Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 31 of 724
CVE-2025-71132MEDIUMCVSS 5.5≥ 5.15.1, < 5.15.198≥ 5.16, < 6.1.160+5 more2026-01-14
CVE-2025-71132 [MEDIUM] CVE-2025-71132: In the Linux kernel, the following vulnerability has been resolved:
smc91x: fix broken irq-context
In the Linux kernel, the following vulnerability has been resolved:
smc91x: fix broken irq-context in PREEMPT_RT
When smc91x.c is built with PREEMPT_RT, the following splat occurs
in FVP_RevC:
[ 13.055000] smc91x LNRO0003:00 eth0: link up, 10Mbps, half-duplex, lpa 0x0000
[ 13.062137] BUG: workqueue leaked atomic, lock or RCU: kworker/2:1[106]
[ 13.062137]
nvdosv
CVE-2025-71108MEDIUMCVSS 5.5≥ 4.13.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-14
CVE-2025-71108 [MEDIUM] CVE-2025-71108: In the Linux kernel, the following vulnerability has been resolved:
usb: typec: ucsi: Handle incorr
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: ucsi: Handle incorrect num_connectors capability
The UCSI spec states that the num_connectors field is 7 bits, and the
8th bit is reserved and should be set to zero.
Some buggy FW has been known to set this bit, and it can lead to a
system not booting.
Flag that the FW is not
nvdosv
CVE-2025-71131MEDIUMCVSS 5.5≥ 2.6.25.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-14
CVE-2025-71131 [MEDIUM] CVE-2025-71131: In the Linux kernel, the following vulnerability has been resolved:
crypto: seqiv - Do not use req-
In the Linux kernel, the following vulnerability has been resolved:
crypto: seqiv - Do not use req->iv after crypto_aead_encrypt
As soon as crypto_aead_encrypt is called, the underlying request
may be freed by an asynchronous completion. Thus dereferencing
req->iv after it returns is invalid.
Instead of checking req->iv against info, create a new variabl
nvdosv
CVE-2025-71126MEDIUMCVSS 5.5≥ 6.1.149, < 6.1.160≥ 6.6.101, < 6.6.120+5 more2026-01-14
CVE-2025-71126 [MEDIUM] CWE-667 CVE-2025-71126: In the Linux kernel, the following vulnerability has been resolved:
mptcp: avoid deadlock on fallba
In the Linux kernel, the following vulnerability has been resolved:
mptcp: avoid deadlock on fallback while reinjecting
Jakub reported an MPTCP deadlock at fallback time:
WARNING: possible recursive locking detected
6.18.0-rc7-virtme #1 Not tainted
mptcp_connect/20858 is trying to acquire lock:
ff1100001da18b60 (&msk->fallback_lock){+.-.}-{3:3},
nvdosv
CVE-2025-71139MEDIUMCVSS 5.5≥ 6.17.1, < 6.18.4v6.17+1 more2026-01-14
CVE-2025-71139 [MEDIUM] CVE-2025-71139: In the Linux kernel, the following vulnerability has been resolved:
kernel/kexec: fix IMA when allo
In the Linux kernel, the following vulnerability has been resolved:
kernel/kexec: fix IMA when allocation happens in CMA area
*** Bug description ***
When I tested kexec with the latest kernel, I ran into the following warning:
[ 40.712410] ------------[ cut here ]------------
[ 40.712576] WARNING: CPU: 2 PID: 1562 at kernel/kexec_core.c:1001 kimage_map
nvdosv
CVE-2025-71113MEDIUMCVSS 5.5≥ 2.6.38.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-14
CVE-2025-71113 [MEDIUM] CWE-908 CVE-2025-71113: In the Linux kernel, the following vulnerability has been resolved:
crypto: af_alg - zero initializ
In the Linux kernel, the following vulnerability has been resolved:
crypto: af_alg - zero initialize memory allocated via sock_kmalloc
Several crypto user API contexts and requests allocated with
sock_kmalloc() were left uninitialized, relying on callers to
set fields explicitly. This resulted in the use of uninitialized
data in certain error path
nvdosv
CVE-2025-71104MEDIUMCVSS 5.5≥ 4.14.45, < 4.15≥ 4.16.13, < 4.17+8 more2026-01-14
CVE-2025-71104 [MEDIUM] CWE-667 CVE-2025-71104: In the Linux kernel, the following vulnerability has been resolved:
KVM: x86: Fix VM hard lockup af
In the Linux kernel, the following vulnerability has been resolved:
KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer
When advancing the target expiration for the guest's APIC timer in periodic
mode, set the expiration to "now" if the target expiration is in the past
(similar to what is done in update_target_expiration
nvdosv
CVE-2025-71119MEDIUMCVSS 5.5≥ 6.1.72, < 6.1.160≥ 6.5.12, < 6.6+5 more2026-01-14
CVE-2025-71119 [MEDIUM] CVE-2025-71119: In the Linux kernel, the following vulnerability has been resolved:
powerpc/kexec: Enable SMT befor
In the Linux kernel, the following vulnerability has been resolved:
powerpc/kexec: Enable SMT before waking offline CPUs
If SMT is disabled or a partial SMT state is enabled, when a new kernel
image is loaded for kexec, on reboot the following warning is observed:
kexec: Waking offline cpu 228.
WARNING: CPU: 0 PID: 9062 at arch/powerpc/kexec/core_64.c:22
nvdosv
CVE-2025-71124MEDIUMCVSS 5.5≥ 6.13.1, < 6.18.3v6.13+1 more2026-01-14
CVE-2025-71124 [MEDIUM] CWE-476 CVE-2025-71124: In the Linux kernel, the following vulnerability has been resolved:
drm/msm/a6xx: move preempt_prep
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/a6xx: move preempt_prepare_postamble after error check
Move the call to preempt_prepare_postamble() after verifying that
preempt_postamble_ptr is valid. If preempt_postamble_ptr is NULL,
dereferencing it in preempt_prepare_postamble() would lead to a crash.
This change av
nvdosv
CVE-2025-71114MEDIUMCVSS 5.5≥ 3.3.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-14
CVE-2025-71114 [MEDIUM] CWE-401 CVE-2025-71114: In the Linux kernel, the following vulnerability has been resolved:
via_wdt: fix critical boot hang
In the Linux kernel, the following vulnerability has been resolved:
via_wdt: fix critical boot hang due to unnamed resource allocation
The VIA watchdog driver uses allocate_resource() to reserve a MMIO
region for the watchdog control register. However, the allocated
resource was not given a name, which causes the kernel resource tree
to contain an
nvdosv
CVE-2025-71135MEDIUMCVSS 5.5≥ 6.12.4, < 6.12.64≥ 6.13.1, < 6.18.4+2 more2026-01-14
CVE-2025-71135 [MEDIUM] CWE-476 CVE-2025-71135: In the Linux kernel, the following vulnerability has been resolved:
md/raid5: fix possible null-poi
In the Linux kernel, the following vulnerability has been resolved:
md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt()
The variable mddev->private is first assigned to conf and then checked:
conf = mddev->private;
if (!conf) ...
If conf is NULL, then mddev->private is also NULL. In this case,
null-pointer derefere
nvdosv
CVE-2025-71138MEDIUMCVSS 5.5≥ 5.19.1, < 6.6.120≥ 6.7, < 6.12.64+3 more2026-01-14
CVE-2025-71138 [MEDIUM] CWE-476 CVE-2025-71138: In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dpu: Add missing NULL p
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/dpu: Add missing NULL pointer check for pingpong interface
It is checked almost always in dpu_encoder_phys_wb_setup_ctl(), but in a
single place the check is missing.
Also use convenient locals instead of phys_enc->* where available.
Patchwork: https://patchwork.freedeskt
nvdosv
CVE-2025-71117MEDIUMCVSS 5.5≥ 6.11.1, < 6.18.3v6.11+1 more2026-01-14
CVE-2025-71117 [MEDIUM] CWE-667 CVE-2025-71117: In the Linux kernel, the following vulnerability has been resolved:
block: Remove queue freezing fr
In the Linux kernel, the following vulnerability has been resolved:
block: Remove queue freezing from several sysfs store callbacks
Freezing the request queue from inside sysfs store callbacks may cause a
deadlock in combination with the dm-multipath driver and the
queue_if_no_path option. Additionally, freezing the request queue slows
down system
nvdosv
CVE-2025-71118MEDIUMCVSS 5.5≥ 2.6.12.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-14
CVE-2025-71118 [MEDIUM] CWE-476 CVE-2025-71118: In the Linux kernel, the following vulnerability has been resolved:
ACPICA: Avoid walking the Names
In the Linux kernel, the following vulnerability has been resolved:
ACPICA: Avoid walking the Namespace if start_node is NULL
Although commit 0c9992315e73 ("ACPICA: Avoid walking the ACPI Namespace
if it is not there") fixed the situation when both start_node and
acpi_gbl_root_node are NULL, the Linux kernel mainline now still crashed
on Honor Mag
nvdosv
CVE-2025-71141MEDIUMCVSS 5.5≥ 6.5.12, < 6.6≥ 6.6.2, < 6.6.120+3 more2026-01-14
CVE-2025-71141 [MEDIUM] CVE-2025-71141: In the Linux kernel, the following vulnerability has been resolved:
drm/tilcdc: Fix removal actions
In the Linux kernel, the following vulnerability has been resolved:
drm/tilcdc: Fix removal actions in case of failed probe
The drm_kms_helper_poll_fini() and drm_atomic_helper_shutdown() helpers
should only be called when the device has been successfully registered.
Currently, these functions are called unconditionally in tilcdc_fini(),
which causes warn
nvdosv
CVE-2025-71120MEDIUMCVSS 5.5≥ 4.19.99, < 4.20≥ 5.4.15, < 5.5+8 more2026-01-14
CVE-2025-71120 [MEDIUM] CWE-476 CVE-2025-71120: In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: svcauth_gss: avoid NULL
In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf
A zero length gss_token results in pages == 0 and in_token->pages[0]
is NULL. The code unconditionally evaluates
page_address(in_token->pages[0]) for the initial memcpy, which can
dereference NUL
nvdosv
CVE-2025-71107MEDIUMCVSS 5.5≥ 6.4.16, < 6.5≥ 6.5.1, < 6.6.120+4 more2026-01-14
CVE-2025-71107 [MEDIUM] CWE-476 CVE-2025-71107: In the Linux kernel, the following vulnerability has been resolved:
f2fs: ensure node page reads co
In the Linux kernel, the following vulnerability has been resolved:
f2fs: ensure node page reads complete before f2fs_put_super() finishes
Xfstests generic/335, generic/336 sometimes crash with the following message:
F2FS-fs (dm-0): detect filesystem reference count leak during umount, type: 9, count: 1
------------[ cut here ]------------
kernel
nvdosv
CVE-2025-71109MEDIUMCVSS 5.5≥ 2.6.35.1, < 6.12.64≥ 6.13, < 6.18.3+2 more2026-01-14
CVE-2025-71109 [MEDIUM] CWE-787 CVE-2025-71109: In the Linux kernel, the following vulnerability has been resolved:
MIPS: ftrace: Fix memory corrup
In the Linux kernel, the following vulnerability has been resolved:
MIPS: ftrace: Fix memory corruption when kernel is located beyond 32 bits
Since commit e424054000878 ("MIPS: Tracing: Reduce the overhead of
dynamic Function Tracer"), the macro UASM_i_LA_mostly has been used,
and this macro can generate more than 2 instructions. At the same
time,
nvdosv
CVE-2025-71142MEDIUMCVSS 5.5≥ 6.15.1, < 6.18.4v6.15+1 more2026-01-14
CVE-2025-71142 [MEDIUM] CVE-2025-71142: In the Linux kernel, the following vulnerability has been resolved:
cpuset: fix warning when disabl
In the Linux kernel, the following vulnerability has been resolved:
cpuset: fix warning when disabling remote partition
A warning was triggered as follows:
WARNING: kernel/cgroup/cpuset.c:1651 at remote_partition_disable+0xf7/0x110
RIP: 0010:remote_partition_disable+0xf7/0x110
RSP: 0018:ffffc90001947d88 EFLAGS: 00000206
RAX: 0000000000007fff RBX: ffff888
nvdosv
CVE-2025-71127MEDIUMCVSS 5.5≥ 5.7.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-14
CVE-2025-71127 [MEDIUM] CVE-2025-71127: In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: Discard Beacon
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: Discard Beacon frames to non-broadcast address
Beacon frames are required to be sent to the broadcast address, see IEEE
Std 802.11-2020, 11.1.3.1 ("The Address 1 field of the Beacon .. frame
shall be set to the broadcast address"). A unicast Beacon frame might be
used as a
nvdosv