Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 90 of 724
CVE-2025-40227UNKNOWN≥ 0, < 6.17.6-12025-12-04
CVE-2025-40227 CVE-2025-40227: In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: dealloc commit test ctx always The damon_ctx for testing online DA In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: dealloc commit test ctx always The damon_ctx for testing online DAMON parameters commit inputs is deallocated only when the test fails. This means memory is leaked for every successful online DAMON parameters commit. Fix the leak by a
osv
CVE-2025-40222UNKNOWN≥ 6.17.0, < 6.17.62025-12-04
CVE-2025-40222 tty: serial: sh-sci: fix RSCI FIFO overrun handling tty: serial: sh-sci: fix RSCI FIFO overrun handling In the Linux kernel, the following vulnerability has been resolved: tty: serial: sh-sci: fix RSCI FIFO overrun handling The receive error handling code is shared between RSCI and all other SCIF port types, but the RSCI overrun_reg is specified as a memory offset, while for other SCIF types it is an enum value used to index into the sci_port_params->regs array, as mentioned ab
osv
CVE-2025-40221UNKNOWN≥ 6.7.0, < 6.12.54≥ 6.13.0, < 6.17.42025-12-04
CVE-2025-40221 media: pci: mg4b: fix uninitialized iio scan data media: pci: mg4b: fix uninitialized iio scan data In the Linux kernel, the following vulnerability has been resolved: media: pci: mg4b: fix uninitialized iio scan data Fix potential leak of uninitialized stack data to userspace by ensuring that the `scan` structure is zeroed before use.
osv
CVE-2025-40225UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-12-04
CVE-2025-40225 CVE-2025-40225: In the Linux kernel, the following vulnerability has been resolved: drm/panthor: Fix kernel panic on partial unmap of a GPU VA region This commit addr In the Linux kernel, the following vulnerability has been resolved: drm/panthor: Fix kernel panic on partial unmap of a GPU VA region This commit address a kernel panic issue that can happen if Userspace tries to partially unmap a GPU virtual region (aka drm_gpuva). The VM_BIND interface allows partial unmapping of a
osv
CVE-2025-40233UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-12-04
CVE-2025-40233 CVE-2025-40233: In the Linux kernel, the following vulnerability has been resolved: ocfs2: clear extent cache after moving/defragmenting extents The extent map cache In the Linux kernel, the following vulnerability has been resolved: ocfs2: clear extent cache after moving/defragmenting extents The extent map cache can become stale when extents are moved or defragmented, causing subsequent operations to see outdated extent flags. This triggers a BUG_ON in ocfs2_refcount_cal_cow_clu
osv
CVE-2025-40255UNKNOWN≥ 0, < 6.17.10-12025-12-04
CVE-2025-40255 CVE-2025-40255: In the Linux kernel, the following vulnerability has been resolved: net: core: prevent NULL deref in generic_hwtstamp_ioctl_lower() The ethtool tsconf In the Linux kernel, the following vulnerability has been resolved: net: core: prevent NULL deref in generic_hwtstamp_ioctl_lower() The ethtool tsconfig Netlink path can trigger a null pointer dereference. A call chain such as: tsconfig_prepare_data() -> dev_get_hwtstamp_phylib() -> vlan_hwtstamp_get() -> generic_hwt
osv
CVE-2025-40216UNKNOWN≥ 6.12.0, < 6.12.36≥ 6.13.0, < 6.15.52025-12-04
CVE-2025-40216 io_uring/rsrc: don't rely on user vaddr alignment io_uring/rsrc: don't rely on user vaddr alignment In the Linux kernel, the following vulnerability has been resolved: io_uring/rsrc: don't rely on user vaddr alignment There is no guaranteed alignment for user pointers, however the calculation of an offset of the first page into a folio after coalescing uses some weird bit mask logic, get rid of it.
osv
CVE-2025-40229UNKNOWN≥ 0, < 6.17.6-12025-12-04
CVE-2025-40229 CVE-2025-40229: In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: fix potential memory leak by cleaning ops_filter in damon_destroy_s In the Linux kernel, the following vulnerability has been resolved: mm/damon/core: fix potential memory leak by cleaning ops_filter in damon_destroy_scheme Currently, damon_destroy_scheme() only cleans up the filter list but leaves ops_filter untouched, which could lead to memory leaks when a scheme is destroyed. Thi
osv
CVE-2025-40259UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-04
CVE-2025-40259 CVE-2025-40259: In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Do not sleep in atomic context sg_finish_rem_req() calls blk_rq_unmap_us In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Do not sleep in atomic context sg_finish_rem_req() calls blk_rq_unmap_user(). The latter function may sleep. Hence, call sg_finish_rem_req() with interrupts enabled instead of disabled.
osv
CVE-2025-40228UNKNOWN≥ 6.15.0, < 6.17.62025-12-04
CVE-2025-40228 mm/damon/sysfs: catch commit test ctx alloc failure mm/damon/sysfs: catch commit test ctx alloc failure In the Linux kernel, the following vulnerability has been resolved: mm/damon/sysfs: catch commit test ctx alloc failure Patch series "mm/damon/sysfs: fix commit test damon_ctx [de]allocation". DAMON sysfs interface dynamically allocates and uses a damon_ctx object for testing if given inputs for online DAMON parameters update is valid. The object is being used without an all
osv
CVE-2025-40244UNKNOWN≥ 2.6.12, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-12-04
CVE-2025-40244 hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent() hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent() In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix KMSAN uninit-value issue in __hfsplus_ext_cache_extent() The syzbot reported issue in __hfsplus_ext_cache_extent(): [ 70.194323][ T9350] BUG: KMSAN: uninit-value in __hfsplus_ext_cache_extent+0x7d0/0x990 [ 70.195022][ T9350] __hfsplus_ext_cache_extent+0x7d0/0x
osv
CVE-2025-40238UNKNOWN≥ 6.7.0, < 6.12.56≥ 6.13.0, < 6.17.62025-12-04
CVE-2025-40238 net/mlx5: Fix IPsec cleanup over MPV device net/mlx5: Fix IPsec cleanup over MPV device In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix IPsec cleanup over MPV device When we do mlx5e_detach_netdev() we eventually disable blocking events notifier, among those events are IPsec MPV events from IB to core. So before disabling those blocking events, make sure to also unregister the devcom device and mark all this device operations as complete, in o
osv
CVE-2025-40231UNKNOWN≥ 0, < 5.10.246≥ 5.11.0, < 5.15.196+4 more2025-12-04
CVE-2025-40231 vsock: fix lock inversion in vsock_assign_transport() vsock: fix lock inversion in vsock_assign_transport() In the Linux kernel, the following vulnerability has been resolved: vsock: fix lock inversion in vsock_assign_transport() Syzbot reported a potential lock inversion deadlock between vsock_register_mutex and sk_lock-AF_VSOCK when vsock_linger() is called. The issue was introduced by commit 687aa0c5581b ("vsock: Fix transport_* TOCTOU") which added vsock_register_mutex loc
osv
CVE-2025-40260UNKNOWN≥ 0, < 6.17.10-12025-12-04
CVE-2025-40260 CVE-2025-40260: In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix scx_enable() crash on helper kthread creation failure A crash was o In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix scx_enable() crash on helper kthread creation failure A crash was observed when the sched_ext selftests runner was terminated with Ctrl+\ while test 15 was running: NIP [c00000000028fa58] scx_enable.constprop.0+0x358/0x12b0 LR [c000000
osv
CVE-2025-40241UNKNOWN≥ 6.15.0, < 6.17.62025-12-04
CVE-2025-40241 erofs: fix crafted invalid cases for encoded extents erofs: fix crafted invalid cases for encoded extents In the Linux kernel, the following vulnerability has been resolved: erofs: fix crafted invalid cases for encoded extents Robert recently reported two corrupted images that can cause system crashes, which are related to the new encoded extents introduced in Linux 6.15: - The first one [1] has plen != 0 (e.g. plen == 0x2000000) but (plen & Z_EROFS_EXTENT_PLEN_MASK) == 0. It
osv
CVE-2025-40243UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-12-04
CVE-2025-40243 CVE-2025-40243: In the Linux kernel, the following vulnerability has been resolved: hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits() The syzbot reported In the Linux kernel, the following vulnerability has been resolved: hfs: fix KMSAN uninit-value issue in hfs_find_set_zero_bits() The syzbot reported issue in hfs_find_set_zero_bits(): ===================================================== BUG: KMSAN: uninit-value in hfs_find_set_zero_bits+0x74d/0xb60 fs/hfs/bitmap.c:4
osv
CVE-2025-40265UNKNOWN≥ 0, < 6.17.10-12025-12-04
CVE-2025-40265 CVE-2025-40265: In the Linux kernel, the following vulnerability has been resolved: vfat: fix missing sb_min_blocksize() return value checks When emulating an nvme de In the Linux kernel, the following vulnerability has been resolved: vfat: fix missing sb_min_blocksize() return value checks When emulating an nvme device on qemu with both logical_block_size and physical_block_size set to 8 KiB, but without format, a kernel panic was triggered during the early boot stage while attem
osv
CVE-2025-40249UNKNOWN≥ 0, < 6.17.10-12025-12-04
CVE-2025-40249 CVE-2025-40249: In the Linux kernel, the following vulnerability has been resolved: gpio: cdev: make sure the cdev fd is still active before emitting events With the In the Linux kernel, the following vulnerability has been resolved: gpio: cdev: make sure the cdev fd is still active before emitting events With the final call to fput() on a file descriptor, the release action may be deferred and scheduled on a work queue. The reference count of that descriptor is still zero and it
osv
CVE-2025-40253UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-04
CVE-2025-40253 CVE-2025-40253: In the Linux kernel, the following vulnerability has been resolved: s390/ctcm: Fix double-kfree The function 'mpc_rcvd_sweep_req(mpcginfo)' is called In the Linux kernel, the following vulnerability has been resolved: s390/ctcm: Fix double-kfree The function 'mpc_rcvd_sweep_req(mpcginfo)' is called conditionally from function 'ctcmpc_unpack_skb'. It frees passed mpcginfo. After that a call to function 'kfree' in function 'ctcmpc_unpack_skb' frees it again. Remove '
osv
CVE-2025-40224UNKNOWN≥ 0, < 6.17.6-12025-12-04
CVE-2025-40224 CVE-2025-40224: In the Linux kernel, the following vulnerability has been resolved: hwmon: (cgbc-hwmon) Add missing NULL check after devm_kzalloc() The driver allocat In the Linux kernel, the following vulnerability has been resolved: hwmon: (cgbc-hwmon) Add missing NULL check after devm_kzalloc() The driver allocates memory for sensor data using devm_kzalloc(), but did not check if the allocation succeeded. In case of memory allocation failure, dereferencing the NULL pointer woul
osv