Linux Kernel vulnerabilities

14,742 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856

Vulnerabilities

Page 104 of 738
CVE-2025-40265UNKNOWN≥ 0, < 6.17.10-12025-12-04
CVE-2025-40265 CVE-2025-40265: In the Linux kernel, the following vulnerability has been resolved: vfat: fix missing sb_min_blocksize() return value checks When emulating an nvme de In the Linux kernel, the following vulnerability has been resolved: vfat: fix missing sb_min_blocksize() return value checks When emulating an nvme device on qemu with both logical_block_size and physical_block_size set to 8 KiB, but without format, a kernel panic was triggered during the early boot stage while attem
osv
CVE-2025-40249UNKNOWN≥ 0, < 6.17.10-12025-12-04
CVE-2025-40249 CVE-2025-40249: In the Linux kernel, the following vulnerability has been resolved: gpio: cdev: make sure the cdev fd is still active before emitting events With the In the Linux kernel, the following vulnerability has been resolved: gpio: cdev: make sure the cdev fd is still active before emitting events With the final call to fput() on a file descriptor, the release action may be deferred and scheduled on a work queue. The reference count of that descriptor is still zero and it
osv
CVE-2025-40253UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-04
CVE-2025-40253 CVE-2025-40253: In the Linux kernel, the following vulnerability has been resolved: s390/ctcm: Fix double-kfree The function 'mpc_rcvd_sweep_req(mpcginfo)' is called In the Linux kernel, the following vulnerability has been resolved: s390/ctcm: Fix double-kfree The function 'mpc_rcvd_sweep_req(mpcginfo)' is called conditionally from function 'ctcmpc_unpack_skb'. It frees passed mpcginfo. After that a call to function 'kfree' in function 'ctcmpc_unpack_skb' frees it again. Remove '
osv
CVE-2025-40224UNKNOWN≥ 0, < 6.17.6-12025-12-04
CVE-2025-40224 CVE-2025-40224: In the Linux kernel, the following vulnerability has been resolved: hwmon: (cgbc-hwmon) Add missing NULL check after devm_kzalloc() The driver allocat In the Linux kernel, the following vulnerability has been resolved: hwmon: (cgbc-hwmon) Add missing NULL check after devm_kzalloc() The driver allocates memory for sensor data using devm_kzalloc(), but did not check if the allocation succeeded. In case of memory allocation failure, dereferencing the NULL pointer woul
osv
CVE-2025-40226UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-12-04
CVE-2025-40226 CVE-2025-40226: In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Account for failed debug initialization When the SCMI debug su In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Account for failed debug initialization When the SCMI debug subsystem fails to initialize, the related debug root will be missing, and the underlying descriptor will be NULL. Handle this fault condition in the SCMI debug helpers t
osv
CVE-2025-40232UNKNOWN≥ 0, < 6.17.0-8.82025-12-04
CVE-2025-40232 CVE-2025-40232: In the Linux kernel, the following vulnerability has been resolved: rv: Fully convert enabled_monitors to use list_head as iterator The callbacks in e In the Linux kernel, the following vulnerability has been resolved: rv: Fully convert enabled_monitors to use list_head as iterator The callbacks in enabled_monitors_seq_ops are inconsistent. Some treat the iterator as struct rv_monitor *, while others treat the iterator as struct list_head *. This causes a wrong typ
osv
CVE-2025-40235UNKNOWN≥ 6.8.0, < 6.12.56≥ 6.13.0, < 6.17.62025-12-04
CVE-2025-40235 btrfs: directly free partially initialized fs_info in btrfs_check_leaked_roots() btrfs: directly free partially initialized fs_info in btrfs_check_leaked_roots() In the Linux kernel, the following vulnerability has been resolved: btrfs: directly free partially initialized fs_info in btrfs_check_leaked_roots() If fs_info->super_copy or fs_info->super_for_commit allocated failed in btrfs_get_tree_subvol(), then no need to call btrfs_free_fs_info(). Otherwise btrfs_check_leaked_ro
osv
CVE-2025-40242UNKNOWN≥ 5.15.0, < 6.12.56≥ 6.13.0, < 6.17.62025-12-04
CVE-2025-40242 gfs2: Fix unlikely race in gdlm_put_lock gfs2: Fix unlikely race in gdlm_put_lock In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix unlikely race in gdlm_put_lock In gdlm_put_lock(), there is a small window of time in which the DFL_UNMOUNT flag has been set but the lockspace hasn't been released, yet. In that window, dlm may still call gdlm_ast() and gdlm_bast(). To prevent it from dereferencing freed glock objects, only free the glock if the lockspa
osv
CVE-2025-40263UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-04
CVE-2025-40263 CVE-2025-40263: In the Linux kernel, the following vulnerability has been resolved: Input: cros_ec_keyb - fix an invalid memory access If cros_ec_keyb_register_matrix In the Linux kernel, the following vulnerability has been resolved: Input: cros_ec_keyb - fix an invalid memory access If cros_ec_keyb_register_matrix() isn't called (due to `buttons_switches_only`) in cros_ec_keyb_probe(), `ckdev->idev` remains NULL. An invalid memory access is observed in cros_ec_keyb_process() whe
osv
CVE-2025-40261UNKNOWN≥ 0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-04
CVE-2025-40261 nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl() nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl() In the Linux kernel, the following vulnerability has been resolved: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl() nvme_fc_delete_assocation() waits for pending I/O to complete before returning, and an error can cause ->ioerr_work to be queued after cancel_work_sync() had been called. Move the call to cancel_
osv
CVE-2025-40266UNKNOWN≥ 3.11.0, < 6.6.118≥ 6.7.0, < 6.12.60+1 more2025-12-04
CVE-2025-40266 KVM: arm64: Check the untrusted offset in FF-A memory share KVM: arm64: Check the untrusted offset in FF-A memory share In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Check the untrusted offset in FF-A memory share Verify the offset to prevent OOB access in the hypervisor FF-A buffer in case an untrusted large enough value [U32_MAX - sizeof(struct ffa_composite_mem_region) + 1, U32_MAX] is set from the host kernel.
osv
CVE-2025-40236UNKNOWN≥ 0, < 6.17.6-12025-12-04
CVE-2025-40236 CVE-2025-40236: In the Linux kernel, the following vulnerability has been resolved: virtio-net: zero unused hash fields When GSO tunnel is negotiated virtio_net_hdr_t In the Linux kernel, the following vulnerability has been resolved: virtio-net: zero unused hash fields When GSO tunnel is negotiated virtio_net_hdr_tnl_from_skb() tries to initialize the tunnel metadata but forget to zero unused rxhash fields. This may leak information to another side. Fixing this by zeroing the unu
osv
CVE-2025-40254UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-04
CVE-2025-40254 CVE-2025-40254: In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: remove never-working support for setting nsh fields The validati In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: remove never-working support for setting nsh fields The validation of the set(nsh(...)) action is completely wrong. It runs through the nsh_key_put_from_nlattr() function that is the same function that validates NSH keys for the flo
osv
CVE-2025-40220UNKNOWN≥ 2.6.38, < 5.10.246≥ 5.11.0, < 5.15.196+4 more2025-12-04
CVE-2025-40220 fuse: fix livelock in synchronous file put from fuseblk workers fuse: fix livelock in synchronous file put from fuseblk workers In the Linux kernel, the following vulnerability has been resolved: fuse: fix livelock in synchronous file put from fuseblk workers I observed a hang when running generic/323 against a fuseblk server. This test opens a file, initiates a lot of AIO writes to that file descriptor, and closes the file descriptor before the writes complete. Unsurprisingly,
osv
CVE-2025-40212UNKNOWN≥ 6.12.0, < 6.12.59≥ 6.13.0, < 6.17.92025-11-24
CVE-2025-40212 nfsd: fix refcount leak in nfsd_set_fh_dentry() nfsd: fix refcount leak in nfsd_set_fh_dentry() In the Linux kernel, the following vulnerability has been resolved: nfsd: fix refcount leak in nfsd_set_fh_dentry() nfsd exports a "pseudo root filesystem" which is used by NFSv4 to find the various exported filesystems using LOOKUP requests from a known root filehandle. NFSv3 uses the MOUNT protocol to find those exported filesystems and so is not given access to the pseudo root fil
osv
CVE-2025-40213UNKNOWN≥ 6.17.0, < 6.17.82025-11-24
CVE-2025-40213 Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete In the Linux kernel, the following vulnerability has been resolved: Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete There is a BUG: KASAN: stack-out-of-bounds in set_mesh_sync due to memcpy from badly declared on-stack flexible array. Another crash is in set_mesh_complete() due to double list_del via mgmt_pending_valid + mgmt_pen
osv
CVE-2025-40210UNKNOWN≥ 6.17.0, < 6.17.82025-11-21
CVE-2025-40210 Revert "NFSD: Remove the cap on number of operations per NFSv4 COMPOUND" Revert "NFSD: Remove the cap on number of operations per NFSv4 COMPOUND" In the Linux kernel, the following vulnerability has been resolved: Revert "NFSD: Remove the cap on number of operations per NFSv4 COMPOUND" I've found that pynfs COMP6 now leaves the connection or lease in a strange state, which causes CLOSE9 to hang indefinitely. I've dug into it a little, but I haven't been able to root-cause it ye
osv
CVE-2025-40209UNKNOWN≥ 6.11.0, < 6.12.58≥ 6.13.0, < 6.17.82025-11-21
CVE-2025-40209 btrfs: fix memory leak of qgroup_list in btrfs_add_qgroup_relation btrfs: fix memory leak of qgroup_list in btrfs_add_qgroup_relation In the Linux kernel, the following vulnerability has been resolved: btrfs: fix memory leak of qgroup_list in btrfs_add_qgroup_relation When btrfs_add_qgroup_relation() is called with invalid qgroup levels (src >= dst), the function returns -EINVAL directly without freeing the preallocated qgroup_list structure passed by the caller. This causes a
osv
CVE-2025-40211UNKNOWN≥ 3.17.0, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-11-21
CVE-2025-40211 ACPI: video: Fix use-after-free in acpi_video_switch_brightness() ACPI: video: Fix use-after-free in acpi_video_switch_brightness() In the Linux kernel, the following vulnerability has been resolved: ACPI: video: Fix use-after-free in acpi_video_switch_brightness() The switch_brightness_work delayed work accesses device->brightness and device->backlight, freed by acpi_video_dev_unregister_backlight() during device removal. If the work executes after acpi_video_bus_unregister_b
osv
CVE-2025-40149HIGHCVSS 7.8≥ 4.18, < 5.15.199≥ 5.16, < 6.1.161+3 more2025-11-12
CVE-2025-40149 [HIGH] CWE-416 CVE-2025-40149: In the Linux kernel, the following vulnerability has been resolved: tls: Use __sk_dst_get() and dst In the Linux kernel, the following vulnerability has been resolved: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock(). get_netdev_for_sock() is called during setsockopt(), so not under RCU. Using sk_dst_get(sk)->dev could trigger UAF. Let's use __sk_dst_get() and dst_dev_rcu(). Note that the only ->ndo_sk_get_lower_dev() user is
nvdosv
Linux Kernel vulnerabilities | cvebase