Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 71 of 724
CVE-2025-68184UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-16
CVE-2025-68184 CVE-2025-68184: In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: Disable AFBC support on Mediatek DRM driver Commit c410fa9b07c3 ("dr
In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: Disable AFBC support on Mediatek DRM driver Commit c410fa9b07c3 ("drm/mediatek: Add AFBC support to Mediatek DRM driver") added AFBC support to Mediatek DRM and enabled the 32x8/split/sparse modifier. However, this is currently broken o
osv
CVE-2025-68296UNKNOWN≥ 2.6.34, < 6.12.61≥ 6.13.0, < 6.17.112025-12-16
CVE-2025-68296 drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup
drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup
In the Linux kernel, the following vulnerability has been resolved:
drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup
Protect vga_switcheroo_client_fb_set() with console lock. Avoids OOB
access in fbcon_remap_all(). Without holding the console lock the call
races with switching outputs.
VGA switcheroo calls fbcon_remap_all() when switchi
osv
CVE-2025-68247UNKNOWN≥ 6.15.0, < 6.17.92025-12-16
CVE-2025-68247 posix-timers: Plug potential memory leak in do_timer_create()
posix-timers: Plug potential memory leak in do_timer_create()
In the Linux kernel, the following vulnerability has been resolved:
posix-timers: Plug potential memory leak in do_timer_create()
When posix timer creation is set to allocate a given timer ID and the
access to the user space value faults, the function terminates without
freeing the already allocated posix timer structure.
Move the allocation after the use
osv
CVE-2025-68201UNKNOWN≥ 5.19.0, < 6.12.59≥ 6.13.0, < 6.17.92025-12-16
CVE-2025-68201 drm/amdgpu: remove two invalid BUG_ON()s
drm/amdgpu: remove two invalid BUG_ON()s
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: remove two invalid BUG_ON()s
Those can be triggered trivially by userspace.
osv
CVE-2025-40361UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.17.8-12025-12-16
CVE-2025-40361 CVE-2025-40361: In the Linux kernel, the following vulnerability has been resolved: fs: ext4: change GFP_KERNEL to GFP_NOFS to avoid deadlock The parent function ext4
In the Linux kernel, the following vulnerability has been resolved: fs: ext4: change GFP_KERNEL to GFP_NOFS to avoid deadlock The parent function ext4_xattr_inode_lookup_create already uses GFP_NOFS for memory alloction, so the function ext4_xattr_inode_cache_find should use same gfp_flag.
osv
CVE-2025-68179UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-16
CVE-2025-68179 CVE-2025-68179: In the Linux kernel, the following vulnerability has been resolved: s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP As reported by Luiz Capitulino en
In the Linux kernel, the following vulnerability has been resolved: s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP As reported by Luiz Capitulino enabling HVO on s390 leads to reproducible crashes. The problem is that kernel page tables are modified without flushing corresponding TLB entries. Even if it looks like
osv
CVE-2025-68259UNKNOWN≥ 0, < 6.1.162-1≥ 0, < 6.12.63-1+1 more2025-12-16
CVE-2025-68259 CVE-2025-68259: In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced When re-inject
In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced When re-injecting a soft interrupt from an INT3, INT0, or (select) INTn instruction, discard the exception and retry the instruction if the code stream is changed (e.g. by a differen
osv
CVE-2025-40363UNKNOWN≥ 2.6.12, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-16
CVE-2025-40363 net: ipv6: fix field-spanning memcpy warning in AH output
net: ipv6: fix field-spanning memcpy warning in AH output
In the Linux kernel, the following vulnerability has been resolved:
net: ipv6: fix field-spanning memcpy warning in AH output
Fix field-spanning memcpy warnings in ah6_output() and
ah6_output_done() where extension headers are copied to/from IPv6
address fields, triggering fortify-string warnings about writes beyond
the 16-byte address fields.
memcpy: detected fi
osv
CVE-2025-68282UNKNOWN≥ 3.12.0, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2025-12-16
CVE-2025-68282 usb: gadget: udc: fix use-after-free in usb_gadget_state_work
usb: gadget: udc: fix use-after-free in usb_gadget_state_work
In the Linux kernel, the following vulnerability has been resolved:
usb: gadget: udc: fix use-after-free in usb_gadget_state_work
A race condition during gadget teardown can lead to a use-after-free
in usb_gadget_state_work(), as reported by KASAN:
BUG: KASAN: invalid-access in sysfs_notify+0x2c/0xd0
Workqueue: events usb_gadget_state_work
The fundamenta
osv
CVE-2025-68192UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-16
CVE-2025-68192 CVE-2025-68192: In the Linux kernel, the following vulnerability has been resolved: net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup Raw IP packets
In the Linux kernel, the following vulnerability has been resolved: net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup Raw IP packets have no MAC header, leaving skb->mac_header uninitialized. This can trigger kernel panics on ARM64 when xfrm or other subsystems access the offset due to strict alignm
osv
CVE-2025-68181UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-16
CVE-2025-68181 CVE-2025-68181: In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Remove calls to drm_put_dev() Since the allocation of the drivers main
In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Remove calls to drm_put_dev() Since the allocation of the drivers main structure was changed to devm_drm_dev_alloc() drm_put_dev()'ing to trigger it to be free'd should be done by devres. However, drm_put_dev() is still in the probe error
osv
CVE-2025-68245UNKNOWN≥ 3.17.0, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-16
CVE-2025-68245 net: netpoll: fix incorrect refcount handling causing incorrect cleanup
net: netpoll: fix incorrect refcount handling causing incorrect cleanup
In the Linux kernel, the following vulnerability has been resolved:
net: netpoll: fix incorrect refcount handling causing incorrect cleanup
commit efa95b01da18 ("netpoll: fix use after free") incorrectly
ignored the refcount and prematurely set dev->npinfo to NULL during
netpoll cleanup, leading to improper behavior and memory leaks.
S
osv
CVE-2025-68218UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-16
CVE-2025-68218 CVE-2025-68218: In the Linux kernel, the following vulnerability has been resolved: nvme-multipath: fix lockdep WARN due to partition scan work Blktests test cases nv
In the Linux kernel, the following vulnerability has been resolved: nvme-multipath: fix lockdep WARN due to partition scan work Blktests test cases nvme/014, 057 and 058 fail occasionally due to a lockdep WARN. As reported in the Closes tag URL, the WARN indicates that a deadlock can happen due to the dependency amon
osv
CVE-2025-68176UNKNOWN≥ 5.9.0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-16
CVE-2025-68176 PCI: cadence: Check for the existence of cdns_pcie::ops before using it
PCI: cadence: Check for the existence of cdns_pcie::ops before using it
In the Linux kernel, the following vulnerability has been resolved:
PCI: cadence: Check for the existence of cdns_pcie::ops before using it
cdns_pcie::ops might not be populated by all the Cadence glue drivers. This
is going to be true for the upcoming Sophgo platform which doesn't set the
ops.
Hence, add a check to prevent NULL pointe
osv
CVE-2025-68230UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.10-12025-12-16
CVE-2025-68230 CVE-2025-68230: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix gpu page fault after hibernation on PF passthrough On PF passthrou
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix gpu page fault after hibernation on PF passthrough On PF passthrough environment, after hibernate and then resume, coralgemm will cause gpu page fault. Mode1 reset happens during hibernate, but partition mode is not restored on resume
osv
CVE-2025-68203UNKNOWN≥ 0, < 6.17.9-12025-12-16
CVE-2025-68203 CVE-2025-68203: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process Fix a potential
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process Fix a potential deadlock caused by inconsistent spinlock usage between interrupt and process contexts in the userq fence driver. The issue occurs when amdgpu_userq_fence_driver_process(
osv
CVE-2025-68175UNKNOWN≥ 6.4.0, < 6.17.82025-12-16
CVE-2025-68175 media: nxp: imx8-isi: Fix streaming cleanup on release
media: nxp: imx8-isi: Fix streaming cleanup on release
In the Linux kernel, the following vulnerability has been resolved:
media: nxp: imx8-isi: Fix streaming cleanup on release
The current implementation unconditionally calls
mxc_isi_video_cleanup_streaming() in mxc_isi_video_release(). This can
lead to situations where any release call (like from a simple
"v4l2-ctl -l") may release a currently streaming queue when called
osv
CVE-2025-68229UNKNOWN≥ 4.5.0, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-16
CVE-2025-68229 scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show()
scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show()
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show()
If the allocation of tl_hba->sh fails in tcm_loop_driver_probe() and we
attempt to dereference it in tcm_loop_tpg_address_show() we will get a
segfault, see below for an example. So, check tl_hba->sh before
der
osv
CVE-2025-68221UNKNOWN≥ 0, < 6.17.10-12025-12-16
CVE-2025-68221 CVE-2025-68221: In the Linux kernel, the following vulnerability has been resolved: mptcp: fix address removal logic in mptcp_pm_nl_rm_addr Fix inverted WARN_ON_ONCE
In the Linux kernel, the following vulnerability has been resolved: mptcp: fix address removal logic in mptcp_pm_nl_rm_addr Fix inverted WARN_ON_ONCE condition that prevented normal address removal counter updates. The current code only executes decrement logic when the counter is already 0 (abnormal state), while nor
osv
CVE-2025-68189UNKNOWN≥ 0, < 6.17.8-12025-12-16
CVE-2025-68189 CVE-2025-68189: In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix GEM free for imported dma-bufs Imported dma-bufs also have obj->resv
In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix GEM free for imported dma-bufs Imported dma-bufs also have obj->resv != &obj->_resv. So we should check both this condition in addition to flags for handling the _NO_SHARE case. Fixes this splat that was reported with IRIS video playback:
osv