Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 34 of 724
CVE-2025-71083MEDIUMCVSS 5.5≥ 4.14.1, < 5.15.198≥ 5.16, < 6.1.160+5 more2026-01-13
CVE-2025-71083 [MEDIUM] CWE-476 CVE-2025-71083: In the Linux kernel, the following vulnerability has been resolved:
drm/ttm: Avoid NULL pointer der
In the Linux kernel, the following vulnerability has been resolved:
drm/ttm: Avoid NULL pointer deref for evicted BOs
It is possible for a BO to exist that is not currently associated with a
resource, e.g. because it has been evicted.
When devcoredump tries to read the contents of all BOs for dumping, we need
to expect this as well -- in this cas
nvdosv
CVE-2025-68823MEDIUMCVSS 5.5≥ 6.0, < 6.6.124≥ 6.7, < 6.12.70+2 more2026-01-13
CVE-2025-68823 [MEDIUM] CWE-667 CVE-2025-68823: In the Linux kernel, the following vulnerability has been resolved:
ublk: fix deadlock when reading
In the Linux kernel, the following vulnerability has been resolved:
ublk: fix deadlock when reading partition table
When one process(such as udev) opens ublk block device (e.g., to read
the partition table via bdev_open()), a deadlock[1] can occur:
1. bdev_open() grabs disk->open_mutex
2. The process issues read I/O to ublk backend to read partit
nvdosv
CVE-2025-71074MEDIUMCVSS 4.7≥ 2.6.35.1, < 6.19v2.6.35+1 more2026-01-13
CVE-2025-71074 [MEDIUM] CWE-362 CVE-2025-71074: In the Linux kernel, the following vulnerability has been resolved:
functionfs: fix the open/remova
In the Linux kernel, the following vulnerability has been resolved:
functionfs: fix the open/removal races
ffs_epfile_open() can race with removal, ending up with file->private_data
pointing to freed object.
There is a total count of opened files on functionfs (both ep0 and
dynamic ones) and when it hits zero, dynamic files get removed.
Unfortuna
nvdosv
CVE-2025-71077MEDIUMCVSS 5.5≥ 5.1.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-13
CVE-2025-71077 [MEDIUM] CVE-2025-71077: In the Linux kernel, the following vulnerability has been resolved:
tpm: Cap the number of PCR bank
In the Linux kernel, the following vulnerability has been resolved:
tpm: Cap the number of PCR banks
tpm2_get_pcr_allocation() does not cap any upper limit for the number of
banks. Cap the limit to eight banks so that out of bounds values coming
from external I/O cause on only limited harm.
nvdosv
CVE-2025-71081MEDIUMCVSS 5.5≥ 4.15.1, < 5.15.198≥ 5.16, < 6.1.160+5 more2026-01-13
CVE-2025-71081 [MEDIUM] CWE-401 CVE-2025-71081: In the Linux kernel, the following vulnerability has been resolved:
ASoC: stm32: sai: fix OF node l
In the Linux kernel, the following vulnerability has been resolved:
ASoC: stm32: sai: fix OF node leak on probe
The reference taken to the sync provider OF node when probing the
platform device is currently only dropped if the set_sync() callback
fails during DAI probe.
Make sure to drop the reference on platform probe failures (e.g. probe
deferr
nvdosv
CVE-2025-68787UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68787 CVE-2025-68787: In the Linux kernel, the following vulnerability has been resolved: netrom: Fix memory leak in nr_sendmsg() syzbot reported a memory leak [1]
In the Linux kernel, the following vulnerability has been resolved: netrom: Fix memory leak in nr_sendmsg() syzbot reported a memory leak [1]. When function sock_alloc_send_skb() return NULL in nr_output(), the original skb is not freed, which was allocated in nr_sendmsg(). Fix this by freeing it before return. [1] BUG: memor
osv
CVE-2025-68769UNKNOWN≥ 4.7.0, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2026-01-13
CVE-2025-68769 f2fs: fix return value of f2fs_recover_fsync_data()
f2fs: fix return value of f2fs_recover_fsync_data()
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix return value of f2fs_recover_fsync_data()
With below scripts, it will trigger panic in f2fs:
mkfs.f2fs -f /dev/vdd
mount /dev/vdd /mnt/f2fs
touch /mnt/f2fs/foo
sync
echo 111 >> /mnt/f2fs/foo
f2fs_io fsync /mnt/f2fs/foo
f2fs_io shutdown 2 /mnt/f2fs
umount /mnt/f2fs
mount -o ro,norecovery /dev/vdd /m
osv
CVE-2025-71064UNKNOWN≥ 4.16.0, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2026-01-13
CVE-2025-71064 net: hns3: using the num_tqps in the vf driver to apply for resources
net: hns3: using the num_tqps in the vf driver to apply for resources
In the Linux kernel, the following vulnerability has been resolved:
net: hns3: using the num_tqps in the vf driver to apply for resources
Currently, hdev->htqp is allocated using hdev->num_tqps, and kinfo->tqp
is allocated using kinfo->num_tqps. However, kinfo->num_tqps is set to
min(new_tqps, hdev->num_tqps); Therefore, kinfo->num_tqps may
osv
CVE-2025-68785UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68785 CVE-2025-68785: In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix middle attribute validation in push_nsh() action The push_ns
In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix middle attribute validation in push_nsh() action The push_nsh() action structure looks like this: OVS_ACTION_ATTR_PUSH_NSH(OVS_KEY_ATTR_NSH(OVS_NSH_KEY_ATTR_BASE,...)) The outermost OVS_ACTION_ATTR_PUSH_NSH attribute is OK'ed by
osv
CVE-2025-68771UNKNOWN≥ 2.6.16, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2026-01-13
CVE-2025-68771 ocfs2: fix kernel BUG in ocfs2_find_victim_chain
ocfs2: fix kernel BUG in ocfs2_find_victim_chain
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: fix kernel BUG in ocfs2_find_victim_chain
syzbot reported a kernel BUG in ocfs2_find_victim_chain() because the
`cl_next_free_rec` field of the allocation chain list (next free slot in
the chain list) is 0, triggring the BUG_ON(!cl->cl_next_free_rec)
condition in ocfs2_find_victim_chain() and panicking the k
osv
CVE-2025-68795UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68795 CVE-2025-68795: In the Linux kernel, the following vulnerability has been resolved: ethtool: Avoid overflowing userspace buffer on stats query The ethtool -S command
In the Linux kernel, the following vulnerability has been resolved: ethtool: Avoid overflowing userspace buffer on stats query The ethtool -S command operates across three ioctl calls: ETHTOOL_GSSET_INFO for the size, ETHTOOL_GSTRINGS for the names, and ETHTOOL_GSTATS for the values. If the number of stats changes bet
osv
CVE-2025-68808UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68808 CVE-2025-68808: In the Linux kernel, the following vulnerability has been resolved: media: vidtv: initialize local pointers upon transfer of memory ownership vidtv_ch
In the Linux kernel, the following vulnerability has been resolved: media: vidtv: initialize local pointers upon transfer of memory ownership vidtv_channel_si_init() creates a temporary list (program, service, event) and ownership of the memory itself is transferred to the PAT/SDT/EIT tables through vidtv_psi_pat_pro
osv
CVE-2025-68782UNKNOWN≥ 5.8.0, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2026-01-13
CVE-2025-68782 scsi: target: Reset t_task_cdb pointer in error case
scsi: target: Reset t_task_cdb pointer in error case
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: Reset t_task_cdb pointer in error case
If allocation of cmd->t_task_cdb fails, it remains NULL but is later
dereferenced in the 'err' path.
In case of error, reset NULL t_task_cdb value to point at the default
fixed-size buffer.
Found by Linux Verification Center (linuxtesting.org) with SVAC
osv
CVE-2025-68776UNKNOWN≥ 3.17.0, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2026-01-13
CVE-2025-68776 net/hsr: fix NULL pointer dereference in prp_get_untagged_frame()
net/hsr: fix NULL pointer dereference in prp_get_untagged_frame()
In the Linux kernel, the following vulnerability has been resolved:
net/hsr: fix NULL pointer dereference in prp_get_untagged_frame()
prp_get_untagged_frame() calls __pskb_copy() to create frame->skb_std
but doesn't check if the allocation failed. If __pskb_copy() returns
NULL, skb_clone() is called with a NULL pointer, causing a crash:
Oops: gene
osv
CVE-2025-68811UNKNOWN≥ 0, < 6.12.69-1≥ 0, < 6.18.3-12026-01-13
CVE-2025-68811 CVE-2025-68811: In the Linux kernel, the following vulnerability has been resolved: svcrdma: use rc_pageoff for memcpy byte offset svc_rdma_copy_inline_range added rc
In the Linux kernel, the following vulnerability has been resolved: svcrdma: use rc_pageoff for memcpy byte offset svc_rdma_copy_inline_range added rc_curpage (page index) to the page base instead of the byte offset rc_pageoff. Use rc_pageoff so copies land within the current page. Found by ZeroPath (https://zeropath
osv
CVE-2025-68778UNKNOWN≥ 4.8.0, < 6.1.160≥ 6.2.0, < 6.6.120+2 more2026-01-13
CVE-2025-68778 btrfs: don't log conflicting inode if it's a dir moved in the current transaction
btrfs: don't log conflicting inode if it's a dir moved in the current transaction
In the Linux kernel, the following vulnerability has been resolved:
btrfs: don't log conflicting inode if it's a dir moved in the current transaction
We can't log a conflicting inode if it's a directory and it was moved
from one parent directory to another parent directory in the current
transaction, as this can resu
osv
CVE-2025-68793UNKNOWN≥ 6.17.0, < 6.18.32026-01-13
CVE-2025-68793 drm/amdgpu: fix a job->pasid access race in gpu recovery
drm/amdgpu: fix a job->pasid access race in gpu recovery
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: fix a job->pasid access race in gpu recovery
Avoid a possible UAF in GPU recovery due to a race between
the sched timeout callback and the tdr work queue.
The gpu recovery function calls drm_sched_stop() and
later drm_sched_start(). drm_sched_start() restarts
the tdr queue which will ev
osv
CVE-2025-68813UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68813 CVE-2025-68813: In the Linux kernel, the following vulnerability has been resolved: ipvs: fix ipv4 null-ptr-deref in route error path The IPv4 code path in __ip_vs_ge
In the Linux kernel, the following vulnerability has been resolved: ipvs: fix ipv4 null-ptr-deref in route error path The IPv4 code path in __ip_vs_get_out_rt() calls dst_link_failure() without ensuring skb->dev is set, leading to a NULL pointer dereference in fib_compute_spec_dst() when ipv4_link_failure() attempts
osv
CVE-2025-68789UNKNOWN≥ 0, < 6.1.162-1≥ 0, < 6.12.69-1+1 more2026-01-13
CVE-2025-68789 CVE-2025-68789: In the Linux kernel, the following vulnerability has been resolved: hwmon: (ibmpex) fix use-after-free in high/low store The ibmpex_high_low_store() f
In the Linux kernel, the following vulnerability has been resolved: hwmon: (ibmpex) fix use-after-free in high/low store The ibmpex_high_low_store() function retrieves driver data using dev_get_drvdata() and uses it without validation. This creates a race condition where the sysfs callback can be invoked after the da
osv
CVE-2025-68768UNKNOWN≥ 5.3.0, < 6.18.32026-01-13
CVE-2025-68768 inet: frags: flush pending skbs in fqdir_pre_exit()
inet: frags: flush pending skbs in fqdir_pre_exit()
In the Linux kernel, the following vulnerability has been resolved:
inet: frags: flush pending skbs in fqdir_pre_exit()
We have been seeing occasional deadlocks on pernet_ops_rwsem since
September in NIPA. The stuck task was usually modprobe (often loading
a driver like ipvlan), trying to take the lock as a Writer.
lockdep does not track readers for rwsems so the read wasn't
osv