Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 71 of 724
CVE-2025-68184UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-16
CVE-2025-68184 CVE-2025-68184: In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: Disable AFBC support on Mediatek DRM driver Commit c410fa9b07c3 ("dr In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: Disable AFBC support on Mediatek DRM driver Commit c410fa9b07c3 ("drm/mediatek: Add AFBC support to Mediatek DRM driver") added AFBC support to Mediatek DRM and enabled the 32x8/split/sparse modifier. However, this is currently broken o
osv
CVE-2025-68296UNKNOWN≥ 2.6.34, < 6.12.61≥ 6.13.0, < 6.17.112025-12-16
CVE-2025-68296 drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup In the Linux kernel, the following vulnerability has been resolved: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup Protect vga_switcheroo_client_fb_set() with console lock. Avoids OOB access in fbcon_remap_all(). Without holding the console lock the call races with switching outputs. VGA switcheroo calls fbcon_remap_all() when switchi
osv
CVE-2025-68247UNKNOWN≥ 6.15.0, < 6.17.92025-12-16
CVE-2025-68247 posix-timers: Plug potential memory leak in do_timer_create() posix-timers: Plug potential memory leak in do_timer_create() In the Linux kernel, the following vulnerability has been resolved: posix-timers: Plug potential memory leak in do_timer_create() When posix timer creation is set to allocate a given timer ID and the access to the user space value faults, the function terminates without freeing the already allocated posix timer structure. Move the allocation after the use
osv
CVE-2025-68201UNKNOWN≥ 5.19.0, < 6.12.59≥ 6.13.0, < 6.17.92025-12-16
CVE-2025-68201 drm/amdgpu: remove two invalid BUG_ON()s drm/amdgpu: remove two invalid BUG_ON()s In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: remove two invalid BUG_ON()s Those can be triggered trivially by userspace.
osv
CVE-2025-40361UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.17.8-12025-12-16
CVE-2025-40361 CVE-2025-40361: In the Linux kernel, the following vulnerability has been resolved: fs: ext4: change GFP_KERNEL to GFP_NOFS to avoid deadlock The parent function ext4 In the Linux kernel, the following vulnerability has been resolved: fs: ext4: change GFP_KERNEL to GFP_NOFS to avoid deadlock The parent function ext4_xattr_inode_lookup_create already uses GFP_NOFS for memory alloction, so the function ext4_xattr_inode_cache_find should use same gfp_flag.
osv
CVE-2025-68179UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-16
CVE-2025-68179 CVE-2025-68179: In the Linux kernel, the following vulnerability has been resolved: s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP As reported by Luiz Capitulino en In the Linux kernel, the following vulnerability has been resolved: s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP As reported by Luiz Capitulino enabling HVO on s390 leads to reproducible crashes. The problem is that kernel page tables are modified without flushing corresponding TLB entries. Even if it looks like
osv
CVE-2025-68259UNKNOWN≥ 0, < 6.1.162-1≥ 0, < 6.12.63-1+1 more2025-12-16
CVE-2025-68259 CVE-2025-68259: In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced When re-inject In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced When re-injecting a soft interrupt from an INT3, INT0, or (select) INTn instruction, discard the exception and retry the instruction if the code stream is changed (e.g. by a differen
osv
CVE-2025-40363UNKNOWN≥ 2.6.12, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-16
CVE-2025-40363 net: ipv6: fix field-spanning memcpy warning in AH output net: ipv6: fix field-spanning memcpy warning in AH output In the Linux kernel, the following vulnerability has been resolved: net: ipv6: fix field-spanning memcpy warning in AH output Fix field-spanning memcpy warnings in ah6_output() and ah6_output_done() where extension headers are copied to/from IPv6 address fields, triggering fortify-string warnings about writes beyond the 16-byte address fields. memcpy: detected fi
osv
CVE-2025-68282UNKNOWN≥ 3.12.0, < 5.10.248≥ 5.11.0, < 5.15.198+4 more2025-12-16
CVE-2025-68282 usb: gadget: udc: fix use-after-free in usb_gadget_state_work usb: gadget: udc: fix use-after-free in usb_gadget_state_work In the Linux kernel, the following vulnerability has been resolved: usb: gadget: udc: fix use-after-free in usb_gadget_state_work A race condition during gadget teardown can lead to a use-after-free in usb_gadget_state_work(), as reported by KASAN: BUG: KASAN: invalid-access in sysfs_notify+0x2c/0xd0 Workqueue: events usb_gadget_state_work The fundamenta
osv
CVE-2025-68192UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-16
CVE-2025-68192 CVE-2025-68192: In the Linux kernel, the following vulnerability has been resolved: net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup Raw IP packets In the Linux kernel, the following vulnerability has been resolved: net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup Raw IP packets have no MAC header, leaving skb->mac_header uninitialized. This can trigger kernel panics on ARM64 when xfrm or other subsystems access the offset due to strict alignm
osv
CVE-2025-68181UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-16
CVE-2025-68181 CVE-2025-68181: In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Remove calls to drm_put_dev() Since the allocation of the drivers main In the Linux kernel, the following vulnerability has been resolved: drm/radeon: Remove calls to drm_put_dev() Since the allocation of the drivers main structure was changed to devm_drm_dev_alloc() drm_put_dev()'ing to trigger it to be free'd should be done by devres. However, drm_put_dev() is still in the probe error
osv
CVE-2025-68245UNKNOWN≥ 3.17.0, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-16
CVE-2025-68245 net: netpoll: fix incorrect refcount handling causing incorrect cleanup net: netpoll: fix incorrect refcount handling causing incorrect cleanup In the Linux kernel, the following vulnerability has been resolved: net: netpoll: fix incorrect refcount handling causing incorrect cleanup commit efa95b01da18 ("netpoll: fix use after free") incorrectly ignored the refcount and prematurely set dev->npinfo to NULL during netpoll cleanup, leading to improper behavior and memory leaks. S
osv
CVE-2025-68218UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-16
CVE-2025-68218 CVE-2025-68218: In the Linux kernel, the following vulnerability has been resolved: nvme-multipath: fix lockdep WARN due to partition scan work Blktests test cases nv In the Linux kernel, the following vulnerability has been resolved: nvme-multipath: fix lockdep WARN due to partition scan work Blktests test cases nvme/014, 057 and 058 fail occasionally due to a lockdep WARN. As reported in the Closes tag URL, the WARN indicates that a deadlock can happen due to the dependency amon
osv
CVE-2025-68176UNKNOWN≥ 5.9.0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-16
CVE-2025-68176 PCI: cadence: Check for the existence of cdns_pcie::ops before using it PCI: cadence: Check for the existence of cdns_pcie::ops before using it In the Linux kernel, the following vulnerability has been resolved: PCI: cadence: Check for the existence of cdns_pcie::ops before using it cdns_pcie::ops might not be populated by all the Cadence glue drivers. This is going to be true for the upcoming Sophgo platform which doesn't set the ops. Hence, add a check to prevent NULL pointe
osv
CVE-2025-68230UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.10-12025-12-16
CVE-2025-68230 CVE-2025-68230: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix gpu page fault after hibernation on PF passthrough On PF passthrou In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix gpu page fault after hibernation on PF passthrough On PF passthrough environment, after hibernate and then resume, coralgemm will cause gpu page fault. Mode1 reset happens during hibernate, but partition mode is not restored on resume
osv
CVE-2025-68203UNKNOWN≥ 0, < 6.17.9-12025-12-16
CVE-2025-68203 CVE-2025-68203: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process Fix a potential In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process Fix a potential deadlock caused by inconsistent spinlock usage between interrupt and process contexts in the userq fence driver. The issue occurs when amdgpu_userq_fence_driver_process(
osv
CVE-2025-68175UNKNOWN≥ 6.4.0, < 6.17.82025-12-16
CVE-2025-68175 media: nxp: imx8-isi: Fix streaming cleanup on release media: nxp: imx8-isi: Fix streaming cleanup on release In the Linux kernel, the following vulnerability has been resolved: media: nxp: imx8-isi: Fix streaming cleanup on release The current implementation unconditionally calls mxc_isi_video_cleanup_streaming() in mxc_isi_video_release(). This can lead to situations where any release call (like from a simple "v4l2-ctl -l") may release a currently streaming queue when called
osv
CVE-2025-68229UNKNOWN≥ 4.5.0, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-16
CVE-2025-68229 scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show() scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show() In the Linux kernel, the following vulnerability has been resolved: scsi: target: tcm_loop: Fix segfault in tcm_loop_tpg_address_show() If the allocation of tl_hba->sh fails in tcm_loop_driver_probe() and we attempt to dereference it in tcm_loop_tpg_address_show() we will get a segfault, see below for an example. So, check tl_hba->sh before der
osv
CVE-2025-68221UNKNOWN≥ 0, < 6.17.10-12025-12-16
CVE-2025-68221 CVE-2025-68221: In the Linux kernel, the following vulnerability has been resolved: mptcp: fix address removal logic in mptcp_pm_nl_rm_addr Fix inverted WARN_ON_ONCE In the Linux kernel, the following vulnerability has been resolved: mptcp: fix address removal logic in mptcp_pm_nl_rm_addr Fix inverted WARN_ON_ONCE condition that prevented normal address removal counter updates. The current code only executes decrement logic when the counter is already 0 (abnormal state), while nor
osv
CVE-2025-68189UNKNOWN≥ 0, < 6.17.8-12025-12-16
CVE-2025-68189 CVE-2025-68189: In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix GEM free for imported dma-bufs Imported dma-bufs also have obj->resv In the Linux kernel, the following vulnerability has been resolved: drm/msm: Fix GEM free for imported dma-bufs Imported dma-bufs also have obj->resv != &obj->_resv. So we should check both this condition in addition to flags for handling the _NO_SHARE case. Fixes this splat that was reported with IRIS video playback:
osv