Linux Kernel vulnerabilities

12,345 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
12,345
CISA KEV
25
actively exploited
Public exploits
277
Exploited in wild
26
Severity breakdown
CRITICAL108HIGH3529MEDIUM8298LOW410

Vulnerabilities

Page 4 of 618
CVE-2026-23130MEDIUMCVSS 5.5≥ 6.14, < 6.18.8v6.192026-02-14
CVE-2026-23130 [MEDIUM] CWE-667 CVE-2026-23130: In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dead lock whi In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dead lock while flushing management frames Commit [1] converted the management transmission work item into a wiphy work. Since a wiphy work can only run under wiphy lock protection, a race condition happens in below scenario: 1. a management frame is queued for
nvd
CVE-2026-23157MEDIUMCVSS 5.5≥ 2.6.29, < 6.18.9v6.192026-02-14
CVE-2026-23157 [MEDIUM] CWE-667 CVE-2026-23157: In the Linux kernel, the following vulnerability has been resolved: btrfs: do not strictly require In the Linux kernel, the following vulnerability has been resolved: btrfs: do not strictly require dirty metadata threshold for metadata writepages [BUG] There is an internal report that over 1000 processes are waiting at the io_schedule_timeout() of balance_dirty_pages(), causing a system hang and trigger a kernel coredump. The kernel is v6.4 ker
nvd
CVE-2026-23122MEDIUMCVSS 5.5≥ 6.16, < 6.18.8v6.192026-02-14
CVE-2026-23122 [MEDIUM] CVE-2026-23122: In the Linux kernel, the following vulnerability has been resolved: igc: Reduce TSN TX packet buffe In the Linux kernel, the following vulnerability has been resolved: igc: Reduce TSN TX packet buffer from 7KB to 5KB per queue The previous 7 KB per queue caused TX unit hangs under heavy timestamping load. Reducing to 5 KB avoids these hangs and matches the TSN recommendation in I225/I226 SW User Manual Section 7.5.4. The 8 KB "freed" by this change is
nvd
CVE-2026-23152MEDIUMCVSS 5.5≥ 6.7, < 6.18.9v6.192026-02-14
CVE-2026-23152 [MEDIUM] CVE-2026-23152: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: correctly decod In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: correctly decode TTLM with default link map TID-To-Link Mapping (TTLM) elements do not contain any link mapping presence indicator if a default mapping is used and parsing needs to be skipped. Note that access points should not explicitly report an advertised TTLM with a
nvd
CVE-2026-23201MEDIUMCVSS 5.5≥ 6.12.42, < 6.12.70≥ 6.15.10, < 6.16+2 more2026-02-14
CVE-2026-23201 [MEDIUM] CWE-476 CVE-2026-23201: In the Linux kernel, the following vulnerability has been resolved: ceph: fix oops due to invalid p In the Linux kernel, the following vulnerability has been resolved: ceph: fix oops due to invalid pointer for kfree() in parse_longname() This fixes a kernel oops when reading ceph snapshot directories (.snap), for example by simply running `ls /mnt/my_ceph/.snap`. The variable str is guarded by __free(kfree), but advanced by one for skipping the
nvd
CVE-2026-23120MEDIUMCVSS 5.5≥ 3.16.57, < 3.17≥ 4.15.8, < 4.16+8 more2026-02-14
CVE-2026-23120 [MEDIUM] CVE-2026-23120: In the Linux kernel, the following vulnerability has been resolved: l2tp: avoid one data-race in l2 In the Linux kernel, the following vulnerability has been resolved: l2tp: avoid one data-race in l2tp_tunnel_del_work() We should read sk->sk_socket only when dealing with kernel sockets. syzbot reported the following data-race: BUG: KCSAN: data-race in l2tp_tunnel_del_work / sk_common_release write to 0xffff88811c182b20 of 8 bytes by task 5365 on cpu
nvd
CVE-2026-23113MEDIUMCVSS 5.5≥ 5.12.1, < 6.6.122≥ 6.7, < 6.12.68+3 more2026-02-14
CVE-2026-23113 [MEDIUM] CVE-2026-23113: In the Linux kernel, the following vulnerability has been resolved: io_uring/io-wq: check IO_WQ_BIT In the Linux kernel, the following vulnerability has been resolved: io_uring/io-wq: check IO_WQ_BIT_EXIT inside work run loop Currently this is checked before running the pending work. Normally this is quite fine, as work items either end up blocking (which will create a new worker for other items), or they complete fairly quickly. But syzbot reports an i
nvd
CVE-2026-23143MEDIUMCVSS 5.5≥ 6.15, < 6.18.7v6.192026-02-14
CVE-2026-23143 [MEDIUM] CVE-2026-23143: In the Linux kernel, the following vulnerability has been resolved: virtio_net: Fix misalignment bu In the Linux kernel, the following vulnerability has been resolved: virtio_net: Fix misalignment bug in struct virtnet_info Use the new TRAILING_OVERLAP() helper to fix a misalignment bug along with the following warning: drivers/net/virtio_net.c:429:46: warning: structure containing a flexible array member is not at the end of another structure [-Wflex-
nvd
CVE-2026-23186MEDIUMCVSS 5.5≥ 6.15, < 6.18.10v6.192026-02-14
CVE-2026-23186 [MEDIUM] CWE-667 CVE-2026-23186: In the Linux kernel, the following vulnerability has been resolved: hwmon: (acpi_power_meter) Fix d In the Linux kernel, the following vulnerability has been resolved: hwmon: (acpi_power_meter) Fix deadlocks related to acpi_power_meter_notify() The acpi_power_meter driver's .notify() callback function, acpi_power_meter_notify(), calls hwmon_device_unregister() under a lock that is also acquired by callbacks in sysfs attributes of the device bein
nvd
CVE-2026-23146MEDIUMCVSS 5.5≥ 5.4.293, < 5.5≥ 5.10.237, < 5.10.249+7 more2026-02-14
CVE-2026-23146 [MEDIUM] CWE-476 CVE-2026-23146: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_uart: fix null-p In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work hci_uart_set_proto() sets HCI_UART_PROTO_INIT before calling hci_uart_register_dev(), which calls proto->open() to initialize hu->priv. However, if a TTY write wakeup occurs during this window, hci_uart_tx_wakeup() may
nvd
CVE-2026-23155MEDIUMCVSS 5.5v6.6.122v6.12.68+2 more2026-02-14
CVE-2026-23155 [MEDIUM] CWE-476 CVE-2026-23155: In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bul In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bulk_callback(): fix error message Sinc commit 79a6d1bfe114 ("can: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error") a failing resubmit URB will print an info message. In the case of a short read where netdev has not yet
nvd
CVE-2026-23151MEDIUMCVSS 5.5≥ 6.12.59, < 6.12.69≥ 6.16.10, < 6.17+3 more2026-02-14
CVE-2026-23151 [MEDIUM] CWE-401 CVE-2026-23151: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix memory lea In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: Fix memory leak in set_ssp_complete Fix memory leak in set_ssp_complete() where mgmt_pending_cmd structures are not freed after being removed from the pending list. Commit 302a1f674c00 ("Bluetooth: MGMT: Fix possible UAFs") replaced mgmt_pending_foreach() calls w
nvd
CVE-2026-23203MEDIUMCVSS 5.5≥ 6.17, < 6.18.10v6.192026-02-14
CVE-2026-23203 [MEDIUM] CVE-2026-23203: In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set_ In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue Commit 1767bb2d47b7 ("ipv6: mcast: Don't hold RTNL for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP.") removed the RTNL lock for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP operations. However, this change triggered the following ca
nvd
CVE-2026-23118MEDIUMCVSS 4.7≥ 4.17, < 6.12.69≥ 6.13, < 6.18.8+1 more2026-02-14
CVE-2026-23118 [MEDIUM] CWE-362 CVE-2026-23118: In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix data-race warning an In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix data-race warning and potential load/store tearing Fix the following: BUG: KCSAN: data-race in rxrpc_peer_keepalive_worker / rxrpc_send_data_packet which is reporting an issue with the reads and writes to ->last_tx_at in: conn->peer->last_tx_at = ktime_get_seconds();
nvd
CVE-2026-23115MEDIUMCVSS 4.7≥ 6.15, < 6.18.8v6.192026-02-14
CVE-2026-23115 [MEDIUM] CWE-362 CVE-2026-23115: In the Linux kernel, the following vulnerability has been resolved: serial: Fix not set tty->port r In the Linux kernel, the following vulnerability has been resolved: serial: Fix not set tty->port race condition Revert commit bfc467db60b7 ("serial: remove redundant tty_port_link_device()") because the tty_port_link_device() is not redundant: the tty->port has to be confured before we call uart_configure_port(), otherwise user-space can open con
nvd
CVE-2026-23163MEDIUMCVSS 5.5≥ 6.4, < 6.6.123≥ 6.7, < 6.12.69+2 more2026-02-14
CVE-2026-23163 [MEDIUM] CWE-476 CVE-2026-23163: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix NULL pointer de In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove On APUs such as Raven and Renoir (GC 9.1.0, 9.2.2, 9.3.0), the ih1 and ih2 interrupt ring buffers are not initialized. This is by design, as these secondary IH rings are only available on discrete GPUs. Se
nvd
CVE-2026-23127MEDIUMCVSS 5.5≥ 6.18, < 6.18.8v6.192026-02-14
CVE-2026-23127 [MEDIUM] CVE-2026-23127: In the Linux kernel, the following vulnerability has been resolved: perf: Fix refcount warning on e In the Linux kernel, the following vulnerability has been resolved: perf: Fix refcount warning on event->mmap_count increment When calling refcount_inc(&event->mmap_count) inside perf_mmap_rb(), the following warning is triggered: refcount_t: addition on 0; use-after-free. WARNING: lib/refcount.c:25 PoC: struct perf_event_attr attr = {0}; int fd = sysc
nvd
CVE-2026-23117MEDIUMCVSS 5.5≥ 6.18.2, < 6.18.8v6.192026-02-14
CVE-2026-23117 [MEDIUM] CWE-476 CVE-2026-23117: In the Linux kernel, the following vulnerability has been resolved: ice: add missing ice_deinit_hw( In the Linux kernel, the following vulnerability has been resolved: ice: add missing ice_deinit_hw() in devlink reinit path devlink-reload results in ice_init_hw failed error, and then removing the ice driver causes a NULL pointer dereference. [ +0.102213] ice 0000:ca:00.0: ice_init_hw failed: -16 ... [ +0.000001] Call Trace: [ +0.000003] [ +0.00
nvd
CVE-2026-23114MEDIUMCVSS 5.5≥ 6.16, < 6.18.8v6.192026-02-14
CVE-2026-23114 [MEDIUM] CVE-2026-23114: In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: ptrace: Fix SVE w In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: ptrace: Fix SVE writes on !SME systems When SVE is supported but SME is not supported, a ptrace write to the NT_ARM_SVE regset can place the tracee into an invalid state where (non-streaming) SVE register data is stored in FP_STATE_SVE format but TIF_SVE is clear. This can r
nvd
CVE-2026-23125MEDIUMCVSS 5.5≥ 2.6.24, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-14
CVE-2026-23125 [MEDIUM] CWE-476 CVE-2026-23125: In the Linux kernel, the following vulnerability has been resolved: sctp: move SCTP_CMD_ASSOC_SHKEY In the Linux kernel, the following vulnerability has been resolved: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT A null-ptr-deref was reported in the SCTP transmit path when SCTP-AUTH key initialization fails: KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f] CPU: 0 PID: 16 Comm: ksoftirqd/0 Tainted: G W 6.6
nvd
Linux Kernel vulnerabilities | cvebase