Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 69 of 724
CVE-2025-68238UNKNOWN≥ 0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-16
CVE-2025-68238 mtd: rawnand: cadence: fix DMA device NULL pointer dereference mtd: rawnand: cadence: fix DMA device NULL pointer dereference In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: cadence: fix DMA device NULL pointer dereference The DMA device pointer `dma_dev` was being dereferenced before ensuring that `cdns_ctrl->dmac` is properly initialized. Move the assignment of `dma_dev` after successfully acquiring the DMA channel to ensure the pointer is v
osv
CVE-2025-68174UNKNOWN≥ 0, < 6.17.8-12025-12-16
CVE-2025-68174 CVE-2025-68174: In the Linux kernel, the following vulnerability has been resolved: amd/amdkfd: enhance kfd process check in switch partition current switch partition In the Linux kernel, the following vulnerability has been resolved: amd/amdkfd: enhance kfd process check in switch partition current switch partition only check if kfd_processes_table is empty. kfd_prcesses_table entry is deleted in kfd_process_notifier_release, but kfd_process tear down is in kfd_process_wq_release
osv
CVE-2025-68204UNKNOWN≥ 4.17.0, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-16
CVE-2025-68204 pmdomain: arm: scmi: Fix genpd leak on provider registration failure pmdomain: arm: scmi: Fix genpd leak on provider registration failure In the Linux kernel, the following vulnerability has been resolved: pmdomain: arm: scmi: Fix genpd leak on provider registration failure If of_genpd_add_provider_onecell() fails during probe, the previously created generic power domains are not removed, leading to a memory leak and potential kernel crash later in genpd_debug_add(). Add prope
osv
CVE-2025-68219UNKNOWN≥ 5.11.0, < 6.6.118≥ 6.7.0, < 6.12.60+1 more2025-12-16
CVE-2025-68219 cifs: fix memory leak in smb3_fs_context_parse_param error path cifs: fix memory leak in smb3_fs_context_parse_param error path In the Linux kernel, the following vulnerability has been resolved: cifs: fix memory leak in smb3_fs_context_parse_param error path Add proper cleanup of ctx->source and fc->source to the cifs_parse_mount_err error handler. This ensures that memory allocated for the source strings is correctly freed on all error paths, matching the cleanup already perf
osv
CVE-2025-68291UNKNOWN≥ 6.1.159, < 6.1.160≥ 6.6.119, < 6.6.120+2 more2025-12-16
CVE-2025-68291 mptcp: Initialise rcv_mss before calling tcp_send_active_reset() in mptcp_do_fastclose(). mptcp: Initialise rcv_mss before calling tcp_send_active_reset() in mptcp_do_fastclose(). In the Linux kernel, the following vulnerability has been resolved: mptcp: Initialise rcv_mss before calling tcp_send_active_reset() in mptcp_do_fastclose(). syzbot reported divide-by-zero in __tcp_select_window() by MPTCP socket. [0] We had a similar issue for the bare TCP and fixed in commit 499350
osv
CVE-2025-68312UNKNOWN≥ 0, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-16
CVE-2025-68312 usbnet: Prevents free active kevent usbnet: Prevents free active kevent In the Linux kernel, the following vulnerability has been resolved: usbnet: Prevents free active kevent The root cause of this issue are: 1. When probing the usbnet device, executing usbnet_link_change(dev, 0, 0); put the kevent work in global workqueue. However, the kevent has not yet been scheduled when the usbnet device is unregistered. Therefore, executing free_netdev() results in the "free active objec
osv
CVE-2025-40354UNKNOWN≥ 0, < 6.12.57-1≥ 0, < 6.17.6-12025-12-16
CVE-2025-40354 CVE-2025-40354: In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: increase max link count and fix link->enc NULL pointer access [wh In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: increase max link count and fix link->enc NULL pointer access [why] 1.) dc->links[MAX_LINKS] array size smaller than actual requested. max_connector + max_dpia + 4 virtual = 14. increase from 12 to 14. 2.) hw_init() access null LINK_
osv
CVE-2025-68317UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-16
CVE-2025-68317 CVE-2025-68317: In the Linux kernel, the following vulnerability has been resolved: io_uring/zctx: check chained notif contexts Send zc only links ubuf_info for reque In the Linux kernel, the following vulnerability has been resolved: io_uring/zctx: check chained notif contexts Send zc only links ubuf_info for requests coming from the same context. There are some ambiguous syz reports, so let's check the assumption on notification completion.
osv
CVE-2025-68283UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-16
CVE-2025-68283 CVE-2025-68283: In the Linux kernel, the following vulnerability has been resolved: libceph: replace BUG_ON with bounds check for map->max_osd OSD indexes come from u In the Linux kernel, the following vulnerability has been resolved: libceph: replace BUG_ON with bounds check for map->max_osd OSD indexes come from untrusted network packets. Boundary checks are added to validate these against map->max_osd. [ idryomov: drop BUG_ON in ceph_get_primary_affinity(), minor cosmetic edits
osv
CVE-2025-68285UNKNOWN≥ 2.6.35, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-16
CVE-2025-68285 libceph: fix potential use-after-free in have_mon_and_osd_map() libceph: fix potential use-after-free in have_mon_and_osd_map() In the Linux kernel, the following vulnerability has been resolved: libceph: fix potential use-after-free in have_mon_and_osd_map() The wait loop in __ceph_open_session() can race with the client receiving a new monmap or osdmap shortly after the initial map is received. Both ceph_monc_handle_map() and handle_one_map() install a new map immediately aft
osv
CVE-2025-68178UNKNOWN≥ 6.5.0, < 6.6.117≥ 6.7.0, < 6.12.58+1 more2025-12-16
CVE-2025-68178 blk-cgroup: fix possible deadlock while configuring policy blk-cgroup: fix possible deadlock while configuring policy In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: fix possible deadlock while configuring policy Following deadlock can be triggered easily by lockdep: WARNING: possible circular locking dependency detected 6.17.0-rc3-00124-ga12c2658ced0 #1665 Not tainted check/1334 is trying to acquire lock: ff1100011d9d0678 (&q->sysfs_lock){+.+.}
osv
CVE-2025-40358UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-16
CVE-2025-40358 CVE-2025-40358: In the Linux kernel, the following vulnerability has been resolved: riscv: stacktrace: Disable KASAN checks for non-current tasks Unwinding the stack In the Linux kernel, the following vulnerability has been resolved: riscv: stacktrace: Disable KASAN checks for non-current tasks Unwinding the stack of a task other than current, KASAN would report "BUG: KASAN: out-of-bounds in walk_stackframe+0x41c/0x460" There is a same issue on x86 and has been resolved by the com
osv
CVE-2025-68264UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2025-12-16
CVE-2025-68264 CVE-2025-68264: In the Linux kernel, the following vulnerability has been resolved: ext4: refresh inline data size before write operations The cached ei->i_inline_siz In the Linux kernel, the following vulnerability has been resolved: ext4: refresh inline data size before write operations The cached ei->i_inline_size can become stale between the initial size check and when ext4_update_inline_data()/ext4_create_inline_data() use it. Although ext4_get_max_inline_size() reads the cor
osv
CVE-2025-68182UNKNOWN≥ 0, < 6.17.8-12025-12-16
CVE-2025-68182 CVE-2025-68182: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix potential use after free in iwl_mld_remove_link() This code fre In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix potential use after free in iwl_mld_remove_link() This code frees "link" by calling kfree_rcu(link, rcu_head) and then it dereferences "link" to get the "link->fw_id". Save the "link->fw_id" first to avoid a potential use after fre
osv
CVE-2025-68200UNKNOWN≥ 0, < 5.15.197≥ 5.16.0, < 6.1.159+3 more2025-12-16
CVE-2025-68200 bpf: Add bpf_prog_run_data_pointers() bpf: Add bpf_prog_run_data_pointers() In the Linux kernel, the following vulnerability has been resolved: bpf: Add bpf_prog_run_data_pointers() syzbot found that cls_bpf_classify() is able to change tc_skb_cb(skb)->drop_reason triggering a warning in sk_skb_reason_drop(). WARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 __sk_skb_reason_drop net/core/skbuff.c:1189 [inline] WARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 sk_skb_reason
osv
CVE-2025-68177UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-16
CVE-2025-68177 CVE-2025-68177: In the Linux kernel, the following vulnerability has been resolved: cpufreq/longhaul: handle NULL policy in longhaul_exit longhaul_exit() was calling In the Linux kernel, the following vulnerability has been resolved: cpufreq/longhaul: handle NULL policy in longhaul_exit longhaul_exit() was calling cpufreq_cpu_get(0) without checking for a NULL policy pointer. On some systems, this could lead to a NULL dereference and a kernel warning or panic. This patch adds a ch
osv
CVE-2025-68241UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-16
CVE-2025-68241 CVE-2025-68241: In the Linux kernel, the following vulnerability has been resolved: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe The sit driver' In the Linux kernel, the following vulnerability has been resolved: ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe The sit driver's packet transmission path calls: sit_tunnel_xmit() -> update_or_create_fnhe(), which lead to fnhe_remove_oldest() being called to delete entries exceeding FNHE_RECLAIM
osv
CVE-2025-68235UNKNOWN≥ 6.2.0, < 6.6.118≥ 6.7.0, < 6.12.60+1 more2025-12-16
CVE-2025-68235 nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot In the Linux kernel, the following vulnerability has been resolved: nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot nvkm_falcon_fw::boot is allocated, but no one frees it. This causes a kmemleak warning. Make sure this data is deallocated.
osv
CVE-2025-68316UNKNOWN≥ 6.13.0, < 6.17.82025-12-16
CVE-2025-68316 scsi: ufs: core: Fix invalid probe error return value scsi: ufs: core: Fix invalid probe error return value In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Fix invalid probe error return value After DME Link Startup, the error return value is set to the MIPI UniPro GenericErrorCode which can be 0 (SUCCESS) or 1 (FAILURE). Upon failure during driver probe, the error code 1 is propagated back to the driver probe function which must return a ne
osv
CVE-2025-68310UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-16
CVE-2025-68310 CVE-2025-68310: In the Linux kernel, the following vulnerability has been resolved: s390/pci: Avoid deadlock between PCI error recovery and mlx5 crdump Do not block P In the Linux kernel, the following vulnerability has been resolved: s390/pci: Avoid deadlock between PCI error recovery and mlx5 crdump Do not block PCI config accesses through pci_cfg_access_lock() when executing the s390 variant of PCI error recovery: Acquire just device_lock() instead of pci_dev_lock() as powerpc'
osv