Linux Kernel vulnerabilities
14,883 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,883
CISA KEV
29
actively exploited
Public exploits
297
Exploited in wild
31
Severity breakdown
CRITICAL128HIGH3822MEDIUM8775LOW429UNKNOWN1729
Vulnerabilities
Page 150 of 745
CVE-2024-58241MEDIUMCVSS 5.5≥ 4.19.319, < 4.20≥ 5.4.281, < 5.5+8 more2025-09-24
CVE-2024-58241 [MEDIUM] CVE-2024-58241: In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_core: Disable wo
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_core: Disable works on hci_unregister_dev
This make use of disable_work_* on hci_unregister_dev since the hci_dev is
about to be freed new submissions are not disarable.
nvdosv
CVE-2025-39890MEDIUMCVSS 5.5≥ 6.3, < 6.6.94≥ 6.7, < 6.12.34+1 more2025-09-24
CVE-2025-39890 [MEDIUM] CWE-401 CVE-2025-39890: In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix memory leak i
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event
Currently, in ath12k_service_ready_ext_event(), svc_rdy_ext.mac_phy_caps
is not freed in the failure case, causing a memory leak. The following
trace is observed in kmemleak:
unreferenced object 0xffff8b3eb5789c00 (s
nvdosv
CVE-2025-39882HIGHCVSS 7.8≥ 6.6.105, < 6.6.107≥ 6.12.45, < 6.12.48+2 more2025-09-23
CVE-2025-39882 [HIGH] CWE-416 CVE-2025-39882: In the Linux kernel, the following vulnerability has been resolved:
drm/mediatek: fix potential OF
In the Linux kernel, the following vulnerability has been resolved:
drm/mediatek: fix potential OF node use-after-free
The for_each_child_of_node() helper drops the reference it takes to each
node as it iterates over children and an explicit of_node_put() is only
needed when exiting the loop early.
Drop the recently introduced bogus additional refer
nvdosv
CVE-2025-39870HIGHCVSS 7.8≥ 6.1.140, < 6.1.153≥ 6.6.92, < 6.6.107+5 more2025-09-23
CVE-2025-39870 [HIGH] CWE-415 CVE-2025-39870: In the Linux kernel, the following vulnerability has been resolved:
dmaengine: idxd: Fix double fre
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: idxd: Fix double free in idxd_setup_wqs()
The clean up in idxd_setup_wqs() has had a couple bugs because the error
handling is a bit subtle. It's simpler to just re-write it in a cleaner
way. The issues here are:
1) If "idxd->max_wqs" is <= 0 then we call put_device(conf
nvdosv
CVE-2025-39888HIGHCVSS 7.8≥ 6.16, < 6.16.8v6.172025-09-23
CVE-2025-39888 [HIGH] CWE-787 CVE-2025-39888: In the Linux kernel, the following vulnerability has been resolved:
fuse: Block access to folio ove
In the Linux kernel, the following vulnerability has been resolved:
fuse: Block access to folio overlimit
syz reported a slab-out-of-bounds Write in fuse_dev_do_write.
When the number of bytes to be retrieved is truncated to the upper limit
by fc->max_pages and there is an offset, the oob is triggered.
Add a loop termination condition to prevent o
nvdosv
CVE-2025-39869HIGHCVSS 7.1≥ 4.4, < 5.4.300≥ 5.5, < 5.10.245+6 more2025-09-23
CVE-2025-39869 [HIGH] CWE-125 CVE-2025-39869: In the Linux kernel, the following vulnerability has been resolved:
dmaengine: ti: edma: Fix memory
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: ti: edma: Fix memory allocation size for queue_priority_map
Fix a critical memory allocation bug in edma_setup_from_hw() where
queue_priority_map was allocated with insufficient memory. The code
declared queue_priority_map as s8 (*)[2] (pointer to array of 2 s8),
but allo
nvdosv
CVE-2025-39873HIGHCVSS 7.8≥ 4.19, < 5.15.194≥ 5.16, < 6.1.153+4 more2025-09-23
CVE-2025-39873 [HIGH] CWE-416 CVE-2025-39873: In the Linux kernel, the following vulnerability has been resolved:
can: xilinx_can: xcan_write_fra
In the Linux kernel, the following vulnerability has been resolved:
can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB
can_put_echo_skb() takes ownership of the SKB and it may be freed
during or after the call.
However, xilinx_can xcan_write_frame() keeps using SKB after the call.
Fix that by only calling can_put_echo_skb()
nvdosv
CVE-2025-39880HIGHCVSS 7.8≥ 5.11, < 5.15.194≥ 5.16, < 6.1.153+4 more2025-09-23
CVE-2025-39880 [HIGH] CWE-704 CVE-2025-39880: In the Linux kernel, the following vulnerability has been resolved:
libceph: fix invalid accesses t
In the Linux kernel, the following vulnerability has been resolved:
libceph: fix invalid accesses to ceph_connection_v1_info
There is a place where generic code in messenger.c is reading and
another place where it is writing to con->v1 union member without
checking that the union member is active (i.e. msgr1 is in use).
On 64-bit systems, con->v1.a
nvdosv
CVE-2025-39868HIGHCVSS 7.8≥ 6.15, < 6.16.8v6.172025-09-23
CVE-2025-39868 [HIGH] CVE-2025-39868: In the Linux kernel, the following vulnerability has been resolved:
erofs: fix runtime warning on t
In the Linux kernel, the following vulnerability has been resolved:
erofs: fix runtime warning on truncate_folio_batch_exceptionals()
Commit 0e2f80afcfa6("fs/dax: ensure all pages are idle prior to
filesystem unmount") introduced the WARN_ON_ONCE to capture whether
the filesystem has removed all DAX entries or not and applied the
fix to xfs and ext4.
Apply
nvdosv
CVE-2025-39871HIGHCVSS 7.8≥ 6.1.140, < 6.2≥ 6.6.92, < 6.6.107+5 more2025-09-23
CVE-2025-39871 [HIGH] CWE-416 CVE-2025-39871: In the Linux kernel, the following vulnerability has been resolved:
dmaengine: idxd: Remove imprope
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: idxd: Remove improper idxd_free
The call to idxd_free() introduces a duplicate put_device() leading to a
reference count underflow:
refcount_t: underflow; use-after-free.
WARNING: CPU: 15 PID: 4428 at lib/refcount.c:28 refcount_warn_saturate+0xbe/0x110
...
Call Trace:
id
nvdosv
CVE-2025-39883HIGHCVSS 7.1≥ 4.13, < 5.4.300≥ 5.5, < 5.10.245+6 more2025-09-23
CVE-2025-39883 [HIGH] CWE-125 CVE-2025-39883: In the Linux kernel, the following vulnerability has been resolved:
mm/memory-failure: fix VM_BUG_O
In the Linux kernel, the following vulnerability has been resolved:
mm/memory-failure: fix VM_BUG_ON_PAGE(PagePoisoned(page)) when unpoison memory
When I did memory failure tests, below panic occurs:
page dumped because: VM_BUG_ON_PAGE(PagePoisoned(page))
kernel BUG at include/linux/page-flags.h:616!
Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPT
nvdosv
CVE-2025-39877HIGHCVSS 7.8≥ 5.18, < 6.1.153≥ 6.2, < 6.6.107+3 more2025-09-23
CVE-2025-39877 [HIGH] CWE-416 CVE-2025-39877: In the Linux kernel, the following vulnerability has been resolved:
mm/damon/sysfs: fix use-after-f
In the Linux kernel, the following vulnerability has been resolved:
mm/damon/sysfs: fix use-after-free in state_show()
state_show() reads kdamond->damon_ctx without holding damon_sysfs_lock.
This allows a use-after-free race:
CPU 0 CPU 1
----- -----
state_show() damon_sysfs_turn_damon_on()
ctx = kdamond->damon_ctx; mutex_lock(&damon_sysfs_lock);
da
nvdosv
CVE-2025-39881HIGHCVSS 7.8≥ 6.1, < 6.1.153≥ 6.2, < 6.6.107+3 more2025-09-23
CVE-2025-39881 [HIGH] CWE-416 CVE-2025-39881: In the Linux kernel, the following vulnerability has been resolved:
kernfs: Fix UAF in polling when
In the Linux kernel, the following vulnerability has been resolved:
kernfs: Fix UAF in polling when open file is released
A use-after-free (UAF) vulnerability was identified in the PSI (Pressure
Stall Information) monitoring mechanism:
BUG: KASAN: slab-use-after-free in psi_trigger_poll+0x3c/0x140
Read of size 8 at addr ffff3de3d50bd308 by task sys
nvdosv
CVE-2025-39887MEDIUMCVSS 5.5≥ 6.16, < 6.16.8v6.172025-09-23
CVE-2025-39887 [MEDIUM] CWE-476 CVE-2025-39887: In the Linux kernel, the following vulnerability has been resolved:
tracing/osnoise: Fix null-ptr-d
In the Linux kernel, the following vulnerability has been resolved:
tracing/osnoise: Fix null-ptr-deref in bitmap_parselist()
A crash was observed with the following output:
BUG: kernel NULL pointer dereference, address: 0000000000000010
Oops: Oops: 0000 [#1] SMP NOPTI
CPU: 2 UID: 0 PID: 92 Comm: osnoise_cpus Not tainted 6.17.0-rc4-00201-gd69eb20
nvdosv
CVE-2025-39884MEDIUMCVSS 4.7≥ 6.11, < 6.12.48≥ 6.13, < 6.16.8+1 more2025-09-23
CVE-2025-39884 [MEDIUM] CWE-667 CVE-2025-39884: In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix subvolume deletion l
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix subvolume deletion lockup caused by inodes xarray race
There is a race condition between inode eviction and inode caching that
can cause a live struct btrfs_inode to be missing from the root->inodes
xarray. Specifically, there is a window during evict() between the inod
nvdosv
CVE-2025-39876MEDIUMCVSS 5.5≥ 4.19.153, < 4.20≥ 5.4.73, < 5.4.300+8 more2025-09-23
CVE-2025-39876 [MEDIUM] CWE-476 CVE-2025-39876: In the Linux kernel, the following vulnerability has been resolved:
net: fec: Fix possible NPD in f
In the Linux kernel, the following vulnerability has been resolved:
net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable()
The function of_phy_find_device may return NULL, so we need to take
care before dereferencing phy_dev.
nvdosv
CVE-2025-39886MEDIUMCVSS 5.5≥ 5.15, < 6.6.107≥ 6.7, < 6.12.48+2 more2025-09-23
CVE-2025-39886 [MEDIUM] CVE-2025-39886: In the Linux kernel, the following vulnerability has been resolved:
bpf: Tell memcg to use allow_sp
In the Linux kernel, the following vulnerability has been resolved:
bpf: Tell memcg to use allow_spinning=false path in bpf_timer_init()
Currently, calling bpf_map_kmalloc_node() from __bpf_async_init() can
cause various locking issues; see the following stack trace (edited for
style) as one example:
...
[10.011566] do_raw_spin_lock.cold
[10.011570] try_
nvdosv
CVE-2025-39878MEDIUMCVSS 5.5≥ 6.15, < 6.16.8v6.172025-09-23
CVE-2025-39878 [MEDIUM] CWE-476 CVE-2025-39878: In the Linux kernel, the following vulnerability has been resolved:
ceph: fix crash after fscrypt_e
In the Linux kernel, the following vulnerability has been resolved:
ceph: fix crash after fscrypt_encrypt_pagecache_blocks() error
The function move_dirty_folio_in_page_array() was created by commit
ce80b76dd327 ("ceph: introduce ceph_process_folio_batch() method") by
moving code from ceph_writepages_start() to this function.
This new function is
nvdosv
CVE-2025-39874MEDIUMCVSS 5.5≥ 6.15, < 6.16.8v6.172025-09-23
CVE-2025-39874 [MEDIUM] CVE-2025-39874: In the Linux kernel, the following vulnerability has been resolved:
macsec: sync features on RTM_NE
In the Linux kernel, the following vulnerability has been resolved:
macsec: sync features on RTM_NEWLINK
Syzkaller managed to lock the lower device via ETHTOOL_SFEATURES:
netdev_lock include/linux/netdevice.h:2761 [inline]
netdev_lock_ops include/net/netdev_lock.h:42 [inline]
netdev_sync_lower_features net/core/dev.c:10649 [inline]
__netdev_update_featur
nvdosv
CVE-2025-39879MEDIUMCVSS 5.5≥ 6.15, < 6.16.8v6.172025-09-23
CVE-2025-39879 [MEDIUM] CWE-476 CVE-2025-39879: In the Linux kernel, the following vulnerability has been resolved:
ceph: always call ceph_shift_un
In the Linux kernel, the following vulnerability has been resolved:
ceph: always call ceph_shift_unused_folios_left()
The function ceph_process_folio_batch() sets folio_batch entries to
NULL, which is an illegal state. Before folio_batch_release() crashes
due to this API violation, the function ceph_shift_unused_folios_left()
is supposed to remove
nvdosv