Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 67 of 724
CVE-2025-68333MEDIUMCVSS 5.5≥ 6.12, < 6.12.68≥ 6.13, < 6.17.12+1 more2025-12-22
CVE-2025-68333 [MEDIUM] CWE-667 CVE-2025-68333: In the Linux kernel, the following vulnerability has been resolved:
sched_ext: Fix possible deadloc
In the Linux kernel, the following vulnerability has been resolved:
sched_ext: Fix possible deadlock in the deferred_irq_workfn()
For PREEMPT_RT=y kernels, the deferred_irq_workfn() is executed in
the per-cpu irq_work/* task context and not disable-irq, if the rq
returned by container_of() is current CPU's rq, the following scenarios
may occur:
l
nvdosv
CVE-2025-68329UNKNOWN≥ 6.10.0, < 6.12.61≥ 6.13.0, < 6.17.112025-12-22
CVE-2025-68329 tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs
tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs
In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs
When a VMA is split (e.g., by partial munmap or MAP_FIXED), the kernel
calls vm_ops->close on each portion. For trace buffer mappings, this
results in ring_buffer_unmap() being called multiple times while
ring_buffer
osv
CVE-2025-68332UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2025-12-22
CVE-2025-68332 CVE-2025-68332: In the Linux kernel, the following vulnerability has been resolved: comedi: c6xdigio: Fix invalid PNP driver unregistration The Comedi low-level drive
In the Linux kernel, the following vulnerability has been resolved: comedi: c6xdigio: Fix invalid PNP driver unregistration The Comedi low-level driver "c6xdigio" seems to be for a parallel port connected device. When the Comedi core calls the driver's Comedi "attach" handler `c6xdigio_attach()` to configure a Comedi
osv
CVE-2025-68331UNKNOWN≥ 5.10.0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-22
CVE-2025-68331 usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer
usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer
In the Linux kernel, the following vulnerability has been resolved:
usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer
When a UAS device is unplugged during data transfer, there is
a probability of a system panic occurring. The root cause is
an access to
osv
CVE-2025-68328UNKNOWN≥ 5.4.0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-22
CVE-2025-68328 firmware: stratix10-svc: fix bug in saving controller data
firmware: stratix10-svc: fix bug in saving controller data
In the Linux kernel, the following vulnerability has been resolved:
firmware: stratix10-svc: fix bug in saving controller data
Fix the incorrect usage of platform_set_drvdata and dev_set_drvdata. They
both are of the same data and overrides each other. This resulted in the
rmmod of the svc driver to fail and throw a kernel panic for kthread_stop
and fifo free.
osv
CVE-2025-68336UNKNOWN≥ 5.5.0, < 5.10.248≥ 5.11.0, < 5.15.198+5 more2025-12-22
CVE-2025-68336 locking/spinlock/debug: Fix data-race in do_raw_write_lock
locking/spinlock/debug: Fix data-race in do_raw_write_lock
In the Linux kernel, the following vulnerability has been resolved:
locking/spinlock/debug: Fix data-race in do_raw_write_lock
KCSAN reports:
BUG: KCSAN: data-race in do_raw_write_lock / do_raw_write_lock
write (marked) to 0xffff800009cf504c of 4 bytes by task 1102 on cpu 1:
do_raw_write_lock+0x120/0x204
_raw_write_lock_irq
do_exit
call_usermodehelper_exec_asy
osv
CVE-2025-68330UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-22
CVE-2025-68330 CVE-2025-68330: In the Linux kernel, the following vulnerability has been resolved: iio: accel: bmc150: Fix irq assumption regression The code in bmc150-accel-core
In the Linux kernel, the following vulnerability has been resolved: iio: accel: bmc150: Fix irq assumption regression The code in bmc150-accel-core.c unconditionally calls bmc150_accel_set_interrupt() in the iio_buffer_setup_ops, such as on the runtime PM resume path giving a kernel splat like this if the device has no
osv
CVE-2025-68335UNKNOWN≥ 0, < 6.1.162-1≥ 0, < 6.12.63-1+1 more2025-12-22
CVE-2025-68335 CVE-2025-68335: In the Linux kernel, the following vulnerability has been resolved: comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() Syzbot identified an issu
In the Linux kernel, the following vulnerability has been resolved: comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() Syzbot identified an issue [1] in pcl818_ai_cancel(), which stems from the fact that in case of early device detach via pcl818_detach(), subdevice dev->read_subdev may not have initialized its
osv
CVE-2025-68334UNKNOWN≥ 0, < 6.17.12-12025-12-22
CVE-2025-68334 CVE-2025-68334: In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd/pmc: Add support for Van Gogh SoC The ROG Xbox Ally (non-X) SoC f
In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd/pmc: Add support for Van Gogh SoC The ROG Xbox Ally (non-X) SoC features a similar architecture to the Steam Deck. While the Steam Deck supports S3 (s2idle causes a crash), this support was dropped by the Xbox Ally which only S0ix su
osv
CVE-2025-68337UNKNOWN≥ 2.6.19, < 5.10.248≥ 5.11.0, < 5.15.198+5 more2025-12-22
CVE-2025-68337 jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted
jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted
In the Linux kernel, the following vulnerability has been resolved:
jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted
There's issue when file system corrupted:
------------[ cut here ]------------
kernel BUG at fs/jbd2/transaction.c:1289!
Oops: invalid opcode: 0000 [#1] SMP KASAN PTI
C
osv
CVE-2025-68327UNKNOWN≥ 3.0.0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-22
CVE-2025-68327 usb: renesas_usbhs: Fix synchronous external abort on unbind
usb: renesas_usbhs: Fix synchronous external abort on unbind
In the Linux kernel, the following vulnerability has been resolved:
usb: renesas_usbhs: Fix synchronous external abort on unbind
A synchronous external abort occurs on the Renesas RZ/G3S SoC if unbind is
executed after the configuration sequence described above:
modprobe usb_f_ecm
modprobe libcomposite
modprobe configfs
cd /sys/kernel/config/usb_gadget
mkdi
osv
CVE-2025-68326UNKNOWN≥ 0, < 6.17.11-12025-12-22
CVE-2025-68326 CVE-2025-68326: In the Linux kernel, the following vulnerability has been resolved: drm/xe/guc: Fix stack_depot usage Add missing stack_depot_init() call when CONFIG_
In the Linux kernel, the following vulnerability has been resolved: drm/xe/guc: Fix stack_depot usage Add missing stack_depot_init() call when CONFIG_DRM_XE_DEBUG_GUC is enabled to fix the following call stack: [] BUG: kernel NULL pointer dereference, address: 0000000000000000 [] Workqueue: drm_sched_run_job_work [gp
osv
CVE-2025-68325UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2025-12-18
CVE-2025-68325 CVE-2025-68325: In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop In cake_drop(), qdi
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop In cake_drop(), qdisc_tree_reduce_backlog() is used to update the qlen and backlog of the qdisc hierarchy. Its caller, cake_enqueue(), assumes that the parent qdisc will enqueue the curre
osv
CVE-2025-68323UNKNOWN≥ 6.16.0, < 6.17.13≥ 6.18.0, < 6.18.22025-12-18
CVE-2025-68323 usb: typec: ucsi: fix use-after-free caused by uec->work
usb: typec: ucsi: fix use-after-free caused by uec->work
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: ucsi: fix use-after-free caused by uec->work
The delayed work uec->work is scheduled in gaokun_ucsi_probe()
but never properly canceled in gaokun_ucsi_remove(). This creates
use-after-free scenarios where the ucsi and gaokun_ucsi structure
are freed after ucsi_destroy() completes executi
osv
CVE-2025-68324UNKNOWN≥ 2.6.12, < 6.12.63≥ 6.13.0, < 6.17.13+1 more2025-12-18
CVE-2025-68324 scsi: imm: Fix use-after-free bug caused by unfinished delayed work
scsi: imm: Fix use-after-free bug caused by unfinished delayed work
In the Linux kernel, the following vulnerability has been resolved:
scsi: imm: Fix use-after-free bug caused by unfinished delayed work
The delayed work item 'imm_tq' is initialized in imm_attach() and
scheduled via imm_queuecommand() for processing SCSI commands. When the
IMM parallel port SCSI host adapter is detached through imm_detach(),
th
osv
CVE-2025-68263CRITICALCVSS 9.8≥ 5.15.0, < 6.1.160≥ 6.2.0, < 6.6.120+3 more2025-12-16
CVE-2025-68263 [CRITICAL] ksmbd: ipc: fix use-after-free in ipc_msg_send_request
ksmbd: ipc: fix use-after-free in ipc_msg_send_request
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: ipc: fix use-after-free in ipc_msg_send_request
ipc_msg_send_request() waits for a generic netlink reply using an
ipc_msg_table_entry on the stack. The generic netlink handler
(handle_generic_event()/handle_response()) fills entry->response under
ipc_msg_table_lock, but ipc_msg_send_re
osv
CVE-2025-68288MEDIUMCVSS 5.3≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-16
CVE-2025-68288 [MEDIUM] CVE-2025-68288: In the Linux kernel, the following vulnerability has been resolved: usb: storage: Fix memory leak in USB bulk transport A kernel memory leak was ident
In the Linux kernel, the following vulnerability has been resolved: usb: storage: Fix memory leak in USB bulk transport A kernel memory leak was identified by the 'ioctl_sg01' test from Linux Test Project (LTP). The following bytes were mainly observed: 0x53425355. When USB storage devices incorrectly skip t
osv
CVE-2025-68214MEDIUMCVSS 4.7≥ 6.2, < 6.6.118≥ 6.7, < 6.12.60+3 more2025-12-16
CVE-2025-68214 [MEDIUM] CWE-362 CVE-2025-68214: In the Linux kernel, the following vulnerability has been resolved:
timers: Fix NULL function point
In the Linux kernel, the following vulnerability has been resolved:
timers: Fix NULL function pointer race in timer_shutdown_sync()
There is a race condition between timer_shutdown_sync() and timer
expiration that can lead to hitting a WARN_ON in expire_timers().
The issue occurs when timer_shutdown_sync() clears the timer function
to NULL while
nvdosv
CVE-2025-68211MEDIUMCVSS 5.5≥ 2.6.32, < 5.10.249≥ 5.11, < 5.15.199+5 more2025-12-16
CVE-2025-68211 [MEDIUM] CVE-2025-68211: In the Linux kernel, the following vulnerability has been resolved:
ksm: use range-walk function to
In the Linux kernel, the following vulnerability has been resolved:
ksm: use range-walk function to jump over holes in scan_get_next_rmap_item
Currently, scan_get_next_rmap_item() walks every page address in a VMA to
locate mergeable pages. This becomes highly inefficient when scanning
large virtual memory areas that contain mostly unmapped regions, causi
nvdosv
CVE-2025-68223MEDIUMCVSS 5.5≥ 3.18, < 6.1.162≥ 6.2, < 6.6.123+3 more2025-12-16
CVE-2025-68223 [MEDIUM] CWE-667 CVE-2025-68223: In the Linux kernel, the following vulnerability has been resolved:
drm/radeon: delete radeon_fence
In the Linux kernel, the following vulnerability has been resolved:
drm/radeon: delete radeon_fence_process in is_signaled, no deadlock
Delete the attempt to progress the queue when checking if fence is
signaled. This avoids deadlock.
dma-fence_ops::signaled can be called with the fence lock in unknown
state. For radeon, the fence lock is also th
nvdosv