Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 92 of 724
CVE-2025-40177UNKNOWN≥ 6.10.0, < 6.12.55≥ 6.13.0, < 6.17.52025-11-12
CVE-2025-40177 accel/qaic: Fix bootlog initialization ordering accel/qaic: Fix bootlog initialization ordering In the Linux kernel, the following vulnerability has been resolved: accel/qaic: Fix bootlog initialization ordering As soon as we queue MHI buffers to receive the bootlog from the device, we could be receiving data. Therefore all the resources needed to process that data need to be setup prior to queuing the buffers. We currently initialize some of the resources after queuing the bu
osv
CVE-2025-40144UNKNOWN≥ 0, < 6.1.158-1≥ 0, < 6.12.57-1+1 more2025-11-12
CVE-2025-40144 CVE-2025-40144: In the Linux kernel, the following vulnerability has been resolved: nvdimm: ndtest: Return -ENOMEM if devm_kcalloc() fails in ndtest_probe() devm_kcal In the Linux kernel, the following vulnerability has been resolved: nvdimm: ndtest: Return -ENOMEM if devm_kcalloc() fails in ndtest_probe() devm_kcalloc() may fail. ndtest_probe() allocates three DMA address arrays (dcr_dma, label_dma, dimm_dma) and later unconditionally uses them in ndtest_nvdimm_init(), which can
osv
CVE-2025-40165UNKNOWN≥ 6.4.0, < 6.6.114≥ 6.7.0, < 6.12.55+1 more2025-11-12
CVE-2025-40165 media: nxp: imx8-isi: m2m: Fix streaming cleanup on release media: nxp: imx8-isi: m2m: Fix streaming cleanup on release In the Linux kernel, the following vulnerability has been resolved: media: nxp: imx8-isi: m2m: Fix streaming cleanup on release If streamon/streamoff calls are imbalanced, such as when exiting an application with Ctrl+C when streaming, the m2m usage_count will never reach zero and the ISI channel won't be freed. Besides from that, if the input line width is mo
osv
CVE-2025-40159UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40159 CVE-2025-40159: In the Linux kernel, the following vulnerability has been resolved: xsk: Harden userspace-supplied xdp_desc validation Turned out certain clearly inva In the Linux kernel, the following vulnerability has been resolved: xsk: Harden userspace-supplied xdp_desc validation Turned out certain clearly invalid values passed in xdp_desc from userspace can pass xp_{,un}aligned_validate_desc() and then lead to UBs or just invalid frames to be queued for xmit. desc->len close
osv
CVE-2025-40111UNKNOWN≥ 4.20.0, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-11-12
CVE-2025-40111 drm/vmwgfx: Fix Use-after-free in validation drm/vmwgfx: Fix Use-after-free in validation In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix Use-after-free in validation Nodes stored in the validation duplicates hashtable come from an arena allocator that is cleared at the end of vmw_execbuf_process. All nodes are expected to be cleared in vmw_validation_drop_ht but this node escaped because its resource was destroyed prematurely.
osv
CVE-2025-40174UNKNOWN≥ 6.14.0, < 6.17.52025-11-12
CVE-2025-40174 x86/mm: Fix SMP ordering in switch_mm_irqs_off() x86/mm: Fix SMP ordering in switch_mm_irqs_off() In the Linux kernel, the following vulnerability has been resolved: x86/mm: Fix SMP ordering in switch_mm_irqs_off() Stephen noted that it is possible to not have an smp_mb() between the loaded_mm store and the tlb_gen load in switch_mm(), meaning the ordering against flush_tlb_mm_range() goes out the window, and it becomes possible for switch_mm() to not observe a recent tlb_gen u
osv
CVE-2025-40150UNKNOWN≥ 0, < 6.6.130≥ 6.7.0, < 6.12.78+1 more2025-11-12
CVE-2025-40150 f2fs: fix to avoid migrating empty section f2fs: fix to avoid migrating empty section In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid migrating empty section It reports a bug from device w/ zufs: F2FS-fs (dm-64): Inconsistent segment (173822) type [1, 0] in SSA and SIT F2FS-fs (dm-64): Stopped filesystem due to reason: 4 Thread A Thread B - f2fs_expand_inode_data - f2fs_allocate_pinning_section - f2fs_gc_range - do_garbage_collect w/ seg
osv
CVE-2025-40127UNKNOWN≥ 5.5.0, < 5.10.246≥ 5.11.0, < 5.15.195+4 more2025-11-12
CVE-2025-40127 hwrng: ks-sa - fix division by zero in ks_sa_rng_init hwrng: ks-sa - fix division by zero in ks_sa_rng_init In the Linux kernel, the following vulnerability has been resolved: hwrng: ks-sa - fix division by zero in ks_sa_rng_init Fix division by zero in ks_sa_rng_init caused by missing clock pointer initialization. The clk_get_rate() call is performed on an uninitialized clk pointer, resulting in division by zero when calculating delay values. Add clock initialization code bef
osv
CVE-2025-40119UNKNOWN≥ 0, < 6.17.0-14.142025-11-12
CVE-2025-40119 CVE-2025-40119: In the Linux kernel, the following vulnerability has been resolved: ext4: fix potential null deref in ext4_mb_init() In ext4_mb_init(), ext4_mb_avg_fr In the Linux kernel, the following vulnerability has been resolved: ext4: fix potential null deref in ext4_mb_init() In ext4_mb_init(), ext4_mb_avg_fragment_size_destroy() may be called when sbi->s_mb_avg_fragment_size remains uninitialized (e.g., if groupinfo slab cache allocation fails). Since ext4_mb_avg_fragment_
osv
CVE-2025-40176UNKNOWN≥ 0, < 6.1.158-1≥ 0, < 6.12.57-1+1 more2025-11-12
CVE-2025-40176 CVE-2025-40176: In the Linux kernel, the following vulnerability has been resolved: tls: wait for pending async decryptions if tls_strp_msg_hold fails Async decryptio In the Linux kernel, the following vulnerability has been resolved: tls: wait for pending async decryptions if tls_strp_msg_hold fails Async decryption calls tls_strp_msg_hold to create a clone of the input skb to hold references to the memory it uses. If we fail to allocate that clone, proceeding with async decrypti
osv
CVE-2025-40199UNKNOWN≥ 0, < 6.12.54≥ 6.13.0, < 6.17.42025-11-12
CVE-2025-40199 page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches In the Linux kernel, the following vulnerability has been resolved: page_pool: Fix PP_MAGIC_MASK to avoid crashing on some 32-bit arches Helge reported that the introduction of PP_MAGIC_MASK let to crashes on boot on his 32-bit parisc machine. The cause of this is the mask is set too wide, so the page_pool_page_is_pp() incurs false positives
osv
CVE-2025-40171UNKNOWN≥ 0, < 6.1.158-1≥ 0, < 6.12.57-1+1 more2025-11-12
CVE-2025-40171 CVE-2025-40171: In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: move lsop put work to nvmet_fc_ls_req_op It’s possible for more than one In the Linux kernel, the following vulnerability has been resolved: nvmet-fc: move lsop put work to nvmet_fc_ls_req_op It’s possible for more than one async command to be in flight from __nvmet_fc_send_ls_req. For each command, a tgtport reference is taken. In the current code, only one put work item is queued at a t
osv
CVE-2025-40195UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40195 CVE-2025-40195: In the Linux kernel, the following vulnerability has been resolved: mount: handle NULL values in mnt_ns_release() When calling in listmount() mnt_ns_r In the Linux kernel, the following vulnerability has been resolved: mount: handle NULL values in mnt_ns_release() When calling in listmount() mnt_ns_release() may be passed a NULL pointer. Handle that case gracefully.
osv
CVE-2025-40198UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-11-12
CVE-2025-40198 CVE-2025-40198: In the Linux kernel, the following vulnerability has been resolved: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() Unlike ot In the Linux kernel, the following vulnerability has been resolved: ext4: avoid potential buffer over-read in parse_apply_sb_mount_options() Unlike other strings in the ext4 superblock, we rely on tune2fs to make sure s_mount_opts is NUL terminated. Harden parse_apply_sb_mount_options() by treating s_mount_opts as a
osv
CVE-2025-40208UNKNOWN≥ 6.15.0, < 6.17.42025-11-12
CVE-2025-40208 media: iris: fix module removal if firmware download failed media: iris: fix module removal if firmware download failed In the Linux kernel, the following vulnerability has been resolved: media: iris: fix module removal if firmware download failed Fix remove if firmware failed to load: qcom-iris aa00000.video-codec: Direct firmware load for qcom/vpu/vpu33_p4.mbn failed with error -2 qcom-iris aa00000.video-codec: firmware download failed qcom-iris aa00000.video-codec: core init
osv
CVE-2025-40187UNKNOWN≥ 4.17.0, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-11-12
CVE-2025-40187 net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() In the Linux kernel, the following vulnerability has been resolved: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() If new_asoc->peer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0 and sctp_ulpevent_make_authkey() returns 0, then the variable ai_ev remains zero and the zero will be dereferenced in the sc
osv
CVE-2025-40161UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40161 CVE-2025-40161: In the Linux kernel, the following vulnerability has been resolved: mailbox: zynqmp-ipi: Fix SGI cleanup on unbind The driver incorrectly determines S In the Linux kernel, the following vulnerability has been resolved: mailbox: zynqmp-ipi: Fix SGI cleanup on unbind The driver incorrectly determines SGI vs SPI interrupts by checking IRQ number < 16, which fails with dynamic IRQ allocation. During unbind, this causes improper SGI cleanup leading to kernel crash. Add
osv
CVE-2025-40141UNKNOWN≥ 6.0.0, < 6.1.156≥ 6.2.0, < 6.6.112+2 more2025-11-12
CVE-2025-40141 Bluetooth: ISO: Fix possible UAF on iso_conn_free Bluetooth: ISO: Fix possible UAF on iso_conn_free In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: Fix possible UAF on iso_conn_free This attempt to fix similar issue to sco_conn_free where if the conn->sk is not set to NULL may lead to UAF on iso_conn_free.
osv
CVE-2025-40151UNKNOWN≥ 6.17.0, < 6.17.32025-11-12
CVE-2025-40151 LoongArch: BPF: No support of struct argument in trampoline programs LoongArch: BPF: No support of struct argument in trampoline programs In the Linux kernel, the following vulnerability has been resolved: LoongArch: BPF: No support of struct argument in trampoline programs The current implementation does not support struct argument. This causes a oops when running bpf selftest: $ ./test_progs -a tracing_struct Oops[#1]: CPU -1 Unable to handle kernel paging request at virtual
osv
CVE-2025-40154UNKNOWN≥ 4.18.0, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-11-12
CVE-2025-40154 ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping When an invalid value is passed via quirk option, currently bytcr_rt5640 driver only shows an error message but leaves as is. This may lead to unepxected results like OOB access. This patch corrects the input mapping to the certain defa
osv