Linux Kernel vulnerabilities

12,345 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
12,345
CISA KEV
25
actively exploited
Public exploits
277
Exploited in wild
26
Severity breakdown
CRITICAL108HIGH3529MEDIUM8298LOW410

Vulnerabilities

Page 6 of 618
CVE-2026-23131MEDIUMCVSS 5.5≥ 6.6, < 6.6.122≥ 6.7, < 6.12.68+2 more2026-02-14
CVE-2026-23131 [MEDIUM] CVE-2026-23131: In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix k In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix kobject warnings for empty attribute names The hp-bioscfg driver attempts to register kobjects with empty names when the HP BIOS returns attributes with empty name strings. This causes multiple kernel warnings: kobject: (00000000135fb5e6): attempted to be re
nvd
CVE-2026-23170MEDIUMCVSS 5.5≥ 3.10, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-14
CVE-2026-23170 [MEDIUM] CWE-401 CVE-2026-23170: In the Linux kernel, the following vulnerability has been resolved: drm/imx/tve: fix probe device l In the Linux kernel, the following vulnerability has been resolved: drm/imx/tve: fix probe device leak Make sure to drop the reference taken to the DDC device during probe on probe failure (e.g. probe deferral) and on driver unbind.
nvd
CVE-2026-23190MEDIUMCVSS 5.5≥ 5.8, < 5.10.250≥ 5.11, < 5.15.200+5 more2026-02-14
CVE-2026-23190 [MEDIUM] CWE-401 CVE-2026-23190: In the Linux kernel, the following vulnerability has been resolved: ASoC: amd: fix memory leak in a In the Linux kernel, the following vulnerability has been resolved: ASoC: amd: fix memory leak in acp3x pdm dma ops
nvd
CVE-2026-23142MEDIUMCVSS 5.5≥ 5.18, < 6.1.162≥ 6.2, < 6.6.122+3 more2026-02-14
CVE-2026-23142 [MEDIUM] CVE-2026-23142: In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs-scheme: cleanup In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs-scheme: cleanup access_pattern subdirs on scheme dir setup failure When a DAMOS-scheme DAMON sysfs directory setup fails after setup of access_pattern/ directory, subdirectories of access_pattern/ directory are not cleaned up. As a result, DAMON sysfs interface is nearly bro
nvd
CVE-2026-23149MEDIUMCVSS 5.5≥ 6.18, < 6.18.9v6.192026-02-14
CVE-2026-23149 [MEDIUM] CVE-2026-23149: In the Linux kernel, the following vulnerability has been resolved: drm: Do not allow userspace to In the Linux kernel, the following vulnerability has been resolved: drm: Do not allow userspace to trigger kernel warnings in drm_gem_change_handle_ioctl() Since GEM bo handles are u32 in the uapi and the internal implementation uses idr_alloc() which uses int ranges, passing a new handle larger than INT_MAX trivially triggers a kernel warning: idr_alloc(
nvd
CVE-2025-71223MEDIUMCVSS 5.5≥ 6.6.32, < 6.6.124≥ 6.9, < 6.12.70+2 more2026-02-14
CVE-2025-71223 [MEDIUM] CVE-2025-71223: In the Linux kernel, the following vulnerability has been resolved: smb/server: fix refcount leak i In the Linux kernel, the following vulnerability has been resolved: smb/server: fix refcount leak in smb2_open() When ksmbd_vfs_getattr() fails, the reference count of ksmbd_file must be released.
nvd
CVE-2026-23129MEDIUMCVSS 5.5≥ 6.7, < 6.12.68≥ 6.13, < 6.18.8+1 more2026-02-14
CVE-2026-23129 [MEDIUM] CVE-2026-23129: In the Linux kernel, the following vulnerability has been resolved: dpll: Prevent duplicate registr In the Linux kernel, the following vulnerability has been resolved: dpll: Prevent duplicate registrations Modify the internal registration helpers dpll_xa_ref_{dpll,pin}_add() to reject duplicate registration attempts. Previously, if a caller attempted to register the same pin multiple times (with the same ops, priv, and cookie) on the same device, the c
nvd
CVE-2026-23150MEDIUMCVSS 5.5≥ 3.8, < 5.10.249≥ 5.11, < 5.15.199+5 more2026-02-14
CVE-2026-23150 [MEDIUM] CWE-401 CVE-2026-23150: In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: Fix memleak in nfc_l In the Linux kernel, the following vulnerability has been resolved: nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame(). syzbot reported various memory leaks related to NFC, struct nfc_llcp_sock, sk_buff, nfc_dev, etc. [0] The leading log hinted that nfc_llcp_send_ui_frame() failed to allocate skb due to sock_error(sk) being -ENXIO. ENXIO is set
nvd
CVE-2026-23172MEDIUMCVSS 5.5≥ 5.19, < 6.1.162≥ 6.2, < 6.6.123+3 more2026-02-14
CVE-2026-23172 [HIGH] CWE-401 CVE-2026-23172: In the Linux kernel, the following vulnerability has been resolved: net: wwan: t7xx: fix potential In the Linux kernel, the following vulnerability has been resolved: net: wwan: t7xx: fix potential skb->frags overflow in RX path When receiving data in the DPMAIF RX path, the t7xx_dpmaif_set_frag_to_skb() function adds page fragments to an skb without checking if the number of fragments has exceeded MAX_SKB_FRAGS. This could lead to a buffer overfl
nvd
CVE-2026-23138MEDIUMCVSS 5.5≥ 5.8, < 6.18.6v6.192026-02-14
CVE-2026-23138 [MEDIUM] CVE-2026-23138: In the Linux kernel, the following vulnerability has been resolved: tracing: Add recursion protecti In the Linux kernel, the following vulnerability has been resolved: tracing: Add recursion protection in kernel stack trace recording A bug was reported about an infinite recursion caused by tracing the rcu events with the kernel stack trace trigger enabled. The stack trace code called back into RCU which then called the stack trace again. Expand the ftr
nvd
CVE-2026-23147MEDIUMCVSS 5.5≥ 6.15, < 6.18.9v6.192026-02-14
CVE-2026-23147 [MEDIUM] CWE-401 CVE-2026-23147: In the Linux kernel, the following vulnerability has been resolved: btrfs: zlib: fix the folio leak In the Linux kernel, the following vulnerability has been resolved: btrfs: zlib: fix the folio leak on S390 hardware acceleration [BUG] After commit aa60fe12b4f4 ("btrfs: zlib: refactor S390x HW acceleration buffer preparation"), we no longer release the folio of the page cache of folio returned by btrfs_compress_filemap_get_folio() for S390 hardw
nvd
CVE-2026-23123MEDIUMCVSS 5.5≥ 6.6, < 6.6.122≥ 6.7, < 6.12.68+2 more2026-02-14
CVE-2026-23123 [MEDIUM] CWE-908 CVE-2026-23123: In the Linux kernel, the following vulnerability has been resolved: interconnect: debugfs: initiali In the Linux kernel, the following vulnerability has been resolved: interconnect: debugfs: initialize src_node and dst_node to empty strings The debugfs_create_str() API assumes that the string pointer is either NULL or points to valid kmalloc() memory. Leaving the pointer uninitialized can cause problems. Initialize src_node and dst_node to empt
nvd
CVE-2026-23145MEDIUMCVSS 5.5≥ 5.4.301, < 5.5≥ 5.10.246, < 5.10.249+6 more2026-02-14
CVE-2026-23145 [MEDIUM] CWE-401 CVE-2026-23145: In the Linux kernel, the following vulnerability has been resolved: ext4: fix iloc.bh leak in ext4_ In the Linux kernel, the following vulnerability has been resolved: ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref The error branch for ext4_xattr_inode_update_ref forget to release the refcount for iloc.bh. Find this when review code.
nvd
CVE-2026-23168MEDIUMCVSS 5.5≥ 6.0, < 6.1.162≥ 6.2, < 6.6.123+3 more2026-02-14
CVE-2026-23168 [MEDIUM] CVE-2026-23168: In the Linux kernel, the following vulnerability has been resolved: flex_proportions: make fprop_ne In the Linux kernel, the following vulnerability has been resolved: flex_proportions: make fprop_new_period() hardirq safe Bernd has reported a lockdep splat from flexible proportions code that is essentially complaining about the following race: run_timer_softirq - we are in softirq context call_timer_fn writeout_period fprop_new_period write_seqcount_
nvd
CVE-2026-23134MEDIUMCVSS 5.5≥ 6.18, < 6.18.8v6.192026-02-14
CVE-2026-23134 [MEDIUM] CVE-2026-23134: In the Linux kernel, the following vulnerability has been resolved: slab: fix kmalloc_nolock() cont In the Linux kernel, the following vulnerability has been resolved: slab: fix kmalloc_nolock() context check for PREEMPT_RT On PREEMPT_RT kernels, local_lock becomes a sleeping lock. The current check in kmalloc_nolock() only verifies we're not in NMI or hard IRQ context, but misses the case where preemption is disabled. When a BPF program runs from a tr
nvd
CVE-2026-23206MEDIUMCVSS 5.5≥ 5.13, < 5.15.200≥ 5.16, < 6.1.163+4 more2026-02-14
CVE-2026-23206 [MEDIUM] CWE-476 CVE-2026-23206: In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: prevent ZERO_SIZE In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: prevent ZERO_SIZE_PTR dereference when num_ifs is zero The driver allocates arrays for ports, FDBs, and filter blocks using kcalloc() with ethsw->sw_attr.num_ifs as the element count. When the device reports zero interfaces (either due to hardware configuration or fi
nvd
CVE-2026-23139MEDIUMCVSS 5.5≥ 5.19, < 6.1.161≥ 6.2, < 6.6.121+3 more2026-02-14
CVE-2026-23139 [HIGH] CVE-2026-23139: In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conncount: update In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_conncount: update last_gc only when GC has been performed Currently last_gc is being updated everytime a new connection is tracked, that means that it is updated even if a GC wasn't performed. With a sufficiently high packet rate, it is possible to always bypass the GC, causin
nvd
CVE-2026-23135MEDIUMCVSS 5.5≥ 6.3, < 6.6.122≥ 6.7, < 6.12.68+2 more2026-02-14
CVE-2026-23135 [MEDIUM] CVE-2026-23135: In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dma_free_cohe In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix dma_free_coherent() pointer dma_alloc_coherent() allocates a DMA mapped buffer and stores the addresses in XXX_unaligned fields. Those should be reused when freeing the buffer rather than the aligned addresses.
nvd
CVE-2026-23126MEDIUMCVSS 4.7≥ 4.16, < 6.1.162≥ 6.2, < 6.6.122+3 more2026-02-14
CVE-2026-23126 [MEDIUM] CWE-362 CVE-2026-23126: In the Linux kernel, the following vulnerability has been resolved: netdevsim: fix a race issue rel In the Linux kernel, the following vulnerability has been resolved: netdevsim: fix a race issue related to the operation on bpf_bound_progs list The netdevsim driver lacks a protection mechanism for operations on the bpf_bound_progs list. When the nsim_bpf_create_prog() performs list_add_tail, it is possible that nsim_bpf_destroy_prog() is simulta
nvd
CVE-2026-23202MEDIUMCVSS 5.5≥ 5.15.198, < 5.15.200≥ 6.1.160, < 6.1.163+5 more2026-02-14
CVE-2026-23202 [MEDIUM] CWE-476 CVE-2026-23202: In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect cur In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer The curr_xfer field is read by the IRQ handler without holding the lock to check if a transfer is in progress. When clearing curr_xfer in the combined sequence transfer loop, protect it with the spinlock to prev
nvd