Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 67 of 724
CVE-2025-68333MEDIUMCVSS 5.5≥ 6.12, < 6.12.68≥ 6.13, < 6.17.12+1 more2025-12-22
CVE-2025-68333 [MEDIUM] CWE-667 CVE-2025-68333: In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix possible deadloc In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix possible deadlock in the deferred_irq_workfn() For PREEMPT_RT=y kernels, the deferred_irq_workfn() is executed in the per-cpu irq_work/* task context and not disable-irq, if the rq returned by container_of() is current CPU's rq, the following scenarios may occur: l
nvdosv
CVE-2025-68329UNKNOWN≥ 6.10.0, < 6.12.61≥ 6.13.0, < 6.17.112025-12-22
CVE-2025-68329 tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs In the Linux kernel, the following vulnerability has been resolved: tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs When a VMA is split (e.g., by partial munmap or MAP_FIXED), the kernel calls vm_ops->close on each portion. For trace buffer mappings, this results in ring_buffer_unmap() being called multiple times while ring_buffer
osv
CVE-2025-68332UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2025-12-22
CVE-2025-68332 CVE-2025-68332: In the Linux kernel, the following vulnerability has been resolved: comedi: c6xdigio: Fix invalid PNP driver unregistration The Comedi low-level drive In the Linux kernel, the following vulnerability has been resolved: comedi: c6xdigio: Fix invalid PNP driver unregistration The Comedi low-level driver "c6xdigio" seems to be for a parallel port connected device. When the Comedi core calls the driver's Comedi "attach" handler `c6xdigio_attach()` to configure a Comedi
osv
CVE-2025-68331UNKNOWN≥ 5.10.0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-22
CVE-2025-68331 usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer In the Linux kernel, the following vulnerability has been resolved: usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer When a UAS device is unplugged during data transfer, there is a probability of a system panic occurring. The root cause is an access to
osv
CVE-2025-68328UNKNOWN≥ 5.4.0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-22
CVE-2025-68328 firmware: stratix10-svc: fix bug in saving controller data firmware: stratix10-svc: fix bug in saving controller data In the Linux kernel, the following vulnerability has been resolved: firmware: stratix10-svc: fix bug in saving controller data Fix the incorrect usage of platform_set_drvdata and dev_set_drvdata. They both are of the same data and overrides each other. This resulted in the rmmod of the svc driver to fail and throw a kernel panic for kthread_stop and fifo free.
osv
CVE-2025-68336UNKNOWN≥ 5.5.0, < 5.10.248≥ 5.11.0, < 5.15.198+5 more2025-12-22
CVE-2025-68336 locking/spinlock/debug: Fix data-race in do_raw_write_lock locking/spinlock/debug: Fix data-race in do_raw_write_lock In the Linux kernel, the following vulnerability has been resolved: locking/spinlock/debug: Fix data-race in do_raw_write_lock KCSAN reports: BUG: KCSAN: data-race in do_raw_write_lock / do_raw_write_lock write (marked) to 0xffff800009cf504c of 4 bytes by task 1102 on cpu 1: do_raw_write_lock+0x120/0x204 _raw_write_lock_irq do_exit call_usermodehelper_exec_asy
osv
CVE-2025-68330UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-22
CVE-2025-68330 CVE-2025-68330: In the Linux kernel, the following vulnerability has been resolved: iio: accel: bmc150: Fix irq assumption regression The code in bmc150-accel-core In the Linux kernel, the following vulnerability has been resolved: iio: accel: bmc150: Fix irq assumption regression The code in bmc150-accel-core.c unconditionally calls bmc150_accel_set_interrupt() in the iio_buffer_setup_ops, such as on the runtime PM resume path giving a kernel splat like this if the device has no
osv
CVE-2025-68335UNKNOWN≥ 0, < 6.1.162-1≥ 0, < 6.12.63-1+1 more2025-12-22
CVE-2025-68335 CVE-2025-68335: In the Linux kernel, the following vulnerability has been resolved: comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() Syzbot identified an issu In the Linux kernel, the following vulnerability has been resolved: comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() Syzbot identified an issue [1] in pcl818_ai_cancel(), which stems from the fact that in case of early device detach via pcl818_detach(), subdevice dev->read_subdev may not have initialized its
osv
CVE-2025-68334UNKNOWN≥ 0, < 6.17.12-12025-12-22
CVE-2025-68334 CVE-2025-68334: In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd/pmc: Add support for Van Gogh SoC The ROG Xbox Ally (non-X) SoC f In the Linux kernel, the following vulnerability has been resolved: platform/x86/amd/pmc: Add support for Van Gogh SoC The ROG Xbox Ally (non-X) SoC features a similar architecture to the Steam Deck. While the Steam Deck supports S3 (s2idle causes a crash), this support was dropped by the Xbox Ally which only S0ix su
osv
CVE-2025-68337UNKNOWN≥ 2.6.19, < 5.10.248≥ 5.11.0, < 5.15.198+5 more2025-12-22
CVE-2025-68337 jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted In the Linux kernel, the following vulnerability has been resolved: jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted There's issue when file system corrupted: ------------[ cut here ]------------ kernel BUG at fs/jbd2/transaction.c:1289! Oops: invalid opcode: 0000 [#1] SMP KASAN PTI C
osv
CVE-2025-68327UNKNOWN≥ 3.0.0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-22
CVE-2025-68327 usb: renesas_usbhs: Fix synchronous external abort on unbind usb: renesas_usbhs: Fix synchronous external abort on unbind In the Linux kernel, the following vulnerability has been resolved: usb: renesas_usbhs: Fix synchronous external abort on unbind A synchronous external abort occurs on the Renesas RZ/G3S SoC if unbind is executed after the configuration sequence described above: modprobe usb_f_ecm modprobe libcomposite modprobe configfs cd /sys/kernel/config/usb_gadget mkdi
osv
CVE-2025-68326UNKNOWN≥ 0, < 6.17.11-12025-12-22
CVE-2025-68326 CVE-2025-68326: In the Linux kernel, the following vulnerability has been resolved: drm/xe/guc: Fix stack_depot usage Add missing stack_depot_init() call when CONFIG_ In the Linux kernel, the following vulnerability has been resolved: drm/xe/guc: Fix stack_depot usage Add missing stack_depot_init() call when CONFIG_DRM_XE_DEBUG_GUC is enabled to fix the following call stack: [] BUG: kernel NULL pointer dereference, address: 0000000000000000 [] Workqueue: drm_sched_run_job_work [gp
osv
CVE-2025-68325UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2025-12-18
CVE-2025-68325 CVE-2025-68325: In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop In cake_drop(), qdi In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop In cake_drop(), qdisc_tree_reduce_backlog() is used to update the qlen and backlog of the qdisc hierarchy. Its caller, cake_enqueue(), assumes that the parent qdisc will enqueue the curre
osv
CVE-2025-68323UNKNOWN≥ 6.16.0, < 6.17.13≥ 6.18.0, < 6.18.22025-12-18
CVE-2025-68323 usb: typec: ucsi: fix use-after-free caused by uec->work usb: typec: ucsi: fix use-after-free caused by uec->work In the Linux kernel, the following vulnerability has been resolved: usb: typec: ucsi: fix use-after-free caused by uec->work The delayed work uec->work is scheduled in gaokun_ucsi_probe() but never properly canceled in gaokun_ucsi_remove(). This creates use-after-free scenarios where the ucsi and gaokun_ucsi structure are freed after ucsi_destroy() completes executi
osv
CVE-2025-68324UNKNOWN≥ 2.6.12, < 6.12.63≥ 6.13.0, < 6.17.13+1 more2025-12-18
CVE-2025-68324 scsi: imm: Fix use-after-free bug caused by unfinished delayed work scsi: imm: Fix use-after-free bug caused by unfinished delayed work In the Linux kernel, the following vulnerability has been resolved: scsi: imm: Fix use-after-free bug caused by unfinished delayed work The delayed work item 'imm_tq' is initialized in imm_attach() and scheduled via imm_queuecommand() for processing SCSI commands. When the IMM parallel port SCSI host adapter is detached through imm_detach(), th
osv
CVE-2025-68263CRITICALCVSS 9.8≥ 5.15.0, < 6.1.160≥ 6.2.0, < 6.6.120+3 more2025-12-16
CVE-2025-68263 [CRITICAL] ksmbd: ipc: fix use-after-free in ipc_msg_send_request ksmbd: ipc: fix use-after-free in ipc_msg_send_request In the Linux kernel, the following vulnerability has been resolved: ksmbd: ipc: fix use-after-free in ipc_msg_send_request ipc_msg_send_request() waits for a generic netlink reply using an ipc_msg_table_entry on the stack. The generic netlink handler (handle_generic_event()/handle_response()) fills entry->response under ipc_msg_table_lock, but ipc_msg_send_re
osv
CVE-2025-68288MEDIUMCVSS 5.3≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-16
CVE-2025-68288 [MEDIUM] CVE-2025-68288: In the Linux kernel, the following vulnerability has been resolved: usb: storage: Fix memory leak in USB bulk transport A kernel memory leak was ident In the Linux kernel, the following vulnerability has been resolved: usb: storage: Fix memory leak in USB bulk transport A kernel memory leak was identified by the 'ioctl_sg01' test from Linux Test Project (LTP). The following bytes were mainly observed: 0x53425355. When USB storage devices incorrectly skip t
osv
CVE-2025-68214MEDIUMCVSS 4.7≥ 6.2, < 6.6.118≥ 6.7, < 6.12.60+3 more2025-12-16
CVE-2025-68214 [MEDIUM] CWE-362 CVE-2025-68214: In the Linux kernel, the following vulnerability has been resolved: timers: Fix NULL function point In the Linux kernel, the following vulnerability has been resolved: timers: Fix NULL function pointer race in timer_shutdown_sync() There is a race condition between timer_shutdown_sync() and timer expiration that can lead to hitting a WARN_ON in expire_timers(). The issue occurs when timer_shutdown_sync() clears the timer function to NULL while
nvdosv
CVE-2025-68211MEDIUMCVSS 5.5≥ 2.6.32, < 5.10.249≥ 5.11, < 5.15.199+5 more2025-12-16
CVE-2025-68211 [MEDIUM] CVE-2025-68211: In the Linux kernel, the following vulnerability has been resolved: ksm: use range-walk function to In the Linux kernel, the following vulnerability has been resolved: ksm: use range-walk function to jump over holes in scan_get_next_rmap_item Currently, scan_get_next_rmap_item() walks every page address in a VMA to locate mergeable pages. This becomes highly inefficient when scanning large virtual memory areas that contain mostly unmapped regions, causi
nvdosv
CVE-2025-68223MEDIUMCVSS 5.5≥ 3.18, < 6.1.162≥ 6.2, < 6.6.123+3 more2025-12-16
CVE-2025-68223 [MEDIUM] CWE-667 CVE-2025-68223: In the Linux kernel, the following vulnerability has been resolved: drm/radeon: delete radeon_fence In the Linux kernel, the following vulnerability has been resolved: drm/radeon: delete radeon_fence_process in is_signaled, no deadlock Delete the attempt to progress the queue when checking if fence is signaled. This avoids deadlock. dma-fence_ops::signaled can be called with the fence lock in unknown state. For radeon, the fence lock is also th
nvdosv