Linux Kernel vulnerabilities

14,742 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856

Vulnerabilities

Page 105 of 738
CVE-2025-40164MEDIUMCVSS 5.5≥ 4.7.1, < 5.15.199≥ 5.16, < 6.1.162+5 more2025-11-12
CVE-2025-40164 [MEDIUM] CVE-2025-40164: In the Linux kernel, the following vulnerability has been resolved: usbnet: Fix using smp_processor In the Linux kernel, the following vulnerability has been resolved: usbnet: Fix using smp_processor_id() in preemptible code warnings Syzbot reported the following warning: BUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879 caller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331 CPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not
nvdosv
CVE-2025-40135UNKNOWN≥ 4.13.0, < 6.1.167≥ 6.2.0, < 6.6.130+2 more2025-11-12
CVE-2025-40135 ipv6: use RCU in ip6_xmit() ipv6: use RCU in ip6_xmit() In the Linux kernel, the following vulnerability has been resolved: ipv6: use RCU in ip6_xmit() Use RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent possible UAF.
osv
CVE-2025-40172UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40172 CVE-2025-40172: In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages() Currently, In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages() Currently, if find_and_map_user_pages() takes a DMA xfer request from the user with a length field set to 0, or in a rare case, the host receives QAIC_TRANS_DMA_XFER_CONT from the
osv
CVE-2025-40180UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40180 CVE-2025-40180: In the Linux kernel, the following vulnerability has been resolved: mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop The cleanup In the Linux kernel, the following vulnerability has been resolved: mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop The cleanup loop was starting at the wrong array index, causing out-of-bounds access. Start the loop at the correct index for zero-indexed arrays to prevent accessing memory beyond
osv
CVE-2025-40177UNKNOWN≥ 6.10.0, < 6.12.55≥ 6.13.0, < 6.17.52025-11-12
CVE-2025-40177 accel/qaic: Fix bootlog initialization ordering accel/qaic: Fix bootlog initialization ordering In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Fix bootlog initialization ordering As soon as we queue MHI buffers to receive the bootlog from the device, we could be receiving data. Therefore all the resources needed to process that data need to be setup prior to queuing the buffers. We currently initialize some of the resources after queuing the bu
osv
CVE-2025-40144UNKNOWN≥ 0, < 6.1.158-1≥ 0, < 6.12.57-1+1 more2025-11-12
CVE-2025-40144 CVE-2025-40144: In the Linux kernel, the following vulnerability has been resolved: nvdimm: ndtest: Return -ENOMEM if devm_kcalloc() fails in ndtest_probe() devm_kcal In the Linux kernel, the following vulnerability has been resolved: nvdimm: ndtest: Return -ENOMEM if devm_kcalloc() fails in ndtest_probe() devm_kcalloc() may fail. ndtest_probe() allocates three DMA address arrays (dcr_dma, label_dma, dimm_dma) and later unconditionally uses them in ndtest_nvdimm_init(), which can
osv
CVE-2025-40165UNKNOWN≥ 6.4.0, < 6.6.114≥ 6.7.0, < 6.12.55+1 more2025-11-12
CVE-2025-40165 media: nxp: imx8-isi: m2m: Fix streaming cleanup on release media: nxp: imx8-isi: m2m: Fix streaming cleanup on release In the Linux kernel, the following vulnerability has been resolved: media: nxp: imx8-isi: m2m: Fix streaming cleanup on release If streamon/streamoff calls are imbalanced, such as when exiting an application with Ctrl+C when streaming, the m2m usage_count will never reach zero and the ISI channel won't be freed. Besides from that, if the input line width is mo
osv
CVE-2025-40159UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40159 CVE-2025-40159: In the Linux kernel, the following vulnerability has been resolved: xsk: Harden userspace-supplied xdp_desc validation Turned out certain clearly inva In the Linux kernel, the following vulnerability has been resolved: xsk: Harden userspace-supplied xdp_desc validation Turned out certain clearly invalid values passed in xdp_desc from userspace can pass xp_{,un}aligned_validate_desc() and then lead to UBs or just invalid frames to be queued for xmit. desc->len close
osv
CVE-2025-40111UNKNOWN≥ 4.20.0, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-11-12
CVE-2025-40111 drm/vmwgfx: Fix Use-after-free in validation drm/vmwgfx: Fix Use-after-free in validation In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix Use-after-free in validation Nodes stored in the validation duplicates hashtable come from an arena allocator that is cleared at the end of vmw_execbuf_process. All nodes are expected to be cleared in vmw_validation_drop_ht but this node escaped because its resource was destroyed prematurely.
osv
CVE-2025-40174UNKNOWN≥ 6.14.0, < 6.17.52025-11-12
CVE-2025-40174 x86/mm: Fix SMP ordering in switch_mm_irqs_off() x86/mm: Fix SMP ordering in switch_mm_irqs_off() In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix SMP ordering in switch_mm_irqs_off() Stephen noted that it is possible to not have an smp_mb() between the loaded_mm store and the tlb_gen load in switch_mm(), meaning the ordering against flush_tlb_mm_range() goes out the window, and it becomes possible for switch_mm() to not observe a recent tlb_gen u
osv
CVE-2025-40150UNKNOWN≥ 0, < 6.6.130≥ 6.7.0, < 6.12.78+1 more2025-11-12
CVE-2025-40150 f2fs: fix to avoid migrating empty section f2fs: fix to avoid migrating empty section In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid migrating empty section It reports a bug from device w/ zufs: F2FS-fs (dm-64): Inconsistent segment (173822) type [1, 0] in SSA and SIT F2FS-fs (dm-64): Stopped filesystem due to reason: 4 Thread A Thread B - f2fs_expand_inode_data - f2fs_allocate_pinning_section - f2fs_gc_range - do_garbage_collect w/ seg
osv
CVE-2025-40127UNKNOWN≥ 5.5.0, < 5.10.246≥ 5.11.0, < 5.15.195+4 more2025-11-12
CVE-2025-40127 hwrng: ks-sa - fix division by zero in ks_sa_rng_init hwrng: ks-sa - fix division by zero in ks_sa_rng_init In the Linux kernel, the following vulnerability has been resolved: hwrng: ks-sa - fix division by zero in ks_sa_rng_init Fix division by zero in ks_sa_rng_init caused by missing clock pointer initialization. The clk_get_rate() call is performed on an uninitialized clk pointer, resulting in division by zero when calculating delay values. Add clock initialization code bef
osv
CVE-2025-40119UNKNOWN≥ 0, < 6.17.0-14.142025-11-12
CVE-2025-40119 CVE-2025-40119: In the Linux kernel, the following vulnerability has been resolved: ext4: fix potential null deref in ext4_mb_init() In ext4_mb_init(), ext4_mb_avg_fr In the Linux kernel, the following vulnerability has been resolved: ext4: fix potential null deref in ext4_mb_init() In ext4_mb_init(), ext4_mb_avg_fragment_size_destroy() may be called when sbi->s_mb_avg_fragment_size remains uninitialized (e.g., if groupinfo slab cache allocation fails). Since ext4_mb_avg_fragment_
osv
CVE-2025-40176UNKNOWN≥ 0, < 6.1.158-1≥ 0, < 6.12.57-1+1 more2025-11-12
CVE-2025-40176 CVE-2025-40176: In the Linux kernel, the following vulnerability has been resolved: tls: wait for pending async decryptions if tls_strp_msg_hold fails Async decryptio In the Linux kernel, the following vulnerability has been resolved: tls: wait for pending async decryptions if tls_strp_msg_hold fails Async decryption calls tls_strp_msg_hold to create a clone of the input skb to hold references to the memory it uses. If we fail to allocate that clone, proceeding with async decrypti
osv
CVE-2025-40199UNKNOWN≥ 0, < 6.12.54≥ 6.13.0, < 6.17.42025-11-12
CVE-2025-40199 page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches In the Linux kernel, the following vulnerability has been resolved: page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches Helge reported that the introduction of PP_MAGIC_MASK let to crashes on boot on his 32-bit parisc machine. The cause of this is the mask is set too wide, so the page_pool_page_is_pp() incurs false positives
osv
CVE-2025-40171UNKNOWN≥ 0, < 6.1.158-1≥ 0, < 6.12.57-1+1 more2025-11-12
CVE-2025-40171 CVE-2025-40171: In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: move lsop put work to nvmet_fc_ls_req_op It’s possible for more than one In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: move lsop put work to nvmet_fc_ls_req_op It’s possible for more than one async command to be in flight from __nvmet_fc_send_ls_req. For each command, a tgtport reference is taken. In the current code, only one put work item is queued at a t
osv
CVE-2025-40195UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40195 CVE-2025-40195: In the Linux kernel, the following vulnerability has been resolved: mount: handle NULL values in mnt_ns_release() When calling in listmount() mnt_ns_r In the Linux kernel, the following vulnerability has been resolved: mount: handle NULL values in mnt_ns_release() When calling in listmount() mnt_ns_release() may be passed a NULL pointer. Handle that case gracefully.
osv
CVE-2025-40198UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-11-12
CVE-2025-40198 CVE-2025-40198: In the Linux kernel, the following vulnerability has been resolved: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() Unlike ot In the Linux kernel, the following vulnerability has been resolved: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() Unlike other strings in the ext4 superblock, we rely on tune2fs to make sure s_mount_opts is NUL terminated. Harden parse_apply_sb_mount_options() by treating s_mount_opts as a
osv
CVE-2025-40208UNKNOWN≥ 6.15.0, < 6.17.42025-11-12
CVE-2025-40208 media: iris: fix module removal if firmware download failed media: iris: fix module removal if firmware download failed In the Linux kernel, the following vulnerability has been resolved: media: iris: fix module removal if firmware download failed Fix remove if firmware failed to load: qcom-iris aa00000.video-codec: Direct firmware load for qcom/vpu/vpu33_p4.mbn failed with error -2 qcom-iris aa00000.video-codec: firmware download failed qcom-iris aa00000.video-codec: core init
osv
CVE-2025-40187UNKNOWN≥ 4.17.0, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-11-12
CVE-2025-40187 net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() In the Linux kernel, the following vulnerability has been resolved: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() If new_asoc->peer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0 and sctp_ulpevent_make_authkey() returns 0, then the variable ai_ev remains zero and the zero will be dereferenced in the sc
osv