Linux Kernel vulnerabilities

14,742 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856

Vulnerabilities

Page 111 of 738
CVE-2025-40104UNKNOWN≥ 4.20.0, < 6.1.158≥ 6.2.0, < 6.6.114+2 more2025-10-30
CVE-2025-40104 ixgbevf: fix mailbox API compatibility by negotiating supported features ixgbevf: fix mailbox API compatibility by negotiating supported features In the Linux kernel, the following vulnerability has been resolved: ixgbevf: fix mailbox API compatibility by negotiating supported features There was backward compatibility in the terms of mailbox API. Various drivers from various OSes supporting 10G adapters from Intel portfolio could easily negotiate mailbox API. This convention h
osv
CVE-2023-7324UNKNOWN≥ 2.6.25, < 4.14.308≥ 4.15.0, < 4.19.276+5 more2025-10-29
CVE-2023-7324 scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses In the Linux kernel, the following vulnerability has been resolved: scsi: ses: Fix possible addl_desc_ptr out-of-bounds accesses Sanitize possible addl_desc_ptr out-of-bounds accesses in ses_enclosure_data_process().
osv
CVE-2025-40085UNKNOWN≥ 0, < 5.15.196≥ 5.16.0, < 6.1.158+3 more2025-10-29
CVE-2025-40085 ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card In try_to_register_card(), the return value of usb_ifnum_to_if() is passed directly to usb_interface_claimed() without a NULL check, which will lead to a NULL pointer dereference when creating an invalid USB au
osv
CVE-2025-40084UNKNOWN≥ 5.15.0, < 6.1.158≥ 6.2.0, < 6.6.115+2 more2025-10-29
CVE-2025-40084 ksmbd: transport_ipc: validate payload size before reading handle ksmbd: transport_ipc: validate payload size before reading handle In the Linux kernel, the following vulnerability has been resolved: ksmbd: transport_ipc: validate payload size before reading handle handle_response() dereferences the payload as a 4-byte handle without verifying that the declared payload size is at least 4 bytes. A malformed or truncated message from ksmbd.mountd can lead to a 4-byte read past th
osv
CVE-2025-40083UNKNOWN≥ 3.8.0, < 5.4.302≥ 5.5.0, < 5.10.247+4 more2025-10-29
CVE-2025-40083 net/sched: sch_qfq: Fix null-deref in agg_dequeue net/sched: sch_qfq: Fix null-deref in agg_dequeue In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix null-deref in agg_dequeue To prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c) when cl->qdisc->ops->peek(cl->qdisc) returns NULL, we check the return value before using it, similar to the existing approach in sch_hfsc.c. To avoid code duplication, the following changes are ma
osv
CVE-2025-40082HIGHCVSS 7.1≥ 5.4.297, < 5.5≥ 5.10.241, < 5.11+6 more2025-10-28
CVE-2025-40082 [HIGH] CWE-125 CVE-2025-40082: In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bounds In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() BUG: KASAN: slab-out-of-bounds in hfsplus_uni2asc+0xa71/0xb90 fs/hfsplus/unicode.c:186 Read of size 2 at addr ffff8880289ef218 by task syz.6.248/14290 CPU: 0 UID: 0 PID: 14290 Comm: syz.6.248 Not tainted 6.16.4 #1 PREEMPT(fu
nvdosv
CVE-2025-40040MEDIUMCVSS 5.5≥ 4.6, < 5.4.302≥ 5.5, < 5.10.247+5 more2025-10-28
CVE-2025-40040 [MEDIUM] CVE-2025-40040: In the Linux kernel, the following vulnerability has been resolved: mm/ksm: fix flag-dropping behav In the Linux kernel, the following vulnerability has been resolved: mm/ksm: fix flag-dropping behavior in ksm_madvise syzkaller discovered the following crash: (kernel BUG) [ 44.607039] ------------[ cut here ]------------ [ 44.607422] kernel BUG at mm/userfaultfd.c:2067! [ 44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI [ 44.6
nvdosv
CVE-2025-40039MEDIUMCVSS 4.7≥ 5.15.145, < 5.16≥ 6.1.71, < 6.2+3 more2025-10-28
CVE-2025-40039 [MEDIUM] CWE-362 CVE-2025-40039: In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix race condition in RP In the Linux kernel, the following vulnerability has been resolved: ksmbd: Fix race condition in RPC handle list access The 'sess->rpc_handle_list' XArray manages RPC handles within a ksmbd session. Access to this list is intended to be protected by 'sess->rpc_lock' (an rw_semaphore). However, the locking implementation was flawed, leading to pote
nvdosv
CVE-2025-40038UNKNOWN≥ 6.5.0, < 6.6.113≥ 6.7.0, < 6.12.53+1 more2025-10-28
CVE-2025-40038 KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid Skip the WRMSR and HLT fastpaths in SVM's VM-Exit handler if the next RIP isn't valid, e.g. because KVM is running with nrips=false. SVM must decode and emulate to skip the instruction if the CPU doesn't pro
osv
CVE-2025-40078UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-10-28
CVE-2025-40078 CVE-2025-40078: In the Linux kernel, the following vulnerability has been resolved: bpf: Explicitly check accesses to bpf_sock_addr Syzkaller found a kernel warning o In the Linux kernel, the following vulnerability has been resolved: bpf: Explicitly check accesses to bpf_sock_addr Syzkaller found a kernel warning on the following sock_addr program: 0: r0 = 0 1: r2 = *(u32 *)(r1 +60) 2: exit which triggers: verifier bug: error during ctx access conversion (0) This is happening bec
osv
CVE-2025-40069UNKNOWN≥ 0, < 6.17.0-14.142025-10-28
CVE-2025-40069 CVE-2025-40069: In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix obj leak in VM_BIND error path If we fail a handle-lookup part way th In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix obj leak in VM_BIND error path If we fail a handle-lookup part way thru, we need to drop the already obtained obj references. Patchwork: https://patchwork.freedesktop.org/patch/669784/
osv
CVE-2025-40067UNKNOWN≥ 0, < 6.6.112≥ 6.7.0, < 6.12.53+1 more2025-10-28
CVE-2025-40067 fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: reject index allocation if $BITMAP is empty but blocks exist Index allocation requires at least one bit in the $BITMAP attribute to track usage of index entries. If the bitmap is empty while index blocks are already present, this reflects on-disk corruption. sy
osv
CVE-2025-40045UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-10-28
CVE-2025-40045 CVE-2025-40045: In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: wcd937x: set the comp soundwire port correctly For some reason we en In the Linux kernel, the following vulnerability has been resolved: ASoC: codecs: wcd937x: set the comp soundwire port correctly For some reason we endup with setting soundwire port for HPHL_COMP and HPHR_COMP as zero, this can potentially result in a memory corruption due to accessing and setting -1 th element of po
osv
CVE-2025-40049UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-10-28
CVE-2025-40049 CVE-2025-40049: In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix uninit-value in squashfs_get_parent Syzkaller reports a "KMSAN: unin In the Linux kernel, the following vulnerability has been resolved: Squashfs: fix uninit-value in squashfs_get_parent Syzkaller reports a "KMSAN: uninit-value in squashfs_get_parent" bug. This is caused by open_by_handle_at() being called with a file handle containing an invalid parent inode number. In particular the
osv
CVE-2025-40050UNKNOWN≥ 0, < 6.17.0-14.142025-10-28
CVE-2025-40050 CVE-2025-40050: In the Linux kernel, the following vulnerability has been resolved: bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer In check_alu_op(), the In the Linux kernel, the following vulnerability has been resolved: bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer In check_alu_op(), the verifier currently calls check_reg_arg() and adjust_scalar_min_max_vals() unconditionally for BPF_NEG operations. However, if the destination register holds a pointer,
osv
CVE-2025-40028UNKNOWN≥ 6.11.0, < 6.12.52≥ 6.13.0, < 6.16.12+1 more2025-10-28
CVE-2025-40028 binder: fix double-free in dbitmap binder: fix double-free in dbitmap In the Linux kernel, the following vulnerability has been resolved: binder: fix double-free in dbitmap A process might fail to allocate a new bitmap when trying to expand its proc->dmap. In that case, dbitmap_grow() fails and frees the old bitmap via dbitmap_free(). However, the driver calls dbitmap_free() again when the same process terminates, leading to a double-free error: BUG: KASAN: double-free in bind
osv
CVE-2025-40064UNKNOWN≥ 4.19.0, < 6.17.32025-10-28
CVE-2025-40064 smc: Fix use-after-free in __pnet_find_base_ndev(). smc: Fix use-after-free in __pnet_find_base_ndev(). In the Linux kernel, the following vulnerability has been resolved: smc: Fix use-after-free in __pnet_find_base_ndev(). syzbot reported use-after-free of net_device in __pnet_find_base_ndev(), which was called during connect(). [0] smc_pnet_find_ism_resource() fetches sk_dst_get(sk)->dev and passes down to pnet_find_base_ndev(), where RTNL is held. Then, UAF happened at __pn
osv
CVE-2025-40080UNKNOWN≥ 0, < 6.1.158-1≥ 0, < 6.12.57-1+1 more2025-10-28
CVE-2025-40080 CVE-2025-40080: In the Linux kernel, the following vulnerability has been resolved: nbd: restrict sockets to TCP and UDP Recently, syzbot started to abuse NBD with al In the Linux kernel, the following vulnerability has been resolved: nbd: restrict sockets to TCP and UDP Recently, syzbot started to abuse NBD with all kinds of sockets. Commit cf1b2326b734 ("nbd: verify socket is supported during setup") made sure the socket supported a shutdown() method. Explicitely accept TCP and
osv
CVE-2025-40042UNKNOWN≥ 2.6.33, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-10-28
CVE-2025-40042 tracing: Fix race condition in kprobe initialization causing NULL pointer dereference tracing: Fix race condition in kprobe initialization causing NULL pointer dereference In the Linux kernel, the following vulnerability has been resolved: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference There is a critical race condition in kprobe initialization that can lead to NULL pointer dereference and kernel crash. [1135630.084782] Unable to handle k
osv
CVE-2025-40073UNKNOWN≥ 0, < 6.17.6-12025-10-28
CVE-2025-40073 CVE-2025-40073: In the Linux kernel, the following vulnerability has been resolved: drm/msm: Do not validate SSPP when it is not ready Current code will validate curr In the Linux kernel, the following vulnerability has been resolved: drm/msm: Do not validate SSPP when it is not ready Current code will validate current plane and previous plane to confirm they can share a SSPP with multi-rect mode. The SSPP is already allocated for previous plane, while current plane is not associa
osv