Linux Kernel vulnerabilities

14,742 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856

Vulnerabilities

Page 103 of 738
CVE-2025-40257UNKNOWN≥ 5.10.0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-04
CVE-2025-40257 mptcp: fix a race in mptcp_pm_del_add_timer() mptcp: fix a race in mptcp_pm_del_add_timer() In the Linux kernel, the following vulnerability has been resolved: mptcp: fix a race in mptcp_pm_del_add_timer() mptcp_pm_del_add_timer() can call sk_stop_timer_sync(sk, &entry->add_timer) while another might have free entry already, as reported by syzbot. Add RCU protection to fix this issue. Also change confusing add_timer variable with stop_timer boolean. syzbot report: BUG: KASA
osv
CVE-2025-40247UNKNOWN≥ 0, < 6.17.10-12025-12-04
CVE-2025-40247 CVE-2025-40247: In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix pgtable prealloc error path The following splat was reported: Unable In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix pgtable prealloc error path The following splat was reported: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010 Mem abort info: ESR = 0x0000000096000004 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0
osv
CVE-2025-40218UNKNOWN≥ 6.5.0, < 6.6.113≥ 6.7.0, < 6.12.54+1 more2025-12-04
CVE-2025-40218 mm/damon/vaddr: do not repeat pte_offset_map_lock() until success mm/damon/vaddr: do not repeat pte_offset_map_lock() until success In the Linux kernel, the following vulnerability has been resolved: mm/damon/vaddr: do not repeat pte_offset_map_lock() until success DAMON's virtual address space operation set implementation (vaddr) calls pte_offset_map_lock() inside the page table walk callback function. This is for reading and writing page table accessed bits. If pte_offset_map
osv
CVE-2025-40250UNKNOWN≥ 6.4.0, < 6.6.118≥ 6.7.0, < 6.12.60+1 more2025-12-04
CVE-2025-40250 net/mlx5: Clean up only new IRQ glue on request_irq() failure net/mlx5: Clean up only new IRQ glue on request_irq() failure In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Clean up only new IRQ glue on request_irq() failure The mlx5_irq_alloc() function can inadvertently free the entire rmap and end up in a crash[1] when the other threads tries to access this, when request_irq() fails due to exhausted IRQ vectors. This commit modifies the cleanup t
osv
CVE-2025-40227UNKNOWN≥ 0, < 6.17.6-12025-12-04
CVE-2025-40227 CVE-2025-40227: In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: dealloc commit test ctx always The damon_ctx for testing online DA In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: dealloc commit test ctx always The damon_ctx for testing online DAMON parameters commit inputs is deallocated only when the test fails. This means memory is leaked for every successful online DAMON parameters commit. Fix the leak by a
osv
CVE-2025-40222UNKNOWN≥ 6.17.0, < 6.17.62025-12-04
CVE-2025-40222 tty: serial: sh-sci: fix RSCI FIFO overrun handling tty: serial: sh-sci: fix RSCI FIFO overrun handling In the Linux kernel, the following vulnerability has been resolved: tty: serial: sh-sci: fix RSCI FIFO overrun handling The receive error handling code is shared between RSCI and all other SCIF port types, but the RSCI overrun_reg is specified as a memory offset, while for other SCIF types it is an enum value used to index into the sci_port_params->regs array, as mentioned ab
osv
CVE-2025-40221UNKNOWN≥ 6.7.0, < 6.12.54≥ 6.13.0, < 6.17.42025-12-04
CVE-2025-40221 media: pci: mg4b: fix uninitialized iio scan data media: pci: mg4b: fix uninitialized iio scan data In the Linux kernel, the following vulnerability has been resolved: media: pci: mg4b: fix uninitialized iio scan data Fix potential leak of uninitialized stack data to userspace by ensuring that the `scan` structure is zeroed before use.
osv
CVE-2025-40225UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-12-04
CVE-2025-40225 CVE-2025-40225: In the Linux kernel, the following vulnerability has been resolved: drm/panthor: Fix kernel panic on partial unmap of a GPU VA region This commit addr In the Linux kernel, the following vulnerability has been resolved: drm/panthor: Fix kernel panic on partial unmap of a GPU VA region This commit address a kernel panic issue that can happen if Userspace tries to partially unmap a GPU virtual region (aka drm_gpuva). The VM_BIND interface allows partial unmapping of a
osv
CVE-2025-40233UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-12-04
CVE-2025-40233 CVE-2025-40233: In the Linux kernel, the following vulnerability has been resolved: ocfs2: clear extent cache after moving/defragmenting extents The extent map cache In the Linux kernel, the following vulnerability has been resolved: ocfs2: clear extent cache after moving/defragmenting extents The extent map cache can become stale when extents are moved or defragmented, causing subsequent operations to see outdated extent flags. This triggers a BUG_ON in ocfs2_refcount_cal_cow_clu
osv
CVE-2025-40255UNKNOWN≥ 0, < 6.17.10-12025-12-04
CVE-2025-40255 CVE-2025-40255: In the Linux kernel, the following vulnerability has been resolved: net: core: prevent NULL deref in generic_hwtstamp_ioctl_lower() The ethtool tsconf In the Linux kernel, the following vulnerability has been resolved: net: core: prevent NULL deref in generic_hwtstamp_ioctl_lower() The ethtool tsconfig Netlink path can trigger a null pointer dereference. A call chain such as: tsconfig_prepare_data() -> dev_get_hwtstamp_phylib() -> vlan_hwtstamp_get() -> generic_hwt
osv
CVE-2025-40216UNKNOWN≥ 6.12.0, < 6.12.36≥ 6.13.0, < 6.15.52025-12-04
CVE-2025-40216 io_uring/rsrc: don't rely on user vaddr alignment io_uring/rsrc: don't rely on user vaddr alignment In the Linux kernel, the following vulnerability has been resolved: io_uring/rsrc: don't rely on user vaddr alignment There is no guaranteed alignment for user pointers, however the calculation of an offset of the first page into a folio after coalescing uses some weird bit mask logic, get rid of it.
osv
CVE-2025-40229UNKNOWN≥ 0, < 6.17.6-12025-12-04
CVE-2025-40229 CVE-2025-40229: In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: fix potential memory leak by cleaning ops_filter in damon_destroy_s In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: fix potential memory leak by cleaning ops_filter in damon_destroy_scheme Currently, damon_destroy_scheme() only cleans up the filter list but leaves ops_filter untouched, which could lead to memory leaks when a scheme is destroyed. Thi
osv
CVE-2025-40259UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-04
CVE-2025-40259 CVE-2025-40259: In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Do not sleep in atomic context sg_finish_rem_req() calls blk_rq_unmap_us In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Do not sleep in atomic context sg_finish_rem_req() calls blk_rq_unmap_user(). The latter function may sleep. Hence, call sg_finish_rem_req() with interrupts enabled instead of disabled.
osv
CVE-2025-40228UNKNOWN≥ 6.15.0, < 6.17.62025-12-04
CVE-2025-40228 mm/damon/sysfs: catch commit test ctx alloc failure mm/damon/sysfs: catch commit test ctx alloc failure In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: catch commit test ctx alloc failure Patch series "mm/damon/sysfs: fix commit test damon_ctx [de]allocation". DAMON sysfs interface dynamically allocates and uses a damon_ctx object for testing if given inputs for online DAMON parameters update is valid. The object is being used without an all
osv
CVE-2025-40244UNKNOWN≥ 2.6.12, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-12-04
CVE-2025-40244 hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent() hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent() In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent() The syzbot reported issue in __hfsplus_ext_cache_extent(): [ 70.194323][ T9350] BUG: KMSAN: uninit-value in __hfsplus_ext_cache_extent+0x7d0/0x990 [ 70.195022][ T9350] __hfsplus_ext_cache_extent+0x7d0/0x
osv
CVE-2025-40238UNKNOWN≥ 6.7.0, < 6.12.56≥ 6.13.0, < 6.17.62025-12-04
CVE-2025-40238 net/mlx5: Fix IPsec cleanup over MPV device net/mlx5: Fix IPsec cleanup over MPV device In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix IPsec cleanup over MPV device When we do mlx5e_detach_netdev() we eventually disable blocking events notifier, among those events are IPsec MPV events from IB to core. So before disabling those blocking events, make sure to also unregister the devcom device and mark all this device operations as complete, in o
osv
CVE-2025-40231UNKNOWN≥ 0, < 5.10.246≥ 5.11.0, < 5.15.196+4 more2025-12-04
CVE-2025-40231 vsock: fix lock inversion in vsock_assign_transport() vsock: fix lock inversion in vsock_assign_transport() In the Linux kernel, the following vulnerability has been resolved: vsock: fix lock inversion in vsock_assign_transport() Syzbot reported a potential lock inversion deadlock between vsock_register_mutex and sk_lock-AF_VSOCK when vsock_linger() is called. The issue was introduced by commit 687aa0c5581b ("vsock: Fix transport_* TOCTOU") which added vsock_register_mutex loc
osv
CVE-2025-40260UNKNOWN≥ 0, < 6.17.10-12025-12-04
CVE-2025-40260 CVE-2025-40260: In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix scx_enable() crash on helper kthread creation failure A crash was o In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix scx_enable() crash on helper kthread creation failure A crash was observed when the sched_ext selftests runner was terminated with Ctrl+\ while test 15 was running: NIP [c00000000028fa58] scx_enable.constprop.0+0x358/0x12b0 LR [c000000
osv
CVE-2025-40241UNKNOWN≥ 6.15.0, < 6.17.62025-12-04
CVE-2025-40241 erofs: fix crafted invalid cases for encoded extents erofs: fix crafted invalid cases for encoded extents In the Linux kernel, the following vulnerability has been resolved: erofs: fix crafted invalid cases for encoded extents Robert recently reported two corrupted images that can cause system crashes, which are related to the new encoded extents introduced in Linux 6.15: - The first one [1] has plen != 0 (e.g. plen == 0x2000000) but (plen & Z_EROFS_EXTENT_PLEN_MASK) == 0. It
osv
CVE-2025-40243UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-12-04
CVE-2025-40243 CVE-2025-40243: In the Linux kernel, the following vulnerability has been resolved: hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits() The syzbot reported In the Linux kernel, the following vulnerability has been resolved: hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits() The syzbot reported issue in hfs_find_set_zero_bits(): ===================================================== BUG: KMSAN: uninit-value in hfs_find_set_zero_bits+0x74d/0xb60 fs/hfs/bitmap.c:4
osv
Linux Kernel vulnerabilities | cvebase