Linux Kernel vulnerabilities
14,742 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856
Vulnerabilities
Page 111 of 738
CVE-2025-40104UNKNOWN≥ 4.20.0, < 6.1.158≥ 6.2.0, < 6.6.114+2 more2025-10-30
CVE-2025-40104 ixgbevf: fix mailbox API compatibility by negotiating supported features
ixgbevf: fix mailbox API compatibility by negotiating supported features
In the Linux kernel, the following vulnerability has been resolved:
ixgbevf: fix mailbox API compatibility by negotiating supported features
There was backward compatibility in the terms of mailbox API. Various
drivers from various OSes supporting 10G adapters from Intel portfolio
could easily negotiate mailbox API.
This convention h
osv
CVE-2023-7324UNKNOWN≥ 2.6.25, < 4.14.308≥ 4.15.0, < 4.19.276+5 more2025-10-29
CVE-2023-7324 scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses
scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses
In the Linux kernel, the following vulnerability has been resolved:
scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses
Sanitize possible addl_desc_ptr out-of-bounds accesses in
ses_enclosure_data_process().
osv
CVE-2025-40085UNKNOWN≥ 0, < 5.15.196≥ 5.16.0, < 6.1.158+3 more2025-10-29
CVE-2025-40085 ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card
ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card
In the Linux kernel, the following vulnerability has been resolved:
ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card
In try_to_register_card(), the return value of usb_ifnum_to_if() is
passed directly to usb_interface_claimed() without a NULL check, which
will lead to a NULL pointer dereference when creating an invalid
USB au
osv
CVE-2025-40084UNKNOWN≥ 5.15.0, < 6.1.158≥ 6.2.0, < 6.6.115+2 more2025-10-29
CVE-2025-40084 ksmbd: transport_ipc: validate payload size before reading handle
ksmbd: transport_ipc: validate payload size before reading handle
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: transport_ipc: validate payload size before reading handle
handle_response() dereferences the payload as a 4-byte handle without
verifying that the declared payload size is at least 4 bytes. A malformed
or truncated message from ksmbd.mountd can lead to a 4-byte read past th
osv
CVE-2025-40083UNKNOWN≥ 3.8.0, < 5.4.302≥ 5.5.0, < 5.10.247+4 more2025-10-29
CVE-2025-40083 net/sched: sch_qfq: Fix null-deref in agg_dequeue
net/sched: sch_qfq: Fix null-deref in agg_dequeue
In the Linux kernel, the following vulnerability has been resolved:
net/sched: sch_qfq: Fix null-deref in agg_dequeue
To prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)
when cl->qdisc->ops->peek(cl->qdisc) returns NULL, we check the return
value before using it, similar to the existing approach in sch_hfsc.c.
To avoid code duplication, the following changes are ma
osv
CVE-2025-40082HIGHCVSS 7.1≥ 5.4.297, < 5.5≥ 5.10.241, < 5.11+6 more2025-10-28
CVE-2025-40082 [HIGH] CWE-125 CVE-2025-40082: In the Linux kernel, the following vulnerability has been resolved:
hfsplus: fix slab-out-of-bounds
In the Linux kernel, the following vulnerability has been resolved:
hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
BUG: KASAN: slab-out-of-bounds in hfsplus_uni2asc+0xa71/0xb90 fs/hfsplus/unicode.c:186
Read of size 2 at addr ffff8880289ef218 by task syz.6.248/14290
CPU: 0 UID: 0 PID: 14290 Comm: syz.6.248 Not tainted 6.16.4 #1 PREEMPT(fu
nvdosv
CVE-2025-40040MEDIUMCVSS 5.5≥ 4.6, < 5.4.302≥ 5.5, < 5.10.247+5 more2025-10-28
CVE-2025-40040 [MEDIUM] CVE-2025-40040: In the Linux kernel, the following vulnerability has been resolved:
mm/ksm: fix flag-dropping behav
In the Linux kernel, the following vulnerability has been resolved:
mm/ksm: fix flag-dropping behavior in ksm_madvise
syzkaller discovered the following crash: (kernel BUG)
[ 44.607039] ------------[ cut here ]------------
[ 44.607422] kernel BUG at mm/userfaultfd.c:2067!
[ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI
[ 44.6
nvdosv
CVE-2025-40039MEDIUMCVSS 4.7≥ 5.15.145, < 5.16≥ 6.1.71, < 6.2+3 more2025-10-28
CVE-2025-40039 [MEDIUM] CWE-362 CVE-2025-40039: In the Linux kernel, the following vulnerability has been resolved:
ksmbd: Fix race condition in RP
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: Fix race condition in RPC handle list access
The 'sess->rpc_handle_list' XArray manages RPC handles within a ksmbd
session. Access to this list is intended to be protected by
'sess->rpc_lock' (an rw_semaphore). However, the locking implementation was
flawed, leading to pote
nvdosv
CVE-2025-40038UNKNOWN≥ 6.5.0, < 6.6.113≥ 6.7.0, < 6.12.53+1 more2025-10-28
CVE-2025-40038 KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid
KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid
In the Linux kernel, the following vulnerability has been resolved:
KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid
Skip the WRMSR and HLT fastpaths in SVM's VM-Exit handler if the next RIP
isn't valid, e.g. because KVM is running with nrips=false. SVM must
decode and emulate to skip the instruction if the CPU doesn't pro
osv
CVE-2025-40078UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-10-28
CVE-2025-40078 CVE-2025-40078: In the Linux kernel, the following vulnerability has been resolved: bpf: Explicitly check accesses to bpf_sock_addr Syzkaller found a kernel warning o
In the Linux kernel, the following vulnerability has been resolved: bpf: Explicitly check accesses to bpf_sock_addr Syzkaller found a kernel warning on the following sock_addr program: 0: r0 = 0 1: r2 = *(u32 *)(r1 +60) 2: exit which triggers: verifier bug: error during ctx access conversion (0) This is happening bec
osv
CVE-2025-40069UNKNOWN≥ 0, < 6.17.0-14.142025-10-28
CVE-2025-40069 CVE-2025-40069: In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix obj leak in VM_BIND error path If we fail a handle-lookup part way th
In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix obj leak in VM_BIND error path If we fail a handle-lookup part way thru, we need to drop the already obtained obj references. Patchwork: https://patchwork.freedesktop.org/patch/669784/
osv
CVE-2025-40067UNKNOWN≥ 0, < 6.6.112≥ 6.7.0, < 6.12.53+1 more2025-10-28
CVE-2025-40067 fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist
fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist
Index allocation requires at least one bit in the $BITMAP attribute to
track usage of index entries. If the bitmap is empty while index blocks
are already present, this reflects on-disk corruption.
sy
osv
CVE-2025-40045UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-10-28
CVE-2025-40045 CVE-2025-40045: In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: wcd937x: set the comp soundwire port correctly For some reason we en
In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: wcd937x: set the comp soundwire port correctly For some reason we endup with setting soundwire port for HPHL_COMP and HPHR_COMP as zero, this can potentially result in a memory corruption due to accessing and setting -1 th element of po
osv
CVE-2025-40049UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-10-28
CVE-2025-40049 CVE-2025-40049: In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix uninit-value in squashfs_get_parent Syzkaller reports a "KMSAN: unin
In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix uninit-value in squashfs_get_parent Syzkaller reports a "KMSAN: uninit-value in squashfs_get_parent" bug. This is caused by open_by_handle_at() being called with a file handle containing an invalid parent inode number. In particular the
osv
CVE-2025-40050UNKNOWN≥ 0, < 6.17.0-14.142025-10-28
CVE-2025-40050 CVE-2025-40050: In the Linux kernel, the following vulnerability has been resolved: bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer In check_alu_op(), the
In the Linux kernel, the following vulnerability has been resolved: bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer In check_alu_op(), the verifier currently calls check_reg_arg() and adjust_scalar_min_max_vals() unconditionally for BPF_NEG operations. However, if the destination register holds a pointer,
osv
CVE-2025-40028UNKNOWN≥ 6.11.0, < 6.12.52≥ 6.13.0, < 6.16.12+1 more2025-10-28
CVE-2025-40028 binder: fix double-free in dbitmap
binder: fix double-free in dbitmap
In the Linux kernel, the following vulnerability has been resolved:
binder: fix double-free in dbitmap
A process might fail to allocate a new bitmap when trying to expand its
proc->dmap. In that case, dbitmap_grow() fails and frees the old bitmap
via dbitmap_free(). However, the driver calls dbitmap_free() again when
the same process terminates, leading to a double-free error:
BUG: KASAN: double-free in bind
osv
CVE-2025-40064UNKNOWN≥ 4.19.0, < 6.17.32025-10-28
CVE-2025-40064 smc: Fix use-after-free in __pnet_find_base_ndev().
smc: Fix use-after-free in __pnet_find_base_ndev().
In the Linux kernel, the following vulnerability has been resolved:
smc: Fix use-after-free in __pnet_find_base_ndev().
syzbot reported use-after-free of net_device in __pnet_find_base_ndev(),
which was called during connect(). [0]
smc_pnet_find_ism_resource() fetches sk_dst_get(sk)->dev and passes
down to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened
at __pn
osv
CVE-2025-40080UNKNOWN≥ 0, < 6.1.158-1≥ 0, < 6.12.57-1+1 more2025-10-28
CVE-2025-40080 CVE-2025-40080: In the Linux kernel, the following vulnerability has been resolved: nbd: restrict sockets to TCP and UDP Recently, syzbot started to abuse NBD with al
In the Linux kernel, the following vulnerability has been resolved: nbd: restrict sockets to TCP and UDP Recently, syzbot started to abuse NBD with all kinds of sockets. Commit cf1b2326b734 ("nbd: verify socket is supported during setup") made sure the socket supported a shutdown() method. Explicitely accept TCP and
osv
CVE-2025-40042UNKNOWN≥ 2.6.33, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-10-28
CVE-2025-40042 tracing: Fix race condition in kprobe initialization causing NULL pointer dereference
tracing: Fix race condition in kprobe initialization causing NULL pointer dereference
In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix race condition in kprobe initialization causing NULL pointer dereference
There is a critical race condition in kprobe initialization that can lead to
NULL pointer dereference and kernel crash.
[1135630.084782] Unable to handle k
osv
CVE-2025-40073UNKNOWN≥ 0, < 6.17.6-12025-10-28
CVE-2025-40073 CVE-2025-40073: In the Linux kernel, the following vulnerability has been resolved: drm/msm: Do not validate SSPP when it is not ready Current code will validate curr
In the Linux kernel, the following vulnerability has been resolved: drm/msm: Do not validate SSPP when it is not ready Current code will validate current plane and previous plane to confirm they can share a SSPP with multi-rect mode. The SSPP is already allocated for previous plane, while current plane is not associa
osv