Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 91 of 724
CVE-2025-40226UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-12-04
CVE-2025-40226 CVE-2025-40226: In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Account for failed debug initialization When the SCMI debug su
In the Linux kernel, the following vulnerability has been resolved: firmware: arm_scmi: Account for failed debug initialization When the SCMI debug subsystem fails to initialize, the related debug root will be missing, and the underlying descriptor will be NULL. Handle this fault condition in the SCMI debug helpers t
osv
CVE-2025-40232UNKNOWN≥ 0, < 6.17.0-8.82025-12-04
CVE-2025-40232 CVE-2025-40232: In the Linux kernel, the following vulnerability has been resolved: rv: Fully convert enabled_monitors to use list_head as iterator The callbacks in e
In the Linux kernel, the following vulnerability has been resolved: rv: Fully convert enabled_monitors to use list_head as iterator The callbacks in enabled_monitors_seq_ops are inconsistent. Some treat the iterator as struct rv_monitor *, while others treat the iterator as struct list_head *. This causes a wrong typ
osv
CVE-2025-40235UNKNOWN≥ 6.8.0, < 6.12.56≥ 6.13.0, < 6.17.62025-12-04
CVE-2025-40235 btrfs: directly free partially initialized fs_info in btrfs_check_leaked_roots()
btrfs: directly free partially initialized fs_info in btrfs_check_leaked_roots()
In the Linux kernel, the following vulnerability has been resolved:
btrfs: directly free partially initialized fs_info in btrfs_check_leaked_roots()
If fs_info->super_copy or fs_info->super_for_commit allocated failed in
btrfs_get_tree_subvol(), then no need to call btrfs_free_fs_info().
Otherwise btrfs_check_leaked_ro
osv
CVE-2025-40242UNKNOWN≥ 5.15.0, < 6.12.56≥ 6.13.0, < 6.17.62025-12-04
CVE-2025-40242 gfs2: Fix unlikely race in gdlm_put_lock
gfs2: Fix unlikely race in gdlm_put_lock
In the Linux kernel, the following vulnerability has been resolved:
gfs2: Fix unlikely race in gdlm_put_lock
In gdlm_put_lock(), there is a small window of time in which the
DFL_UNMOUNT flag has been set but the lockspace hasn't been released,
yet. In that window, dlm may still call gdlm_ast() and gdlm_bast().
To prevent it from dereferencing freed glock objects, only free the
glock if the lockspa
osv
CVE-2025-40263UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-04
CVE-2025-40263 CVE-2025-40263: In the Linux kernel, the following vulnerability has been resolved: Input: cros_ec_keyb - fix an invalid memory access If cros_ec_keyb_register_matrix
In the Linux kernel, the following vulnerability has been resolved: Input: cros_ec_keyb - fix an invalid memory access If cros_ec_keyb_register_matrix() isn't called (due to `buttons_switches_only`) in cros_ec_keyb_probe(), `ckdev->idev` remains NULL. An invalid memory access is observed in cros_ec_keyb_process() whe
osv
CVE-2025-40261UNKNOWN≥ 0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-04
CVE-2025-40261 nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl()
nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl()
In the Linux kernel, the following vulnerability has been resolved:
nvme: nvme-fc: Ensure ->ioerr_work is cancelled in nvme_fc_delete_ctrl()
nvme_fc_delete_assocation() waits for pending I/O to complete before
returning, and an error can cause ->ioerr_work to be queued after
cancel_work_sync() had been called. Move the call to cancel_
osv
CVE-2025-40266UNKNOWN≥ 3.11.0, < 6.6.118≥ 6.7.0, < 6.12.60+1 more2025-12-04
CVE-2025-40266 KVM: arm64: Check the untrusted offset in FF-A memory share
KVM: arm64: Check the untrusted offset in FF-A memory share
In the Linux kernel, the following vulnerability has been resolved:
KVM: arm64: Check the untrusted offset in FF-A memory share
Verify the offset to prevent OOB access in the hypervisor
FF-A buffer in case an untrusted large enough value
[U32_MAX - sizeof(struct ffa_composite_mem_region) + 1, U32_MAX]
is set from the host kernel.
osv
CVE-2025-40236UNKNOWN≥ 0, < 6.17.6-12025-12-04
CVE-2025-40236 CVE-2025-40236: In the Linux kernel, the following vulnerability has been resolved: virtio-net: zero unused hash fields When GSO tunnel is negotiated virtio_net_hdr_t
In the Linux kernel, the following vulnerability has been resolved: virtio-net: zero unused hash fields When GSO tunnel is negotiated virtio_net_hdr_tnl_from_skb() tries to initialize the tunnel metadata but forget to zero unused rxhash fields. This may leak information to another side. Fixing this by zeroing the unu
osv
CVE-2025-40254UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-04
CVE-2025-40254 CVE-2025-40254: In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: remove never-working support for setting nsh fields The validati
In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: remove never-working support for setting nsh fields The validation of the set(nsh(...)) action is completely wrong. It runs through the nsh_key_put_from_nlattr() function that is the same function that validates NSH keys for the flo
osv
CVE-2025-40220UNKNOWN≥ 2.6.38, < 5.10.246≥ 5.11.0, < 5.15.196+4 more2025-12-04
CVE-2025-40220 fuse: fix livelock in synchronous file put from fuseblk workers
fuse: fix livelock in synchronous file put from fuseblk workers
In the Linux kernel, the following vulnerability has been resolved:
fuse: fix livelock in synchronous file put from fuseblk workers
I observed a hang when running generic/323 against a fuseblk server.
This test opens a file, initiates a lot of AIO writes to that file
descriptor, and closes the file descriptor before the writes complete.
Unsurprisingly,
osv
CVE-2025-40212UNKNOWN≥ 6.12.0, < 6.12.59≥ 6.13.0, < 6.17.92025-11-24
CVE-2025-40212 nfsd: fix refcount leak in nfsd_set_fh_dentry()
nfsd: fix refcount leak in nfsd_set_fh_dentry()
In the Linux kernel, the following vulnerability has been resolved:
nfsd: fix refcount leak in nfsd_set_fh_dentry()
nfsd exports a "pseudo root filesystem" which is used by NFSv4 to find
the various exported filesystems using LOOKUP requests from a known root
filehandle. NFSv3 uses the MOUNT protocol to find those exported
filesystems and so is not given access to the pseudo root fil
osv
CVE-2025-40213UNKNOWN≥ 6.17.0, < 6.17.82025-11-24
CVE-2025-40213 Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete
Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete
There is a BUG: KASAN: stack-out-of-bounds in set_mesh_sync due to
memcpy from badly declared on-stack flexible array.
Another crash is in set_mesh_complete() due to double list_del via
mgmt_pending_valid + mgmt_pen
osv
CVE-2025-40210UNKNOWN≥ 6.17.0, < 6.17.82025-11-21
CVE-2025-40210 Revert "NFSD: Remove the cap on number of operations per NFSv4 COMPOUND"
Revert "NFSD: Remove the cap on number of operations per NFSv4 COMPOUND"
In the Linux kernel, the following vulnerability has been resolved:
Revert "NFSD: Remove the cap on number of operations per NFSv4 COMPOUND"
I've found that pynfs COMP6 now leaves the connection or lease in a
strange state, which causes CLOSE9 to hang indefinitely. I've dug
into it a little, but I haven't been able to root-cause it ye
osv
CVE-2025-40209UNKNOWN≥ 6.11.0, < 6.12.58≥ 6.13.0, < 6.17.82025-11-21
CVE-2025-40209 btrfs: fix memory leak of qgroup_list in btrfs_add_qgroup_relation
btrfs: fix memory leak of qgroup_list in btrfs_add_qgroup_relation
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix memory leak of qgroup_list in btrfs_add_qgroup_relation
When btrfs_add_qgroup_relation() is called with invalid qgroup levels
(src >= dst), the function returns -EINVAL directly without freeing the
preallocated qgroup_list structure passed by the caller. This causes a
osv
CVE-2025-40211UNKNOWN≥ 3.17.0, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-11-21
CVE-2025-40211 ACPI: video: Fix use-after-free in acpi_video_switch_brightness()
ACPI: video: Fix use-after-free in acpi_video_switch_brightness()
In the Linux kernel, the following vulnerability has been resolved:
ACPI: video: Fix use-after-free in acpi_video_switch_brightness()
The switch_brightness_work delayed work accesses device->brightness
and device->backlight, freed by acpi_video_dev_unregister_backlight()
during device removal.
If the work executes after acpi_video_bus_unregister_b
osv
CVE-2025-40149HIGHCVSS 7.8≥ 4.18, < 5.15.199≥ 5.16, < 6.1.161+3 more2025-11-12
CVE-2025-40149 [HIGH] CWE-416 CVE-2025-40149: In the Linux kernel, the following vulnerability has been resolved:
tls: Use __sk_dst_get() and dst
In the Linux kernel, the following vulnerability has been resolved:
tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().
get_netdev_for_sock() is called during setsockopt(),
so not under RCU.
Using sk_dst_get(sk)->dev could trigger UAF.
Let's use __sk_dst_get() and dst_dev_rcu().
Note that the only ->ndo_sk_get_lower_dev() user is
nvdosv
CVE-2025-40164MEDIUMCVSS 5.5≥ 4.7.1, < 5.15.199≥ 5.16, < 6.1.162+5 more2025-11-12
CVE-2025-40164 [MEDIUM] CVE-2025-40164: In the Linux kernel, the following vulnerability has been resolved:
usbnet: Fix using smp_processor
In the Linux kernel, the following vulnerability has been resolved:
usbnet: Fix using smp_processor_id() in preemptible code warnings
Syzbot reported the following warning:
BUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879
caller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331
CPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not
nvdosv
CVE-2025-40135UNKNOWN≥ 4.13.0, < 6.1.167≥ 6.2.0, < 6.6.130+2 more2025-11-12
CVE-2025-40135 ipv6: use RCU in ip6_xmit()
ipv6: use RCU in ip6_xmit()
In the Linux kernel, the following vulnerability has been resolved:
ipv6: use RCU in ip6_xmit()
Use RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent
possible UAF.
osv
CVE-2025-40172UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40172 CVE-2025-40172: In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages() Currently,
In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages() Currently, if find_and_map_user_pages() takes a DMA xfer request from the user with a length field set to 0, or in a rare case, the host receives QAIC_TRANS_DMA_XFER_CONT from the
osv
CVE-2025-40180UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40180 CVE-2025-40180: In the Linux kernel, the following vulnerability has been resolved: mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop The cleanup
In the Linux kernel, the following vulnerability has been resolved: mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop The cleanup loop was starting at the wrong array index, causing out-of-bounds access. Start the loop at the correct index for zero-indexed arrays to prevent accessing memory beyond
osv