Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 33 of 724
CVE-2025-71100HIGHCVSS 7.8≥ 6.9.1, < 6.12.64≥ 6.13, < 6.18.4+2 more2026-01-13
CVE-2025-71100 [HIGH] CWE-129 CVE-2025-71100: In the Linux kernel, the following vulnerability has been resolved:
wifi: rtlwifi: 8192cu: fix tid
In the Linux kernel, the following vulnerability has been resolved:
wifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc()
TID getting from ieee80211_get_tid() might be out of range of array size
of sta_entry->tids[], so check TID is less than MAX_TID_COUNT. Othwerwise,
UBSAN warn:
UBSAN: array-index-out-of-bounds in drivers/net/wirel
nvdosv
CVE-2025-68817HIGHCVSS 7.8≥ 5.15.145, < 5.15.199≥ 6.1.71, < 6.1.160+4 more2026-01-13
CVE-2025-68817 [HIGH] CWE-416 CVE-2025-68817: In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix use-after-free in ks
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix use-after-free in ksmbd_tree_connect_put under concurrency
Under high concurrency, A tree-connection object (tcon) is freed on
a disconnect path while another path still holds a reference and later
executes *_put()/write on it.
nvdosv
CVE-2025-71086HIGHCVSS 7.8≥ 4.19.304, < 4.20≥ 5.4.266, < 5.5+8 more2026-01-13
CVE-2025-71086 [HIGH] CWE-129 CVE-2025-71086: In the Linux kernel, the following vulnerability has been resolved:
net: rose: fix invalid array in
In the Linux kernel, the following vulnerability has been resolved:
net: rose: fix invalid array index in rose_kill_by_device()
rose_kill_by_device() collects sockets into a local array[] and then
iterates over them to disconnect sockets bound to a device being brought
down.
The loop mistakenly indexes array[cnt] instead of array[i]. For cnt <
ARRA
nvdosv
CVE-2025-71075HIGHCVSS 7.8≥ 2.6.19.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-13
CVE-2025-71075 [HIGH] CWE-416 CVE-2025-71075: In the Linux kernel, the following vulnerability has been resolved:
scsi: aic94xx: fix use-after-fr
In the Linux kernel, the following vulnerability has been resolved:
scsi: aic94xx: fix use-after-free in device removal path
The asd_pci_remove() function fails to synchronize with pending tasklets
before freeing the asd_ha structure, leading to a potential
use-after-free vulnerability.
When a device removal is triggered (via hot-unplug or module u
nvdosv
CVE-2025-71099HIGHCVSS 7.8≥ 6.11.1, < 6.12.64≥ 6.13, < 6.18.4+2 more2026-01-13
CVE-2025-71099 [HIGH] CWE-416 CVE-2025-71099: In the Linux kernel, the following vulnerability has been resolved:
drm/xe/oa: Fix potential UAF in
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/oa: Fix potential UAF in xe_oa_add_config_ioctl()
In xe_oa_add_config_ioctl(), we accessed oa_config->id after dropping
metrics_lock. Since this lock protects the lifetime of oa_config, an
attacker could guess the id and call xe_oa_remove_config_ioctl() with
perfect timing, f
nvdosv
CVE-2025-71091HIGHCVSS 7.8≥ 3.11.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-13
CVE-2025-71091 [HIGH] CVE-2025-71091: In the Linux kernel, the following vulnerability has been resolved:
team: fix check for port enable
In the Linux kernel, the following vulnerability has been resolved:
team: fix check for port enabled in team_queue_override_port_prio_changed()
There has been a syzkaller bug reported recently with the following
trace:
list_del corruption, ffff888058bea080->prev is LIST_POISON2 (dead000000000122)
------------[ cut here ]------------
kernel BUG at lib/list_
nvdosv
CVE-2025-71095MEDIUMCVSS 5.5≥ 5.13.1, < 6.1.160≥ 6.2, < 6.6.120+4 more2026-01-13
CVE-2025-71095 [MEDIUM] CVE-2025-71095: In the Linux kernel, the following vulnerability has been resolved:
net: stmmac: fix the crash issu
In the Linux kernel, the following vulnerability has been resolved:
net: stmmac: fix the crash issue for zero copy XDP_TX action
There is a crash issue when running zero copy XDP_TX action, the crash
log is shown below.
[ 216.122464] Unable to handle kernel paging request at virtual address fffeffff80000000
[ 216.187524] Internal error: Oops: 00000000960
nvdosv
CVE-2025-71084MEDIUMCVSS 5.5≥ 5.10.20, < 5.10.248≥ 5.11.3, < 5.12+7 more2026-01-13
CVE-2025-71084 [MEDIUM] CVE-2025-71084: In the Linux kernel, the following vulnerability has been resolved:
RDMA/cm: Fix leaking the multic
In the Linux kernel, the following vulnerability has been resolved:
RDMA/cm: Fix leaking the multicast GID table reference
If the CM ID is destroyed while the CM event for multicast creating is
still queued the cancel_work_sync() will prevent the work from running
which also prevents destroying the ah_attr. This leaks a refcount and
triggers a WARN:
GID
nvdosv
CVE-2025-71097MEDIUMCVSS 5.5≥ 5.3.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-13
CVE-2025-71097 [MEDIUM] CVE-2025-71097: In the Linux kernel, the following vulnerability has been resolved:
ipv4: Fix reference count leak
In the Linux kernel, the following vulnerability has been resolved:
ipv4: Fix reference count leak when using error routes with nexthop objects
When a nexthop object is deleted, it is marked as dead and then
fib_table_flush() is called to flush all the routes that are using the
dead nexthop.
The current logic in fib_table_flush() is to only flush error ro
nvdosv
CVE-2025-71088MEDIUMCVSS 5.5≥ 6.1.110, < 6.1.160≥ 6.2.1, < 6.6.120+4 more2026-01-13
CVE-2025-71088 [MEDIUM] CVE-2025-71088: In the Linux kernel, the following vulnerability has been resolved:
mptcp: fallback earlier on simu
In the Linux kernel, the following vulnerability has been resolved:
mptcp: fallback earlier on simult connection
Syzkaller reports a simult-connect race leading to inconsistent fallback
status:
WARNING: CPU: 3 PID: 33 at net/mptcp/subflow.c:1515 subflow_data_ready+0x40b/0x7c0 net/mptcp/subflow.c:1515
Modules linked in:
CPU: 3 UID: 0 PID: 33 Comm: ksoftir
nvdosv
CVE-2025-71090MEDIUMCVSS 5.5≥ 6.17.1, < 6.18.4v6.17+1 more2026-01-13
CVE-2025-71090 [MEDIUM] CVE-2025-71090: In the Linux kernel, the following vulnerability has been resolved:
nfsd: fix nfsd_file reference l
In the Linux kernel, the following vulnerability has been resolved:
nfsd: fix nfsd_file reference leak in nfsd4_add_rdaccess_to_wrdeleg()
nfsd4_add_rdaccess_to_wrdeleg() unconditionally overwrites
fp->fi_fds[O_RDONLY] with a newly acquired nfsd_file. However, if
the client already has a SHARE_ACCESS_READ open from a previous OPEN
operation, this action ov
nvdosv
CVE-2025-71072MEDIUMCVSS 5.5≥ 6.6.1, < 6.12.64≥ 6.13, < 6.18.3+2 more2026-01-13
CVE-2025-71072 [MEDIUM] CVE-2025-71072: In the Linux kernel, the following vulnerability has been resolved:
shmem: fix recovery on rename f
In the Linux kernel, the following vulnerability has been resolved:
shmem: fix recovery on rename failures
maple_tree insertions can fail if we are seriously short on memory;
simple_offset_rename() does not recover well if it runs into that.
The same goes for simple_offset_rename_exchange().
Moreover, shmem_whiteout() expects that if it succeeds, the cal
nvdosv
CVE-2025-71096MEDIUMCVSS 5.5≥ 4.7.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-13
CVE-2025-71096 [MEDIUM] CWE-908 CVE-2025-71096: In the Linux kernel, the following vulnerability has been resolved:
RDMA/core: Check for the presen
In the Linux kernel, the following vulnerability has been resolved:
RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly
The netlink response for RDMA_NL_LS_OP_IP_RESOLVE should always have a
LS_NLA_TYPE_DGID attribute, it is invalid if it does not.
Use the nl parsing logic properly and call nla_parse_deprecated() to fill
the nlattrs a
nvdosv
CVE-2025-71087MEDIUMCVSS 5.5≥ 4.7.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-13
CVE-2025-71087 [MEDIUM] CWE-193 CVE-2025-71087: In the Linux kernel, the following vulnerability has been resolved:
iavf: fix off-by-one issues in
In the Linux kernel, the following vulnerability has been resolved:
iavf: fix off-by-one issues in iavf_config_rss_reg()
There are off-by-one bugs when configuring RSS hash key and lookup
table, causing out-of-bounds reads to memory [1] and out-of-bounds
writes to device registers.
Before commit 43a3d9ba34c9 ("i40evf: Allow PF driver to configure
nvdosv
CVE-2025-71085MEDIUMCVSS 5.5≥ 4.8.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-13
CVE-2025-71085 [MEDIUM] CWE-617 CVE-2025-71085: In the Linux kernel, the following vulnerability has been resolved:
ipv6: BUG() in pskb_expand_head
In the Linux kernel, the following vulnerability has been resolved:
ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()
There exists a kernel oops caused by a BUG_ON(nhead INT_MAX
(i.e. (int)(skb_headroom(skb) + len_delta) skb_headroom(skb)) is meant to ensure
that delta = headroom - skb_headroom(skb) is never negative, otherwise
nvdosv
CVE-2025-71080MEDIUMCVSS 5.5≥ 6.12.1, < 6.12.64≥ 6.13, < 6.18.4+2 more2026-01-13
CVE-2025-71080 [MEDIUM] CWE-617 CVE-2025-71080: In the Linux kernel, the following vulnerability has been resolved:
ipv6: fix a BUG in rt6_get_pcpu
In the Linux kernel, the following vulnerability has been resolved:
ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT
On PREEMPT_RT kernels, after rt6_get_pcpu_route() returns NULL, the
current task can be preempted. Another task running on the same CPU
may then execute rt6_make_pcpu_route() and successfully install a
pcpu_rt entry. When th
nvdosv
CVE-2025-71094MEDIUMCVSS 5.5≥ 5.13.13, < 5.14≥ 5.14.1, < 5.15.198+6 more2026-01-13
CVE-2025-71094 [MEDIUM] CVE-2025-71094: In the Linux kernel, the following vulnerability has been resolved:
net: usb: asix: validate PHY ad
In the Linux kernel, the following vulnerability has been resolved:
net: usb: asix: validate PHY address before use
The ASIX driver reads the PHY address from the USB device via
asix_read_phy_addr(). A malicious or faulty device can return an
invalid address (>= PHY_MAX_ADDR), which causes a warning in
mdiobus_get_phy():
addr 207 out of range
WARNING: dr
nvdosv
CVE-2025-71079MEDIUMCVSS 5.5≥ 4.4.293, < 4.5≥ 4.9.291, < 4.10+11 more2026-01-13
CVE-2025-71079 [MEDIUM] CWE-667 CVE-2025-71079: In the Linux kernel, the following vulnerability has been resolved:
net: nfc: fix deadlock between
In the Linux kernel, the following vulnerability has been resolved:
net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write
A deadlock can occur between nfc_unregister_device() and rfkill_fop_write()
due to lock ordering inversion between device_lock and rfkill_global_mutex.
The problematic lock order is:
Thread A (rfkill_fop_wr
nvdosv
CVE-2025-71076MEDIUMCVSS 5.5≥ 6.12.17, < 6.12.64≥ 6.13.1, < 6.18.3+2 more2026-01-13
CVE-2025-71076 [MEDIUM] CVE-2025-71076: In the Linux kernel, the following vulnerability has been resolved:
drm/xe/oa: Limit num_syncs to p
In the Linux kernel, the following vulnerability has been resolved:
drm/xe/oa: Limit num_syncs to prevent oversized allocations
The OA open parameters did not validate num_syncs, allowing
userspace to pass arbitrarily large values, potentially
leading to excessive allocations.
Add check to ensure that num_syncs does not exceed DRM_XE_MAX_SYNCS,
returning
nvdosv
CVE-2025-71098MEDIUMCVSS 5.5≥ 3.7.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-13
CVE-2025-71098 [MEDIUM] CWE-476 CVE-2025-71098: In the Linux kernel, the following vulnerability has been resolved:
ip6_gre: make ip6gre_header() r
In the Linux kernel, the following vulnerability has been resolved:
ip6_gre: make ip6gre_header() robust
Over the years, syzbot found many ways to crash the kernel
in ip6gre_header() [1].
This involves team or bonding drivers ability to dynamically
change their dev->needed_headroom and/or dev->hard_header_len
In this particular crash mld_newpack
nvdosv