Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 94 of 724
CVE-2025-40183UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-11-12
CVE-2025-40183 CVE-2025-40183: In the Linux kernel, the following vulnerability has been resolved: bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} Cilium has a BPF egress gat In the Linux kernel, the following vulnerability has been resolved: bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6} Cilium has a BPF egress gateway feature which forces outgoing K8s Pod traffic to pass through dedicated egress gateways which then SNAT the traffic in order to interact with stable IPs outside th
osv
CVE-2025-40139UNKNOWN≥ 0, < 6.17.6-12025-11-12
CVE-2025-40139 CVE-2025-40139: In the Linux kernel, the following vulnerability has been resolved: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() In the Linux kernel, the following vulnerability has been resolved: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set(). smc_clc_prfx_set() is called during connect() and not under RCU nor RTNL. Using sk_dst_get(sk)->dev could trigger UAF. Let's use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock() after kernel_g
osv
CVE-2025-40117UNKNOWN≥ 0, < 6.17.0-14.142025-11-12
CVE-2025-40117 CVE-2025-40117: In the Linux kernel, the following vulnerability has been resolved: misc: pci_endpoint_test: Fix array underflow in pci_endpoint_test_ioctl() Commit e In the Linux kernel, the following vulnerability has been resolved: misc: pci_endpoint_test: Fix array underflow in pci_endpoint_test_ioctl() Commit eefb83790a0d ("misc: pci_endpoint_test: Add doorbell test case") added NO_BAR (-1) to the pci_barno enum which, in practical terms, changes the enum from an unsigned int
osv
CVE-2025-40167UNKNOWN≥ 3.8.0, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-11-12
CVE-2025-40167 ext4: detect invalid INLINE_DATA + EXTENTS flag combination ext4: detect invalid INLINE_DATA + EXTENTS flag combination In the Linux kernel, the following vulnerability has been resolved: ext4: detect invalid INLINE_DATA + EXTENTS flag combination syzbot reported a BUG_ON in ext4_es_cache_extent() when opening a verity file on a corrupted ext4 filesystem mounted without a journal. The issue is that the filesystem has an inode with both the INLINE_DATA and EXTENTS flags set: E
osv
CVE-2025-40146UNKNOWN≥ 3.16.0, < 6.17.32025-11-12
CVE-2025-40146 blk-mq: fix potential deadlock while nr_requests grown blk-mq: fix potential deadlock while nr_requests grown In the Linux kernel, the following vulnerability has been resolved: blk-mq: fix potential deadlock while nr_requests grown Allocate and free sched_tags while queue is freezed can deadlock[1], this is a long term problem, hence allocate memory before freezing queue and free memory after queue is unfreezed. [1] https://lore.kernel.org/all/0659ea8d-a463-47c8-9180-43c719e1
osv
CVE-2025-40202UNKNOWN≥ 0, < 6.1.158-1≥ 0, < 6.12.57-1+1 more2025-11-12
CVE-2025-40202 CVE-2025-40202: In the Linux kernel, the following vulnerability has been resolved: ipmi: Rework user message limit handling The limit on the number of user messages In the Linux kernel, the following vulnerability has been resolved: ipmi: Rework user message limit handling The limit on the number of user messages had a number of issues, improper counting in some cases and a use after free. Restructure how this is all done to handle more in the receive message allocation routine,
osv
CVE-2025-40206UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40206 CVE-2025-40206: In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_objref: validate objref and objrefmap expressions Referencing a syn In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_objref: validate objref and objrefmap expressions Referencing a synproxy stateful object from OUTPUT hook causes kernel crash due to infinite recursive calls: BUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab
osv
CVE-2025-40158UNKNOWN≥ 4.13.0, < 6.17.32025-11-12
CVE-2025-40158 ipv6: use RCU in ip6_output() ipv6: use RCU in ip6_output() In the Linux kernel, the following vulnerability has been resolved: ipv6: use RCU in ip6_output() Use RCU in ip6_output() in order to use dst_dev_rcu() to prevent possible UAF. We can remove rcu_read_lock()/rcu_read_unlock() pairs from ip6_finish_output2().
osv
CVE-2025-40140UNKNOWN≥ 2.6.12, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-11-12
CVE-2025-40140 net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast In the Linux kernel, the following vulnerability has been resolved: net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast syzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb. This is the sequence of events that leads to the warning: rtl8150_start_xmit() { netif_stop_queue(); usb_submit_urb(dev->tx_urb); } rtl8150_
osv
CVE-2025-40122UNKNOWN≥ 0, < 6.17.6-12025-11-12
CVE-2025-40122 CVE-2025-40122: In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel: Fix IA32_PMC_x_CFG_B MSRs access error When running perf_fuzzer on In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel: Fix IA32_PMC_x_CFG_B MSRs access error When running perf_fuzzer on PTL, sometimes the below "unchecked MSR access error" is seen when accessing IA32_PMC_x_CFG_B MSRs. [ 55.611268] unchecked MSR access error: WRMSR to 0x1986 (tried to
osv
CVE-2025-40143UNKNOWN≥ 6.17.0, < 6.17.32025-11-12
CVE-2025-40143 bpf: dont report verifier bug for missing bpf_scc_visit on speculative path bpf: dont report verifier bug for missing bpf_scc_visit on speculative path In the Linux kernel, the following vulnerability has been resolved: bpf: dont report verifier bug for missing bpf_scc_visit on speculative path Syzbot generated a program that triggers a verifier_bug() call in maybe_exit_scc(). maybe_exit_scc() assumes that, when called for a state with insn_idx in some SCC, there should be an i
osv
CVE-2025-40145UNKNOWN≥ 6.15.0, < 6.17.32025-11-12
CVE-2025-40145 PCI/pwrctrl: Fix double cleanup on devm_add_action_or_reset() failure PCI/pwrctrl: Fix double cleanup on devm_add_action_or_reset() failure In the Linux kernel, the following vulnerability has been resolved: PCI/pwrctrl: Fix double cleanup on devm_add_action_or_reset() failure When devm_add_action_or_reset() fails, it calls the passed cleanup function. Hence the caller must not repeat that cleanup. Replace the "goto err_regulator_free" by the actual freeing, as there will neve
osv
CVE-2025-40186UNKNOWN≥ 0, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-11-12
CVE-2025-40186 tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request(). tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request(). In the Linux kernel, the following vulnerability has been resolved: tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request(). syzbot reported the splat below in tcp_conn_request(). [0] If a listener is close()d while a TFO socket is being processed in tcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk->sk and calls inet_child_forget(
osv
CVE-2025-40188UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-11-12
CVE-2025-40188 CVE-2025-40188: In the Linux kernel, the following vulnerability has been resolved: pwm: berlin: Fix wrong register in suspend/resume The 'enable' register should be In the Linux kernel, the following vulnerability has been resolved: pwm: berlin: Fix wrong register in suspend/resume The 'enable' register should be BERLIN_PWM_EN rather than BERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there will be cpu exception then kernel panic during suspend/resume.
osv
CVE-2025-40110UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2025-11-12
CVE-2025-40110 CVE-2025-40110: In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix a null-ptr access in the cursor snooper Check that the resource wh In the Linux kernel, the following vulnerability has been resolved: drm/vmwgfx: Fix a null-ptr access in the cursor snooper Check that the resource which is converted to a surface exists before trying to use the cursor snooper on it. vmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers because so
osv
CVE-2025-40131UNKNOWN≥ 0, < 6.17.6-12025-11-12
CVE-2025-40131 CVE-2025-40131: In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix peer lookup in ath12k_dp_mon_rx_deliver_msdu() In ath12k_dp_mon_ In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix peer lookup in ath12k_dp_mon_rx_deliver_msdu() In ath12k_dp_mon_rx_deliver_msdu(), peer lookup fails because rxcb->peer_id is not updated with a valid value. This is expected in monitor mode, where RX frames bypass the regular RX de
osv
CVE-2025-40152UNKNOWN≥ 6.17.0, < 6.17.32025-11-12
CVE-2025-40152 drm/msm: Fix bootup splat with separate_gpu_drm modparam drm/msm: Fix bootup splat with separate_gpu_drm modparam In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix bootup splat with separate_gpu_drm modparam The drm_gem_for_each_gpuvm_bo() call from lookup_vma() accesses drm_gem_obj.gpuva.list, which is not initialized when the drm driver does not support DRIVER_GEM_GPUVA feature. Enable it for msm_kms drm driver to fix the splat seen when msm.sep
osv
CVE-2025-40137UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40137 CVE-2025-40137: In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to truncate first page in error path of f2fs_truncate() syzbot reports a In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to truncate first page in error path of f2fs_truncate() syzbot reports a bug as below: loop0: detected capacity change from 0 to 40427 F2FS-fs (loop0): Wrong SSA boundary, start(3584) end(4096) blocks(3072) F2FS-fs (loop0): Can't find valid
osv
CVE-2025-40193UNKNOWN≥ 3.9.0, < 6.1.157≥ 6.2.0, < 6.6.113+2 more2025-11-12
CVE-2025-40193 xtensa: simdisk: add input size check in proc_write_simdisk xtensa: simdisk: add input size check in proc_write_simdisk In the Linux kernel, the following vulnerability has been resolved: xtensa: simdisk: add input size check in proc_write_simdisk A malicious user could pass an arbitrarily bad value to memdup_user_nul(), potentially causing kernel crash. This follows the same pattern as commit ee76746387f6 ("netdevsim: prevent bad user input in nsim_dev_health_break_write()")
osv
CVE-2025-40170UNKNOWN≥ 0, < 6.12.69-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40170 CVE-2025-40170: In the Linux kernel, the following vulnerability has been resolved: net: use dst_dev_rcu() in sk_setup_caps() Use RCU to protect accesses to dst->dev In the Linux kernel, the following vulnerability has been resolved: net: use dst_dev_rcu() in sk_setup_caps() Use RCU to protect accesses to dst->dev from sk_setup_caps() and sk_dst_gso_max_size(). Also use dst_dev_rcu() in ip6_dst_mtu_maybe_forward(), and ip_dst_mtu_maybe_forward(). ip4_dst_hoplimit() can use dst_dev
osv