Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 96 of 724
CVE-2025-40148UNKNOWN≥ 6.16.0, < 6.17.32025-11-12
CVE-2025-40148 drm/amd/display: Add NULL pointer checks in dc_stream cursor attribute functions drm/amd/display: Add NULL pointer checks in dc_stream cursor attribute functions In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Add NULL pointer checks in dc_stream cursor attribute functions The function dc_stream_set_cursor_attributes() currently dereferences the `stream` pointer and nested members `stream->ctx->dc->current_state` without checking for NULL.
osv
CVE-2025-40203UNKNOWN≥ 6.8.0, < 6.12.54≥ 6.13.0, < 6.17.42025-11-12
CVE-2025-40203 listmount: don't call path_put() under namespace semaphore listmount: don't call path_put() under namespace semaphore In the Linux kernel, the following vulnerability has been resolved: listmount: don't call path_put() under namespace semaphore Massage listmount() and make sure we don't call path_put() under the namespace semaphore. If we put the last reference we're fscked.
osv
CVE-2025-40121UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-11-12
CVE-2025-40121 CVE-2025-40121: In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping When an invalid value i In the Linux kernel, the following vulnerability has been resolved: ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping When an invalid value is passed via quirk option, currently bytcr_rt5640 driver just ignores and leaves as is, which may lead to unepxected results like OOB access. This patch adds the sanity
osv
CVE-2025-40156UNKNOWN≥ 6.1.0, < 6.1.156≥ 6.2.0, < 6.6.112+2 more2025-11-12
CVE-2025-40156 PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe() PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe() In the Linux kernel, the following vulnerability has been resolved: PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe() The drv->sram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which would lead to a error pointer dereference. Use IS_ERR_OR_NULL() to check that the pointer is valid.
osv
CVE-2025-40133UNKNOWN≥ 6.12.0, < 6.12.55≥ 6.13.0, < 6.17.32025-11-12
CVE-2025-40133 mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable(). mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable(). In the Linux kernel, the following vulnerability has been resolved: mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable(). mptcp_active_enable() is called from subflow_finish_connect(), which is icsk->icsk_af_ops->sk_rx_dst_set() and it's not always under RCU. Using sk_dst_get(sk)->dev could trigger UAF. Let's use __sk_dst_
osv
CVE-2025-40189UNKNOWN≥ 0, < 6.17.6-12025-11-12
CVE-2025-40189 CVE-2025-40189: In the Linux kernel, the following vulnerability has been resolved: net: usb: lan78xx: Fix lost EEPROM read timeout error(-ETIMEDOUT) in lan78xx_read_ In the Linux kernel, the following vulnerability has been resolved: net: usb: lan78xx: Fix lost EEPROM read timeout error(-ETIMEDOUT) in lan78xx_read_raw_eeprom Syzbot reported read of uninitialized variable BUG with following call stack. lan78xx 8-1:1.0 (unnamed net_device) (uninitialized): EEPROM read operation tim
osv
CVE-2025-40162UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40162 CVE-2025-40162: In the Linux kernel, the following vulnerability has been resolved: ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails devm_kasprintf() In the Linux kernel, the following vulnerability has been resolved: ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails devm_kasprintf() may return NULL on memory allocation failure, but the debug message prints cpus->dai_name before checking it. Move the dev_dbg() call after the NULL check to prevent p
osv
CVE-2025-40196UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40196 CVE-2025-40196: In the Linux kernel, the following vulnerability has been resolved: fs: quota: create dedicated workqueue for quota_release_work There is a kernel pan In the Linux kernel, the following vulnerability has been resolved: fs: quota: create dedicated workqueue for quota_release_work There is a kernel panic due to WARN_ONCE when panic_on_warn is set. This issue occurs when writeback is triggered due to sync call for an opened file(ie, writeback reason is WB_REASON_SYNC)
osv
CVE-2025-40129UNKNOWN≥ 6.3.0, < 6.6.112≥ 6.7.0, < 6.12.53+1 more2025-11-12
CVE-2025-40129 sunrpc: fix null pointer dereference on zero-length checksum sunrpc: fix null pointer dereference on zero-length checksum In the Linux kernel, the following vulnerability has been resolved: sunrpc: fix null pointer dereference on zero-length checksum In xdr_stream_decode_opaque_auth(), zero-length checksum.len causes checksum.data to be set to NULL. This triggers a NPD when accessing checksum.data in gss_krb5_verify_mic_v2(). This patch ensures that the value of checksum.len is
osv
CVE-2025-40166UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-11-12
CVE-2025-40166 CVE-2025-40166: In the Linux kernel, the following vulnerability has been resolved: drm/xe/guc: Check GuC running state before deregistering exec queue In normal oper In the Linux kernel, the following vulnerability has been resolved: drm/xe/guc: Check GuC running state before deregistering exec queue In normal operation, a registered exec queue is disabled and deregistered through the GuC, and freed only after the GuC confirms completion. However, if the driver is forced to unbin
osv
CVE-2025-40120UNKNOWN≥ 0, < 6.1.158-1≥ 0, < 6.12.57-1+1 more2025-11-12
CVE-2025-40120 CVE-2025-40120: In the Linux kernel, the following vulnerability has been resolved: net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock Prevent USB run In the Linux kernel, the following vulnerability has been resolved: net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock Prevent USB runtime PM (autosuspend) for AX88772* in bind. usbnet enables runtime PM (autosuspend) by default, so disabling it via the usb_driver flag is ineffective. On AX88772B, aut
osv
CVE-2025-40197UNKNOWN≥ 0, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-11-12
CVE-2025-40197 media: mc: Clear minor number before put device media: mc: Clear minor number before put device In the Linux kernel, the following vulnerability has been resolved: media: mc: Clear minor number before put device The device minor should not be cleared after the device is released.
osv
CVE-2025-40128UNKNOWN≥ 6.17.0, < 6.17.32025-11-12
CVE-2025-40128 btrfs: fix symbolic link reading when bs > ps btrfs: fix symbolic link reading when bs > ps In the Linux kernel, the following vulnerability has been resolved: btrfs: fix symbolic link reading when bs > ps [BUG DURING BS > PS TEST] When running the following script on a btrfs whose block size is larger than page size, e.g. 8K block size and 4K page size, it will trigger a kernel BUG: # mkfs.btrfs -s 8k $dev # mount $dev $mnt # mkdir $mnt/dir # ln -s dir $mnt/link # ls $mnt/lin
osv
CVE-2025-40109UNKNOWN≥ 5.10.0, < 5.10.246≥ 5.11.0, < 5.15.195+5 more2025-11-09
CVE-2025-40109 crypto: rng - Ensure set_ent is always present crypto: rng - Ensure set_ent is always present In the Linux kernel, the following vulnerability has been resolved: crypto: rng - Ensure set_ent is always present Ensure that set_ent is always set since only drbg provides it.
osv
CVE-2025-40108UNKNOWN≥ 0, < 6.17.0-7.72025-11-09
CVE-2025-40108 CVE-2025-40108: In the Linux kernel, the following vulnerability has been resolved: serial: qcom-geni: Fix blocked task Revert commit 1afa70632c39 ("serial: qcom-geni In the Linux kernel, the following vulnerability has been resolved: serial: qcom-geni: Fix blocked task Revert commit 1afa70632c39 ("serial: qcom-geni: Enable PM runtime for serial driver") and its dependent commit 86fa39dd6fb7 ("serial: qcom-geni: Enable Serial on SA8255p Qualcomm platforms") because the first one c
osv
CVE-2025-40107UNKNOWN≥ 0, < 6.1.158-1≥ 0, < 6.12.57-1+1 more2025-11-03
CVE-2025-40107 CVE-2025-40107: In the Linux kernel, the following vulnerability has been resolved: can: hi311x: fix null pointer dereference when resuming from sleep before interfac In the Linux kernel, the following vulnerability has been resolved: can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled This issue is similar to the vulnerability in the `mcp251x` driver, which was fixed in commit 03c427147b2d ("can: mcp251x: fix resume from sleep before in
osv
CVE-2025-40106UNKNOWN≥ 2.6.29, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-10-31
CVE-2025-40106 comedi: fix divide-by-zero in comedi_buf_munge() comedi: fix divide-by-zero in comedi_buf_munge() In the Linux kernel, the following vulnerability has been resolved: comedi: fix divide-by-zero in comedi_buf_munge() The comedi_buf_munge() function performs a modulo operation `async->munge_chan %= async->cmd.chanlist_len` without first checking if chanlist_len is zero. If a user program submits a command with chanlist_len set to zero, this causes a divide-by-zero error when the d
osv
CVE-2025-40090MEDIUMCVSS 5.5≥ 6.12.53, < 6.12.55≥ 6.17.3, < 6.17.5+1 more2025-10-30
CVE-2025-40090 [MEDIUM] CWE-674 CVE-2025-40090: In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix recursive locking in In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix recursive locking in RPC handle list access Since commit 305853cce3794 ("ksmbd: Fix race condition in RPC handle list access"), ksmbd_session_rpc_method() attempts to lock sess->rpc_lock. This causes hung connections / tasks when a client attempts to open a named pipe.
nvd
CVE-2025-40098UNKNOWN≥ 0, < 6.17.6-12025-10-30
CVE-2025-40098 CVE-2025-40098: In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() Return value of a function acpi_evaluate_dsm() is dereferenced without checking for NULL, but it is usually checked for this function. acpi_evaluate_dsm() may return NUL
osv
CVE-2025-40102UNKNOWN≥ 4.19.0, < 6.17.52025-10-30
CVE-2025-40102 KVM: arm64: Prevent access to vCPU events before init KVM: arm64: Prevent access to vCPU events before init In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Prevent access to vCPU events before init Another day, another syzkaller bug. KVM erroneously allows userspace to pend vCPU events for a vCPU that hasn't been initialized yet, leading to KVM interpreting a bunch of uninitialized garbage for routing / injecting the exception. In one case the i
osv