Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 34 of 724
CVE-2025-71083MEDIUMCVSS 5.5≥ 4.14.1, < 5.15.198≥ 5.16, < 6.1.160+5 more2026-01-13
CVE-2025-71083 [MEDIUM] CWE-476 CVE-2025-71083: In the Linux kernel, the following vulnerability has been resolved: drm/ttm: Avoid NULL pointer der In the Linux kernel, the following vulnerability has been resolved: drm/ttm: Avoid NULL pointer deref for evicted BOs It is possible for a BO to exist that is not currently associated with a resource, e.g. because it has been evicted. When devcoredump tries to read the contents of all BOs for dumping, we need to expect this as well -- in this cas
nvdosv
CVE-2025-68823MEDIUMCVSS 5.5≥ 6.0, < 6.6.124≥ 6.7, < 6.12.70+2 more2026-01-13
CVE-2025-68823 [MEDIUM] CWE-667 CVE-2025-68823: In the Linux kernel, the following vulnerability has been resolved: ublk: fix deadlock when reading In the Linux kernel, the following vulnerability has been resolved: ublk: fix deadlock when reading partition table When one process(such as udev) opens ublk block device (e.g., to read the partition table via bdev_open()), a deadlock[1] can occur: 1. bdev_open() grabs disk->open_mutex 2. The process issues read I/O to ublk backend to read partit
nvdosv
CVE-2025-71074MEDIUMCVSS 4.7≥ 2.6.35.1, < 6.19v2.6.35+1 more2026-01-13
CVE-2025-71074 [MEDIUM] CWE-362 CVE-2025-71074: In the Linux kernel, the following vulnerability has been resolved: functionfs: fix the open/remova In the Linux kernel, the following vulnerability has been resolved: functionfs: fix the open/removal races ffs_epfile_open() can race with removal, ending up with file->private_data pointing to freed object. There is a total count of opened files on functionfs (both ep0 and dynamic ones) and when it hits zero, dynamic files get removed. Unfortuna
nvdosv
CVE-2025-71077MEDIUMCVSS 5.5≥ 5.1.1, < 5.10.248≥ 5.11, < 5.15.198+6 more2026-01-13
CVE-2025-71077 [MEDIUM] CVE-2025-71077: In the Linux kernel, the following vulnerability has been resolved: tpm: Cap the number of PCR bank In the Linux kernel, the following vulnerability has been resolved: tpm: Cap the number of PCR banks tpm2_get_pcr_allocation() does not cap any upper limit for the number of banks. Cap the limit to eight banks so that out of bounds values coming from external I/O cause on only limited harm.
nvdosv
CVE-2025-71081MEDIUMCVSS 5.5≥ 4.15.1, < 5.15.198≥ 5.16, < 6.1.160+5 more2026-01-13
CVE-2025-71081 [MEDIUM] CWE-401 CVE-2025-71081: In the Linux kernel, the following vulnerability has been resolved: ASoC: stm32: sai: fix OF node l In the Linux kernel, the following vulnerability has been resolved: ASoC: stm32: sai: fix OF node leak on probe The reference taken to the sync provider OF node when probing the platform device is currently only dropped if the set_sync() callback fails during DAI probe. Make sure to drop the reference on platform probe failures (e.g. probe deferr
nvdosv
CVE-2025-68787UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68787 CVE-2025-68787: In the Linux kernel, the following vulnerability has been resolved: netrom: Fix memory leak in nr_sendmsg() syzbot reported a memory leak [1] In the Linux kernel, the following vulnerability has been resolved: netrom: Fix memory leak in nr_sendmsg() syzbot reported a memory leak [1]. When function sock_alloc_send_skb() return NULL in nr_output(), the original skb is not freed, which was allocated in nr_sendmsg(). Fix this by freeing it before return. [1] BUG: memor
osv
CVE-2025-68769UNKNOWN≥ 4.7.0, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2026-01-13
CVE-2025-68769 f2fs: fix return value of f2fs_recover_fsync_data() f2fs: fix return value of f2fs_recover_fsync_data() In the Linux kernel, the following vulnerability has been resolved: f2fs: fix return value of f2fs_recover_fsync_data() With below scripts, it will trigger panic in f2fs: mkfs.f2fs -f /dev/vdd mount /dev/vdd /mnt/f2fs touch /mnt/f2fs/foo sync echo 111 >> /mnt/f2fs/foo f2fs_io fsync /mnt/f2fs/foo f2fs_io shutdown 2 /mnt/f2fs umount /mnt/f2fs mount -o ro,norecovery /dev/vdd /m
osv
CVE-2025-71064UNKNOWN≥ 4.16.0, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2026-01-13
CVE-2025-71064 net: hns3: using the num_tqps in the vf driver to apply for resources net: hns3: using the num_tqps in the vf driver to apply for resources In the Linux kernel, the following vulnerability has been resolved: net: hns3: using the num_tqps in the vf driver to apply for resources Currently, hdev->htqp is allocated using hdev->num_tqps, and kinfo->tqp is allocated using kinfo->num_tqps. However, kinfo->num_tqps is set to min(new_tqps, hdev->num_tqps); Therefore, kinfo->num_tqps may
osv
CVE-2025-68785UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68785 CVE-2025-68785: In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix middle attribute validation in push_nsh() action The push_ns In the Linux kernel, the following vulnerability has been resolved: net: openvswitch: fix middle attribute validation in push_nsh() action The push_nsh() action structure looks like this: OVS_ACTION_ATTR_PUSH_NSH(OVS_KEY_ATTR_NSH(OVS_NSH_KEY_ATTR_BASE,...)) The outermost OVS_ACTION_ATTR_PUSH_NSH attribute is OK'ed by
osv
CVE-2025-68771UNKNOWN≥ 2.6.16, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2026-01-13
CVE-2025-68771 ocfs2: fix kernel BUG in ocfs2_find_victim_chain ocfs2: fix kernel BUG in ocfs2_find_victim_chain In the Linux kernel, the following vulnerability has been resolved: ocfs2: fix kernel BUG in ocfs2_find_victim_chain syzbot reported a kernel BUG in ocfs2_find_victim_chain() because the `cl_next_free_rec` field of the allocation chain list (next free slot in the chain list) is 0, triggring the BUG_ON(!cl->cl_next_free_rec) condition in ocfs2_find_victim_chain() and panicking the k
osv
CVE-2025-68795UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68795 CVE-2025-68795: In the Linux kernel, the following vulnerability has been resolved: ethtool: Avoid overflowing userspace buffer on stats query The ethtool -S command In the Linux kernel, the following vulnerability has been resolved: ethtool: Avoid overflowing userspace buffer on stats query The ethtool -S command operates across three ioctl calls: ETHTOOL_GSSET_INFO for the size, ETHTOOL_GSTRINGS for the names, and ETHTOOL_GSTATS for the values. If the number of stats changes bet
osv
CVE-2025-68808UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68808 CVE-2025-68808: In the Linux kernel, the following vulnerability has been resolved: media: vidtv: initialize local pointers upon transfer of memory ownership vidtv_ch In the Linux kernel, the following vulnerability has been resolved: media: vidtv: initialize local pointers upon transfer of memory ownership vidtv_channel_si_init() creates a temporary list (program, service, event) and ownership of the memory itself is transferred to the PAT/SDT/EIT tables through vidtv_psi_pat_pro
osv
CVE-2025-68782UNKNOWN≥ 5.8.0, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2026-01-13
CVE-2025-68782 scsi: target: Reset t_task_cdb pointer in error case scsi: target: Reset t_task_cdb pointer in error case In the Linux kernel, the following vulnerability has been resolved: scsi: target: Reset t_task_cdb pointer in error case If allocation of cmd->t_task_cdb fails, it remains NULL but is later dereferenced in the 'err' path. In case of error, reset NULL t_task_cdb value to point at the default fixed-size buffer. Found by Linux Verification Center (linuxtesting.org) with SVAC
osv
CVE-2025-68776UNKNOWN≥ 3.17.0, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2026-01-13
CVE-2025-68776 net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() In the Linux kernel, the following vulnerability has been resolved: net/hsr: fix NULL pointer dereference in prp_get_untagged_frame() prp_get_untagged_frame() calls __pskb_copy() to create frame->skb_std but doesn't check if the allocation failed. If __pskb_copy() returns NULL, skb_clone() is called with a NULL pointer, causing a crash: Oops: gene
osv
CVE-2025-68811UNKNOWN≥ 0, < 6.12.69-1≥ 0, < 6.18.3-12026-01-13
CVE-2025-68811 CVE-2025-68811: In the Linux kernel, the following vulnerability has been resolved: svcrdma: use rc_pageoff for memcpy byte offset svc_rdma_copy_inline_range added rc In the Linux kernel, the following vulnerability has been resolved: svcrdma: use rc_pageoff for memcpy byte offset svc_rdma_copy_inline_range added rc_curpage (page index) to the page base instead of the byte offset rc_pageoff. Use rc_pageoff so copies land within the current page. Found by ZeroPath (https://zeropath
osv
CVE-2025-68778UNKNOWN≥ 4.8.0, < 6.1.160≥ 6.2.0, < 6.6.120+2 more2026-01-13
CVE-2025-68778 btrfs: don't log conflicting inode if it's a dir moved in the current transaction btrfs: don't log conflicting inode if it's a dir moved in the current transaction In the Linux kernel, the following vulnerability has been resolved: btrfs: don't log conflicting inode if it's a dir moved in the current transaction We can't log a conflicting inode if it's a directory and it was moved from one parent directory to another parent directory in the current transaction, as this can resu
osv
CVE-2025-68793UNKNOWN≥ 6.17.0, < 6.18.32026-01-13
CVE-2025-68793 drm/amdgpu: fix a job->pasid access race in gpu recovery drm/amdgpu: fix a job->pasid access race in gpu recovery In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix a job->pasid access race in gpu recovery Avoid a possible UAF in GPU recovery due to a race between the sched timeout callback and the tdr work queue. The gpu recovery function calls drm_sched_stop() and later drm_sched_start(). drm_sched_start() restarts the tdr queue which will ev
osv
CVE-2025-68813UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68813 CVE-2025-68813: In the Linux kernel, the following vulnerability has been resolved: ipvs: fix ipv4 null-ptr-deref in route error path The IPv4 code path in __ip_vs_ge In the Linux kernel, the following vulnerability has been resolved: ipvs: fix ipv4 null-ptr-deref in route error path The IPv4 code path in __ip_vs_get_out_rt() calls dst_link_failure() without ensuring skb->dev is set, leading to a NULL pointer dereference in fib_compute_spec_dst() when ipv4_link_failure() attempts
osv
CVE-2025-68789UNKNOWN≥ 0, < 6.1.162-1≥ 0, < 6.12.69-1+1 more2026-01-13
CVE-2025-68789 CVE-2025-68789: In the Linux kernel, the following vulnerability has been resolved: hwmon: (ibmpex) fix use-after-free in high/low store The ibmpex_high_low_store() f In the Linux kernel, the following vulnerability has been resolved: hwmon: (ibmpex) fix use-after-free in high/low store The ibmpex_high_low_store() function retrieves driver data using dev_get_drvdata() and uses it without validation. This creates a race condition where the sysfs callback can be invoked after the da
osv
CVE-2025-68768UNKNOWN≥ 5.3.0, < 6.18.32026-01-13
CVE-2025-68768 inet: frags: flush pending skbs in fqdir_pre_exit() inet: frags: flush pending skbs in fqdir_pre_exit() In the Linux kernel, the following vulnerability has been resolved: inet: frags: flush pending skbs in fqdir_pre_exit() We have been seeing occasional deadlocks on pernet_ops_rwsem since September in NIPA. The stuck task was usually modprobe (often loading a driver like ipvlan), trying to take the lock as a Writer. lockdep does not track readers for rwsems so the read wasn't
osv