Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 37 of 724
CVE-2025-68819UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68819 CVE-2025-68819: In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg() rlen value is a us
In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg() rlen value is a user-controlled value, but dtv5100_i2c_msg() does not check the size of the rlen value. Therefore, if it is set to a value larger than sizeof(st->data), an out-of-bounds
osv
CVE-2025-71070UNKNOWN≥ 6.15.0, < 6.18.32026-01-13
CVE-2025-71070 ublk: clean up user copy references on ublk server exit
ublk: clean up user copy references on ublk server exit
In the Linux kernel, the following vulnerability has been resolved:
ublk: clean up user copy references on ublk server exit
If a ublk server process releases a ublk char device file, any requests
dispatched to the ublk server but not yet completed will retain a ref
value of UBLK_REFCOUNT_INIT. Before commit e63d2228ef83 ("ublk: simplify
aborting ublk request"), __ublk
osv
CVE-2025-68816UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68816 CVE-2025-68816: In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fw_tracer, Validate format string parameters Add validation for format s
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fw_tracer, Validate format string parameters Add validation for format string parameters in the firmware tracer to prevent potential security vulnerabilities and crashes from malformed format strings received from firmware. The firmware tra
osv
CVE-2025-68790UNKNOWN≥ 6.18.0, < 6.18.32026-01-13
CVE-2025-68790 net/mlx5: Fix double unregister of HCA_PORTS component
net/mlx5: Fix double unregister of HCA_PORTS component
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Fix double unregister of HCA_PORTS component
Clear hca_devcom_comp in device's private data after unregistering it in
LAG teardown. Otherwise a slightly lagging second pass through
mlx5_unload_one() might try to unregister it again and trip over
use-after-free.
On s390 almost all PCI level re
osv
CVE-2025-68805UNKNOWN≥ 0, < 6.18.3-12026-01-13
CVE-2025-68805 CVE-2025-68805: In the Linux kernel, the following vulnerability has been resolved: fuse: fix io-uring list corruption for terminated non-committed requests When a re
In the Linux kernel, the following vulnerability has been resolved: fuse: fix io-uring list corruption for terminated non-committed requests When a request is terminated before it has been committed, the request is not removed from the queue's list. This leaves a dangling list entry that leads to list corruption and
osv
CVE-2025-68767UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68767 CVE-2025-68767: In the Linux kernel, the following vulnerability has been resolved: hfsplus: Verify inode mode when loading from disk syzbot is reporting that S_IFMT
In the Linux kernel, the following vulnerability has been resolved: hfsplus: Verify inode mode when loading from disk syzbot is reporting that S_IFMT bits of inode->i_mode can become bogus when the S_IFMT bits of the 16bits "mode" field loaded from disk are corrupted. According to [1], the permissions field was treate
osv
CVE-2025-68758UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-05
CVE-2025-68758 CVE-2025-68758: In the Linux kernel, the following vulnerability has been resolved: backlight: led-bl: Add devlink to supplier LEDs LED Backlight is a consumer of one
In the Linux kernel, the following vulnerability has been resolved: backlight: led-bl: Add devlink to supplier LEDs LED Backlight is a consumer of one or multiple LED class devices, but devlink is currently unable to create correct supplier-producer links when the supplier is a class device. It creates instead a link
osv
CVE-2025-68765UNKNOWN≥ 5.7.0, < 5.15.198≥ 5.16.0, < 6.1.160+4 more2026-01-05
CVE-2025-68765 mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()
mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()
In the Linux kernel, the following vulnerability has been resolved:
mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()
In mt7615_mcu_wtbl_sta_add(), an skb sskb is allocated. If the
subsequent call to mt76_connac_mcu_alloc_wtbl_req() fails, the function
returns an error without freeing sskb, leading to a memory leak.
Fix this by calling dev_kfree_skb()
osv
CVE-2025-68751UNKNOWN≥ 0, < 6.17.13-12026-01-05
CVE-2025-68751 CVE-2025-68751: In the Linux kernel, the following vulnerability has been resolved: s390/fpu: Fix false-positive kmsan report in fpu_vstl() A false-positive kmsan rep
In the Linux kernel, the following vulnerability has been resolved: s390/fpu: Fix false-positive kmsan report in fpu_vstl() A false-positive kmsan report is detected when running ping command. An inline assembly instruction 'vstl' can write varied amount of bytes depending on value of 'index' argument. If 'index' > 0
osv
CVE-2025-68756UNKNOWN≥ 6.2.0, < 6.6.120≥ 6.7.0, < 6.12.63+2 more2026-01-05
CVE-2025-68756 block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock
block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock
In the Linux kernel, the following vulnerability has been resolved:
block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock
blk_mq_{add,del}_queue_tag_set() functions add and remove queues from
tagset, the functions make sure that tagset and queues are marked as
shared when two or more queues are attached to
osv
CVE-2025-68752UNKNOWN≥ 6.15.0, < 6.17.13≥ 6.18.0, < 6.18.22026-01-05
CVE-2025-68752 iavf: Implement settime64 with -EOPNOTSUPP
iavf: Implement settime64 with -EOPNOTSUPP
In the Linux kernel, the following vulnerability has been resolved:
iavf: Implement settime64 with -EOPNOTSUPP
ptp_clock_settime() assumes every ptp_clock has implemented settime64().
Stub it with -EOPNOTSUPP to prevent a NULL dereference.
The fix is similar to commit 329d050bbe63 ("gve: Implement settime64
with -EOPNOTSUPP").
osv
CVE-2025-68754UNKNOWN≥ 6.13.0, < 6.17.13≥ 6.18.0, < 6.18.22026-01-05
CVE-2025-68754 rtc: amlogic-a4: fix double free caused by devm
rtc: amlogic-a4: fix double free caused by devm
In the Linux kernel, the following vulnerability has been resolved:
rtc: amlogic-a4: fix double free caused by devm
The clock obtained via devm_clk_get_enabled() is automatically managed
by devres and will be disabled and freed on driver detach. Manually
calling clk_disable_unprepare() in error path and remove function
causes double free.
Remove the redundant clk_disable_unprepare()
osv
CVE-2025-68759UNKNOWN≥ 2.6.25, < 5.10.248≥ 5.11.0, < 5.15.198+5 more2026-01-05
CVE-2025-68759 wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()
wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()
In the Linux kernel, the following vulnerability has been resolved:
wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()
In rtl8180_init_rx_ring(), memory is allocated for skb packets and DMA
allocations in a loop. When an allocation fails, the previously
successful allocations are not freed on exit.
Fix that by jumping to err_f
osv
CVE-2025-68761UNKNOWN≥ 6.18.0, < 6.18.22026-01-05
CVE-2025-68761 hfs: fix potential use after free in hfs_correct_next_unused_CNID()
hfs: fix potential use after free in hfs_correct_next_unused_CNID()
In the Linux kernel, the following vulnerability has been resolved:
hfs: fix potential use after free in hfs_correct_next_unused_CNID()
This code calls hfs_bnode_put(node) which drops the refcount and then
dreferences "node" on the next line. It's only safe to use "node"
when we're holding a reference so flip these two lines around.
osv
CVE-2025-68760UNKNOWN≥ 0, < 6.17.13-12026-01-05
CVE-2025-68760 CVE-2025-68760: In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix potential out-of-bounds read in iommu_mmio_show In iommu_mmio_write
In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix potential out-of-bounds read in iommu_mmio_show In iommu_mmio_write(), it validates the user-provided offset with the check: `iommu->dbg_mmio_offset > iommu->mmio_phys_end - 4`. This assumes a 4-byte access. However, the corresponding
osv
CVE-2025-68764UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-05
CVE-2025-68764 CVE-2025-68764: In the Linux kernel, the following vulnerability has been resolved: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags When a file
In the Linux kernel, the following vulnerability has been resolved: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags When a filesystem is being automounted, it needs to preserve the user-set superblock mount options, such as the "ro" flag.
osv
CVE-2025-68755UNKNOWN≥ 5.6.0, < 6.6.120≥ 6.7.0, < 6.17.13+1 more2026-01-05
CVE-2025-68755 staging: most: remove broken i2c driver
staging: most: remove broken i2c driver
In the Linux kernel, the following vulnerability has been resolved:
staging: most: remove broken i2c driver
The MOST I2C driver has been completely broken for five years without
anyone noticing so remove the driver from staging.
Specifically, commit 723de0f9171e ("staging: most: remove device from
interface structure") started requiring drivers to set the interface
device pointer before registratio
osv
CVE-2025-68762UNKNOWN≥ 0, < 6.17.13-12026-01-05
CVE-2025-68762 CVE-2025-68762: In the Linux kernel, the following vulnerability has been resolved: net: netpoll: initialize work queue before error checks Prevent a kernel warning w
In the Linux kernel, the following vulnerability has been resolved: net: netpoll: initialize work queue before error checks Prevent a kernel warning when netconsole setup fails on devices with IFF_DISABLE_NETPOLL flag. The warning (at kernel/workqueue.c:4242 in __flush_work) occurs because the cleanup path tries to c
osv
CVE-2025-68757UNKNOWN≥ 4.8.0, < 5.10.248≥ 5.11.0, < 5.15.198+5 more2026-01-05
CVE-2025-68757 drm/vgem-fence: Fix potential deadlock on release
drm/vgem-fence: Fix potential deadlock on release
In the Linux kernel, the following vulnerability has been resolved:
drm/vgem-fence: Fix potential deadlock on release
A timer that expires a vgem fence automatically in 10 seconds is now
released with timer_delete_sync() from fence->ops.release() called on last
dma_fence_put(). In some scenarios, it can run in IRQ context, which is
not safe unless TIMER_IRQSAFE is used. One poten
osv
CVE-2025-68753UNKNOWN≥ 5.16.0, < 6.1.160≥ 6.2.0, < 6.6.120+3 more2026-01-05
CVE-2025-68753 ALSA: firewire-motu: add bounds check in put_user loop for DSP events
ALSA: firewire-motu: add bounds check in put_user loop for DSP events
In the Linux kernel, the following vulnerability has been resolved:
ALSA: firewire-motu: add bounds check in put_user loop for DSP events
In the DSP event handling code, a put_user() loop copies event data.
When the user buffer size is not aligned to 4 bytes, it could overwrite
beyond the buffer boundary.
Fix by adding a bounds check befor
osv