Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 37 of 724
CVE-2025-68819UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68819 CVE-2025-68819: In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg() rlen value is a us In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg() rlen value is a user-controlled value, but dtv5100_i2c_msg() does not check the size of the rlen value. Therefore, if it is set to a value larger than sizeof(st->data), an out-of-bounds
osv
CVE-2025-71070UNKNOWN≥ 6.15.0, < 6.18.32026-01-13
CVE-2025-71070 ublk: clean up user copy references on ublk server exit ublk: clean up user copy references on ublk server exit In the Linux kernel, the following vulnerability has been resolved: ublk: clean up user copy references on ublk server exit If a ublk server process releases a ublk char device file, any requests dispatched to the ublk server but not yet completed will retain a ref value of UBLK_REFCOUNT_INIT. Before commit e63d2228ef83 ("ublk: simplify aborting ublk request"), __ublk
osv
CVE-2025-68816UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68816 CVE-2025-68816: In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fw_tracer, Validate format string parameters Add validation for format s In the Linux kernel, the following vulnerability has been resolved: net/mlx5: fw_tracer, Validate format string parameters Add validation for format string parameters in the firmware tracer to prevent potential security vulnerabilities and crashes from malformed format strings received from firmware. The firmware tra
osv
CVE-2025-68790UNKNOWN≥ 6.18.0, < 6.18.32026-01-13
CVE-2025-68790 net/mlx5: Fix double unregister of HCA_PORTS component net/mlx5: Fix double unregister of HCA_PORTS component In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix double unregister of HCA_PORTS component Clear hca_devcom_comp in device's private data after unregistering it in LAG teardown. Otherwise a slightly lagging second pass through mlx5_unload_one() might try to unregister it again and trip over use-after-free. On s390 almost all PCI level re
osv
CVE-2025-68805UNKNOWN≥ 0, < 6.18.3-12026-01-13
CVE-2025-68805 CVE-2025-68805: In the Linux kernel, the following vulnerability has been resolved: fuse: fix io-uring list corruption for terminated non-committed requests When a re In the Linux kernel, the following vulnerability has been resolved: fuse: fix io-uring list corruption for terminated non-committed requests When a request is terminated before it has been committed, the request is not removed from the queue's list. This leaves a dangling list entry that leads to list corruption and
osv
CVE-2025-68767UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-13
CVE-2025-68767 CVE-2025-68767: In the Linux kernel, the following vulnerability has been resolved: hfsplus: Verify inode mode when loading from disk syzbot is reporting that S_IFMT In the Linux kernel, the following vulnerability has been resolved: hfsplus: Verify inode mode when loading from disk syzbot is reporting that S_IFMT bits of inode->i_mode can become bogus when the S_IFMT bits of the 16bits "mode" field loaded from disk are corrupted. According to [1], the permissions field was treate
osv
CVE-2025-68758UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-05
CVE-2025-68758 CVE-2025-68758: In the Linux kernel, the following vulnerability has been resolved: backlight: led-bl: Add devlink to supplier LEDs LED Backlight is a consumer of one In the Linux kernel, the following vulnerability has been resolved: backlight: led-bl: Add devlink to supplier LEDs LED Backlight is a consumer of one or multiple LED class devices, but devlink is currently unable to create correct supplier-producer links when the supplier is a class device. It creates instead a link
osv
CVE-2025-68765UNKNOWN≥ 5.7.0, < 5.15.198≥ 5.16.0, < 6.1.160+4 more2026-01-05
CVE-2025-68765 mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() In the Linux kernel, the following vulnerability has been resolved: mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() In mt7615_mcu_wtbl_sta_add(), an skb sskb is allocated. If the subsequent call to mt76_connac_mcu_alloc_wtbl_req() fails, the function returns an error without freeing sskb, leading to a memory leak. Fix this by calling dev_kfree_skb()
osv
CVE-2025-68751UNKNOWN≥ 0, < 6.17.13-12026-01-05
CVE-2025-68751 CVE-2025-68751: In the Linux kernel, the following vulnerability has been resolved: s390/fpu: Fix false-positive kmsan report in fpu_vstl() A false-positive kmsan rep In the Linux kernel, the following vulnerability has been resolved: s390/fpu: Fix false-positive kmsan report in fpu_vstl() A false-positive kmsan report is detected when running ping command. An inline assembly instruction 'vstl' can write varied amount of bytes depending on value of 'index' argument. If 'index' > 0
osv
CVE-2025-68756UNKNOWN≥ 6.2.0, < 6.6.120≥ 6.7.0, < 6.12.63+2 more2026-01-05
CVE-2025-68756 block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock In the Linux kernel, the following vulnerability has been resolved: block: Use RCU in blk_mq_[un]quiesce_tagset() instead of set->tag_list_lock blk_mq_{add,del}_queue_tag_set() functions add and remove queues from tagset, the functions make sure that tagset and queues are marked as shared when two or more queues are attached to
osv
CVE-2025-68752UNKNOWN≥ 6.15.0, < 6.17.13≥ 6.18.0, < 6.18.22026-01-05
CVE-2025-68752 iavf: Implement settime64 with -EOPNOTSUPP iavf: Implement settime64 with -EOPNOTSUPP In the Linux kernel, the following vulnerability has been resolved: iavf: Implement settime64 with -EOPNOTSUPP ptp_clock_settime() assumes every ptp_clock has implemented settime64(). Stub it with -EOPNOTSUPP to prevent a NULL dereference. The fix is similar to commit 329d050bbe63 ("gve: Implement settime64 with -EOPNOTSUPP").
osv
CVE-2025-68754UNKNOWN≥ 6.13.0, < 6.17.13≥ 6.18.0, < 6.18.22026-01-05
CVE-2025-68754 rtc: amlogic-a4: fix double free caused by devm rtc: amlogic-a4: fix double free caused by devm In the Linux kernel, the following vulnerability has been resolved: rtc: amlogic-a4: fix double free caused by devm The clock obtained via devm_clk_get_enabled() is automatically managed by devres and will be disabled and freed on driver detach. Manually calling clk_disable_unprepare() in error path and remove function causes double free. Remove the redundant clk_disable_unprepare()
osv
CVE-2025-68759UNKNOWN≥ 2.6.25, < 5.10.248≥ 5.11.0, < 5.15.198+5 more2026-01-05
CVE-2025-68759 wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() In the Linux kernel, the following vulnerability has been resolved: wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() In rtl8180_init_rx_ring(), memory is allocated for skb packets and DMA allocations in a loop. When an allocation fails, the previously successful allocations are not freed on exit. Fix that by jumping to err_f
osv
CVE-2025-68761UNKNOWN≥ 6.18.0, < 6.18.22026-01-05
CVE-2025-68761 hfs: fix potential use after free in hfs_correct_next_unused_CNID() hfs: fix potential use after free in hfs_correct_next_unused_CNID() In the Linux kernel, the following vulnerability has been resolved: hfs: fix potential use after free in hfs_correct_next_unused_CNID() This code calls hfs_bnode_put(node) which drops the refcount and then dreferences "node" on the next line. It's only safe to use "node" when we're holding a reference so flip these two lines around.
osv
CVE-2025-68760UNKNOWN≥ 0, < 6.17.13-12026-01-05
CVE-2025-68760 CVE-2025-68760: In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix potential out-of-bounds read in iommu_mmio_show In iommu_mmio_write In the Linux kernel, the following vulnerability has been resolved: iommu/amd: Fix potential out-of-bounds read in iommu_mmio_show In iommu_mmio_write(), it validates the user-provided offset with the check: `iommu->dbg_mmio_offset > iommu->mmio_phys_end - 4`. This assumes a 4-byte access. However, the corresponding
osv
CVE-2025-68764UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2026-01-05
CVE-2025-68764 CVE-2025-68764: In the Linux kernel, the following vulnerability has been resolved: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags When a file In the Linux kernel, the following vulnerability has been resolved: NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags When a filesystem is being automounted, it needs to preserve the user-set superblock mount options, such as the "ro" flag.
osv
CVE-2025-68755UNKNOWN≥ 5.6.0, < 6.6.120≥ 6.7.0, < 6.17.13+1 more2026-01-05
CVE-2025-68755 staging: most: remove broken i2c driver staging: most: remove broken i2c driver In the Linux kernel, the following vulnerability has been resolved: staging: most: remove broken i2c driver The MOST I2C driver has been completely broken for five years without anyone noticing so remove the driver from staging. Specifically, commit 723de0f9171e ("staging: most: remove device from interface structure") started requiring drivers to set the interface device pointer before registratio
osv
CVE-2025-68762UNKNOWN≥ 0, < 6.17.13-12026-01-05
CVE-2025-68762 CVE-2025-68762: In the Linux kernel, the following vulnerability has been resolved: net: netpoll: initialize work queue before error checks Prevent a kernel warning w In the Linux kernel, the following vulnerability has been resolved: net: netpoll: initialize work queue before error checks Prevent a kernel warning when netconsole setup fails on devices with IFF_DISABLE_NETPOLL flag. The warning (at kernel/workqueue.c:4242 in __flush_work) occurs because the cleanup path tries to c
osv
CVE-2025-68757UNKNOWN≥ 4.8.0, < 5.10.248≥ 5.11.0, < 5.15.198+5 more2026-01-05
CVE-2025-68757 drm/vgem-fence: Fix potential deadlock on release drm/vgem-fence: Fix potential deadlock on release In the Linux kernel, the following vulnerability has been resolved: drm/vgem-fence: Fix potential deadlock on release A timer that expires a vgem fence automatically in 10 seconds is now released with timer_delete_sync() from fence->ops.release() called on last dma_fence_put(). In some scenarios, it can run in IRQ context, which is not safe unless TIMER_IRQSAFE is used. One poten
osv
CVE-2025-68753UNKNOWN≥ 5.16.0, < 6.1.160≥ 6.2.0, < 6.6.120+3 more2026-01-05
CVE-2025-68753 ALSA: firewire-motu: add bounds check in put_user loop for DSP events ALSA: firewire-motu: add bounds check in put_user loop for DSP events In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-motu: add bounds check in put_user loop for DSP events In the DSP event handling code, a put_user() loop copies event data. When the user buffer size is not aligned to 4 bytes, it could overwrite beyond the buffer boundary. Fix by adding a bounds check befor
osv