CVSS: -EPSS: %CPEs: 5EXPL: 0CVE-2025-71228 – LoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED
https://notcve.org/view.php?id=CVE-2025-71228
18 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: LoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED For 32BIT platform _PAGE_PROTNONE is 0, so set a VMA to be VM_NONE or VM_SHARED will make pages non-present, then cause Oops with kernel page fault. Fix it by set correct protection_map[] for VM_NONE/VM_SHARED, replacing _PAGE_PROTNONE with _PAGE_PRESENT. Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or... • https://git.kernel.org/stable/c/046303283d02c9732a778ccdeea433a899c78cbd •
CVSS: -EPSS: %CPEs: 4EXPL: 0CVE-2025-71229 – wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()
https://notcve.org/view.php?id=CVE-2025-71229
18 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon() rtw_core_enable_beacon() reads 4 bytes from an address that is not a multiple of 4. This results in a crash on some systems. Do 1 byte reads/writes instead. Unable to handle kernel paging request at virtual address ffff8000827e0522 Mem abort info: ESR = 0x0000000096000021 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x21: alignment fault Data... • https://git.kernel.org/stable/c/71dee092903adb496fe1f357b267d94087b679e0 •
CVSS: -EPSS: %CPEs: 3EXPL: 0CVE-2025-71231 – crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode
https://notcve.org/view.php?id=CVE-2025-71231
18 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode The local variable 'i' is initialized with -EINVAL, but the for loop immediately overwrites it and -EINVAL is never returned. If no empty compression mode can be found, the function would return the out-of-bounds index IAA_COMP_MODES_MAX, which would cause an invalid array access in add_iaa_compression_mode(). Fix both issues by returning either a valid index or -EINVA... • https://git.kernel.org/stable/c/c77b33b58512708bd5603f48465f018c8b748847 •
CVSS: -EPSS: %CPEs: 4EXPL: 0CVE-2025-71232 – scsi: qla2xxx: Free sp in error path to fix system crash
https://notcve.org/view.php?id=CVE-2025-71232
18 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Free sp in error path to fix system crash System crash seen during load/unload test in a loop, [61110.449331] qla2xxx [0000:27:00.0]-0042:0: Disabled MSI-X. [61110.467494] ============================================================================= [61110.467498] BUG qla2xxx_srbs (Tainted: G OE -------- --- ): Objects remaining in qla2xxx_srbs on __kmem_cache_shutdown() [61110.467501] ----------------------------------------... • https://git.kernel.org/stable/c/aed16d37696f494288a291b4b477484ed0be774b •
CVSS: -EPSS: %CPEs: 3EXPL: 0CVE-2025-71233 – PCI: endpoint: Avoid creating sub-groups asynchronously
https://notcve.org/view.php?id=CVE-2025-71233
18 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: PCI: endpoint: Avoid creating sub-groups asynchronously The asynchronous creation of sub-groups by a delayed work could lead to a NULL pointer dereference when the driver directory is removed before the work completes. The crash can be easily reproduced with the following commands: # cd /sys/kernel/config/pci_ep/functions/pci_epf_test # for i in {1..20}; do mkdir test && rmdir test; done BUG: kernel NULL pointer dereference, address: 000000... • https://git.kernel.org/stable/c/d9af3cf58bb4c8d6dea4166011c780756b1138b5 •
CVSS: -EPSS: %CPEs: 3EXPL: 0CVE-2025-71234 – wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add
https://notcve.org/view.php?id=CVE-2025-71234
18 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add The driver does not set hw->sta_data_size, which causes mac80211 to allocate insufficient space for driver private station data in __sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of struct rtl8xxxu_sta_info through sta->drv_priv, this results in a slab-out-of-bounds write. KASAN report on RISC-V (VisionFive 2) with RTL8192EU adapter: BUG: KASAN: slab-out-of-bounds in rt... • https://git.kernel.org/stable/c/5d810ba377eddee95d30766d360a14efbb3d1872 •
CVSS: -EPSS: %CPEs: 4EXPL: 0CVE-2025-71235 – scsi: qla2xxx: Delay module unload while fabric scan in progress
https://notcve.org/view.php?id=CVE-2025-71235
18 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Delay module unload while fabric scan in progress System crash seen during load/unload test in a loop. [105954.384919] RBP: ffff914589838dc0 R08: 0000000000000000 R09: 0000000000000086 [105954.384920] R10: 000000000000000f R11: ffffa31240904be5 R12: ffff914605f868e0 [105954.384921] R13: ffff914605f86910 R14: 0000000000008010 R15: 00000000ddb7c000 [105954.384923] FS: 0000000000000000(0000) GS:ffff9163fec40000(0000) knlGS:00000... • https://git.kernel.org/stable/c/528b2f1027edfb52af0171f0f4b227fb356dde05 •
CVSS: -EPSS: %CPEs: 4EXPL: 0CVE-2025-71236 – scsi: qla2xxx: Validate sp before freeing associated memory
https://notcve.org/view.php?id=CVE-2025-71236
18 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Validate sp before freeing associated memory System crash with the following signature [154563.214890] nvme nvme2: NVME-FC{1}: controller connect complete [154564.169363] qla2xxx [0000:b0:00.1]-3002:2: nvme: Sched: Set ZIO exchange threshold to 3. [154564.169405] qla2xxx [0000:b0:00.1]-ffffff:2: SET ZIO Activity exchange threshold to 5. [154565.539974] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed – 0078 0080 0000. [15... • https://git.kernel.org/stable/c/949010291bb941d53733ed08a33454254d9afb1b •
CVSS: -EPSS: %CPEs: 4EXPL: 0CVE-2025-71237 – nilfs2: Fix potential block overflow that cause system hang
https://notcve.org/view.php?id=CVE-2025-71237
18 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: nilfs2: Fix potential block overflow that cause system hang When a user executes the FITRIM command, an underflow can occur when calculating nblocks if end_block is too small. Since nblocks is of type sector_t, which is u64, a negative nblocks value will become a very large positive integer. This ultimately leads to the block layer function __blkdev_issue_discard() taking an excessively long time to process the bio chain, and the ns_segctor... • https://git.kernel.org/stable/c/df1e20796c9f3d541cca47fb72e4369ea135642d •
CVSS: -EPSS: %CPEs: 3EXPL: 0CVE-2026-23213 – drm/amd/pm: Disable MMIO access during SMU Mode 1 reset
https://notcve.org/view.php?id=CVE-2026-23213
18 Feb 2026 — In the Linux kernel, the following vulnerability has been resolved: drm/amd/pm: Disable MMIO access during SMU Mode 1 reset During Mode 1 reset, the ASIC undergoes a reset cycle and becomes temporarily inaccessible via PCIe. Any attempt to access MMIO registers during this window (e.g., from interrupt handlers or other driver threads) can result in uncompleted PCIe transactions, leading to NMI panics or system hangs. To prevent this, set the `no_hw_access` flag to true immediately after triggering the reset... • https://git.kernel.org/stable/c/c1853ebbec980d5c05d431bfd6ded73b1363fd00 •
