Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 35 of 724
CVE-2025-71069UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-71069 CVE-2025-71069: In the Linux kernel, the following vulnerability has been resolved: f2fs: invalidate dentry cache on failed whiteout creation F2FS can mount filesyste In the Linux kernel, the following vulnerability has been resolved: f2fs: invalidate dentry cache on failed whiteout creation F2FS can mount filesystems with corrupted directory depth values that get runtime-clamped to MAX_DIR_HASH_DEPTH. When RENAME_WHITEOUT operations are performed on such directories, f2fs_rename
osv
CVE-2025-68772UNKNOWN≥ 5.6.0, < 6.1.160≥ 6.2.0, < 6.6.120+2 more2026-01-13
CVE-2025-68772 f2fs: fix to avoid updating compression context during writeback f2fs: fix to avoid updating compression context during writeback In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid updating compression context during writeback Bai, Shuangpeng reported a bug as below: Oops: divide error: 0000 [#1] SMP KASAN PTI CPU: 0 UID: 0 PID: 11441 Comm: syz.0.46 Not tainted 6.17.0 #1 PREEMPT(full) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BI
osv
CVE-2025-68780UNKNOWN≥ 0, < 6.1.162-1≥ 0, < 6.12.69-1+1 more2026-01-13
CVE-2025-68780 CVE-2025-68780: In the Linux kernel, the following vulnerability has been resolved: sched/deadline: only set free_cpus for online runqueues Commit 16b269436b72 ("sche In the Linux kernel, the following vulnerability has been resolved: sched/deadline: only set free_cpus for online runqueues Commit 16b269436b72 ("sched/deadline: Modify cpudl::free_cpus to reflect rd->online") introduced the cpudl_set/clear_freecpu functions to allow the cpu_dl::free_cpus mask to be manipulated by th
osv
CVE-2025-71066UNKNOWN≥ 0, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2026-01-13
CVE-2025-71066 net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change In the Linux kernel, the following vulnerability has been resolved: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change [email protected] says: The vulnerability is a race condition between `ets_qdisc_dequeue` and `ets_qdisc_change`. It leads to UAF on
osv
CVE-2025-68815UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68815 CVE-2025-68815: In the Linux kernel, the following vulnerability has been resolved: net/sched: ets: Remove drr class from the active list if it changes to strict When In the Linux kernel, the following vulnerability has been resolved: net/sched: ets: Remove drr class from the active list if it changes to strict Whenever a user issues an ets qdisc change command, transforming a drr class into a strict one, the ets code isn't checking whether that class was in the active list and re
osv
CVE-2025-68799UNKNOWN≥ 2.6.35, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2026-01-13
CVE-2025-68799 caif: fix integer underflow in cffrml_receive() caif: fix integer underflow in cffrml_receive() In the Linux kernel, the following vulnerability has been resolved: caif: fix integer underflow in cffrml_receive() The cffrml_receive() function extracts a length field from the packet header and, when FCS is disabled, subtracts 2 from this length without validating that len >= 2. If an attacker sends a malicious packet with a length field of 0 or 1 to an interface with FCS disable
osv
CVE-2025-68802UNKNOWN≥ 6.8.0, < 6.12.64≥ 6.13.0, < 6.18.32026-01-13
CVE-2025-68802 drm/xe: Limit num_syncs to prevent oversized allocations drm/xe: Limit num_syncs to prevent oversized allocations In the Linux kernel, the following vulnerability has been resolved: drm/xe: Limit num_syncs to prevent oversized allocations The exec and vm_bind ioctl allow userspace to specify an arbitrary num_syncs value. Without bounds checking, a very large num_syncs can force an excessively large allocation, leading to kernel warnings from the page allocator as below. Introd
osv
CVE-2025-71067UNKNOWN≥ 0, < 6.12.69-1≥ 0, < 6.18.3-12026-01-13
CVE-2025-71067 CVE-2025-71067: In the Linux kernel, the following vulnerability has been resolved: ntfs: set dummy blocksize to read boot_block when mounting When mounting, sb->s_bl In the Linux kernel, the following vulnerability has been resolved: ntfs: set dummy blocksize to read boot_block when mounting When mounting, sb->s_blocksize is used to read the boot_block without being defined or validated. Set a dummy blocksize before attempting to read the boot_block. The issue can be triggered wi
osv
CVE-2025-68794UNKNOWN≥ 0, < 6.12.69-1≥ 0, < 6.18.3-12026-01-13
CVE-2025-68794 CVE-2025-68794: In the Linux kernel, the following vulnerability has been resolved: iomap: adjust read range correctly for non-block-aligned positions iomap_adjust_re In the Linux kernel, the following vulnerability has been resolved: iomap: adjust read range correctly for non-block-aligned positions iomap_adjust_read_range() assumes that the position and length passed in are block-aligned. This is not always the case however, as shown in the syzbot generated case for erofs. This
osv
CVE-2025-68788UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68788 CVE-2025-68788: In the Linux kernel, the following vulnerability has been resolved: fsnotify: do not generate ACCESS/MODIFY events on child for special files inotify/ In the Linux kernel, the following vulnerability has been resolved: fsnotify: do not generate ACCESS/MODIFY events on child for special files inotify/fanotify do not allow users with no read access to a file to subscribe to events (e.g. IN_ACCESS/IN_MODIFY), but they do allow the same user to subscribe for watching e
osv
CVE-2025-68796UNKNOWN≥ 4.7.0, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2026-01-13
CVE-2025-68796 f2fs: fix to avoid updating zero-sized extent in extent cache f2fs: fix to avoid updating zero-sized extent in extent cache In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to avoid updating zero-sized extent in extent cache As syzbot reported: F2FS-fs (loop0): __update_extent_tree_range: extent len is zero, type: 0, extent [0, 0, 0], age [0, 0] ------------[ cut here ]------------ kernel BUG at fs/f2fs/extent_cache.c:678! Oops: invalid opcode: 000
osv
CVE-2025-68774UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68774 CVE-2025-68774: In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix missing hfs_bnode_get() in __hfs_bnode_create When sync() and link() In the Linux kernel, the following vulnerability has been resolved: hfsplus: fix missing hfs_bnode_get() in __hfs_bnode_create When sync() and link() are called concurrently, both threads may enter hfs_bnode_find() without finding the node in the hash table and proceed to create it. Thread A: hfsplus_write_inode() ->
osv
CVE-2025-68814UNKNOWN≥ 0, < 6.1.162-1≥ 0, < 6.12.69-1+1 more2026-01-13
CVE-2025-68814 CVE-2025-68814: In the Linux kernel, the following vulnerability has been resolved: io_uring: fix filename leak in __io_openat_prep() __io_openat_prep() allocates a s In the Linux kernel, the following vulnerability has been resolved: io_uring: fix filename leak in __io_openat_prep() __io_openat_prep() allocates a struct filename using getname(). However, for the condition of the file being installed in the fixed file table as well as having O_CLOEXEC flag set, the function return
osv
CVE-2025-68798UNKNOWN≥ 5.19.0, < 6.1.160≥ 6.2.0, < 6.6.120+2 more2026-01-13
CVE-2025-68798 perf/x86/amd: Check event before enable to avoid GPF perf/x86/amd: Check event before enable to avoid GPF In the Linux kernel, the following vulnerability has been resolved: perf/x86/amd: Check event before enable to avoid GPF On AMD machines cpuc->events[idx] can become NULL in a subtle race condition with NMI->throttle->x86_pmu_stop(). Check event for NULL in amd_pmu_enable_all() before enable to avoid a GPF. This appears to be an AMD only issue. Syzkaller reported a GPF in
osv
CVE-2025-68809UNKNOWN≥ 5.15.0, < 6.6.120≥ 6.7.0, < 6.12.64+1 more2026-01-13
CVE-2025-68809 ksmbd: vfs: fix race on m_flags in vfs_cache ksmbd: vfs: fix race on m_flags in vfs_cache In the Linux kernel, the following vulnerability has been resolved: ksmbd: vfs: fix race on m_flags in vfs_cache ksmbd maintains delete-on-close and pending-delete state in ksmbd_inode->m_flags. In vfs_cache.c this field is accessed under inconsistent locking: some paths read and modify m_flags under ci->m_lock while others do so without taking the lock at all. Examples: - ksmbd_query_in
osv
CVE-2025-68800UNKNOWN≥ 5.7.0, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2026-01-13
CVE-2025-68800 mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats In the Linux kernel, the following vulnerability has been resolved: mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats Cited commit added a dedicated mutex (instead of RTNL) to protect the multicast route list, so that it will not change while the driver periodically traverses it in order to update the kern
osv
CVE-2025-68783UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68783 CVE-2025-68783: In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-mixer: us16x08: validate meter packet indices get_meter_levels_from_urb( In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-mixer: us16x08: validate meter packet indices get_meter_levels_from_urb() parses the 64-byte meter packets sent by the device and fills the per-channel arrays meter_level[], comp_level[] and master_level[] in struct snd_us16x08_meter_store.
osv
CVE-2025-68773UNKNOWN≥ 0, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2026-01-13
CVE-2025-68773 spi: fsl-cpm: Check length parity before switching to 16 bit mode spi: fsl-cpm: Check length parity before switching to 16 bit mode In the Linux kernel, the following vulnerability has been resolved: spi: fsl-cpm: Check length parity before switching to 16 bit mode Commit fc96ec826bce ("spi: fsl-cpm: Use 16 bit mode for large transfers with even size") failed to make sure that the size is really even before switching to 16 bit mode. Until recently the problem went unnoticed bec
osv
CVE-2025-68803UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68803 CVE-2025-68803: In the Linux kernel, the following vulnerability has been resolved: NFSD: NFSv4 file creation neglects setting ACL An NFSv4 client that sets an ACL wi In the Linux kernel, the following vulnerability has been resolved: NFSD: NFSv4 file creation neglects setting ACL An NFSv4 client that sets an ACL with a named principal during file creation retrieves the ACL afterwards, and finds that it is only a default ACL (based on the mode bits) and not the ACL that was reques
osv
CVE-2025-68806UNKNOWN≥ 0, < 6.1.160≥ 6.2.0, < 6.6.120+2 more2026-01-13
CVE-2025-68806 ksmbd: fix buffer validation by including null terminator size in EA length ksmbd: fix buffer validation by including null terminator size in EA length In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix buffer validation by including null terminator size in EA length The smb2_set_ea function, which handles Extended Attributes (EA), was performing buffer validation checks that incorrectly omitted the size of the null terminating character (+1 byte) fo
osv