN: slab-out-of-bounds in u32_classify+0x
nvd
CVE-2026-23184HIGHCVSS 7.8≥ 6.18, < 6.18.10v6.192026-02-14
CVE-2026-23184 [HIGH] CWE-416 CVE-2026-23184: In the Linux kernel, the following vulnerability has been resolved:
binder: fix UAF in binder_netli
In the Linux kernel, the following vulnerability has been resolved:
binder: fix UAF in binder_netlink_report()
Oneway transactions sent to frozen targets via binder_proc_transaction()
return a BR_TRANSACTION_PENDING_FROZEN error but they are still treated
as successful since the target is expected to thaw at some point. It is
then not safe to access
nvd
CVE-2026-23171HIGHCVSS 7.8≥ 5.15, < 6.18.9v6.192026-02-14
CVE-2026-23171 [HIGH] CWE-416 CVE-2026-23171: In the Linux kernel, the following vulnerability has been resolved:
bonding: fix use-after-free due
In the Linux kernel, the following vulnerability has been resolved:
bonding: fix use-after-free due to enslave fail after slave array update
Fix a use-after-free which happens due to enslave failure after the new
slave has been added to the array. Since the new slave can be used for Tx
immediately, we can use it after it has been freed by the enslav
nvd
CVE-2026-23194HIGHCVSS 7.8≥ 6.18, < 6.18.10v6.192026-02-14
CVE-2026-23194 [HIGH] CWE-787 CVE-2026-23194: In the Linux kernel, the following vulnerability has been resolved:
rust_binder: correctly handle F
In the Linux kernel, the following vulnerability has been resolved:
rust_binder: correctly handle FDA objects of length zero
Fix a bug where an empty FDA (fd array) object with 0 fds would cause an
out-of-bounds error. The previous implementation used `skip == 0` to
mean "this is a pointer fixup", but 0 is also the correct skip length
for an empty F
nvd
CVE-2026-23208HIGHCVSS 7.8≥ 4.14.186, < 4.14.188≥ 4.19.130, < 4.19.132+6 more2026-02-14
CVE-2026-23208 [HIGH] CWE-787 CVE-2026-23208: In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Prevent excess
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Prevent excessive number of frames
In this case, the user constructed the parameters with maxpacksize 40
for rate 22050 / pps 1000, and packsize[0] 22 packsize[1] 23. The buffer
size for each data URB is maxpacksize * packets, which in this example
is 40 * 6 = 240;
nvd
CVE-2026-23193HIGHCVSS 7.8≥ 3.1, < 5.10.250≥ 5.11, < 5.15.200+5 more2026-02-14
CVE-2026-23193 [HIGH] CWE-416 CVE-2026-23193: In the Linux kernel, the following vulnerability has been resolved:
scsi: target: iscsi: Fix use-af
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()
In iscsit_dec_session_usage_count(), the function calls complete() while
holding the sess->session_usage_lock. Similar to the connection usage count
logic, the waiter signaled by complete() (e.g., in the ses
nvd
CVE-2026-23162HIGHCVSS 7.8≥ 6.17.1, < 6.18.9v6.17+1 more2026-02-14
CVE-2026-23162 [HIGH] CWE-415 CVE-2026-23162: In the Linux kernel, the following vulnerability has been resolved:
drm/xe/nvm: Fix double-free on
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/nvm: Fix double-free on aux add failure
After a successful auxiliary_device_init(), aux_dev->dev.release
(xe_nvm_release_dev()) is responsible for the kfree(nvm). When
there is failure with auxiliary_device_add(), driver will call
auxiliary_device_uninit(), which call put_devi
nvd
CVE-2026-23195HIGHCVSS 7.8≥ 6.14, < 6.18.10v6.192026-02-14
CVE-2026-23195 [HIGH] CWE-416 CVE-2026-23195: In the Linux kernel, the following vulnerability has been resolved:
cgroup/dmem: avoid pool UAF
An
In the Linux kernel, the following vulnerability has been resolved:
cgroup/dmem: avoid pool UAF
An UAF issue was observed:
BUG: KASAN: slab-use-after-free in page_counter_uncharge+0x65/0x150
Write of size 8 at addr ffff888106715440 by task insmod/527
CPU: 4 UID: 0 PID: 527 Comm: insmod 6.19.0-rc7-next-20260129+ #11
Tainted: [O]=OOT_MODULE
Call Tra
nvd
CVE-2025-71201HIGHCVSS 7.1≥ 6.14, < 6.18.6v6.192026-02-14
CVE-2025-71201 [HIGH] CWE-125 CVE-2025-71201: In the Linux kernel, the following vulnerability has been resolved:
netfs: Fix early read unlock of
In the Linux kernel, the following vulnerability has been resolved:
netfs: Fix early read unlock of page with EOF in middle
The read result collection for buffered reads seems to run ahead of the
completion of subrequests under some circumstances, as can be seen in the
following log snippet:
9p_client_res: client 18446612686390831168 response P9_TR
nvd
CVE-2026-23192HIGHCVSS 7.8≥ 6.15.1, < 6.18.10v6.15+1 more2026-02-14
CVE-2026-23192 [HIGH] CWE-416 CVE-2026-23192: In the Linux kernel, the following vulnerability has been resolved:
linkwatch: use __dev_put() in c
In the Linux kernel, the following vulnerability has been resolved:
linkwatch: use __dev_put() in callers to prevent UAF
After linkwatch_do_dev() calls __dev_put() to release the linkwatch
reference, the device refcount may drop to 1. At this point,
netdev_run_todo() can proceed (since linkwatch_sync_dev() sees an
empty list and returns without bloc
nvd
CVE-2026-23187HIGHCVSS 7.1≥ 5.16, < 6.1.163≥ 6.2, < 6.6.124+3 more2026-02-14
CVE-2026-23187 [HIGH] CWE-125 CVE-2026-23187: In the Linux kernel, the following vulnerability has been resolved:
pmdomain: imx8m-blk-ctrl: fix o
In the Linux kernel, the following vulnerability has been resolved:
pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc->domains
Fix out-of-range access of bc->domains in imx8m_blk_ctrl_remove().
nvd
CVE-2026-23185HIGHCVSS 7.8≥ 6.17, < 6.18.10v6.192026-02-14
CVE-2026-23185 [HIGH] CWE-416 CVE-2026-23185: In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: mld: cancel mlo_
In the Linux kernel, the following vulnerability has been resolved:
wifi: iwlwifi: mld: cancel mlo_scan_start_wk
mlo_scan_start_wk is not canceled on disconnection. In fact, it is not
canceled anywhere except in the restart cleanup, where we don't really
have to.
This can cause an init-after-queue issue: if, for example, the work was
queued and the
nvd
CVE-2026-23191HIGHCVSS 7.0≥ 2.6.37, < 6.12.70≥ 6.13, < 6.18.10+1 more2026-02-14
CVE-2026-23191 [HIGH] CWE-416 CVE-2026-23191: In the Linux kernel, the following vulnerability has been resolved:
ALSA: aloop: Fix racy access at
In the Linux kernel, the following vulnerability has been resolved:
ALSA: aloop: Fix racy access at PCM trigger
The PCM trigger callback of aloop driver tries to check the PCM state
and stop the stream of the tied substream in the corresponding cable.
Since both check and stop operations are performed outside the cable
lock, this may result in UAF w
nvd
CVE-2026-23156HIGHCVSS 7.8≥ 6.0, < 6.1.162≥ 6.2, < 6.6.123+3 more2026-02-14
CVE-2026-23156 [HIGH] CVE-2026-23156: In the Linux kernel, the following vulnerability has been resolved:
efivarfs: fix error propagation
In the Linux kernel, the following vulnerability has been resolved:
efivarfs: fix error propagation in efivar_entry_get()
efivar_entry_get() always returns success even if the underlying
__efivar_entry_get() fails, masking errors.
This may result in uninitialized heap memory being copied to userspace
in the efivarfs_file_read() path.
Fix it by returning t
nvd
CVE-2025-71221HIGHCVSS 7.0≥ 3.16, < 6.18.10v6.192026-02-14
CVE-2025-71221 [HIGH] CWE-362 CVE-2025-71221: In the Linux kernel, the following vulnerability has been resolved:
dmaengine: mmp_pdma: Fix race c
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: mmp_pdma: Fix race condition in mmp_pdma_residue()
Add proper locking in mmp_pdma_residue() to prevent use-after-free when
accessing descriptor list and descriptor contents.
The race occurs when multiple threads call tx_status() while the tasklet
on another CPU is freein
nvd
CVE-2026-23209HIGHCVSS 7.8≥ 4.9.1, < 5.10.250≥ 5.11, < 5.15.200+6 more2026-02-14
CVE-2026-23209 [HIGH] CWE-416 CVE-2026-23209: In the Linux kernel, the following vulnerability has been resolved:
macvlan: fix error recovery in
In the Linux kernel, the following vulnerability has been resolved:
macvlan: fix error recovery in macvlan_common_newlink()
valis provided a nice repro to crash the kernel:
ip link add p1 type veth peer p2
ip link set address 00:00:00:00:00:20 dev p1
ip link set up dev p1
ip link set up dev p2
ip link add mv0 link p2 type macvlan mode source
ip lin
nvd
CVE-2026-23132MEDIUMCVSS 5.5≥ 6.18, < 6.18.8v6.192026-02-14
CVE-2026-23132 [MEDIUM] CVE-2026-23132: In the Linux kernel, the following vulnerability has been resolved:
drm/bridge: synopsys: dw-dp: fi
In the Linux kernel, the following vulnerability has been resolved:
drm/bridge: synopsys: dw-dp: fix error paths of dw_dp_bind
Fix several issues in dw_dp_bind() error handling:
1. Missing return after drm_bridge_attach() failure - the function
continued execution instead of returning an error.
2. Resource leak: drm_dp_aux_register() is not a devm funct
nvd
CVE-2025-71200MEDIUMCVSS 5.5≥ 6.0, < 6.1.162≥ 6.2, < 6.6.122+3 more2026-02-14
CVE-2025-71200 [MEDIUM] CVE-2025-71200: In the Linux kernel, the following vulnerability has been resolved:
mmc: sdhci-of-dwcmshc: Prevent
In the Linux kernel, the following vulnerability has been resolved:
mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode
When operating in HS200 or HS400 timing modes, reducing the clock frequency
below 52MHz will lead to link broken as the Rockchip DWC MSHC controller
requires maintaining a minimum clock of 52MHz in these modes.
Add
nvd