Msrc Azl3 Kernel 6.6.121.1-1 On Azure Linux 3.0 vulnerabilities
263 known vulnerabilities affecting msrc/azl3_kernel_6.6.121.1-1_on_azure_linux_3.0.
Total CVEs
263
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH63MEDIUM195LOW4
Vulnerabilities
Page 1 of 14
CVE-2025-71233HIGHCVSS 8.42026-02-10
CVE-2025-71233 [MEDIUM] PCI: endpoint: Avoid creating sub-groups asynchronously
PCI: endpoint: Avoid creating sub-groups asynchronously
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
Remediation: CBL-Mariner Releases
Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2026-23214HIGHCVSS 8.42026-02-10
CVE-2026-23214 [MEDIUM] btrfs: reject new transactions if the fs is fully read-only
btrfs: reject new transactions if the fs is fully read-only
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
msrc
CVE-2026-23221HIGHCVSS 7.02026-02-10
CVE-2026-23221 [HIGH] bus: fsl-mc: fix use-after-free in driver_override_show()
bus: fsl-mc: fix use-after-free in driver_override_show()
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
Remediation: CBL-Mariner Releases
Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2025-71236HIGHCVSS 7.82026-02-10
CVE-2025-71236 [MEDIUM] scsi: qla2xxx: Validate sp before freeing associated memory
scsi: qla2xxx: Validate sp before freeing associated memory
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
Remediation: CBL-Mariner Releases
Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2025-71228HIGHCVSS 8.42026-02-10
CVE-2025-71228 [HIGH] LoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED
LoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
msrc
CVE-2026-23227HIGHCVSS 7.02026-02-10
CVE-2026-23227 [HIGH] drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free
drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
msrc
CVE-2025-71226HIGHCVSS 7.12026-02-10
CVE-2025-71226 [HIGH] wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP
wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
msrc
CVE-2026-23213HIGHCVSS 8.42026-02-10
CVE-2026-23213 [MEDIUM] drm/amd/pm: Disable MMIO access during SMU Mode 1 reset
drm/amd/pm: Disable MMIO access during SMU Mode 1 reset
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
msrc
CVE-2026-23215HIGHCVSS 8.42026-02-10
CVE-2026-23215 [MEDIUM] x86/vmware: Fix hypercall clobbers
x86/vmware: Fix hypercall clobbers
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
msrc
CVE-2025-71231HIGHCVSS 8.42026-02-10
CVE-2025-71231 [HIGH] crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode
crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
msrc
CVE-2026-23216HIGHCVSS 8.42026-02-10
CVE-2026-23216 [HIGH] scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()
scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
Remediation: CBL-Mariner Releases
Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2025-71229HIGHCVSS 8.42026-02-10
CVE-2025-71229 [MEDIUM] wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()
wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
Remediation: CBL-Mariner Releases
Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2026-23226HIGHCVSS 7.52026-02-10
CVE-2026-23226 [HIGH] ksmbd: add chann_lock to protect ksmbd_chann_list xarray
ksmbd: add chann_lock to protect ksmbd_chann_list xarray
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
msrc
CVE-2025-71234HIGHCVSS 7.82026-02-10
CVE-2025-71234 [HIGH] wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add
wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
msrc
CVE-2026-23230HIGHCVSS 8.42026-02-10
CVE-2026-23230 [HIGH] smb: client: split cached_fid bitfields to avoid shared-byte RMW races
smb: client: split cached_fid bitfields to avoid shared-byte RMW races
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
msrc
CVE-2026-23229HIGHCVSS 7.02026-02-10
CVE-2026-23229 [MEDIUM] crypto: virtio - Add spinlock protection with virtqueue notification
crypto: virtio - Add spinlock protection with virtqueue notification
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
Remediation: CBL-Mariner Releases
Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2025-71230MEDIUMCVSS 4.22026-02-10
CVE-2025-71230 [MEDIUM] hfs: ensure sb->s_fs_info is always cleaned up
hfs: ensure sb->s_fs_info is always cleaned up
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
Remediation: CBL-Mariner Releases
Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2026-23225MEDIUMCVSS 5.32026-02-10
CVE-2026-23225 [HIGH] sched/mmcid: Don't assume CID is CPU owned on mode switch
sched/mmcid: Don't assume CID is CPU owned on mode switch
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
Remediation: CBL-Mariner Releases
Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2026-23222MEDIUMCVSS 4.42026-02-10
CVE-2026-23222 [HIGH] crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly
crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
Remediation: CBL-Mariner Releases
Reference: https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade
msrc
CVE-2026-23217MEDIUMCVSS 5.52026-02-10
CVE-2026-23217 [MEDIUM] riscv: trace: fix snapshot deadlock with sbi ecall
riscv: trace: fix snapshot deadlock with sbi ecall
Mariner: Mariner
Linux: Linux
Customer Action Required: Yes
msrc
1 / 14Next →