Linux Kernel

3448 CVEs product

Monthly

CVE-2026-23205 MEDIUM PATCH This Month

A memory leak in the Linux kernel's SMB/CIFS client implementation allows local attackers with unprivileged access to exhaust kernel memory and cause a denial of service by triggering failed file operations on read-only mounted shares. An attacker can exploit this by repeatedly attempting to write files to a read-only CIFS mount, causing memory allocated for SMB requests to not be properly freed. The vulnerability persists until the cifs kernel module is unloaded, and currently lacks a public patch.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23203 Monitor

In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue Commit 1767bb2d47b7 ("ipv6: mcast: Don't hold RTNL for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP.") removed the RTNL lock for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP operations.

Linux Dns Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23202 PATCH Monitor

In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer The curr_xfer field is read by the IRQ handler without holding the lock to check if a transfer is in progress.

Linux Use After Free Null Pointer Dereference Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23201 Monitor

In the Linux kernel, the following vulnerability has been resolved: ceph: fix oops due to invalid pointer for kfree() in parse_longname() This fixes a kernel oops when reading ceph snapshot directories (.snap), for example by simply running `ls /mnt/my_ceph/.snap`.

Linux Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23200 Monitor

In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix ECMP sibling count mismatch when clearing RTF_ADDRCONF syzbot reported a kernel BUG in fib6_add_rt2node() when adding an IPv6 route.

Linux Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23199 Monitor

In the Linux kernel, the following vulnerability has been resolved: procfs: avoid fetching build ID while holding VMA lock Fix PROCMAP_QUERY to fetch optional build ID only after dropping mmap_lock or per-VMA lock, whichever was used to lock VMA under question, to avoid deadlock reported by syzbot: -> #1 (&mm->mmap_lock){++++}-{4:4}: __might_fault+0xed/0x170 _copy_to_iter+0x118/0x1720 copy_page_to_iter+0x12d/0x1e0 filemap_read+0x720/0x10a0 blkdev_read_iter+0x2b5/0x4e0 vfs_read+0x7f4/0xae0 ksys_read+0x12a/0x250 do_syscall_64+0xcb/0xf80 entry_SYSCALL_64_after_hwframe+0x77/0x7f -> #0 (&sb->s_type->i_mutex_key#8){++++}-{4:4}: __lock_acquire+0x1509/0x26d0 lock_acquire+0x185/0x340 down_read+0x98/0x490 blkdev_read_iter+0x2a7/0x4e0 __kernel_read+0x39a/0xa90 freader_fetch+0x1d5/0xa80 __build_id_parse.isra.0+0xea/0x6a0 do_procmap_query+0xd75/0x1050 procfs_procmap_ioctl+0x7a/0xb0 __x64_sys_ioctl+0x18e/0x210 do_syscall_64+0xcb/0xf80 entry_SYSCALL_64_after_hwframe+0x77/0x7f other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- rlock(&mm->mmap_lock); lock(&sb->s_type->i_mutex_key#8); lock(&mm->mmap_lock); rlock(&sb->s_type->i_mutex_key#8); *** DEADLOCK *** This seems to be exacerbated (as we haven't seen these syzbot reports before that) by the recent: 777a8560fd29 ("lib/buildid: use __kernel_read() for sleepable context") To make this safe, we need to grab file refcount while VMA is still locked, but other than that everything is pretty straightforward.

Linux Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23197 Monitor

In the Linux kernel, the following vulnerability has been resolved: i2c: imx: preserve error state in block data length handler When a block read returns an invalid length, zero or >I2C_SMBUS_BLOCK_MAX, the length handler sets the state to IMX_I2C_STATE_FAILED.

Linux Denial Of Service Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23196 Monitor

In the Linux kernel, the following vulnerability has been resolved: HID: Intel-thc-hid: Intel-thc: Add safety check for reading DMA buffer Add DMA buffer readiness check before reading DMA buffer to avoid unexpected NULL pointer accessing.

Linux Null Pointer Dereference Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23194 Monitor

In the Linux kernel, the following vulnerability has been resolved: rust_binder: correctly handle FDA objects of length zero Fix a bug where an empty FDA (fd array) object with 0 fds would cause an out-of-bounds error.

Linux Android Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23190 MEDIUM PATCH This Month

Memory leak in AMD ASoC PDM DMA operations allows local attackers with user-level privileges to cause denial of service through resource exhaustion on affected Linux systems. The vulnerability persists as no patch is currently available, leaving vulnerable systems at continued risk of system instability or crash from cumulative memory consumption.

Linux Information Disclosure Amd Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23189 MEDIUM PATCH This Month

A null pointer dereference in the CephFS kernel client's MDS authentication matching function (ceph_mds_auth_match()) allows local attackers with low privileges to cause a denial of service by crashing the kernel when the mds_namespace mount option is not specified. This regression affects Linux kernel versions 6.18-rc1 and later, impacting systems using CephFS with default mount configurations. No patch is currently available for this vulnerability.

Linux Null Pointer Dereference Denial Of Service Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23188 Monitor

In the Linux kernel, the following vulnerability has been resolved: net: usb: r8152: fix resume reset deadlock rtl8152 can trigger device reset during reset which potentially can result in a deadlock: **** DPM device timeout after 10 seconds; 15 seconds until panic **** Call Trace: <TASK> schedule+0x483/0x1370 schedule_preempt_disabled+0x15/0x30 __mutex_lock_common+0x1fd/0x470 __rtl8152_set_mac_address+0x80/0x1f0 dev_set_mac_address+0x7f/0x150 rtl8152_post_reset+0x72/0x150 usb_reset_device+0x1d0/0x220 rtl8152_resume+0x99/0xc0 usb_resume_interface+0x3e/0xc0 usb_resume_both+0x104/0x150 usb_resume+0x22/0x110 The problem is that rtl8152 resume calls reset under tp->control mutex while reset basically re-enters rtl8152 and attempts to acquire the same tp->control lock once again.

Linux Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23187 Monitor

In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc->domains Fix out-of-range access of bc->domains in imx8m_blk_ctrl_remove().

Linux Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23186 MEDIUM PATCH This Month

The Linux kernel's acpi_power_meter driver contains a deadlock vulnerability in its notify callback function that can cause a denial of service when device removal races with sysfs attribute access. A local user with privileges to trigger power meter notifications can exploit this to hang or crash the system. No patch is currently available.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23183 Monitor

In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: fix NULL pointer dereference when setting max An issue was triggered: BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] SMP NOPTI CPU: 15 UID: 0 PID: 658 Comm: bash Tainted: 6.19.0-rc6-next-2026012 Tainted: [O]=OOT_MODULE Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), RIP: 0010:strcmp+0x10/0x30 RSP: 0018:ffffc900017f7dc0 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff888107cd4358 RDX: 0000000019f73907 RSI: ffffffff82cc381a RDI: 0000000000000000 RBP: ffff8881016bef0d R08: 000000006c0e7145 R09: 0000000056c0e714 R10: 0000000000000001 R11: ffff888107cd4358 R12: 0007ffffffffffff R13: ffff888101399200 R14: ffff888100fcb360 R15: 0007ffffffffffff CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000105c79000 CR4: 00000000000006f0 Call Trace: <TASK> dmemcg_limit_write.constprop.0+0x16d/0x390 ? __pfx_set_resource_max+0x10/0x10 kernfs_fop_write_iter+0x14e/0x200 vfs_write+0x367/0x510 ksys_write+0x66/0xe0 do_syscall_64+0x6b/0x390 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f42697e1887 It was trriggered setting max without limitation, the command is like: "echo test/region0 > dmem.max".

Linux Null Pointer Dereference Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23182 Monitor

In the Linux kernel, the following vulnerability has been resolved: spi: tegra: Fix a memory leak in tegra_slink_probe() In tegra_slink_probe(), when platform_get_irq() fails, it directly returns from the function with an error code, which causes a memory leak.

Linux Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23181 Monitor

In the Linux kernel, the following vulnerability has been resolved: btrfs: sync read disk super and set block size When the user performs a btrfs mount, the block device is not set correctly. The user sets the block size of the block device to 0x4000 by executing the BLKBSZSET command.

Linux Null Pointer Dereference Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23179 Monitor

In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() When the socket is closed while in TCP_LISTEN a callback is run to flush all outstanding packets, which in turns calls nvmet_tcp_listen_data_ready() with the sk_callback_lock held.

Linux Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23177 Monitor

In the Linux kernel, the following vulnerability has been resolved: mm, shmem: prevent infinite loop on truncate race When truncating a large swap entry, shmem_free_swap() returns 0 when the entry's index doesn't match the given index due to lookup alignment.

Linux Golang Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23176 Monitor

In the Linux kernel, the following vulnerability has been resolved: platform/x86: toshiba_haps: Fix memory leaks in add/remove routines toshiba_haps_add() leaks the haps object allocated by it if it returns an error after allocating that object successfully.

Linux Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23174 Monitor

In the Linux kernel, the following vulnerability has been resolved: nvme-pci: handle changing device dma map requirements The initial state of dma_needs_unmap may be false, but change to true while mapping the data iterator. Enabling swiotlb is one such case that can change the result.

Linux Linux Kernel
NVD
EPSS
0.0%
CVE-2025-71224 Monitor

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: ocb: skip rx_no_sta when interface is not joined ieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only present after JOIN_OCB.

Linux Linux Kernel
NVD
EPSS
0.0%
CVE-2025-71223 MEDIUM PATCH This Month

CVE-2025-71223 is a security vulnerability (CVSS 5.5). Remediation should follow standard vulnerability management procedures.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-71222 Monitor

In the Linux kernel, the following vulnerability has been resolved: wifi: wlcore: ensure skb headroom before skb_push This avoids occasional skb_under_panic Oops from wl1271_tx_work. In this case, headroom is less than needed (typically 110 - 94 = 16 bytes).

Linux Linux Kernel
NVD
EPSS
0.0%
CVE-2025-71221 HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: dmaengine: mmp_pdma: Fix race condition in mmp_pdma_residue() Add proper locking in mmp_pdma_residue() to prevent use-after-free when accessing descriptor list and descriptor contents.

Linux Race Condition Information Disclosure Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
7.0
EPSS
0.0%
CVE-2025-71220 Monitor

In the Linux kernel, the following vulnerability has been resolved: smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe() When ksmbd_iov_pin_rsp() fails, we should call ksmbd_session_rpc_close().

Linux Linux Kernel
NVD
EPSS
0.0%
CVE-2025-71204 MEDIUM PATCH This Month

CVE-2025-71204 is a security vulnerability (CVSS 5.5). Remediation should follow standard vulnerability management procedures.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-71203 HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: riscv: Sanitize syscall table indexing under speculation The syscall number is a user-controlled value used to index into the syscall table.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
7.0
EPSS
0.0%
CVE-2026-23173 MEDIUM PATCH This Month

A null pointer dereference in the Linux kernel's mlx5e TC steering driver allows local attackers with user privileges to cause a denial of service by triggering improper flow deletion logic that attempts to access non-existent device peers. The vulnerability occurs when deleting TC flows without validating peer existence, leading to kernel crashes. No patch is currently available for this medium-severity flaw affecting Linux systems with Mellanox network drivers.

Linux Null Pointer Dereference Denial Of Service Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23170 MEDIUM PATCH This Month

The Linux kernel's imx/tve driver fails to properly release a DDC device reference during probe failure or driver unbind, causing a resource leak that could lead to denial of service through memory exhaustion. Local users with driver interaction capabilities can trigger this leak through probe deferral or module unload operations. No patch is currently available to address this medium-severity vulnerability.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23168 MEDIUM PATCH This Month

Linux kernel flexible proportions code can cause a denial of service through a deadlock when a hard interrupt fires during a soft interrupt's sequence count operation, allowing a local attacker with limited privileges to hang the system by triggering indefinite loops in proportion calculations. The vulnerability affects the fprop_new_period() function which lacks proper hardirq safety, creating a race condition between timer softirq context and block I/O hardirq handlers. No patch is currently available for this medium-severity issue.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23167 MEDIUM PATCH This Month

A race condition in the Linux kernel NFC subsystem allows local attackers with low privileges to cause a denial of service by triggering a use-after-free condition between rfkill device unregistration and NCI command queue destruction. An attacker can exploit this by closing a virtual NCI device file while rfkill operations are in progress, causing the kernel to access a destroyed work queue. No patch is currently available for this vulnerability.

Linux Race Condition Information Disclosure Google Linux Kernel +2
NVD VulDB
CVSS 3.1
4.7
EPSS
0.0%
CVE-2026-23166 MEDIUM PATCH This Month

A NULL pointer dereference in the Intel ice network driver's ice_vsi_set_napi_queues() function can cause a kernel crash on Linux systems during suspend/resume operations when ring queue vectors are improperly initialized. Local users with standard privileges can trigger this denial of service condition through standard power management operations like systemctl suspend. No patch is currently available for this vulnerability affecting Linux kernel v6.18 and the Intel E810 Ethernet adapter family.

Linux Null Pointer Dereference Denial Of Service Intel Linux Kernel +2
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23165 MEDIUM PATCH This Month

The Linux kernel's Saffirecode (sfc) driver contains a deadlock vulnerability in RSS configuration reading where the driver attempts to acquire a lock that the kernel's ethtool subsystem has already locked, causing the system to hang. A local user with sufficient privileges can trigger this denial of service condition by executing ethtool RSS configuration commands. No patch is currently available for this medium-severity issue.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23164 MEDIUM PATCH This Month

The Linux kernel's rocker network driver fails to free allocated memory in rocker_world_port_post_fini() when certain callback functions are not implemented, causing a memory leak of approximately 288 bytes per port during device removal. A local attacker with standard user privileges can trigger repeated device removal operations to exhaust kernel memory and cause a denial of service. No patch is currently available for this issue.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23163 MEDIUM PATCH This Month

The Linux kernel amdgpu graphics driver crashes with a NULL pointer dereference on APU platforms (Raven, Renoir) when SVM page fault recovery attempts to access uninitialized interrupt ring buffers that only exist on discrete GPUs. A local authenticated attacker can trigger this denial of service by enabling retry faults on affected APUs. No patch is currently available.

Linux Null Pointer Dereference Denial Of Service Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23162 HIGH PATCH This Week

A double-free vulnerability in the Linux kernel's xe/nvm driver allows local users with low privileges to cause a denial of service or potential code execution through improper memory management during auxiliary device initialization failures. The flaw occurs when auxiliary_device_add() fails and triggers both the release callback and an additional kfree() operation on the same memory region. This affects Linux systems with the xe driver, and no patch is currently available.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-23160 MEDIUM PATCH This Month

The Linux kernel's octeon_ep driver fails to properly clean up allocated memory and mapped resources when the octep_ctrl_net_init() function fails during device setup, resulting in a local denial of service condition. An authenticated local attacker could trigger this memory leak by causing the initialization to fail, exhausting system memory over time. A patch is not currently available for this vulnerability.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23159 MEDIUM PATCH This Month

A null pointer dereference in the Linux kernel's perf scheduler functionality causes a denial of service when handling user space stacktraces for certain kernel tasks. Local attackers with low privileges can trigger this crash by exploiting inconsistent task classification logic that fails to properly identify user versus kernel tasks. The vulnerability affects the Linux kernel with no patch currently available.

Linux Null Pointer Dereference Denial Of Service Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23158 HIGH PATCH This Week

A use-after-free vulnerability in the Linux kernel's gpio-virtuser configfs release path allows local users with standard privileges to trigger memory corruption and potentially achieve code execution by causing mutex operations on freed memory. The flaw exists because the device structure is freed while a mutex guard scope is still active, leading to undefined behavior when the guard attempts to unlock the already-destroyed mutex. This vulnerability affects Linux systems with the affected kernel versions and requires local access to exploit.

Linux Use After Free Memory Corruption Information Disclosure Linux Kernel +2
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-23157 MEDIUM PATCH This Month

Linux kernel dirty page throttling can cause system hangs when cgroup memory limits are restrictive, as processes become stuck waiting on balance_dirty_pages() io_schedule_timeout() calls. A local user with write permissions can trigger a denial of service by exhausting dirty page limits through intensive file operations, potentially freezing the system. No patch is currently available for affected kernels prior to v6.18.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23156 HIGH PATCH This Week

The Linux kernel's efivarfs implementation fails to propagate errors from __efivar_entry_get(), causing the efivar_entry_get() function to mask failures and return success regardless of the underlying operation's result. This error handling flaw enables uninitialized heap memory to be copied to userspace through the efivarfs_file_read() path, potentially exposing sensitive kernel data to local users with read access to efivarfs. No patch is currently available for this high-severity vulnerability affecting the Linux kernel.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2026-23155 MEDIUM PATCH This Month

A null pointer dereference in the Linux kernel's gs_usb driver can cause a denial of service when processing malformed USB bulk transfer callbacks, affecting systems with vulnerable CAN interface hardware. Local attackers with unprivileged access can trigger this crash by submitting crafted USB requests that fail resubmission. No patch is currently available for this vulnerability.

Linux Denial Of Service Null Pointer Dereference Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23154 MEDIUM PATCH This Month

GSO segmentation when forwarding GRO packets containing a frag_list. The function skb_segment_list cannot correctly process GRO skbs contains a security vulnerability.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23153 MEDIUM PATCH This Month

A race condition in the Linux kernel's FireWire core transaction handling allows local attackers with low privileges to cause a denial of service by triggering concurrent processing of AR response and AT request completion events without proper synchronization. The vulnerability stems from transaction list enumeration occurring outside the card lock scope, enabling memory corruption or system crashes when exploited. No patch is currently available for this issue.

Linux Race Condition Information Disclosure Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
4.7
EPSS
0.0%
CVE-2026-23152 MEDIUM PATCH This Month

The Linux kernel's mac80211 WiFi implementation contains a parsing error when processing TID-To-Link Mapping (TTLM) elements with default link configurations, causing out-of-bounds memory reads. This vulnerability affects systems running vulnerable Linux kernels and could lead to denial of service through kernel crashes or information disclosure. No patch is currently available for this medium-severity issue.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23151 MEDIUM PATCH This Month

The Linux kernel's Bluetooth MGMT subsystem fails to properly deallocate memory structures in the set_ssp_complete() function, resulting in a memory leak for each completed SSP command. A local attacker with unprivileged user access can exploit this to cause denial of service through memory exhaustion over time. No patch is currently available.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23150 MEDIUM PATCH This Month

A memory leak in the Linux kernel's NFC LLCP implementation allows local attackers to exhaust memory by exploiting a race condition between the nfc_llcp_send_ui_frame() function and local device cleanup routines. An attacker with local access can trigger the vulnerability by sending NFC frames while the underlying device is being destroyed, causing socket buffers to accumulate in the transmit queue and never be freed.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23149 MEDIUM PATCH This Month

A local attacker with unprivileged access can trigger kernel warnings in the Linux kernel's DRM subsystem by passing oversized handle values to drm_gem_change_handle_ioctl(), exploiting improper input validation between userspace u32 and kernel int types. This vulnerability affects the Linux kernel and allows denial of service through repeated warning generation, though no patch is currently available.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23147 MEDIUM PATCH This Month

A memory leak in the Linux kernel's btrfs zlib compression module on S390 hardware-accelerated systems fails to properly release file cache pages, potentially leading to memory exhaustion and denial of service on affected systems. The vulnerability stems from missing cleanup code introduced during a refactoring of the S390x hardware acceleration buffer handling. Local attackers with access to the system could trigger the leak through repeated compression operations.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23146 MEDIUM PATCH This Month

A race condition in the Linux kernel's Bluetooth HCI UART driver allows local attackers with user privileges to trigger a null pointer dereference and cause a denial of service by initiating a TTY write wakeup during driver initialization. The vulnerability occurs when hci_uart_tx_wakeup() schedules write work before the protocol handler's private data structure is initialized, leading to a crash in hci_uart_write_work(). No patch is currently available for this issue.

Linux Null Pointer Dereference Denial Of Service Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23145 MEDIUM PATCH This Month

A resource leak in the Linux kernel's ext4 filesystem implementation fails to properly release buffer head references in the xattr inode update function, potentially causing memory exhaustion on systems with local access. This medium-severity vulnerability affects Linux kernel versions and could allow local attackers to degrade system availability through repeated resource consumption. No patch is currently available.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23144 MEDIUM PATCH This Month

Linux kernel DAMON sysfs interface fails to properly clean up subdirectories when context setup encounters errors, leaving orphaned directory structures and leaked memory that degrades functionality until system reboot. A local user with appropriate privileges can trigger this condition to cause denial of service by making the DAMON sysfs interface unreliable or unusable. This vulnerability requires local access and user interaction to exploit, with no available patch currently issued.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23143 MEDIUM PATCH This Month

A memory alignment flaw in the Linux kernel's virtio_net driver allows local attackers with user-level privileges to cause denial of service through misalignment of flexible array members in the virtnet_info structure. The vulnerability results in potential memory corruption when accessing the rss_hash_key_data field, impacting systems running affected Linux kernel versions. No patch is currently available for this medium-severity issue.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23142 MEDIUM PATCH This Month

Linux kernel DAMON sysfs interface fails to properly clean up access_pattern subdirectories when scheme directory setup fails, causing memory leaks and rendering the sysfs interface non-functional until system reboot. A local privileged user can trigger this condition to degrade system functionality and exhaust memory resources. No patch is currently available for this medium-severity vulnerability.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23141 MEDIUM PATCH This Month

The Linux kernel's btrfs send functionality fails to validate whether file extent items are inline extents before accessing the disk_bytenr field, potentially causing invalid memory access or metadata corruption on affected systems. A local attacker with file system access could exploit this to trigger a denial of service condition through carefully crafted inline extent items. No patch is currently available for this medium-severity vulnerability.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23140 MEDIUM PATCH This Month

The Linux kernel's BPF test_run component fails to properly validate XDP frame metadata size, allowing local users with appropriate privileges to specify oversized metadata that exhausts frame headroom and leaves the frame structure uninitialized. This can lead to denial of service or memory corruption during packet transmission. No patch is currently available for this issue.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23138 MEDIUM PATCH This Month

The Linux kernel's ftrace stack trace recording mechanism lacks proper recursion protection, allowing local users with sufficient privileges to trigger an infinite recursion loop when kernel stack trace triggers are enabled on RCU events, resulting in denial of service through system hang or crash. The vulnerability affects systems where tracing is configured to capture stack traces during RCU event monitoring. No patch is currently available to address this medium-severity defect.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23137 MEDIUM PATCH This Month

Memory leak in the Linux kernel's device tree unittest module allows local users with standard privileges to cause a denial of service by exhausting system memory when the of_resolve_phandles() function fails during unit test execution. The vulnerability stems from improper resource cleanup in the unittest_data_add() function, where allocated memory is not freed on error paths. A patch is not currently available.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23135 MEDIUM PATCH This Month

The Linux kernel ath12k WiFi driver incorrectly frees DMA memory buffers using aligned addresses instead of the original unaligned pointers returned by dma_alloc_coherent(), potentially causing memory management errors and denial of service on systems using affected WiFi hardware. A local attacker with user privileges can trigger this vulnerability through normal WiFi driver operations, leading to system instability or crashes. No patch is currently available for this medium-severity vulnerability.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23134 MEDIUM PATCH This Month

The Linux kernel's kmalloc_nolock() function on PREEMPT_RT systems fails to properly validate execution context before acquiring a sleeping lock, causing a kernel panic when BPF programs execute from tracepoints with preemption disabled. A local attacker with ability to run BPF programs can trigger a denial of service by causing the kernel to attempt sleeping operations in invalid contexts. No patch is currently available for this medium-severity vulnerability.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23133 MEDIUM PATCH This Month

The ath10k WiFi driver in the Linux kernel incorrectly frees DMA-allocated memory by using aligned addresses instead of the original unaligned pointers, potentially causing memory corruption and system denial of service on affected systems. A local attacker with appropriate privileges can trigger this vulnerability to crash the kernel or cause system instability. No patch is currently available for this issue.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23132 MEDIUM PATCH This Month

The Linux kernel's Synopsys DesignWare DisplayPort bridge driver contains improper error handling in the dw_dp_bind() function that fails to unregister auxiliary devices and return error codes correctly, potentially causing resource leaks or kernel instability for systems using affected display hardware. A local attacker with sufficient privileges could trigger these error paths to cause a denial of service through resource exhaustion or kernel panic.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-71202 MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: iommu/sva: invalidate stale IOTLB entries for kernel address space Introduce a new IOMMU interface to flush IOTLB paging cache entries for the CPU kernel address space.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-71201 HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: netfs: Fix early read unlock of page with EOF in middle The read result collection for buffered reads seems to run ahead of the completion of subrequests under some circumstances, as can be seen in the following log snippet: 9p_client_res: client 18446612686390831168 response P9_TREAD tag 0 err 0 ...

Linux Buffer Overflow Information Disclosure Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
7.1
EPSS
0.0%
CVE-2026-23131 MEDIUM PATCH This Month

The HP BIOS configuration driver in the Linux kernel fails to validate attribute names before kobject registration, causing kernel warnings and potential denial of service when HP BIOS returns empty name strings. A local user with standard privileges can trigger this vulnerability to crash or destabilize the system by supplying malformed BIOS attribute data. No patch is currently available for this medium-severity flaw affecting Linux systems with HP BIOS configuration support.

Linux Hp Information Disclosure Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23130 MEDIUM PATCH This Month

A deadlock condition in the Linux kernel's ath12k WiFi driver occurs when management frame transmission is blocked by the wiphy lock during flush operations, causing the wireless interface to hang and preventing authentication. Local users with sufficient privileges can trigger this condition by initiating WiFi authentication while pending management frames are being flushed, resulting in a denial of service. No patch is currently available for this medium-severity vulnerability.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23129 MEDIUM PATCH This Month

The Linux kernel's DPLL subsystem fails to prevent duplicate pin registrations, allowing callers to register the same pin multiple times and causing memory management issues during unregistration. A local attacker with unprivileged access could trigger this condition to cause a denial of service through kernel warnings or crashes. No patch is currently available for this vulnerability.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23128 MEDIUM PATCH This Month

The Linux kernel's ARM64 hibernation resume function fails to disable Control Flow Integrity (CFI) checking, causing a data abort exception when resuming from hibernation on affected systems. A local attacker with hibernation access could trigger a denial of service by invoking the resume function without proper CFI validation. This affects Linux kernel deployments on ARM64 architecture, though no patch is currently available.

Linux Information Disclosure Google Linux Kernel Android +2
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23127 MEDIUM PATCH This Month

Linux kernel perf subsystem allows local authenticated users to trigger a use-after-free condition via refcount manipulation when creating perf event group members with PERF_FLAG_FD_OUTPUT flag, resulting in denial of service through kernel warnings and potential system instability. This vulnerability requires local access and existing privileges to exploit, with no patch currently available.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23126 MEDIUM PATCH This Month

The Linux kernel netdevsim driver contains a race condition in the bpf_bound_progs list operations where concurrent calls to nsim_bpf_create_prog() and nsim_bpf_destroy_prog() can corrupt the list and trigger kernel crashes. A local attacker with limited privileges can exploit this vulnerability to cause a denial of service by manipulating eBPF program creation and destruction. No patch is currently available for this issue.

Linux Debian Denial Of Service Race Condition Linux Kernel +2
NVD VulDB
CVSS 3.1
4.7
EPSS
0.0%
CVE-2026-23125 MEDIUM PATCH This Month

A null pointer dereference in the Linux kernel's SCTP authentication initialization can be triggered by local attackers with user privileges to cause a denial of service through a crash in the packet transmission path. The vulnerability occurs when SCTP-AUTH key setup fails during association peer initialization, leaving a dangling pointer that is subsequently dereferenced. No patch is currently available for this medium-severity issue affecting the Linux kernel.

Linux Denial Of Service Null Pointer Dereference Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23124 MEDIUM PATCH This Month

A data race condition in the Linux kernel's IPv6 NDISC router discovery function allows concurrent unsynchronized read/write access to the ra_mtu field, potentially causing denial of service through system instability or crashes on local systems. The vulnerability affects all Linux systems running vulnerable kernel versions and requires local access to trigger. No patch is currently available, though the race condition is considered low-impact as the affected field represents best-effort MTU configuration.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23123 MEDIUM PATCH This Month

Uninitialized pointer dereferences in the Linux kernel's interconnect debugfs implementation can cause denial of service when users interact with src_node and dst_node debugfs entries. A local attacker with standard user privileges can trigger memory access violations through reads or writes to these debugfs interfaces, crashing the system or causing kernel instability. No patch is currently available for this medium-severity vulnerability.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23122 MEDIUM PATCH This Month

The Intel i225/i226 Ethernet controller driver in the Linux kernel is susceptible to TX unit hangs during heavy timestamping operations due to insufficient packet buffer allocation. A local user with low privileges can trigger denial of service by generating sustained timestamped network traffic that exhausts the 7KB per-queue TX buffer, requiring a kernel patch that reduces the buffer to 5KB per hardware specification to mitigate the hang condition.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23121 MEDIUM PATCH This Month

A data-race condition in the Linux kernel's mISDN subsystem allows local attackers with unprivileged access to cause a denial of service by triggering concurrent access to the dev->work field through ioctl and read operations without proper synchronization. The vulnerability affects the mISDN timer device driver where unsynchronized reads and writes to shared data can result in system availability issues. No patch is currently available for this medium-severity vulnerability.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23120 MEDIUM PATCH This Month

A data-race condition in the Linux kernel's L2TP tunnel deletion function can cause a denial of service on systems using L2TP networking. Local attackers with unprivileged access can trigger concurrent socket operations to crash the kernel or cause system instability. No patch is currently available for this vulnerability.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23119 MEDIUM PATCH This Month

The Linux kernel bonding driver fails to properly provide a network namespace pointer to the flow dissector function, allowing a local attacker with unprivileged access to trigger a kernel warning and cause a denial of service. The vulnerability exists in the bond_flow_dissect() code path used for XDP packet transmission, where crafted network packets lacking proper device or socket context can be processed unsafely.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23118 MEDIUM PATCH This Month

A race condition in the Linux kernel's rxrpc subsystem allows local attackers with limited privileges to cause a denial of service by exploiting unsynchronized access to the last_tx_at timestamp variable, potentially triggering load/store tearing on 32-bit architectures. The vulnerability requires local access and specific timing conditions to trigger, but can result in system instability or crash when successfully exploited. No patch is currently available.

Linux Race Condition Information Disclosure Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
4.7
EPSS
0.0%
CVE-2026-23117 MEDIUM PATCH This Month

A NULL pointer dereference in the Linux kernel's ice driver occurs when devlink reload fails and the driver is subsequently removed, affecting systems using Intel ice network adapters. A local privileged user can trigger this denial of service condition by initiating a devlink reinit operation that fails, leaving the hardware in an uninitialized state. The vulnerability stems from a missing ice_deinit_hw() call in the devlink reinit path that leaves control queues uninitialized.

Linux Null Pointer Dereference Denial Of Service Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23116 MEDIUM PATCH This Month

Improper handling of reset and clock masking in the Linux kernel's i.MX8MQ VPU power domain controller can cause system hangs when attempting to independently reset GPU cores. Local attackers with sufficient privileges can trigger this vulnerability by manipulating VPU reset operations, leading to denial of service. A patch is not currently available.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23115 MEDIUM PATCH This Month

A race condition in the Linux kernel's serial driver allows local attackers with low privileges to bypass TTY device linkage during console configuration, potentially enabling unauthorized access to serial console interfaces on Qualcomm SoCs and other affected systems. The vulnerability stems from improper initialization ordering that fails to configure tty->port before uart_configure_port() is called, creating a window where user-space applications can open the console without proper driver linkage. No patch is currently available.

Qualcomm Denial Of Service Race Condition Linux Linux Kernel +2
NVD VulDB
CVSS 3.1
4.7
EPSS
0.0%
CVE-2026-23114 MEDIUM PATCH This Month

Linux kernel ptrace operations on ARM64 systems without SME support can corrupt SVE register state, causing the kernel to enter an invalid FPSIMD configuration that triggers warnings and potential instability. A local attacker with ptrace privileges can exploit this to cause a denial of service by manipulating SVE register writes on affected systems. The vulnerability requires local access and is present on Linux systems running vulnerable kernel versions without an available patch.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23113 MEDIUM PATCH This Month

The Linux kernel io_uring/io-wq subsystem fails to properly monitor exit signals during work execution loops, allowing a local attacker with user privileges to cause the work queue to hang indefinitely by queuing operations that take excessive time to complete. This denial of service condition prevents the io-wq worker threads from shutting down gracefully, potentially blocking system operations that depend on io_uring. No patch is currently available for this vulnerability.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2025-71200 MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode When operating in HS200 or HS400 timing modes, reducing the clock frequency below 52MHz will lead to link broken as the Rockchip DWC MSHC controller requires maintaining a minimum clock of 52MHz in these modes.

Linux Debian Information Disclosure Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23110 MEDIUM PATCH This Month

A race condition in the Linux kernel's SCSI error handling mechanism can prevent the error handler from being properly awakened when concurrent command completions occur, causing I/O operations to hang indefinitely. A local attacker with low privileges can trigger this condition through timing-sensitive operations to cause a denial of service. No patch is currently available for this vulnerability.

Linux Race Condition Information Disclosure Linux Kernel Redhat +1
NVD VulDB
CVSS 3.1
4.7
EPSS
0.0%
CVE-2026-23109 MEDIUM PATCH This Month

A denial of service vulnerability in the Linux kernel's writeback mechanism allows local users with standard privileges to cause indefinite hangs in wait_sb_inodes() when interacting with faulty FUSE servers that fail to respond to write requests. The vulnerability stems from improper handling of mappings without data integrity semantics, which should be skipped during synchronization operations but are instead waited upon indefinitely. An attacker controlling a malfunctioning FUSE server can exploit this to freeze system operations that depend on filesystem synchronization.

Linux Denial Of Service Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23108 MEDIUM PATCH This Month

The Linux kernel USB CAN driver (usb_8dev) fails to properly manage URB memory when USB transfers complete, allowing a local attacker with user privileges to trigger a memory leak and cause a denial of service through resource exhaustion. The vulnerability occurs because completed URBs are unanchored by the USB framework before the callback function executes, preventing proper cleanup during driver shutdown. No patch is currently available for this issue.

Linux Information Disclosure Linux Kernel Redhat Suse
NVD VulDB
CVSS 3.1
5.5
EPSS
0.0%
CVE-2026-23107 Monitor

In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA The code to restore a ZA context doesn't attempt to allocate the task's sve_state before setting TIF_SME.

Linux Null Pointer Dereference Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23106 Monitor

In the Linux kernel, the following vulnerability has been resolved: timekeeping: Adjust the leap state for the correct auxiliary timekeeper When __do_ajdtimex() was introduced to handle adjtimex for any timekeeper, this reference to tk_core was not updated.

Linux Industrial Linux Kernel
NVD
EPSS
0.0%
CVE-2026-23205
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A memory leak in the Linux kernel's SMB/CIFS client implementation allows local attackers with unprivileged access to exhaust kernel memory and cause a denial of service by triggering failed file operations on read-only mounted shares. An attacker can exploit this by repeatedly attempting to write files to a read-only CIFS mount, causing memory allocated for SMB requests to not be properly freed. The vulnerability persists until the cifs kernel module is unloaded, and currently lacks a public patch.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23203
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue Commit 1767bb2d47b7 ("ipv6: mcast: Don't hold RTNL for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP.") removed the RTNL lock for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP operations.

Linux Dns Linux Kernel
NVD
CVE-2026-23202
EPSS 0%
PATCH Monitor

In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer The curr_xfer field is read by the IRQ handler without holding the lock to check if a transfer is in progress.

Linux Use After Free Null Pointer Dereference +1
NVD
CVE-2026-23201
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: ceph: fix oops due to invalid pointer for kfree() in parse_longname() This fixes a kernel oops when reading ceph snapshot directories (.snap), for example by simply running `ls /mnt/my_ceph/.snap`.

Linux Linux Kernel
NVD
CVE-2026-23200
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix ECMP sibling count mismatch when clearing RTF_ADDRCONF syzbot reported a kernel BUG in fib6_add_rt2node() when adding an IPv6 route.

Linux Linux Kernel
NVD
CVE-2026-23199
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: procfs: avoid fetching build ID while holding VMA lock Fix PROCMAP_QUERY to fetch optional build ID only after dropping mmap_lock or per-VMA lock, whichever was used to lock VMA under question, to avoid deadlock reported by syzbot: -> #1 (&mm->mmap_lock){++++}-{4:4}: __might_fault+0xed/0x170 _copy_to_iter+0x118/0x1720 copy_page_to_iter+0x12d/0x1e0 filemap_read+0x720/0x10a0 blkdev_read_iter+0x2b5/0x4e0 vfs_read+0x7f4/0xae0 ksys_read+0x12a/0x250 do_syscall_64+0xcb/0xf80 entry_SYSCALL_64_after_hwframe+0x77/0x7f -> #0 (&sb->s_type->i_mutex_key#8){++++}-{4:4}: __lock_acquire+0x1509/0x26d0 lock_acquire+0x185/0x340 down_read+0x98/0x490 blkdev_read_iter+0x2a7/0x4e0 __kernel_read+0x39a/0xa90 freader_fetch+0x1d5/0xa80 __build_id_parse.isra.0+0xea/0x6a0 do_procmap_query+0xd75/0x1050 procfs_procmap_ioctl+0x7a/0xb0 __x64_sys_ioctl+0x18e/0x210 do_syscall_64+0xcb/0xf80 entry_SYSCALL_64_after_hwframe+0x77/0x7f other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- rlock(&mm->mmap_lock); lock(&sb->s_type->i_mutex_key#8); lock(&mm->mmap_lock); rlock(&sb->s_type->i_mutex_key#8); *** DEADLOCK *** This seems to be exacerbated (as we haven't seen these syzbot reports before that) by the recent: 777a8560fd29 ("lib/buildid: use __kernel_read() for sleepable context") To make this safe, we need to grab file refcount while VMA is still locked, but other than that everything is pretty straightforward.

Linux Linux Kernel
NVD
CVE-2026-23197
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: i2c: imx: preserve error state in block data length handler When a block read returns an invalid length, zero or >I2C_SMBUS_BLOCK_MAX, the length handler sets the state to IMX_I2C_STATE_FAILED.

Linux Denial Of Service Linux Kernel
NVD
CVE-2026-23196
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: HID: Intel-thc-hid: Intel-thc: Add safety check for reading DMA buffer Add DMA buffer readiness check before reading DMA buffer to avoid unexpected NULL pointer accessing.

Linux Null Pointer Dereference Linux Kernel
NVD
CVE-2026-23194
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: rust_binder: correctly handle FDA objects of length zero Fix a bug where an empty FDA (fd array) object with 0 fds would cause an out-of-bounds error.

Linux Android Linux Kernel
NVD
CVE-2026-23190
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Memory leak in AMD ASoC PDM DMA operations allows local attackers with user-level privileges to cause denial of service through resource exhaustion on affected Linux systems. The vulnerability persists as no patch is currently available, leaving vulnerable systems at continued risk of system instability or crash from cumulative memory consumption.

Linux Information Disclosure Amd +3
NVD VulDB
CVE-2026-23189
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A null pointer dereference in the CephFS kernel client's MDS authentication matching function (ceph_mds_auth_match()) allows local attackers with low privileges to cause a denial of service by crashing the kernel when the mds_namespace mount option is not specified. This regression affects Linux kernel versions 6.18-rc1 and later, impacting systems using CephFS with default mount configurations. No patch is currently available for this vulnerability.

Linux Null Pointer Dereference Denial Of Service +3
NVD VulDB
CVE-2026-23188
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: net: usb: r8152: fix resume reset deadlock rtl8152 can trigger device reset during reset which potentially can result in a deadlock: **** DPM device timeout after 10 seconds; 15 seconds until panic **** Call Trace: <TASK> schedule+0x483/0x1370 schedule_preempt_disabled+0x15/0x30 __mutex_lock_common+0x1fd/0x470 __rtl8152_set_mac_address+0x80/0x1f0 dev_set_mac_address+0x7f/0x150 rtl8152_post_reset+0x72/0x150 usb_reset_device+0x1d0/0x220 rtl8152_resume+0x99/0xc0 usb_resume_interface+0x3e/0xc0 usb_resume_both+0x104/0x150 usb_resume+0x22/0x110 The problem is that rtl8152 resume calls reset under tp->control mutex while reset basically re-enters rtl8152 and attempts to acquire the same tp->control lock once again.

Linux Linux Kernel
NVD
CVE-2026-23187
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc->domains Fix out-of-range access of bc->domains in imx8m_blk_ctrl_remove().

Linux Linux Kernel
NVD
CVE-2026-23186
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel's acpi_power_meter driver contains a deadlock vulnerability in its notify callback function that can cause a denial of service when device removal races with sysfs attribute access. A local user with privileges to trigger power meter notifications can exploit this to hang or crash the system. No patch is currently available.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23183
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: fix NULL pointer dereference when setting max An issue was triggered: BUG: kernel NULL pointer dereference, address: 0000000000000000 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] SMP NOPTI CPU: 15 UID: 0 PID: 658 Comm: bash Tainted: 6.19.0-rc6-next-2026012 Tainted: [O]=OOT_MODULE Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), RIP: 0010:strcmp+0x10/0x30 RSP: 0018:ffffc900017f7dc0 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff888107cd4358 RDX: 0000000019f73907 RSI: ffffffff82cc381a RDI: 0000000000000000 RBP: ffff8881016bef0d R08: 000000006c0e7145 R09: 0000000056c0e714 R10: 0000000000000001 R11: ffff888107cd4358 R12: 0007ffffffffffff R13: ffff888101399200 R14: ffff888100fcb360 R15: 0007ffffffffffff CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 0000000105c79000 CR4: 00000000000006f0 Call Trace: <TASK> dmemcg_limit_write.constprop.0+0x16d/0x390 ? __pfx_set_resource_max+0x10/0x10 kernfs_fop_write_iter+0x14e/0x200 vfs_write+0x367/0x510 ksys_write+0x66/0xe0 do_syscall_64+0x6b/0x390 entry_SYSCALL_64_after_hwframe+0x76/0x7e RIP: 0033:0x7f42697e1887 It was trriggered setting max without limitation, the command is like: "echo test/region0 > dmem.max".

Linux Null Pointer Dereference Linux Kernel
NVD
CVE-2026-23182
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: spi: tegra: Fix a memory leak in tegra_slink_probe() In tegra_slink_probe(), when platform_get_irq() fails, it directly returns from the function with an error code, which causes a memory leak.

Linux Linux Kernel
NVD
CVE-2026-23181
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: btrfs: sync read disk super and set block size When the user performs a btrfs mount, the block device is not set correctly. The user sets the block size of the block device to 0x4000 by executing the BLKBSZSET command.

Linux Null Pointer Dereference Linux Kernel
NVD
CVE-2026-23179
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() When the socket is closed while in TCP_LISTEN a callback is run to flush all outstanding packets, which in turns calls nvmet_tcp_listen_data_ready() with the sk_callback_lock held.

Linux Linux Kernel
NVD
CVE-2026-23177
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: mm, shmem: prevent infinite loop on truncate race When truncating a large swap entry, shmem_free_swap() returns 0 when the entry's index doesn't match the given index due to lookup alignment.

Linux Golang Linux Kernel
NVD
CVE-2026-23176
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: platform/x86: toshiba_haps: Fix memory leaks in add/remove routines toshiba_haps_add() leaks the haps object allocated by it if it returns an error after allocating that object successfully.

Linux Linux Kernel
NVD
CVE-2026-23174
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: nvme-pci: handle changing device dma map requirements The initial state of dma_needs_unmap may be false, but change to true while mapping the data iterator. Enabling swiotlb is one such case that can change the result.

Linux Linux Kernel
NVD
CVE-2025-71224
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: ocb: skip rx_no_sta when interface is not joined ieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only present after JOIN_OCB.

Linux Linux Kernel
NVD
CVE-2025-71223
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

CVE-2025-71223 is a security vulnerability (CVSS 5.5). Remediation should follow standard vulnerability management procedures.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2025-71222
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: wifi: wlcore: ensure skb headroom before skb_push This avoids occasional skb_under_panic Oops from wl1271_tx_work. In this case, headroom is less than needed (typically 110 - 94 = 16 bytes).

Linux Linux Kernel
NVD
CVE-2025-71221
EPSS 0% CVSS 7.0
HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: dmaengine: mmp_pdma: Fix race condition in mmp_pdma_residue() Add proper locking in mmp_pdma_residue() to prevent use-after-free when accessing descriptor list and descriptor contents.

Linux Race Condition Information Disclosure +3
NVD VulDB
CVE-2025-71220
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe() When ksmbd_iov_pin_rsp() fails, we should call ksmbd_session_rpc_close().

Linux Linux Kernel
NVD
CVE-2025-71204
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

CVE-2025-71204 is a security vulnerability (CVSS 5.5). Remediation should follow standard vulnerability management procedures.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2025-71203
EPSS 0% CVSS 7.0
HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: riscv: Sanitize syscall table indexing under speculation The syscall number is a user-controlled value used to index into the syscall table.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23173
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A null pointer dereference in the Linux kernel's mlx5e TC steering driver allows local attackers with user privileges to cause a denial of service by triggering improper flow deletion logic that attempts to access non-existent device peers. The vulnerability occurs when deleting TC flows without validating peer existence, leading to kernel crashes. No patch is currently available for this medium-severity flaw affecting Linux systems with Mellanox network drivers.

Linux Null Pointer Dereference Denial Of Service +3
NVD VulDB
CVE-2026-23170
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel's imx/tve driver fails to properly release a DDC device reference during probe failure or driver unbind, causing a resource leak that could lead to denial of service through memory exhaustion. Local users with driver interaction capabilities can trigger this leak through probe deferral or module unload operations. No patch is currently available to address this medium-severity vulnerability.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23168
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Linux kernel flexible proportions code can cause a denial of service through a deadlock when a hard interrupt fires during a soft interrupt's sequence count operation, allowing a local attacker with limited privileges to hang the system by triggering indefinite loops in proportion calculations. The vulnerability affects the fprop_new_period() function which lacks proper hardirq safety, creating a race condition between timer softirq context and block I/O hardirq handlers. No patch is currently available for this medium-severity issue.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23167
EPSS 0% CVSS 4.7
MEDIUM PATCH This Month

A race condition in the Linux kernel NFC subsystem allows local attackers with low privileges to cause a denial of service by triggering a use-after-free condition between rfkill device unregistration and NCI command queue destruction. An attacker can exploit this by closing a virtual NCI device file while rfkill operations are in progress, causing the kernel to access a destroyed work queue. No patch is currently available for this vulnerability.

Linux Race Condition Information Disclosure +4
NVD VulDB
CVE-2026-23166
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A NULL pointer dereference in the Intel ice network driver's ice_vsi_set_napi_queues() function can cause a kernel crash on Linux systems during suspend/resume operations when ring queue vectors are improperly initialized. Local users with standard privileges can trigger this denial of service condition through standard power management operations like systemctl suspend. No patch is currently available for this vulnerability affecting Linux kernel v6.18 and the Intel E810 Ethernet adapter family.

Linux Null Pointer Dereference Denial Of Service +4
NVD VulDB
CVE-2026-23165
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel's Saffirecode (sfc) driver contains a deadlock vulnerability in RSS configuration reading where the driver attempts to acquire a lock that the kernel's ethtool subsystem has already locked, causing the system to hang. A local user with sufficient privileges can trigger this denial of service condition by executing ethtool RSS configuration commands. No patch is currently available for this medium-severity issue.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23164
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel's rocker network driver fails to free allocated memory in rocker_world_port_post_fini() when certain callback functions are not implemented, causing a memory leak of approximately 288 bytes per port during device removal. A local attacker with standard user privileges can trigger repeated device removal operations to exhaust kernel memory and cause a denial of service. No patch is currently available for this issue.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23163
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel amdgpu graphics driver crashes with a NULL pointer dereference on APU platforms (Raven, Renoir) when SVM page fault recovery attempts to access uninitialized interrupt ring buffers that only exist on discrete GPUs. A local authenticated attacker can trigger this denial of service by enabling retry faults on affected APUs. No patch is currently available.

Linux Null Pointer Dereference Denial Of Service +3
NVD VulDB
CVE-2026-23162
EPSS 0% CVSS 7.8
HIGH PATCH This Week

A double-free vulnerability in the Linux kernel's xe/nvm driver allows local users with low privileges to cause a denial of service or potential code execution through improper memory management during auxiliary device initialization failures. The flaw occurs when auxiliary_device_add() fails and triggers both the release callback and an additional kfree() operation on the same memory region. This affects Linux systems with the xe driver, and no patch is currently available.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23160
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel's octeon_ep driver fails to properly clean up allocated memory and mapped resources when the octep_ctrl_net_init() function fails during device setup, resulting in a local denial of service condition. An authenticated local attacker could trigger this memory leak by causing the initialization to fail, exhausting system memory over time. A patch is not currently available for this vulnerability.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23159
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A null pointer dereference in the Linux kernel's perf scheduler functionality causes a denial of service when handling user space stacktraces for certain kernel tasks. Local attackers with low privileges can trigger this crash by exploiting inconsistent task classification logic that fails to properly identify user versus kernel tasks. The vulnerability affects the Linux kernel with no patch currently available.

Linux Null Pointer Dereference Denial Of Service +3
NVD VulDB
CVE-2026-23158
EPSS 0% CVSS 7.8
HIGH PATCH This Week

A use-after-free vulnerability in the Linux kernel's gpio-virtuser configfs release path allows local users with standard privileges to trigger memory corruption and potentially achieve code execution by causing mutex operations on freed memory. The flaw exists because the device structure is freed while a mutex guard scope is still active, leading to undefined behavior when the guard attempts to unlock the already-destroyed mutex. This vulnerability affects Linux systems with the affected kernel versions and requires local access to exploit.

Linux Use After Free Memory Corruption +4
NVD VulDB
CVE-2026-23157
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Linux kernel dirty page throttling can cause system hangs when cgroup memory limits are restrictive, as processes become stuck waiting on balance_dirty_pages() io_schedule_timeout() calls. A local user with write permissions can trigger a denial of service by exhausting dirty page limits through intensive file operations, potentially freezing the system. No patch is currently available for affected kernels prior to v6.18.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23156
EPSS 0% CVSS 7.8
HIGH PATCH This Week

The Linux kernel's efivarfs implementation fails to propagate errors from __efivar_entry_get(), causing the efivar_entry_get() function to mask failures and return success regardless of the underlying operation's result. This error handling flaw enables uninitialized heap memory to be copied to userspace through the efivarfs_file_read() path, potentially exposing sensitive kernel data to local users with read access to efivarfs. No patch is currently available for this high-severity vulnerability affecting the Linux kernel.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23155
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A null pointer dereference in the Linux kernel's gs_usb driver can cause a denial of service when processing malformed USB bulk transfer callbacks, affecting systems with vulnerable CAN interface hardware. Local attackers with unprivileged access can trigger this crash by submitting crafted USB requests that fail resubmission. No patch is currently available for this vulnerability.

Linux Denial Of Service Null Pointer Dereference +3
NVD VulDB
CVE-2026-23154
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

GSO segmentation when forwarding GRO packets containing a frag_list. The function skb_segment_list cannot correctly process GRO skbs contains a security vulnerability.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23153
EPSS 0% CVSS 4.7
MEDIUM PATCH This Month

A race condition in the Linux kernel's FireWire core transaction handling allows local attackers with low privileges to cause a denial of service by triggering concurrent processing of AR response and AT request completion events without proper synchronization. The vulnerability stems from transaction list enumeration occurring outside the card lock scope, enabling memory corruption or system crashes when exploited. No patch is currently available for this issue.

Linux Race Condition Information Disclosure +3
NVD VulDB
CVE-2026-23152
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel's mac80211 WiFi implementation contains a parsing error when processing TID-To-Link Mapping (TTLM) elements with default link configurations, causing out-of-bounds memory reads. This vulnerability affects systems running vulnerable Linux kernels and could lead to denial of service through kernel crashes or information disclosure. No patch is currently available for this medium-severity issue.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23151
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel's Bluetooth MGMT subsystem fails to properly deallocate memory structures in the set_ssp_complete() function, resulting in a memory leak for each completed SSP command. A local attacker with unprivileged user access can exploit this to cause denial of service through memory exhaustion over time. No patch is currently available.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23150
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A memory leak in the Linux kernel's NFC LLCP implementation allows local attackers to exhaust memory by exploiting a race condition between the nfc_llcp_send_ui_frame() function and local device cleanup routines. An attacker with local access can trigger the vulnerability by sending NFC frames while the underlying device is being destroyed, causing socket buffers to accumulate in the transmit queue and never be freed.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23149
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A local attacker with unprivileged access can trigger kernel warnings in the Linux kernel's DRM subsystem by passing oversized handle values to drm_gem_change_handle_ioctl(), exploiting improper input validation between userspace u32 and kernel int types. This vulnerability affects the Linux kernel and allows denial of service through repeated warning generation, though no patch is currently available.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23147
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A memory leak in the Linux kernel's btrfs zlib compression module on S390 hardware-accelerated systems fails to properly release file cache pages, potentially leading to memory exhaustion and denial of service on affected systems. The vulnerability stems from missing cleanup code introduced during a refactoring of the S390x hardware acceleration buffer handling. Local attackers with access to the system could trigger the leak through repeated compression operations.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23146
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A race condition in the Linux kernel's Bluetooth HCI UART driver allows local attackers with user privileges to trigger a null pointer dereference and cause a denial of service by initiating a TTY write wakeup during driver initialization. The vulnerability occurs when hci_uart_tx_wakeup() schedules write work before the protocol handler's private data structure is initialized, leading to a crash in hci_uart_write_work(). No patch is currently available for this issue.

Linux Null Pointer Dereference Denial Of Service +3
NVD VulDB
CVE-2026-23145
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A resource leak in the Linux kernel's ext4 filesystem implementation fails to properly release buffer head references in the xattr inode update function, potentially causing memory exhaustion on systems with local access. This medium-severity vulnerability affects Linux kernel versions and could allow local attackers to degrade system availability through repeated resource consumption. No patch is currently available.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23144
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Linux kernel DAMON sysfs interface fails to properly clean up subdirectories when context setup encounters errors, leaving orphaned directory structures and leaked memory that degrades functionality until system reboot. A local user with appropriate privileges can trigger this condition to cause denial of service by making the DAMON sysfs interface unreliable or unusable. This vulnerability requires local access and user interaction to exploit, with no available patch currently issued.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23143
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A memory alignment flaw in the Linux kernel's virtio_net driver allows local attackers with user-level privileges to cause denial of service through misalignment of flexible array members in the virtnet_info structure. The vulnerability results in potential memory corruption when accessing the rss_hash_key_data field, impacting systems running affected Linux kernel versions. No patch is currently available for this medium-severity issue.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23142
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Linux kernel DAMON sysfs interface fails to properly clean up access_pattern subdirectories when scheme directory setup fails, causing memory leaks and rendering the sysfs interface non-functional until system reboot. A local privileged user can trigger this condition to degrade system functionality and exhaust memory resources. No patch is currently available for this medium-severity vulnerability.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23141
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel's btrfs send functionality fails to validate whether file extent items are inline extents before accessing the disk_bytenr field, potentially causing invalid memory access or metadata corruption on affected systems. A local attacker with file system access could exploit this to trigger a denial of service condition through carefully crafted inline extent items. No patch is currently available for this medium-severity vulnerability.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23140
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel's BPF test_run component fails to properly validate XDP frame metadata size, allowing local users with appropriate privileges to specify oversized metadata that exhausts frame headroom and leaves the frame structure uninitialized. This can lead to denial of service or memory corruption during packet transmission. No patch is currently available for this issue.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23138
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel's ftrace stack trace recording mechanism lacks proper recursion protection, allowing local users with sufficient privileges to trigger an infinite recursion loop when kernel stack trace triggers are enabled on RCU events, resulting in denial of service through system hang or crash. The vulnerability affects systems where tracing is configured to capture stack traces during RCU event monitoring. No patch is currently available to address this medium-severity defect.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23137
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Memory leak in the Linux kernel's device tree unittest module allows local users with standard privileges to cause a denial of service by exhausting system memory when the of_resolve_phandles() function fails during unit test execution. The vulnerability stems from improper resource cleanup in the unittest_data_add() function, where allocated memory is not freed on error paths. A patch is not currently available.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23135
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel ath12k WiFi driver incorrectly frees DMA memory buffers using aligned addresses instead of the original unaligned pointers returned by dma_alloc_coherent(), potentially causing memory management errors and denial of service on systems using affected WiFi hardware. A local attacker with user privileges can trigger this vulnerability through normal WiFi driver operations, leading to system instability or crashes. No patch is currently available for this medium-severity vulnerability.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23134
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel's kmalloc_nolock() function on PREEMPT_RT systems fails to properly validate execution context before acquiring a sleeping lock, causing a kernel panic when BPF programs execute from tracepoints with preemption disabled. A local attacker with ability to run BPF programs can trigger a denial of service by causing the kernel to attempt sleeping operations in invalid contexts. No patch is currently available for this medium-severity vulnerability.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23133
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The ath10k WiFi driver in the Linux kernel incorrectly frees DMA-allocated memory by using aligned addresses instead of the original unaligned pointers, potentially causing memory corruption and system denial of service on affected systems. A local attacker with appropriate privileges can trigger this vulnerability to crash the kernel or cause system instability. No patch is currently available for this issue.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23132
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel's Synopsys DesignWare DisplayPort bridge driver contains improper error handling in the dw_dp_bind() function that fails to unregister auxiliary devices and return error codes correctly, potentially causing resource leaks or kernel instability for systems using affected display hardware. A local attacker with sufficient privileges could trigger these error paths to cause a denial of service through resource exhaustion or kernel panic.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2025-71202
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: iommu/sva: invalidate stale IOTLB entries for kernel address space Introduce a new IOMMU interface to flush IOTLB paging cache entries for the CPU kernel address space.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2025-71201
EPSS 0% CVSS 7.1
HIGH PATCH This Week

In the Linux kernel, the following vulnerability has been resolved: netfs: Fix early read unlock of page with EOF in middle The read result collection for buffered reads seems to run ahead of the completion of subrequests under some circumstances, as can be seen in the following log snippet: 9p_client_res: client 18446612686390831168 response P9_TREAD tag 0 err 0 ...

Linux Buffer Overflow Information Disclosure +3
NVD VulDB
CVE-2026-23131
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The HP BIOS configuration driver in the Linux kernel fails to validate attribute names before kobject registration, causing kernel warnings and potential denial of service when HP BIOS returns empty name strings. A local user with standard privileges can trigger this vulnerability to crash or destabilize the system by supplying malformed BIOS attribute data. No patch is currently available for this medium-severity flaw affecting Linux systems with HP BIOS configuration support.

Linux Hp Information Disclosure +3
NVD VulDB
CVE-2026-23130
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A deadlock condition in the Linux kernel's ath12k WiFi driver occurs when management frame transmission is blocked by the wiphy lock during flush operations, causing the wireless interface to hang and preventing authentication. Local users with sufficient privileges can trigger this condition by initiating WiFi authentication while pending management frames are being flushed, resulting in a denial of service. No patch is currently available for this medium-severity vulnerability.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23129
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel's DPLL subsystem fails to prevent duplicate pin registrations, allowing callers to register the same pin multiple times and causing memory management issues during unregistration. A local attacker with unprivileged access could trigger this condition to cause a denial of service through kernel warnings or crashes. No patch is currently available for this vulnerability.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23128
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel's ARM64 hibernation resume function fails to disable Control Flow Integrity (CFI) checking, causing a data abort exception when resuming from hibernation on affected systems. A local attacker with hibernation access could trigger a denial of service by invoking the resume function without proper CFI validation. This affects Linux kernel deployments on ARM64 architecture, though no patch is currently available.

Linux Information Disclosure Google +4
NVD VulDB
CVE-2026-23127
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Linux kernel perf subsystem allows local authenticated users to trigger a use-after-free condition via refcount manipulation when creating perf event group members with PERF_FLAG_FD_OUTPUT flag, resulting in denial of service through kernel warnings and potential system instability. This vulnerability requires local access and existing privileges to exploit, with no patch currently available.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23126
EPSS 0% CVSS 4.7
MEDIUM PATCH This Month

The Linux kernel netdevsim driver contains a race condition in the bpf_bound_progs list operations where concurrent calls to nsim_bpf_create_prog() and nsim_bpf_destroy_prog() can corrupt the list and trigger kernel crashes. A local attacker with limited privileges can exploit this vulnerability to cause a denial of service by manipulating eBPF program creation and destruction. No patch is currently available for this issue.

Linux Debian Denial Of Service +4
NVD VulDB
CVE-2026-23125
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A null pointer dereference in the Linux kernel's SCTP authentication initialization can be triggered by local attackers with user privileges to cause a denial of service through a crash in the packet transmission path. The vulnerability occurs when SCTP-AUTH key setup fails during association peer initialization, leaving a dangling pointer that is subsequently dereferenced. No patch is currently available for this medium-severity issue affecting the Linux kernel.

Linux Denial Of Service Null Pointer Dereference +3
NVD VulDB
CVE-2026-23124
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A data race condition in the Linux kernel's IPv6 NDISC router discovery function allows concurrent unsynchronized read/write access to the ra_mtu field, potentially causing denial of service through system instability or crashes on local systems. The vulnerability affects all Linux systems running vulnerable kernel versions and requires local access to trigger. No patch is currently available, though the race condition is considered low-impact as the affected field represents best-effort MTU configuration.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23123
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Uninitialized pointer dereferences in the Linux kernel's interconnect debugfs implementation can cause denial of service when users interact with src_node and dst_node debugfs entries. A local attacker with standard user privileges can trigger memory access violations through reads or writes to these debugfs interfaces, crashing the system or causing kernel instability. No patch is currently available for this medium-severity vulnerability.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23122
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Intel i225/i226 Ethernet controller driver in the Linux kernel is susceptible to TX unit hangs during heavy timestamping operations due to insufficient packet buffer allocation. A local user with low privileges can trigger denial of service by generating sustained timestamped network traffic that exhausts the 7KB per-queue TX buffer, requiring a kernel patch that reduces the buffer to 5KB per hardware specification to mitigate the hang condition.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23121
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A data-race condition in the Linux kernel's mISDN subsystem allows local attackers with unprivileged access to cause a denial of service by triggering concurrent access to the dev->work field through ioctl and read operations without proper synchronization. The vulnerability affects the mISDN timer device driver where unsynchronized reads and writes to shared data can result in system availability issues. No patch is currently available for this medium-severity vulnerability.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23120
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A data-race condition in the Linux kernel's L2TP tunnel deletion function can cause a denial of service on systems using L2TP networking. Local attackers with unprivileged access can trigger concurrent socket operations to crash the kernel or cause system instability. No patch is currently available for this vulnerability.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23119
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel bonding driver fails to properly provide a network namespace pointer to the flow dissector function, allowing a local attacker with unprivileged access to trigger a kernel warning and cause a denial of service. The vulnerability exists in the bond_flow_dissect() code path used for XDP packet transmission, where crafted network packets lacking proper device or socket context can be processed unsafely.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23118
EPSS 0% CVSS 4.7
MEDIUM PATCH This Month

A race condition in the Linux kernel's rxrpc subsystem allows local attackers with limited privileges to cause a denial of service by exploiting unsynchronized access to the last_tx_at timestamp variable, potentially triggering load/store tearing on 32-bit architectures. The vulnerability requires local access and specific timing conditions to trigger, but can result in system instability or crash when successfully exploited. No patch is currently available.

Linux Race Condition Information Disclosure +3
NVD VulDB
CVE-2026-23117
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A NULL pointer dereference in the Linux kernel's ice driver occurs when devlink reload fails and the driver is subsequently removed, affecting systems using Intel ice network adapters. A local privileged user can trigger this denial of service condition by initiating a devlink reinit operation that fails, leaving the hardware in an uninitialized state. The vulnerability stems from a missing ice_deinit_hw() call in the devlink reinit path that leaves control queues uninitialized.

Linux Null Pointer Dereference Denial Of Service +3
NVD VulDB
CVE-2026-23116
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Improper handling of reset and clock masking in the Linux kernel's i.MX8MQ VPU power domain controller can cause system hangs when attempting to independently reset GPU cores. Local attackers with sufficient privileges can trigger this vulnerability by manipulating VPU reset operations, leading to denial of service. A patch is not currently available.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23115
EPSS 0% CVSS 4.7
MEDIUM PATCH This Month

A race condition in the Linux kernel's serial driver allows local attackers with low privileges to bypass TTY device linkage during console configuration, potentially enabling unauthorized access to serial console interfaces on Qualcomm SoCs and other affected systems. The vulnerability stems from improper initialization ordering that fails to configure tty->port before uart_configure_port() is called, creating a window where user-space applications can open the console without proper driver linkage. No patch is currently available.

Qualcomm Denial Of Service Race Condition +4
NVD VulDB
CVE-2026-23114
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

Linux kernel ptrace operations on ARM64 systems without SME support can corrupt SVE register state, causing the kernel to enter an invalid FPSIMD configuration that triggers warnings and potential instability. A local attacker with ptrace privileges can exploit this to cause a denial of service by manipulating SVE register writes on affected systems. The vulnerability requires local access and is present on Linux systems running vulnerable kernel versions without an available patch.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23113
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel io_uring/io-wq subsystem fails to properly monitor exit signals during work execution loops, allowing a local attacker with user privileges to cause the work queue to hang indefinitely by queuing operations that take excessive time to complete. This denial of service condition prevents the io-wq worker threads from shutting down gracefully, potentially blocking system operations that depend on io_uring. No patch is currently available for this vulnerability.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2025-71200
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

In the Linux kernel, the following vulnerability has been resolved: mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode When operating in HS200 or HS400 timing modes, reducing the clock frequency below 52MHz will lead to link broken as the Rockchip DWC MSHC controller requires maintaining a minimum clock of 52MHz in these modes.

Linux Debian Information Disclosure +3
NVD VulDB
CVE-2026-23110
EPSS 0% CVSS 4.7
MEDIUM PATCH This Month

A race condition in the Linux kernel's SCSI error handling mechanism can prevent the error handler from being properly awakened when concurrent command completions occur, causing I/O operations to hang indefinitely. A local attacker with low privileges can trigger this condition through timing-sensitive operations to cause a denial of service. No patch is currently available for this vulnerability.

Linux Race Condition Information Disclosure +3
NVD VulDB
CVE-2026-23109
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

A denial of service vulnerability in the Linux kernel's writeback mechanism allows local users with standard privileges to cause indefinite hangs in wait_sb_inodes() when interacting with faulty FUSE servers that fail to respond to write requests. The vulnerability stems from improper handling of mappings without data integrity semantics, which should be skipped during synchronization operations but are instead waited upon indefinitely. An attacker controlling a malfunctioning FUSE server can exploit this to freeze system operations that depend on filesystem synchronization.

Linux Denial Of Service Linux Kernel +2
NVD VulDB
CVE-2026-23108
EPSS 0% CVSS 5.5
MEDIUM PATCH This Month

The Linux kernel USB CAN driver (usb_8dev) fails to properly manage URB memory when USB transfers complete, allowing a local attacker with user privileges to trigger a memory leak and cause a denial of service through resource exhaustion. The vulnerability occurs because completed URBs are unanchored by the USB framework before the callback function executes, preventing proper cleanup during driver shutdown. No patch is currently available for this issue.

Linux Information Disclosure Linux Kernel +2
NVD VulDB
CVE-2026-23107
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA The code to restore a ZA context doesn't attempt to allocate the task's sve_state before setting TIF_SME.

Linux Null Pointer Dereference Linux Kernel
NVD
CVE-2026-23106
EPSS 0%
Monitor

In the Linux kernel, the following vulnerability has been resolved: timekeeping: Adjust the leap state for the correct auxiliary timekeeper When __do_ajdtimex() was introduced to handle adjtimex for any timekeeper, this reference to tk_core was not updated.

Linux Industrial Linux Kernel
NVD
Prev Page 4 of 39 Next

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy