INFSA-2025:20518: kernel security update

Information about definition

Identificator: INFSA-2025:20518

Type: security

Release date: 2025-12-07 22:23:18 UTC

Information about package

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Vulnerabilities description

  • CVE-2024-53241

    In the Linux kernel, the following vulnerability has been resolved: x86/xen: don't do PV iret hypercall through hypercall page.

  • CVE-2024-36350

    A transient execution vulnerability in some AMD processors may allow an attacker to infer data from previous stores, potentially resulting in the leakage of privileged information.

  • CVE-2025-38396

    In the Linux kernel, the following vulnerability has been resolved: fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass.

  • CVE-2024-36357

    A transient execution vulnerability in some AMD processors may allow an attacker to infer data in the L1D cache, potentially resulting in the leakage of sensitive information across privileged boundaries.

  • CVE-2022-48830

    In the Linux kernel, the following vulnerability has been resolved: can: isotp: fix potential CAN frame reception race in isotp_rcv().

  • CVE-2022-49024

    In the Linux kernel, the following vulnerability has been resolved: can: m_can: pci: add missing m_can_class_free_dev() in probe/remove methods.

  • CVE-2022-49269

    In the Linux kernel, the following vulnerability has been resolved: can: isotp: sanitize CAN ID checks in isotp_bind().

  • CVE-2022-49353

    In the Linux kernel, the following vulnerability has been resolved: powerpc/papr_scm: don't requests stats with '0' sized stats buffer.

  • CVE-2022-49357

    In the Linux kernel, the following vulnerability has been resolved: efi: Do not import certificates from UEFI Secure Boot for T2 Macs.

  • CVE-2022-49432

    In the Linux kernel, the following vulnerability has been resolved: powerpc/xics: fix refcount leak in icp_opal_init().

  • CVE-2022-49437

    In the Linux kernel, the following vulnerability has been resolved: powerpc/xive: Fix refcount leak in xive_spapr_init.

  • CVE-2022-49443

    In the Linux kernel, the following vulnerability has been resolved: list: fix a data-race around ep->rdllist.

  • CVE-2022-49623

    In the Linux kernel, the following vulnerability has been resolved: powerpc/xive/spapr: correct bitmap allocation size.

  • CVE-2022-49627

    In the Linux kernel, the following vulnerability has been resolved: ima: Fix potential memory leak in ima_init_crypto().

  • CVE-2022-49643

    In the Linux kernel, the following vulnerability has been resolved: ima: Fix a potential integer overflow in ima_appraise_measurement.

  • CVE-2022-49648

    In the Linux kernel, the following vulnerability has been resolved: tracing/histograms: Fix memory leak problem.

  • CVE-2022-49657

    In the Linux kernel, the following vulnerability has been resolved: usbnet: fix memory leak in error case.

  • CVE-2022-49670

    In the Linux kernel, the following vulnerability has been resolved: linux/dim: Fix divide by 0 in RDMA DIM.

  • CVE-2022-49672

    In the Linux kernel, the following vulnerability has been resolved: net: tun: unlink NAPI from device on destruction.

  • CVE-2022-49845

    In the Linux kernel, the following vulnerability has been resolved: can: j1939: j1939_send_one(): fix missing CAN header initialization.

  • CVE-2024-46689

    In the Linux kernel, the following vulnerability has been resolved: soc: qcom: cmd-db: Map shared memory as WC, not WB.

  • CVE-2024-46744

    In the Linux kernel, the following vulnerability has been resolved: Squashfs: sanity check symbolic link size.

  • CVE-2024-47679

    In the Linux kernel, the following vulnerability has been resolved: vfs: fix race between evice_inodes() and find_inode()&iput().

  • CVE-2024-47727

    In the Linux kernel, the following vulnerability has been resolved: x86/tdx: Fix "in-kernel MMIO" check.

  • CVE-2024-49570

    In the Linux kernel, the following vulnerability has been resolved: drm/xe/tracing: Fix a potential TP_printk UAF.

  • CVE-2024-49864

    In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix a race between socket set up and I/O thread creation.

  • CVE-2024-50060

    In the Linux kernel, the following vulnerability has been resolved: io_uring: check if we need to reschedule during overflow flush.

  • CVE-2024-50195

    In the Linux kernel, the following vulnerability has been resolved: posix-clock: Fix missing timespec64 check in pc_clock_settime().

  • CVE-2024-50294

    In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix missing locking causing hanging calls.

  • CVE-2024-52332

    In the Linux kernel, the following vulnerability has been resolved: igb: Fix potential invalid memory access in igb_init_module().

  • CVE-2024-53052

    In the Linux kernel, the following vulnerability has been resolved: io_uring/rw: fix missing NOWAIT check for O_DIRECT start write.

  • CVE-2024-53090

    In the Linux kernel, the following vulnerability has been resolved: afs: Fix lock recursion.

  • CVE-2024-53119

    In the Linux kernel, the following vulnerability has been resolved: virtio/vsock: Fix accept_queue memory leak.

  • CVE-2024-53135

    In the Linux kernel, the following vulnerability has been resolved: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN.

  • CVE-2024-53170

    In the Linux kernel, the following vulnerability has been resolved: block: fix uaf for flush rq while iterating tags.

  • CVE-2024-53216

    In the Linux kernel, the following vulnerability has been resolved: nfsd: release svc_expkey/svc_export with rcu_work.

  • CVE-2024-53229

    In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix the qp flush warnings in req.

  • CVE-2024-53680

    In the Linux kernel, the following vulnerability has been resolved: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init().

  • CVE-2024-54456

    In the Linux kernel, the following vulnerability has been resolved: NFS: Fix potential buffer overflowin nfs_sysfs_link_rpc_client().

  • CVE-2024-56603

    In the Linux kernel, the following vulnerability has been resolved: net: af_can: do not leave a dangling sk pointer in can_create().

  • CVE-2024-56645

    In the Linux kernel, the following vulnerability has been resolved: can: j1939: j1939_session_new(): fix skb reference counting.

  • CVE-2024-56662

    In the Linux kernel, the following vulnerability has been resolved: acpi: nfit: vmalloc-out-of-bounds Read in acpi_nfit_ctl.

  • CVE-2024-56672

    In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix UAF in blkcg_unpin_online().

  • CVE-2024-56675

    In the Linux kernel, the following vulnerability has been resolved: bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors.

  • CVE-2024-56690

    In the Linux kernel, the following vulnerability has been resolved: crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY.

  • CVE-2024-56709

    In the Linux kernel, the following vulnerability has been resolved: io_uring: check if iowq is killed before queuing.

  • CVE-2024-56739

    In the Linux kernel, the following vulnerability has been resolved: rtc: check if __rtc_read_time was successful in rtc_timer_do_work().

  • CVE-2024-56786

    In the Linux kernel, the following vulnerability has been resolved: bpf: put bpf_link's program when link is safe to be deallocated.

  • CVE-2024-57981

    In the Linux kernel, the following vulnerability has been resolved: usb: xhci: Fix NULL pointer dereference on certain command aborts.

  • CVE-2024-57986

    In the Linux kernel, the following vulnerability has been resolved: HID: core: Fix assumption that Resolution Multipliers must be in Logical Collections.

  • CVE-2024-57987

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btrtl: check for NULL in btrtl_setup_realtek().

  • CVE-2024-57988

    In the Linux kernel, the following vulnerability has been resolved: Bluetooth: btbcm: Fix NULL dereference in btbcm_get_board_name().

  • CVE-2024-57989

    In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7925: fix NULL deref check in mt7925_change_vif_links.

  • CVE-2024-57990

    In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7925: fix off by one in mt7925_load_clc().

  • CVE-2024-57993

    In the Linux kernel, the following vulnerability has been resolved: HID: hid-thrustmaster: Fix warning in thrustmaster_probe by adding endpoint check.

  • CVE-2024-57995

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix read pointer after free in ath12k_mac_assign_vif_to_vdev().

  • CVE-2024-57998

    In the Linux kernel, the following vulnerability has been resolved: OPP: add index check to assert to avoid buffer overflow in _read_freq().

  • CVE-2024-58012

    In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params.

  • CVE-2024-58014

    In the Linux kernel, the following vulnerability has been resolved: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy().

  • CVE-2024-58015

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: Fix for out-of bound access error.

  • CVE-2024-58057

    In the Linux kernel, the following vulnerability has been resolved: idpf: convert workqueues to unbound.

  • CVE-2024-58062

    In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: avoid NULL pointer dereference.

  • CVE-2024-58068

    In the Linux kernel, the following vulnerability has been resolved: OPP: fix dev_pm_opp_find_bw_*() when bandwidth table not initialized.

  • CVE-2024-58072

    In the Linux kernel, the following vulnerability has been resolved: wifi: rtlwifi: remove unused check_buddy_priv.

  • CVE-2024-58075

    In the Linux kernel, the following vulnerability has been resolved: crypto: tegra - do not transfer req when tegra init fails.

  • CVE-2024-58077

    In the Linux kernel, the following vulnerability has been resolved: ASoC: soc-pcm: don't use soc_pcm_ret() on .prepare callback.

  • CVE-2024-58083

    In the Linux kernel, the following vulnerability has been resolved: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu().

  • CVE-2024-58088

    In the Linux kernel, the following vulnerability has been resolved: bpf: Fix deadlock when freeing cgroup storage.

  • CVE-2025-21631

    In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix waker_bfqq UAF after bfq_split_bfqq().

  • CVE-2025-21647

    In the Linux kernel, the following vulnerability has been resolved: sched: sch_cake: add bounds checks to host bulk flow fairness counts.

  • CVE-2025-21648

    In the Linux kernel, the following vulnerability has been resolved: netfilter: conntrack: clamp maximum hashtable size to INT_MAX.

  • CVE-2025-21671

    In the Linux kernel, the following vulnerability has been resolved: zram: fix potential UAF of zram table.

  • CVE-2025-21672

    In the Linux kernel, the following vulnerability has been resolved: afs: Fix merge preference rule failure condition.

  • CVE-2025-21691

    In the Linux kernel, the following vulnerability has been resolved: cachestat: fix page cache statistics permission checking.

  • CVE-2025-21693

    In the Linux kernel, the following vulnerability has been resolved: mm: zswap: properly synchronize freeing resources during CPU hotunplug.

  • CVE-2025-21696

    In the Linux kernel, the following vulnerability has been resolved: mm: clear uffd-wp PTE/PMD state on mremap().

  • CVE-2025-21702

    In the Linux kernel, the following vulnerability has been resolved: pfifo_tail_enqueue: Drop new packet when sch->limit == 0.

  • CVE-2025-21714

    In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx5: Fix implicit ODP use after free.

  • CVE-2025-21726

    In the Linux kernel, the following vulnerability has been resolved: padata: avoid UAF for reorder_work.

  • CVE-2025-21728

    In the Linux kernel, the following vulnerability has been resolved: bpf: Send signals asynchronously if !preemptible.

  • CVE-2025-21729

    In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion.

  • CVE-2025-21738

    In the Linux kernel, the following vulnerability has been resolved: ata: libata-sff: Ensure that we cannot write outside the allocated buffer.

  • CVE-2025-21739

    In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix use-after free in init error and remove paths.

  • CVE-2025-21745

    In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix class @block_class's subsystem refcount leakage.

  • CVE-2025-21746

    In the Linux kernel, the following vulnerability has been resolved: Input: synaptics - fix crash when enabling pass-through port.

  • CVE-2025-21765

    In the Linux kernel, the following vulnerability has been resolved: ipv6: use RCU protection in ip6_default_advmss().

  • CVE-2025-21786

    In the Linux kernel, the following vulnerability has been resolved: workqueue: Put the pwq after detaching the rescuer from the pool.

  • CVE-2025-21787

    In the Linux kernel, the following vulnerability has been resolved: team: better TEAM_OPTION_TYPE_STRING validation.

  • CVE-2025-21790

    In the Linux kernel, the following vulnerability has been resolved: vxlan: check vxlan_vnigroup_init() return value.

  • CVE-2025-21791

    In the Linux kernel, the following vulnerability has been resolved: vrf: use RCU protection in l3mdev_l3_out().

  • CVE-2025-21795

    In the Linux kernel, the following vulnerability has been resolved: NFSD: fix hang in nfsd4_shutdown_callback.

  • CVE-2025-21796

    In the Linux kernel, the following vulnerability has been resolved: nfsd: clear acl_access/acl_default after releasing them.

  • CVE-2025-21806

    In the Linux kernel, the following vulnerability has been resolved: net: let net.core.dev_weight always be non-zero.

  • CVE-2025-21826

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: reject mismatching sum of field_len with set key length.

  • CVE-2025-21828

    In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: don't flush non-uploaded STAs.

  • CVE-2025-21829

    In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]".

  • CVE-2025-21837

    In the Linux kernel, the following vulnerability has been resolved: io_uring/uring_cmd: unconditionally copy SQEs at prep time.

  • CVE-2025-21839

    In the Linux kernel, the following vulnerability has been resolved: KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop.

  • CVE-2025-21844

    In the Linux kernel, the following vulnerability has been resolved: smb: client: Add check for next_buffer in receive_encrypted_standard().

  • CVE-2025-21846

    In the Linux kernel, the following vulnerability has been resolved: acct: perform last write from work queue.

  • CVE-2025-21847

    In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: stream-ipc: Check for cstream nullity in sof_ipc_msg_data().

  • CVE-2025-21848

    In the Linux kernel, the following vulnerability has been resolved: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc().

  • CVE-2025-21851

    In the Linux kernel, the following vulnerability has been resolved: bpf: Fix softlockup in arena_map_free on 64k page kernel.

  • CVE-2025-21853

    In the Linux kernel, the following vulnerability has been resolved: bpf: avoid holding freeze_mutex during mmap operation.

  • CVE-2025-21855

    In the Linux kernel, the following vulnerability has been resolved: ibmvnic: Don't reference skb after sending to VIOS.

  • CVE-2025-21861

    In the Linux kernel, the following vulnerability has been resolved: mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize().

  • CVE-2025-21863

    In the Linux kernel, the following vulnerability has been resolved: io_uring: prevent opcode speculation.

  • CVE-2025-21864

    In the Linux kernel, the following vulnerability has been resolved: tcp: drop secpath at the same time as we currently drop dst.

  • CVE-2025-22056

    In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_tunnel: fix geneve_opt type confusion addition.

  • CVE-2025-37994

    In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: displayport: Fix NULL pointer access.

  • CVE-2025-38116

    In the Linux kernel, the following vulnerability has been resolved: wifi: ath12k: fix uaf in ath12k_core_init().

Severity level

CVE Score CVSS 2.0 Score CVSS 3.x Score CVSS 4.0
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 6.1 no information
no information 5.5 no information
no information 5.5 no information
no information 4.7 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 4.7 no information
no information 5.5 no information
no information 4.7 no information
no information 5.5 no information
no information 5.6 no information
no information 5.6 no information
no information 4.4 no information
no information 5.5 no information
no information 4.7 no information
no information 7.8 no information
no information 6.0 no information
no information 4.7 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.7 no information
no information 4.4 no information
no information 5.5 no information
no information 6.1 no information
no information 6.5 no information
no information 6.7 no information
no information 7.1 no information
no information 7.0 no information
no information 5.7 no information
no information 5.5 no information
no information 7.1 no information
no information 7.3 no information
no information 7.1 no information
no information 6.0 no information
no information 6.4 no information
no information 6.7 no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information no information no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 7.8 no information
no information 3.3 no information
no information 6.7 no information
no information 7.1 no information
no information 4.4 no information
no information 6.0 no information
no information 6.0 no information
no information 4.4 no information
no information 5.5 no information
no information 5.5 no information
no information 6.4 no information
no information 6.0 no information
no information 4.4 no information
no information 5.5 no information
no information 4.4 no information
no information 6.0 no information
no information 7.1 no information
no information 7.1 no information
no information 6.7 no information
no information 5.5 no information
no information 7.1 no information
no information 5.5 no information
no information 5.5 no information
no information 7.0 no information
no information 6.7 no information
no information 7.0 no information
no information 4.4 no information
no information 5.5 no information
no information 6.7 no information
no information 6.7 no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 7.8 no information
no information 5.5 no information
no information 5.5 no information
no information 7.1 no information
no information 5.5 no information
no information 5.5 no information
no information 3.3 no information
no information 6.1 no information
no information 5.5 no information
no information 4.4 no information
no information no information no information
no information 5.5 no information
no information 5.5 no information
no information 5.5 no information
no information 4.4 no information
no information 5.5 no information
no information 2.3 no information
no information 4.4 no information
no information 6.4 no information
no information 5.5 no information
no information 7.1 no information
no information 4.7 no information
no information 7.0 no information
no information 6.4 no information
no information 4.1 no information
no information 6.0 no information
Critical, important, moderate, low

Updated packages

loader icon Preparing to download...
Architecture: Download