Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 93 of 724
CVE-2025-40124UNKNOWN≥ 0, < 6.1.158-1≥ 0, < 6.12.57-1+1 more2025-11-12
CVE-2025-40124 CVE-2025-40124: In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC III
In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC III Anthony Yznaga tracked down that a BUG_ON in ext4 code with large folios enabled resulted from copy_from_user() returning impossibly large values greater than the size t
osv
CVE-2025-40153UNKNOWN≥ 2.6.17, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-11-12
CVE-2025-40153 mm: hugetlb: avoid soft lockup when mprotect to large memory area
mm: hugetlb: avoid soft lockup when mprotect to large memory area
In the Linux kernel, the following vulnerability has been resolved:
mm: hugetlb: avoid soft lockup when mprotect to large memory area
When calling mprotect() to a large hugetlb memory area in our customer's
workload (~300GB hugetlb memory), soft lockup was observed:
watchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]
CPU: 98 P
osv
CVE-2025-40112UNKNOWN≥ 0, < 6.1.158-1≥ 0, < 6.12.57-1+1 more2025-11-12
CVE-2025-40112 CVE-2025-40112: In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for Niagara The ref
In the Linux kernel, the following vulnerability has been resolved: sparc: fix accurate exception reporting in copy_{from_to}_user for Niagara The referenced commit introduced exception handlers on user-space memory references in copy_from_user and copy_to_user. These handlers return from the respective function and
osv
CVE-2025-40190UNKNOWN≥ 0, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-11-12
CVE-2025-40190 ext4: guard against EA inode refcount underflow in xattr update
ext4: guard against EA inode refcount underflow in xattr update
In the Linux kernel, the following vulnerability has been resolved:
ext4: guard against EA inode refcount underflow in xattr update
syzkaller found a path where ext4_xattr_inode_update_ref() reads an EA
inode refcount that is already ref underflow: ref_count=-1 ref_change=-1
EXT4-fs warning: ea_inode dec ref err=-117
Make the invariant explicit: if th
osv
CVE-2025-40163UNKNOWN≥ 6.17.0, < 6.17.52025-11-12
CVE-2025-40163 sched/deadline: Stop dl_server before CPU goes offline
sched/deadline: Stop dl_server before CPU goes offline
In the Linux kernel, the following vulnerability has been resolved:
sched/deadline: Stop dl_server before CPU goes offline
IBM CI tool reported kernel warning[1] when running a CPU removal
operation through drmgr[2]. i.e "drmgr -c cpu -r -q 1"
WARNING: CPU: 0 PID: 0 at kernel/sched/cpudeadline.c:219 cpudl_set+0x58/0x170
NIP [c0000000002b6ed8] cpudl_set+0x58/0x170
LR [c
osv
CVE-2025-40207UNKNOWN≥ 0, < 6.1.158-1≥ 0, < 6.12.57-1+1 more2025-11-12
CVE-2025-40207 CVE-2025-40207: In the Linux kernel, the following vulnerability has been resolved: media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try() v4l2_s
In the Linux kernel, the following vulnerability has been resolved: media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try() v4l2_subdev_call_state_try() macro allocates a subdev state with __v4l2_subdev_state_alloc(), but does not check the returned value. If __v4l2_subdev_state_alloc fails, it re
osv
CVE-2025-40169UNKNOWN≥ 6.6.0, < 6.6.112≥ 6.7.0, < 6.12.53+1 more2025-11-12
CVE-2025-40169 bpf: Reject negative offsets for ALU ops
bpf: Reject negative offsets for ALU ops
In the Linux kernel, the following vulnerability has been resolved:
bpf: Reject negative offsets for ALU ops
When verifying BPF programs, the check_alu_op() function validates
instructions with ALU operations. The 'offset' field in these
instructions is a signed 16-bit integer.
The existing check 'insn->off > 1' was intended to ensure the offset is
either 0, or 1 for BPF_MOD/BPF_DIV. However, bec
osv
CVE-2025-40126UNKNOWN≥ 4.9.0, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-11-12
CVE-2025-40126 sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC
sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC
In the Linux kernel, the following vulnerability has been resolved:
sparc: fix accurate exception reporting in copy_{from_to}_user for UltraSPARC
The referenced commit introduced exception handlers on user-space memory
references in copy_from_user and copy_to_user. These handlers return from
the respective function and calcu
osv
CVE-2025-40175UNKNOWN≥ 6.16.0, < 6.17.52025-11-12
CVE-2025-40175 idpf: cleanup remaining SKBs in PTP flows
idpf: cleanup remaining SKBs in PTP flows
In the Linux kernel, the following vulnerability has been resolved:
idpf: cleanup remaining SKBs in PTP flows
When the driver requests Tx timestamp value, one of the first steps is
to clone SKB using skb_get. It increases the reference counter for that
SKB to prevent unexpected freeing by another component.
However, there may be a case where the index is requested, SKB is
assigned and never cons
osv
CVE-2025-40194UNKNOWN≥ 5.4.0, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-11-12
CVE-2025-40194 cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()
cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()
In the Linux kernel, the following vulnerability has been resolved:
cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()
The cpufreq_cpu_put() call in update_qos_request() takes place too early
because the latter subsequently calls freq_qos_update_request() that
indirectly accesses the policy object in question
osv
CVE-2025-40168UNKNOWN≥ 0, < 6.17.6-12025-11-12
CVE-2025-40168 CVE-2025-40168: In the Linux kernel, the following vulnerability has been resolved: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match()
In the Linux kernel, the following vulnerability has been resolved: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match(). smc_clc_prfx_match() is called from smc_listen_work() and not under RCU nor RTNL. Using sk_dst_get(sk)->dev could trigger UAF. Let's use __sk_dst_get() and dst_dev_rcu(). Note that the returned value
osv
CVE-2025-40155UNKNOWN≥ 6.7.0, < 6.12.53≥ 6.13.0, < 6.17.32025-11-12
CVE-2025-40155 iommu/vt-d: debugfs: Fix legacy mode page table dump logic
iommu/vt-d: debugfs: Fix legacy mode page table dump logic
In the Linux kernel, the following vulnerability has been resolved:
iommu/vt-d: debugfs: Fix legacy mode page table dump logic
In legacy mode, SSPTPTR is ignored if TT is not 00b or 01b. SSPTPTR
maybe uninitialized or zero in that case and may cause oops like:
Oops: general protection fault, probably for non-canonical address
0xf00087d3f000f000: 0000 [#1] SMP N
osv
CVE-2025-40157UNKNOWN≥ 6.3.0, < 6.6.112≥ 6.7.0, < 6.12.53+1 more2025-11-12
CVE-2025-40157 EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller
EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller
In the Linux kernel, the following vulnerability has been resolved:
EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller
When loading the i10nm_edac driver on some Intel Granite Rapids servers,
a call trace may appear as follows:
UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16
shift exponent -66 is negative
...
__ubsan_
osv
CVE-2025-40201UNKNOWN≥ 0, < 6.1.158-1≥ 0, < 6.12.57-1+1 more2025-11-12
CVE-2025-40201 CVE-2025-40201: In the Linux kernel, the following vulnerability has been resolved: kernel/sys
In the Linux kernel, the following vulnerability has been resolved: kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths The usage of task_lock(tsk->group_leader) in sys_prlimit64()->do_prlimit() path is very broken. sys_prlimit64() does get_task_struct(tsk) but this only protects task_struct itself. If tsk != current and tsk is not a leader, this pro
osv
CVE-2025-40116UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-11-12
CVE-2025-40116 CVE-2025-40116: In the Linux kernel, the following vulnerability has been resolved: usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup The kthread
In the Linux kernel, the following vulnerability has been resolved: usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup The kthread_run() function returns error pointers so the max3421_hcd->spi_thread pointer can be either error pointers or NULL. Check for both before dereferencing it.
osv
CVE-2025-40136UNKNOWN≥ 0, < 6.17.6-12025-11-12
CVE-2025-40136 CVE-2025-40136: In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - request reserved interrupt for virtual function The device
In the Linux kernel, the following vulnerability has been resolved: crypto: hisilicon/qm - request reserved interrupt for virtual function The device interrupt vector 3 is an error interrupt for physical function and a reserved interrupt for virtual function. However, the driver has not registered the reserved interru
osv
CVE-2025-40147UNKNOWN≥ 0, < 6.17.6-12025-11-12
CVE-2025-40147 CVE-2025-40147: In the Linux kernel, the following vulnerability has been resolved: blk-throttle: fix access race during throttle policy activation On repeated cold b
In the Linux kernel, the following vulnerability has been resolved: blk-throttle: fix access race during throttle policy activation On repeated cold boots we occasionally hit a NULL pointer crash in blk_should_throtl() when throttling is consulted before the throttle policy is fully enabled for the queue. Checking on
osv
CVE-2025-40132UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40132 CVE-2025-40132: In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback In create_sdw_dail
In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback In create_sdw_dailink() check that sof_end->codec_info->add_sidecar is not NULL before calling it. The original code assumed that if include_sidecar is true, the codec on that link has a
osv
CVE-2025-40192UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40192 CVE-2025-40192: In the Linux kernel, the following vulnerability has been resolved: Revert "ipmi: fix msg stack when IPMI is disconnected" This reverts commit c608966
In the Linux kernel, the following vulnerability has been resolved: Revert "ipmi: fix msg stack when IPMI is disconnected" This reverts commit c608966f3f9c2dca596967501d00753282b395fc. This patch has a subtle bug that can cause the IPMI driver to go into an infinite loop if the BMC misbehaves in a certain way. Appare
osv
CVE-2025-40179UNKNOWN≥ 5.15.0, < 5.15.195≥ 5.16.0, < 6.1.157+3 more2025-11-12
CVE-2025-40179 ext4: verify orphan file size is not too big
ext4: verify orphan file size is not too big
In the Linux kernel, the following vulnerability has been resolved:
ext4: verify orphan file size is not too big
In principle orphan file can be arbitrarily large. However orphan replay
needs to traverse it all and we also pin all its buffers in memory. Thus
filesystems with absurdly large orphan files can lead to big amounts of
memory consumed. Limit orphan file size to a sane value and a
osv