Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 72 of 724
CVE-2025-68232UNKNOWN≥ 6.16.0, < 6.17.102025-12-16
CVE-2025-68232 veth: more robust handing of race to avoid txq getting stuck veth: more robust handing of race to avoid txq getting stuck In the Linux kernel, the following vulnerability has been resolved: veth: more robust handing of race to avoid txq getting stuck Commit dc82a33297fc ("veth: apply qdisc backpressure on full ptr_ring to reduce TX drops") introduced a race condition that can lead to a permanently stalled TXQ. This was observed in production on ARM64 systems (Ampere Altra Max).
osv
CVE-2025-40352UNKNOWN≥ 6.14.0, < 6.17.62025-12-16
CVE-2025-40352 platform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init platform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init In the Linux kernel, the following vulnerability has been resolved: platform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init The lock-related debug logic (CONFIG_LOCK_STAT) in the kernel is noting the following warning when the BlueField-3 SOC is booted: BUG: key ffff00008a3402a8 has not been registered! ------------[ cu
osv
CVE-2025-68246UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-16
CVE-2025-68246 CVE-2025-68246: In the Linux kernel, the following vulnerability has been resolved: ksmbd: close accepted socket when per-IP limit rejects connection When the per-IP In the Linux kernel, the following vulnerability has been resolved: ksmbd: close accepted socket when per-IP limit rejects connection When the per-IP connection limit is exceeded in ksmbd_kthread_fn(), the code sets ret = -EAGAIN and continues the accept loop without closing the just-accepted socket. That leaks one so
osv
CVE-2025-68180UNKNOWN≥ 6.7.0, < 6.12.58≥ 6.13.0, < 6.17.82025-12-16
CVE-2025-68180 drm/amd/display: Fix NULL deref in debugfs odm_combine_segments drm/amd/display: Fix NULL deref in debugfs odm_combine_segments In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Fix NULL deref in debugfs odm_combine_segments When a connector is connected but inactive (e.g., disabled by desktop environments), pipe_ctx->stream_res.tg will be destroyed. Then, reading odm_combine_segments causes kernel NULL pointer dereference. BUG: kernel NULL p
osv
CVE-2025-68188UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-16
CVE-2025-68188 CVE-2025-68188: In the Linux kernel, the following vulnerability has been resolved: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() Use RCU to avoid In the Linux kernel, the following vulnerability has been resolved: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() Use RCU to avoid a pair of atomic operations and a potential UAF on dst_dev()->flags.
osv
CVE-2025-68190UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-16
CVE-2025-68190 CVE-2025-68190: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked() kcalloc() may fail. When WS is non-zero and allocation fails, ectx.ws remains NULL while ectx.ws_size is set, leading to a potential NULL pointer dereference in atom
osv
CVE-2025-68313UNKNOWN≥ 6.8.0, < 6.12.58≥ 6.13.0, < 6.17.82025-12-16
CVE-2025-68313 x86/CPU/AMD: Add RDSEED fix for Zen5 x86/CPU/AMD: Add RDSEED fix for Zen5 In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Add RDSEED fix for Zen5 There's an issue with RDSEED's 16-bit and 32-bit register output variants on Zen5 which return a random value of 0 "at a rate inconsistent with randomness while incorrectly signaling success (CF=1)". Search the web for AMD-SB-7055 for more detail. Add a fix glue which checks microcode revisions. [ bp
osv
CVE-2025-68250UNKNOWN≥ 6.16.0, < 6.17.62025-12-16
CVE-2025-68250 hung_task: fix warnings caused by unaligned lock pointers hung_task: fix warnings caused by unaligned lock pointers In the Linux kernel, the following vulnerability has been resolved: hung_task: fix warnings caused by unaligned lock pointers The blocker tracking mechanism assumes that lock pointers are at least 4-byte aligned to use their lower bits for type encoding. However, as reported by Eero Tamminen, some architectures like m68k only guarantee 2-byte alignment of 32-bit
osv
CVE-2025-68254UNKNOWN≥ 4.12.0, < 5.15.198≥ 5.16.0, < 6.1.160+4 more2025-12-16
CVE-2025-68254 staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing The Extended Supported Rates (ESR) IE handling in OnBeacon accessed *(p + 1 + ielen) and *(p + 2 + ielen) without verifying that these offsets lie within the received frame buffer. A malformed beacon with
osv
CVE-2025-68302UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-16
CVE-2025-68302 CVE-2025-68302: In the Linux kernel, the following vulnerability has been resolved: net: sxgbe: fix potential NULL dereference in sxgbe_rx() Currently, when skb is nu In the Linux kernel, the following vulnerability has been resolved: net: sxgbe: fix potential NULL dereference in sxgbe_rx() Currently, when skb is null, the driver prints an error and then dereferences skb on the next line. To fix this, let's add a 'break' after the error message to switch to sxgbe_rx_refill(), whic
osv
CVE-2025-40355UNKNOWN≥ 0, < 6.17.6-12025-12-16
CVE-2025-40355 CVE-2025-40355: In the Linux kernel, the following vulnerability has been resolved: sysfs: check visibility before changing group attribute ownership Since commit 0c1 In the Linux kernel, the following vulnerability has been resolved: sysfs: check visibility before changing group attribute ownership Since commit 0c17270f9b92 ("net: sysfs: Implement is_visible for phys_(port_id, port_name, switch_id)"), __dev_change_net_namespace() can hit WARN_ON() when trying to change owner of a
osv
CVE-2025-68236UNKNOWN≥ 5.12.0, < 6.17.102025-12-16
CVE-2025-68236 scsi: ufs: ufs-qcom: Fix UFS OCP issue during UFS power down (PC=3) scsi: ufs: ufs-qcom: Fix UFS OCP issue during UFS power down (PC=3) In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: ufs-qcom: Fix UFS OCP issue during UFS power down (PC=3) According to UFS specifications, the power-off sequence for a UFS device includes: - Sending an SSU command with Power_Condition=3 and await a response. - Asserting RST_N low. - Turning off REF_CLK. - Turni
osv
CVE-2025-68252UNKNOWN≥ 6.1.156, < 6.1.158≥ 6.6.112, < 6.6.115+2 more2025-12-16
CVE-2025-68252 misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup In the Linux kernel, the following vulnerability has been resolved: misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup In fastrpc_map_lookup, dma_buf_get is called to obtain a reference to the dma_buf for comparison purposes. However, this reference is never released when the function returns, leading to a dma_buf memory leak. Fix this by adding d
osv
CVE-2025-68309UNKNOWN≥ 0, < 6.17.8-12025-12-16
CVE-2025-68309 CVE-2025-68309: In the Linux kernel, the following vulnerability has been resolved: PCI/AER: Fix NULL pointer access by aer_info The kzalloc(GFP_KERNEL) may return NU In the Linux kernel, the following vulnerability has been resolved: PCI/AER: Fix NULL pointer access by aer_info The kzalloc(GFP_KERNEL) may return NULL, so all accesses to aer_info->xxx will result in kernel panic. Fix it.
osv
CVE-2025-68300UNKNOWN≥ 6.12.59, < 6.12.61≥ 6.17.9, < 6.17.112025-12-16
CVE-2025-68300 fs/namespace: fix reference leak in grab_requested_mnt_ns fs/namespace: fix reference leak in grab_requested_mnt_ns In the Linux kernel, the following vulnerability has been resolved: fs/namespace: fix reference leak in grab_requested_mnt_ns lookup_mnt_ns() already takes a reference on mnt_ns. grab_requested_mnt_ns() doesn't need to take an extra reference.
osv
CVE-2025-68167UNKNOWN≥ 6.9.0, < 6.12.58≥ 6.13.0, < 6.17.82025-12-16
CVE-2025-68167 gpiolib: fix invalid pointer access in debugfs gpiolib: fix invalid pointer access in debugfs In the Linux kernel, the following vulnerability has been resolved: gpiolib: fix invalid pointer access in debugfs If the memory allocation in gpiolib_seq_start() fails, the s->private field remains uninitialized and is later dereferenced without checking in gpiolib_seq_stop(). Initialize s->private to NULL before calling kzalloc() and check it before dereferencing it.
osv
CVE-2025-68169UNKNOWN≥ 6.15.0, < 6.17.82025-12-16
CVE-2025-68169 netpoll: Fix deadlock in memory allocation under spinlock netpoll: Fix deadlock in memory allocation under spinlock In the Linux kernel, the following vulnerability has been resolved: netpoll: Fix deadlock in memory allocation under spinlock Fix a AA deadlock in refill_skbs() where memory allocation while holding skb_pool->lock can trigger a recursive lock acquisition attempt. The deadlock scenario occurs when the system is under severe memory pressure: 1. refill_skbs() acqui
osv
CVE-2025-68287UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-16
CVE-2025-68287 CVE-2025-68287: In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths This patch addresses a race condition caused by unsynchronized execution of multiple call paths invoking `dwc3_remove_requests()`, leading to premature freeing of USB
osv
CVE-2025-68173UNKNOWN≥ 4.5.0, < 6.1.159≥ 6.2.0, < 6.6.117+2 more2025-12-16
CVE-2025-68173 ftrace: Fix softlockup in ftrace_module_enable ftrace: Fix softlockup in ftrace_module_enable In the Linux kernel, the following vulnerability has been resolved: ftrace: Fix softlockup in ftrace_module_enable A soft lockup was observed when loading amdgpu module. If a module has a lot of tracable functions, multiple calls to kallsyms_lookup can spend too much time in RCU critical section and with disabled preemption, causing kernel panic. This is the same issue that was fixed i
osv
CVE-2025-68256UNKNOWN≥ 4.12.0, < 6.1.160≥ 6.2.0, < 6.6.120+3 more2025-12-16
CVE-2025-68256 staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser In the Linux kernel, the following vulnerability has been resolved: staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser The Information Element (IE) parser rtw_get_ie() trusted the length byte of each IE without validating that the IE body (len bytes after the 2-byte header) fits inside the remaining frame buffer. A malformed frame ca
osv