Latest CVE Feed
-
0.0
NACVE-2026-23210
In the Linux kernel, the following vulnerability has been resolved: ice: Fix PTP NULL pointer dereference during VSI rebuild Fix race condition where PTP periodic work runs while VSI is being rebuilt, accessing NULL vsi->rx_rings. The sequence was: 1. ... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Race Condition
-
0.0
NACVE-2026-23209
In the Linux kernel, the following vulnerability has been resolved: macvlan: fix error recovery in macvlan_common_newlink() valis provided a nice repro to crash the kernel: ip link add p1 type veth peer p2 ip link set address 00:00:00:00:00:20 dev p1 i... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Memory Corruption
-
0.0
NACVE-2026-23208
In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Prevent excessive number of frames In this case, the user constructed the parameters with maxpacksize 40 for rate 22050 / pps 1000, and packsize[0] 22 packsize[1] 23. T... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Memory Corruption
-
0.0
NACVE-2026-23207
In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect curr_xfer check in IRQ handler Now that all other accesses to curr_xfer are done under the lock, protect the curr_xfer NULL check in tegra_qspi_isr_thread() ... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Race Condition
-
0.0
NACVE-2026-23206
In the Linux kernel, the following vulnerability has been resolved: dpaa2-switch: prevent ZERO_SIZE_PTR dereference when num_ifs is zero The driver allocates arrays for ports, FDBs, and filter blocks using kcalloc() with ethsw->sw_attr.num_ifs as the el... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Memory Corruption
-
0.0
NACVE-2026-23205
In the Linux kernel, the following vulnerability has been resolved: smb/client: fix memory leak in smb2_open_file() Reproducer: 1. server: directories are exported read-only 2. client: mount -t cifs //${server_ip}/export /mnt 3. client: dd if=/de... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Memory Corruption
-
0.0
NACVE-2026-23204
In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_u32: use skb_header_pointer_careful() skb_header_pointer() does not fully validate negative @offset values. Use skb_header_pointer_careful() instead. GangMin Kim provid... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Memory Corruption
-
0.0
NACVE-2026-23203
In the Linux kernel, the following vulnerability has been resolved: net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue Commit 1767bb2d47b7 ("ipv6: mcast: Don't hold RTNL for IPV6_ADD_MEMBERSHIP and MCAST_JOIN_GROUP.") removed the RTNL lock ... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Race Condition
-
0.0
NACVE-2026-23202
In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer The curr_xfer field is read by the IRQ handler without holding the lock to check if a transfer is in progress. When... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Race Condition
-
0.0
NACVE-2026-23201
In the Linux kernel, the following vulnerability has been resolved: ceph: fix oops due to invalid pointer for kfree() in parse_longname() This fixes a kernel oops when reading ceph snapshot directories (.snap), for example by simply running `ls /mnt/my_... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Memory Corruption
-
0.0
NACVE-2026-23200
In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix ECMP sibling count mismatch when clearing RTF_ADDRCONF syzbot reported a kernel BUG in fib6_add_rt2node() when adding an IPv6 route. [0] Commit f72514b3c569 ("ipv6: clear RA ... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Misconfiguration
-
0.0
NACVE-2026-23199
In the Linux kernel, the following vulnerability has been resolved: procfs: avoid fetching build ID while holding VMA lock Fix PROCMAP_QUERY to fetch optional build ID only after dropping mmap_lock or per-VMA lock, whichever was used to lock VMA under q... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Race Condition
-
0.0
NACVE-2026-23198
In the Linux kernel, the following vulnerability has been resolved: KVM: Don't clobber irqfd routing type when deassigning irqfd When deassigning a KVM_IRQFD, don't clobber the irqfd's copy of the IRQ's routing entry as doing so breaks kvm_arch_irq_bypa... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Memory Corruption
-
0.0
NACVE-2026-23197
In the Linux kernel, the following vulnerability has been resolved: i2c: imx: preserve error state in block data length handler When a block read returns an invalid length, zero or >I2C_SMBUS_BLOCK_MAX, the length handler sets the state to IMX_I2C_STATE... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Misconfiguration
-
0.0
NACVE-2026-23196
In the Linux kernel, the following vulnerability has been resolved: HID: Intel-thc-hid: Intel-thc: Add safety check for reading DMA buffer Add DMA buffer readiness check before reading DMA buffer to avoid unexpected NULL pointer accessing.... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
-
0.0
NACVE-2026-23195
In the Linux kernel, the following vulnerability has been resolved: cgroup/dmem: avoid pool UAF An UAF issue was observed: BUG: KASAN: slab-use-after-free in page_counter_uncharge+0x65/0x150 Write of size 8 at addr ffff888106715440 by task insmod/527 ... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Memory Corruption
-
0.0
NACVE-2026-23194
In the Linux kernel, the following vulnerability has been resolved: rust_binder: correctly handle FDA objects of length zero Fix a bug where an empty FDA (fd array) object with 0 fds would cause an out-of-bounds error. The previous implementation used `... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Memory Corruption
-
0.0
NACVE-2026-23193
In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() In iscsit_dec_session_usage_count(), the function calls complete() while holding the sess->session_usage_lock... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Race Condition
-
0.0
NACVE-2026-23192
In the Linux kernel, the following vulnerability has been resolved: linkwatch: use __dev_put() in callers to prevent UAF After linkwatch_do_dev() calls __dev_put() to release the linkwatch reference, the device refcount may drop to 1. At this point, net... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Memory Corruption
-
0.0
NACVE-2026-23191
In the Linux kernel, the following vulnerability has been resolved: ALSA: aloop: Fix racy access at PCM trigger The PCM trigger callback of aloop driver tries to check the PCM state and stop the stream of the tied substream in the corresponding cable. S... Read more
Affected Products : linux_kernel- Published: Feb. 14, 2026
- Modified: Feb. 14, 2026
- Vuln Type: Race Condition