Linux Kernel vulnerabilities
14,742 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856
Vulnerabilities
Page 120 of 738
CVE-2025-39973UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-10-15
CVE-2025-39973 CVE-2025-39973: In the Linux kernel, the following vulnerability has been resolved: i40e: add validation for ring_len param The `ring_len` parameter provided by the v
In the Linux kernel, the following vulnerability has been resolved: i40e: add validation for ring_len param The `ring_len` parameter provided by the virtual function (VF) is assigned directly to the hardware memory context (HMC) without any validation. To address this, introduce an upper boundary check for both Tx an
osv
CVE-2025-39992UNKNOWN≥ 6.8.0, < 6.12.51≥ 6.13.0, < 6.16.11+1 more2025-10-15
CVE-2025-39992 mm: swap: check for stable address space before operating on the VMA
mm: swap: check for stable address space before operating on the VMA
In the Linux kernel, the following vulnerability has been resolved:
mm: swap: check for stable address space before operating on the VMA
It is possible to hit a zero entry while traversing the vmas in unuse_mm()
called from swapoff path and accessing it causes the OOPS:
Unable to handle kernel NULL pointer dereference at virtual address
0000
osv
CVE-2025-39975UNKNOWN≥ 0, < 6.6.109≥ 6.7.0, < 6.12.50+1 more2025-10-15
CVE-2025-39975 smb: client: fix wrong index reference in smb2_compound_op()
smb: client: fix wrong index reference in smb2_compound_op()
In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix wrong index reference in smb2_compound_op()
In smb2_compound_op(), the loop that processes each command's response
uses wrong indices when accessing response bufferes.
This incorrect indexing leads to improper handling of command results.
Also, if incorrectly computed index
osv
CVE-2025-39978UNKNOWN≥ 5.14.0, < 6.1.155≥ 6.2.0, < 6.6.109+2 more2025-10-15
CVE-2025-39978 octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()
octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()
In the Linux kernel, the following vulnerability has been resolved:
octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()
This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node"
and then dereferences it on the next line. Two lines later, we take
a mutex so I don't think this is an RCU safe region. Re-order it to do
the de
osv
CVE-2025-39980UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-10-15
CVE-2025-39980 CVE-2025-39980: In the Linux kernel, the following vulnerability has been resolved: nexthop: Forbid FDB status change while nexthop is in a group The kernel forbids t
In the Linux kernel, the following vulnerability has been resolved: nexthop: Forbid FDB status change while nexthop is in a group The kernel forbids the creation of non-FDB nexthop groups with FDB nexthops: # ip nexthop add id 1 via 192.0.2.1 fdb # ip nexthop add id 2 group 1 Error: Non FDB nexthop group cannot have
osv
CVE-2025-39994UNKNOWN≥ 3.16.0, < 5.4.301≥ 5.5.0, < 5.10.246+6 more2025-10-15
CVE-2025-39994 media: tuner: xc5000: Fix use-after-free in xc5000_release
media: tuner: xc5000: Fix use-after-free in xc5000_release
In the Linux kernel, the following vulnerability has been resolved:
media: tuner: xc5000: Fix use-after-free in xc5000_release
The original code uses cancel_delayed_work() in xc5000_release(), which
does not guarantee that the delayed work item timer_sleep has fully
completed if it was already running. This leads to use-after-free scenarios
where xc5000_release(
osv
CVE-2025-39995UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-10-15
CVE-2025-39995 CVE-2025-39995: In the Linux kernel, the following vulnerability has been resolved: media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe The
In the Linux kernel, the following vulnerability has been resolved: media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe The state->timer is a cyclic timer that schedules work_i2c_poll and delayed_work_enable_hotplug, while rearming itself. Using timer_delete() fails to guarantee the timer isn
osv
CVE-2025-39970UNKNOWN≥ 4.17.0, < 5.4.300≥ 5.5.0, < 5.10.245+5 more2025-10-15
CVE-2025-39970 i40e: fix input validation logic for action_meta
i40e: fix input validation logic for action_meta
In the Linux kernel, the following vulnerability has been resolved:
i40e: fix input validation logic for action_meta
Fix condition to check 'greater or equal' to prevent OOB dereference.
osv
CVE-2025-39965MEDIUMCVSS 5.5≥ 6.6.103, < 6.6.109≥ 6.12.43, < 6.12.50+3 more2025-10-13
CVE-2025-39965 [MEDIUM] CVE-2025-39965: In the Linux kernel, the following vulnerability has been resolved:
xfrm: xfrm_alloc_spi shouldn't
In the Linux kernel, the following vulnerability has been resolved:
xfrm: xfrm_alloc_spi shouldn't use 0 as SPI
x->id.spi == 0 means "no SPI assigned", but since commit
94f39804d891 ("xfrm: Duplicate SPI Handling"), we now create states
and add them to the byspi list with this value.
__xfrm_state_delete doesn't remove those states from the byspi list,
sin
nvdosv
CVE-2025-39964LOWCVSS 3.3≥ 2.6.38, < 5.10.245≥ 5.11, < 5.15.194+5 more2025-10-13
CVE-2025-39964 [LOW] CVE-2025-39964: In the Linux kernel, the following vulnerability has been resolved:
crypto: af_alg - Disallow concu
In the Linux kernel, the following vulnerability has been resolved:
crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg
Issuing two writes to the same af_alg socket is bogus as the
data will be interleaved in an unpredictable fashion. Furthermore,
concurrent writes may create inconsistencies in the internal
socket state.
Disallow this by adding a
nvdosv
CVE-2025-39963HIGHCVSS 7.8≥ 6.10, < 6.12.49≥ 6.13, < 6.16.9+1 more2025-10-09
CVE-2025-39963 [HIGH] CWE-401 CVE-2025-39963: In the Linux kernel, the following vulnerability has been resolved:
io_uring: fix incorrect io_kioc
In the Linux kernel, the following vulnerability has been resolved:
io_uring: fix incorrect io_kiocb reference in io_link_skb
In io_link_skb function, there is a bug where prev_notif is incorrectly
assigned using 'nd' instead of 'prev_nd'. This causes the context
validation check to compare the current notification with itself instead
of comparing i
nvdosv
CVE-2025-39958HIGHCVSS 7.8≥ 6.2, < 6.16.9v6.172025-10-09
CVE-2025-39958 [HIGH] CVE-2025-39958: In the Linux kernel, the following vulnerability has been resolved:
iommu/s390: Make attach succeed
In the Linux kernel, the following vulnerability has been resolved:
iommu/s390: Make attach succeed when the device was surprise removed
When a PCI device is removed with surprise hotplug, there may still be
attempts to attach the device to the default domain as part of tear down
via (__iommu_release_dma_ownership()), or because the removal happens
during p
nvdosv
CVE-2025-39962HIGHCVSS 7.8≥ 6.16, < 6.16.9v6.172025-10-09
CVE-2025-39962 [HIGH] CWE-787 CVE-2025-39962: In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Fix untrusted unsigned s
In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Fix untrusted unsigned subtract
Fix the following Smatch static checker warning:
net/rxrpc/rxgk_app.c:65 rxgk_yfs_decode_ticket()
warn: untrusted unsigned subtract. 'ticket_len - 10 * 4'
by prechecking the length of what we're trying to extract in two places in
the token an
nvdosv
CVE-2025-39957HIGHCVSS 7.8≥ 6.4, < 6.6.108≥ 6.7, < 6.12.49+2 more2025-10-09
CVE-2025-39957 [HIGH] CVE-2025-39957: In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: increase scan_i
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: increase scan_ies_len for S1G
Currently the S1G capability element is not taken into account
for the scan_ies_len, which leads to a buffer length validation
failure in ieee80211_prep_hw_scan() and subsequent WARN in
__ieee80211_start_scan(). This prevents hw scanning from fu
nvdosv
CVE-2025-39955HIGHCVSS 7.8≥ 3.7, < 5.4.300≥ 5.5, < 5.10.245+6 more2025-10-09
CVE-2025-39955 [HIGH] CVE-2025-39955: In the Linux kernel, the following vulnerability has been resolved:
tcp: Clear tcp_sk(sk)->fastopen
In the Linux kernel, the following vulnerability has been resolved:
tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect().
syzbot reported the splat below where a socket had tcp_sk(sk)->fastopen_rsk
in the TCP_ESTABLISHED state. [0]
syzbot reused the server-side TCP Fast Open socket as a new client before
the TFO socket completes 3WHS:
1. accept()
2. co
nvdosv
CVE-2025-39960HIGHCVSS 7.8≥ 6.16, < 6.16.9v6.172025-10-09
CVE-2025-39960 [HIGH] CVE-2025-39960: In the Linux kernel, the following vulnerability has been resolved:
gpiolib: acpi: initialize acpi_
In the Linux kernel, the following vulnerability has been resolved:
gpiolib: acpi: initialize acpi_gpio_info struct
Since commit 7c010d463372 ("gpiolib: acpi: Make sure we fill struct
acpi_gpio_info"), uninitialized acpi_gpio_info struct are passed to
__acpi_find_gpio() and later in the call stack info->quirks is used in
acpi_populate_gpio_lookup. This brea
nvdosv
CVE-2025-39956MEDIUMCVSS 5.5≥ 6.9, < 6.12.49≥ 6.13, < 6.16.9+1 more2025-10-09
CVE-2025-39956 [MEDIUM] CVE-2025-39956: In the Linux kernel, the following vulnerability has been resolved:
igc: don't fail igc_probe() on
In the Linux kernel, the following vulnerability has been resolved:
igc: don't fail igc_probe() on LED setup error
When igc_led_setup() fails, igc_probe() fails and triggers kernel panic
in free_netdev() since unregister_netdev() is not called. [1]
This behavior can be tested using fault-injection framework, especially
the failslab feature. [2]
Since LED
nvdosv
CVE-2025-39959MEDIUMCVSS 5.5≥ 6.15, < 6.16.9v6.172025-10-09
CVE-2025-39959 [MEDIUM] CWE-476 CVE-2025-39959: In the Linux kernel, the following vulnerability has been resolved:
ASoC: amd: acp: Fix incorrect r
In the Linux kernel, the following vulnerability has been resolved:
ASoC: amd: acp: Fix incorrect retrival of acp_chip_info
Use dev_get_drvdata(dev->parent) instead of dev_get_platdata(dev)
to correctly obtain acp_chip_info members in the acp I2S driver.
Previously, some members were not updated properly due to incorrect
data access, which could p
nvdosv
CVE-2025-39954MEDIUMCVSS 5.5≥ 6.15, < 6.16.9v6.172025-10-09
CVE-2025-39954 [MEDIUM] CWE-369 CVE-2025-39954: In the Linux kernel, the following vulnerability has been resolved:
clk: sunxi-ng: mp: Fix dual-div
In the Linux kernel, the following vulnerability has been resolved:
clk: sunxi-ng: mp: Fix dual-divider clock rate readback
When dual-divider clock support was introduced, the P divider offset was
left out of the .recalc_rate readback function. This causes the clock
rate to become bogus or even zero (possibly due to the P divider being
1, leading
nvdosv
CVE-2025-39961MEDIUMCVSS 4.7≥ 4.9.194, < 4.10≥ 4.14.146, < 4.15+7 more2025-10-09
CVE-2025-39961 [MEDIUM] CWE-362 CVE-2025-39961: In the Linux kernel, the following vulnerability has been resolved:
iommu/amd/pgtbl: Fix possible r
In the Linux kernel, the following vulnerability has been resolved:
iommu/amd/pgtbl: Fix possible race while increase page table level
The AMD IOMMU host page table implementation supports dynamic page table levels
(up to 6 levels), starting with a 3-level configuration that expands based on
IOVA address. The kernel maintains a root pointer and cu
nvdosv