Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 32 of 724
CVE-2025-71115MEDIUMCVSS 5.5≥ 6.13.1, < 6.18.3v6.13+1 more2026-01-14
CVE-2025-71115 [MEDIUM] CWE-908 CVE-2025-71115: In the Linux kernel, the following vulnerability has been resolved: um: init cpu_tasks[] earlier T In the Linux kernel, the following vulnerability has been resolved: um: init cpu_tasks[] earlier This is currently done in uml_finishsetup(), but e.g. with KCOV enabled we'll crash because some init code can call into e.g. memparse(), which has coverage annotations, and then the checks in check_kcov_mode() crash because current is NULL. Simply in
nvdosv
CVE-2025-71102MEDIUMCVSS 5.5≥ 5.8.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-14
CVE-2025-71102 [MEDIUM] CVE-2025-71102: In the Linux kernel, the following vulnerability has been resolved: scs: fix a wrong parameter in _ In the Linux kernel, the following vulnerability has been resolved: scs: fix a wrong parameter in __scs_magic __scs_magic() needs a 'void *' variable, but a 'struct task_struct *' is given. 'task_scs(tsk)' is the starting address of the task's shadow call stack, and '__scs_magic(task_scs(tsk))' is the end address of the task's shadow call stack. Here shou
nvdosv
CVE-2025-71105MEDIUMCVSS 5.5≥ 5.7.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-14
CVE-2025-71105 [MEDIUM] CVE-2025-71105: In the Linux kernel, the following vulnerability has been resolved: f2fs: use global inline_xattr_s In the Linux kernel, the following vulnerability has been resolved: f2fs: use global inline_xattr_slab instead of per-sb slab cache As Hong Yun reported in mailing list: loop7: detected capacity change from 0 to 131072 ------------[ cut here ]------------ kmem_cache of name 'f2fs_xattr_entry-7:7' already exists WARNING: CPU: 0 PID: 24426 at mm/slab_commo
nvdosv
CVE-2025-71129MEDIUMCVSS 5.5≥ 6.1.1, < 6.6.120≥ 6.7, < 6.12.64+3 more2026-01-14
CVE-2025-71129 [MEDIUM] CVE-2025-71129: In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Sign extend kfu In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: Sign extend kfunc call arguments The kfunc calls are native calls so they should follow LoongArch calling conventions. Sign extend its arguments properly to avoid kernel panic. This is done by adding a new emit_abi_ext() helper. The emit_abi_ext() helper performs extension
nvdosv
CVE-2025-71111MEDIUMCVSS 4.7≥ 2.6.18.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-14
CVE-2025-71111 [MEDIUM] CWE-367 CVE-2025-71111: In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83791d) Convert macros In the Linux kernel, the following vulnerability has been resolved: hwmon: (w83791d) Convert macros to functions to avoid TOCTOU The macro FAN_FROM_REG evaluates its arguments multiple times. When used in lockless contexts involving shared driver data, this leads to Time-of-Check to Time-of-Use (TOCTOU) race conditions, potentially causing divide-
nvdosv
CVE-2025-71125MEDIUMCVSS 5.5≥ 4.17.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-14
CVE-2025-71125 [MEDIUM] CWE-476 CVE-2025-71125: In the Linux kernel, the following vulnerability has been resolved: tracing: Do not register unsupp In the Linux kernel, the following vulnerability has been resolved: tracing: Do not register unsupported perf events Synthetic events currently do not have a function to register perf events. This leads to calling the tracepoint register functions with a NULL function pointer which triggers: ------------[ cut here ]------------ WARNING: kernel/tr
nvdosv
CVE-2025-71130MEDIUMCVSS 5.5≥ 5.16.1, < 6.1.160≥ 6.2, < 6.6.120+4 more2026-01-14
CVE-2025-71130 [MEDIUM] CWE-476 CVE-2025-71130: In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Zero-initialize t In the Linux kernel, the following vulnerability has been resolved: drm/i915/gem: Zero-initialize the eb.vma array in i915_gem_do_execbuffer Initialize the eb.vma array with values of 0 when the eb structure is first set up. In particular, this sets the eb->vma[i].vma pointers to NULL, simplifying cleanup and getting rid of the bug described below
nvdosv
CVE-2025-71121MEDIUMCVSS 5.5≥ 4.14.276, < 4.15≥ 4.19.238, < 4.20+11 more2026-01-14
CVE-2025-71121 [MEDIUM] CVE-2025-71121: In the Linux kernel, the following vulnerability has been resolved: parisc: Do not reprogram affini In the Linux kernel, the following vulnerability has been resolved: parisc: Do not reprogram affinitiy on ASP chip The ASP chip is a very old variant of the GSP chip and is used e.g. in HP 730 workstations. When trying to reprogram the affinity it will crash with a HPMC as the relevant registers don't seem to be at the usual location. Let's avoid the cras
nvdosv
CVE-2025-71106MEDIUMCVSS 5.5≥ 6.18.1, < 6.18.3v6.18+1 more2026-01-14
CVE-2025-71106 [MEDIUM] CVE-2025-71106: In the Linux kernel, the following vulnerability has been resolved: fs: PM: Fix reverse check in fi In the Linux kernel, the following vulnerability has been resolved: fs: PM: Fix reverse check in filesystems_freeze_callback() The freeze_all_ptr check in filesystems_freeze_callback() introduced by commit a3f8f8662771 ("power: always freeze efivarfs") is reverse which quite confusingly causes all file systems to be frozen when filesystem_freeze_enabled i
nvdosv
CVE-2025-71144MEDIUMCVSS 5.5≥ 6.1.159, < 6.1.164≥ 6.12.60, < 6.12.65+5 more2026-01-14
CVE-2025-71144 [MEDIUM] CVE-2025-71144: In the Linux kernel, the following vulnerability has been resolved: mptcp: ensure context reset on In the Linux kernel, the following vulnerability has been resolved: mptcp: ensure context reset on disconnect() After the blamed commit below, if the MPC subflow is already in TCP_CLOSE status or has fallback to TCP at mptcp_disconnect() time, mptcp_do_fastclose() skips setting the `send_fastclose flag` and the later __mptcp_close_ssk() does not reset anym
nvdosv
CVE-2025-71140UNKNOWN≥ 0, < 6.12.69-1≥ 0, < 6.18.5-12026-01-14
CVE-2025-71140 CVE-2025-71140: In the Linux kernel, the following vulnerability has been resolved: media: mediatek: vcodec: Use spinlock for context list protection lock Previously In the Linux kernel, the following vulnerability has been resolved: media: mediatek: vcodec: Use spinlock for context list protection lock Previously a mutex was added to protect the encoder and decoder context lists from unexpected changes originating from the SCP IP block, causing the context pointer to go invalid,
osv
CVE-2025-71068HIGHCVSS 7.8≥ 5.11, < 5.15.198≥ 6.0, < 6.6.120+3 more2026-01-13
CVE-2025-71068 [HIGH] CVE-2025-71068: In the Linux kernel, the following vulnerability has been resolved: svcrdma: bound check rq_pages i In the Linux kernel, the following vulnerability has been resolved: svcrdma: bound check rq_pages index in inline path svc_rdma_copy_inline_range indexed rqstp->rq_pages[rc_curpage] without verifying rc_curpage stays within the allocated page array. Add guards before the first use and after advancing to a new page.
nvdosv
CVE-2025-71071HIGHCVSS 7.8≥ 6.0.16, < 6.1≥ 6.1.2, < 6.1.160+5 more2026-01-13
CVE-2025-71071 [HIGH] CWE-416 CVE-2025-71071: In the Linux kernel, the following vulnerability has been resolved: iommu/mediatek: fix use-after-f In the Linux kernel, the following vulnerability has been resolved: iommu/mediatek: fix use-after-free on probe deferral The driver is dropping the references taken to the larb devices during probe after successful lookup as well as on errors. This can potentially lead to a use-after-free in case a larb device has not yet been bound to its driver so
nvdosv
CVE-2025-71089HIGHCVSS 7.8≥ 5.2, < 5.15.200≥ 5.16, < 6.1.163+3 more2026-01-13
CVE-2025-71089 [HIGH] CVE-2025-71089: In the Linux kernel, the following vulnerability has been resolved: iommu: disable SVA when CONFIG_ In the Linux kernel, the following vulnerability has been resolved: iommu: disable SVA when CONFIG_X86 is set Patch series "Fix stale IOTLB entries for kernel address space", v7. This proposes a fix for a security vulnerability related to IOMMU Shared Virtual Addressing (SVA). In an SVA context, an IOMMU can cache kernel page table entries. When a kernel p
nvdosv
CVE-2025-71093HIGHCVSS 7.1≥ 3.18.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-13
CVE-2025-71093 [HIGH] CWE-125 CVE-2025-71093: In the Linux kernel, the following vulnerability has been resolved: e1000: fix OOB in e1000_tbi_sho In the Linux kernel, the following vulnerability has been resolved: e1000: fix OOB in e1000_tbi_should_accept() In e1000_tbi_should_accept() we read the last byte of the frame via 'data[length - 1]' to evaluate the TBI workaround. If the descriptor- reported length is zero or larger than the actual RX buffer size, this read goes out of bounds and ca
nvdosv
CVE-2025-71082HIGHCVSS 7.8≥ 3.7.1, < 5.15.198≥ 5.16, < 6.1.160+5 more2026-01-13
CVE-2025-71082 [HIGH] CVE-2025-71082: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: revert use of In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btusb: revert use of devm_kzalloc in btusb This reverts commit 98921dbd00c4e ("Bluetooth: Use devm_kzalloc in btusb.c file"). In btusb_probe(), we use devm_kzalloc() to allocate the btusb data. This ties the lifetime of all the btusb data to the binding of a driver to one interf
nvdosv
CVE-2025-71092HIGHCVSS 7.8≥ 6.18.1, < 6.18.4v6.18+1 more2026-01-13
CVE-2025-71092 [HIGH] CWE-787 CVE-2025-71092: In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix OOB write in In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix OOB write in bnxt_re_copy_err_stats() Commit ef56081d1864 ("RDMA/bnxt_re: RoCE related hardware counters update") added three new counters and placed them after BNXT_RE_OUT_OF_SEQ_ERR. BNXT_RE_OUT_OF_SEQ_ERR acts as a boundary marker for allocating hardware statist
nvdosv
CVE-2025-71101HIGHCVSS 7.1≥ 6.6.1, < 6.6.120≥ 6.7, < 6.12.64+3 more2026-01-13
CVE-2025-71101 [HIGH] CWE-125 CVE-2025-71101: In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix o In the Linux kernel, the following vulnerability has been resolved: platform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package parsing The hp_populate_*_elements_from_package() functions in the hp-bioscfg driver contain out-of-bounds array access vulnerabilities. These functions parse ACPI packages into internal data structures using
nvdosv
CVE-2025-71073HIGHCVSS 7.8≥ 2.6.12.1, < 6.12.64≥ 6.13, < 6.18.3+2 more2026-01-13
CVE-2025-71073 [HIGH] CWE-416 CVE-2025-71073: In the Linux kernel, the following vulnerability has been resolved: Input: lkkbd - disable pending In the Linux kernel, the following vulnerability has been resolved: Input: lkkbd - disable pending work before freeing device lkkbd_interrupt() schedules lk->tq via schedule_work(), and the work handler lkkbd_reinit() dereferences the lkkbd structure and its serio/input_dev fields. lkkbd_disconnect() and error paths in lkkbd_connect() free the lkkbd
nvdosv
CVE-2025-71078HIGHCVSS 7.8≥ 4.20.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-13
CVE-2025-71078 [HIGH] CVE-2025-71078: In the Linux kernel, the following vulnerability has been resolved: powerpc/64s/slb: Fix SLB multih In the Linux kernel, the following vulnerability has been resolved: powerpc/64s/slb: Fix SLB multihit issue during SLB preload On systems using the hash MMU, there is a software SLB preload cache that mirrors the entries loaded into the hardware SLB buffer. This preload cache is subject to periodic eviction — typically after every 256 context switches — to
nvdosv