Linux Kernel vulnerabilities
12,345 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
12,345
CISA KEV
25
actively exploited
Public exploits
277
Exploited in wild
26
Severity breakdown
CRITICAL108HIGH3529MEDIUM8298LOW410
Vulnerabilities
Page 5 of 618
CVE-2026-23164MEDIUMCVSS 5.5≥ 4.6, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-14
CVE-2026-23164 [MEDIUM] CWE-401 CVE-2026-23164: In the Linux kernel, the following vulnerability has been resolved:
rocker: fix memory leak in rock
In the Linux kernel, the following vulnerability has been resolved:
rocker: fix memory leak in rocker_world_port_post_fini()
In rocker_world_port_pre_init(), rocker_port->wpriv is allocated with
kzalloc(wops->port_priv_size, GFP_KERNEL). However, in
rocker_world_port_post_fini(), the memory is only freed when
wops->port_post_fini callback is set:
nvd
CVE-2026-23141MEDIUMCVSS 5.5≥ 4.11, < 6.6.122≥ 6.7, < 6.12.67+2 more2026-02-14
CVE-2026-23141 [MEDIUM] CVE-2026-23141: In the Linux kernel, the following vulnerability has been resolved:
btrfs: send: check for inline e
In the Linux kernel, the following vulnerability has been resolved:
btrfs: send: check for inline extents in range_is_hole_in_parent()
Before accessing the disk_bytenr field of a file extent item we need
to check if we are dealing with an inline extent.
This is because for inline extents their data starts at the offset of
the disk_bytenr field. So accessi
nvd
CVE-2026-23124MEDIUMCVSS 5.5≥ 5.15, < 5.15.199≥ 5.16, < 6.1.162+4 more2026-02-14
CVE-2026-23124 [MEDIUM] CVE-2026-23124: In the Linux kernel, the following vulnerability has been resolved:
ipv6: annotate data-race in ndi
In the Linux kernel, the following vulnerability has been resolved:
ipv6: annotate data-race in ndisc_router_discovery()
syzbot found that ndisc_router_discovery() could read and write
in6_dev->ra_mtu without holding a lock [1]
This looks fine, IFLA_INET6_RA_MTU is best effort.
Add READ_ONCE()/WRITE_ONCE() to document the race.
Note that we might also
nvd
CVE-2026-23121MEDIUMCVSS 5.5≥ 2.6.27, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-14
CVE-2026-23121 [MEDIUM] CVE-2026-23121: In the Linux kernel, the following vulnerability has been resolved:
mISDN: annotate data-race aroun
In the Linux kernel, the following vulnerability has been resolved:
mISDN: annotate data-race around dev->work
dev->work can re read locklessly in mISDN_read()
and mISDN_poll(). Add READ_ONCE()/WRITE_ONCE() annotations.
BUG: KCSAN: data-race in mISDN_ioctl / mISDN_read
write to 0xffff88812d848280 of 4 bytes by task 10864 on cpu 1:
misdn_add_timer driver
nvd
CVE-2026-23159MEDIUMCVSS 5.5≥ 6.6.116, < 6.6.123≥ 6.12.57, < 6.12.69+2 more2026-02-14
CVE-2026-23159 [MEDIUM] CWE-476 CVE-2026-23159: In the Linux kernel, the following vulnerability has been resolved:
perf: sched: Fix perf crash wit
In the Linux kernel, the following vulnerability has been resolved:
perf: sched: Fix perf crash with new is_user_task() helper
In order to do a user space stacktrace the current task needs to be a user
task that has executed in user space. It use to be possible to test if a
task is a user task or not by simply checking the task_struct mm field. If
nvd
CVE-2026-23200MEDIUMCVSS 5.5≥ 6.6.120, < 6.6.124≥ 6.12.63, < 6.12.70+3 more2026-02-14
CVE-2026-23200 [MEDIUM] CWE-476 CVE-2026-23200: In the Linux kernel, the following vulnerability has been resolved:
ipv6: Fix ECMP sibling count mi
In the Linux kernel, the following vulnerability has been resolved:
ipv6: Fix ECMP sibling count mismatch when clearing RTF_ADDRCONF
syzbot reported a kernel BUG in fib6_add_rt2node() when adding an IPv6
route. [0]
Commit f72514b3c569 ("ipv6: clear RA flags when adding a static
route") introduced logic to clear RTF_ADDRCONF from existing routes
w
nvd
CVE-2026-23166MEDIUMCVSS 5.5≥ 6.10.10, < 6.11≥ 6.11.1, < 6.12.69+3 more2026-02-14
CVE-2026-23166 [MEDIUM] CWE-476 CVE-2026-23166: In the Linux kernel, the following vulnerability has been resolved:
ice: Fix NULL pointer dereferen
In the Linux kernel, the following vulnerability has been resolved:
ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues
Add NULL pointer checks in ice_vsi_set_napi_queues() to prevent crashes
during resume from suspend when rings[q_idx]->q_vector is NULL.
Tested adaptor:
60:00.0 Ethernet controller [0200]: Intel Corporation Ethernet Cont
nvd
CVE-2025-71222MEDIUMCVSS 5.5≥ 2.6.32, < 5.10.250≥ 5.11, < 5.15.200+5 more2026-02-14
CVE-2025-71222 [MEDIUM] CVE-2025-71222: In the Linux kernel, the following vulnerability has been resolved:
wifi: wlcore: ensure skb headro
In the Linux kernel, the following vulnerability has been resolved:
wifi: wlcore: ensure skb headroom before skb_push
This avoids occasional skb_under_panic Oops from wl1271_tx_work. In this case, headroom is
less than needed (typically 110 - 94 = 16 bytes).
nvd
CVE-2025-71202MEDIUMCVSS 5.5≥ 4.4, < 6.18.72026-02-14
CVE-2025-71202 [MEDIUM] CVE-2025-71202: In the Linux kernel, the following vulnerability has been resolved:
iommu/sva: invalidate stale IOT
In the Linux kernel, the following vulnerability has been resolved:
iommu/sva: invalidate stale IOTLB entries for kernel address space
Introduce a new IOMMU interface to flush IOTLB paging cache entries for
the CPU kernel address space. This interface is invoked from the x86
architecture code that manages combined user and kernel page tables,
specifically
nvd
CVE-2026-23188MEDIUMCVSS 5.5≥ 6.11, < 6.12.70≥ 6.13, < 6.18.10+1 more2026-02-14
CVE-2026-23188 [MEDIUM] CWE-667 CVE-2026-23188: In the Linux kernel, the following vulnerability has been resolved:
net: usb: r8152: fix resume res
In the Linux kernel, the following vulnerability has been resolved:
net: usb: r8152: fix resume reset deadlock
rtl8152 can trigger device reset during reset which
potentially can result in a deadlock:
**** DPM device timeout after 10 seconds; 15 seconds until panic ****
Call Trace:
schedule+0x483/0x1370
schedule_preempt_disabled+0x15/0x30
__mute
nvd
CVE-2026-23207MEDIUMCVSS 4.7≥ 5.15.198, < 5.16≥ 6.1.160, < 6.2+5 more2026-02-14
CVE-2026-23207 [MEDIUM] CWE-362 CVE-2026-23207: In the Linux kernel, the following vulnerability has been resolved:
spi: tegra210-quad: Protect cur
In the Linux kernel, the following vulnerability has been resolved:
spi: tegra210-quad: Protect curr_xfer check in IRQ handler
Now that all other accesses to curr_xfer are done under the lock,
protect the curr_xfer NULL check in tegra_qspi_isr_thread() with the
spinlock. Without this protection, the following race can occur:
CPU0 (ISR thread) CPU
nvd
CVE-2026-23154MEDIUMCVSS 5.5≥ 5.6, < 6.12.69≥ 6.13, < 6.18.9+1 more2026-02-14
CVE-2026-23154 [MEDIUM] CVE-2026-23154: In the Linux kernel, the following vulnerability has been resolved:
net: fix segmentation of forwar
In the Linux kernel, the following vulnerability has been resolved:
net: fix segmentation of forwarding fraglist GRO
This patch enhances GSO segment handling by properly checking
the SKB_GSO_DODGY flag for frag_list GSO packets, addressing
low throughput issues observed when a station accesses IPv4
servers via hotspots with an IPv6-only upstream interface
nvd
CVE-2026-23199MEDIUMCVSS 5.5≥ 6.11, < 6.12.70≥ 6.13, < 6.18.10+1 more2026-02-14
CVE-2026-23199 [MEDIUM] CWE-667 CVE-2026-23199: In the Linux kernel, the following vulnerability has been resolved:
procfs: avoid fetching build ID
In the Linux kernel, the following vulnerability has been resolved:
procfs: avoid fetching build ID while holding VMA lock
Fix PROCMAP_QUERY to fetch optional build ID only after dropping mmap_lock
or per-VMA lock, whichever was used to lock VMA under question, to avoid
deadlock reported by syzbot:
-> #1 (&mm->mmap_lock){++++}-{4:4}:
__might_faul
nvd
CVE-2026-23133MEDIUMCVSS 5.5≥ 4.16, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-14
CVE-2026-23133 [MEDIUM] CVE-2026-23133: In the Linux kernel, the following vulnerability has been resolved:
wifi: ath10k: fix dma_free_cohe
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath10k: fix dma_free_coherent() pointer
dma_alloc_coherent() allocates a DMA mapped buffer and stores the
addresses in XXX_unaligned fields. Those should be reused when freeing
the buffer rather than the aligned addresses.
nvd
CVE-2026-23167MEDIUMCVSS 4.7≥ 3.2, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-14
CVE-2026-23167 [MEDIUM] CWE-362 CVE-2026-23167: In the Linux kernel, the following vulnerability has been resolved:
nfc: nci: Fix race between rfki
In the Linux kernel, the following vulnerability has been resolved:
nfc: nci: Fix race between rfkill and nci_unregister_device().
syzbot reported the splat below [0] without a repro.
It indicates that struct nci_dev.cmd_wq had been destroyed before
nci_close_device() was called via rfkill.
nci_dev.cmd_wq is only destroyed in nci_unregister_devi
nvd
CVE-2026-23128MEDIUMCVSS 5.5≥ 6.1, < 6.1.162≥ 6.2, < 6.6.122+3 more2026-02-14
CVE-2026-23128 [MEDIUM] CVE-2026-23128: In the Linux kernel, the following vulnerability has been resolved:
arm64: Set __nocfi on swsusp_ar
In the Linux kernel, the following vulnerability has been resolved:
arm64: Set __nocfi on swsusp_arch_resume()
A DABT is reported[1] on an android based system when resume from hiberate.
This happens because swsusp_arch_suspend_exit() is marked with SYM_CODE_*()
and does not have a CFI hash, but swsusp_arch_resume() will attempt to
verify the CFI hash whe
nvd
CVE-2026-23173MEDIUMCVSS 5.5≥ 6.5, < 6.6.123≥ 6.7, < 6.12.69+2 more2026-02-14
CVE-2026-23173 [MEDIUM] CWE-476 CVE-2026-23173: In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: TC, delete flows onl
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: TC, delete flows only for existing peers
When deleting TC steering flows, iterate only over actual devcom
peers instead of assuming all possible ports exist. This avoids
touching non-existent peers and ensures cleanup is limited to
devices the driver is currently connec
nvd
CVE-2026-23119MEDIUMCVSS 5.5≥ 5.5, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-14
CVE-2026-23119 [MEDIUM] CVE-2026-23119: In the Linux kernel, the following vulnerability has been resolved:
bonding: provide a net pointer
In the Linux kernel, the following vulnerability has been resolved:
bonding: provide a net pointer to __skb_flow_dissect()
After 3cbf4ffba5ee ("net: plumb network namespace into __skb_flow_dissect")
we have to provide a net pointer to __skb_flow_dissect(),
either via skb->dev, skb->sk, or a user provided pointer.
In the following case, syzbot was able to
nvd
CVE-2026-23140MEDIUMCVSS 5.5≥ 5.18, < 6.1.161≥ 6.2, < 6.6.121+3 more2026-02-14
CVE-2026-23140 [MEDIUM] CVE-2026-23140: In the Linux kernel, the following vulnerability has been resolved:
bpf, test_run: Subtract size of
In the Linux kernel, the following vulnerability has been resolved:
bpf, test_run: Subtract size of xdp_frame from allowed metadata size
The xdp_frame structure takes up part of the XDP frame headroom,
limiting the size of the metadata. However, in bpf_test_run, we don't
take this into account, which makes it possible for userspace to supply
a metadata si
nvd
CVE-2026-23116MEDIUMCVSS 5.5≥ 5.18, < 6.1.162≥ 6.2, < 6.6.122+3 more2026-02-14
CVE-2026-23116 [MEDIUM] CVE-2026-23116: In the Linux kernel, the following vulnerability has been resolved:
pmdomain: imx8m-blk-ctrl: Remov
In the Linux kernel, the following vulnerability has been resolved:
pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu
For i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset
and clock enable bits, but is ungated and reset together with the VPUs.
So we can't reset G1 or G2 separately, it may led to the system hang.
Rem
nvd