Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 75 of 724
CVE-2025-68244UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-16
CVE-2025-68244 CVE-2025-68244: In the Linux kernel, the following vulnerability has been resolved: drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD On completion o
In the Linux kernel, the following vulnerability has been resolved: drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD On completion of i915_vma_pin_ww(), a synchronous variant of dma_fence_work_commit() is called. When pinning a VMA to GGTT address space on a Cherry View family processor, or on a Bro
osv
CVE-2025-68265UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.12-12025-12-16
CVE-2025-68265 CVE-2025-68265: In the Linux kernel, the following vulnerability has been resolved: nvme: fix admin request_queue lifetime The namespaces can access the controller's
In the Linux kernel, the following vulnerability has been resolved: nvme: fix admin request_queue lifetime The namespaces can access the controller's admin request_queue, and stale references on the namespaces may exist after tearing down the controller. Ensure the admin request_queue is active by moving the controlle
osv
CVE-2025-40348UNKNOWN≥ 6.12.54, < 6.12.56≥ 6.17.4, < 6.17.62025-12-16
CVE-2025-40348 slab: Avoid race on slab->obj_exts in alloc_slab_obj_exts
slab: Avoid race on slab->obj_exts in alloc_slab_obj_exts
In the Linux kernel, the following vulnerability has been resolved:
slab: Avoid race on slab->obj_exts in alloc_slab_obj_exts
If two competing threads enter alloc_slab_obj_exts() and one of them
fails to allocate the object extension vector, it might override the
valid slab->obj_exts allocated by the other thread with
OBJEXTS_ALLOC_FAIL. This will cause the thread
osv
CVE-2025-68311UNKNOWN≥ 6.5.0, < 6.12.58≥ 6.13.0, < 6.17.82025-12-16
CVE-2025-68311 tty: serial: ip22zilog: Use platform device for probing
tty: serial: ip22zilog: Use platform device for probing
In the Linux kernel, the following vulnerability has been resolved:
tty: serial: ip22zilog: Use platform device for probing
After commit 84a9582fd203 ("serial: core: Start managing serial controllers
to enable runtime PM") serial drivers need to provide a device in
struct uart_port.dev otherwise an oops happens. To fix this issue
for ip22zilog driver switch driver to
osv
CVE-2025-68320UNKNOWN≥ 5.17.0, < 6.6.117≥ 6.7.0, < 6.12.58+1 more2025-12-16
CVE-2025-68320 lan966x: Fix sleeping in atomic context
lan966x: Fix sleeping in atomic context
In the Linux kernel, the following vulnerability has been resolved:
lan966x: Fix sleeping in atomic context
The following warning was seen when we try to connect using ssh to the device.
BUG: sleeping function called from invalid context at kernel/locking/mutex.c:575
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 104, name: dropbear
preempt_count: 1, expected: 0
INFO: lockdep is turned off.
osv
CVE-2025-40359UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-16
CVE-2025-40359 CVE-2025-40359: In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel: Fix KASAN global-out-of-bounds warning When running "perf mem reco
In the Linux kernel, the following vulnerability has been resolved: perf/x86/intel: Fix KASAN global-out-of-bounds warning When running "perf mem record" command on CWF, the below KASAN global-out-of-bounds warning is seen. ================================================================== BUG: KASAN: global-out-of-b
osv
CVE-2025-40351UNKNOWN≥ 3.14.0, < 5.4.301≥ 5.5.0, < 5.10.246+5 more2025-12-16
CVE-2025-40351 hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()
hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()
In the Linux kernel, the following vulnerability has been resolved:
hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat()
The syzbot reported issue in hfsplus_delete_cat():
[ 70.682285][ T9333] =====================================================
[ 70.682943][ T9333] BUG: KMSAN: uninit-value in hfsplus_subfolders_dec+0x1d7/0x220
[ 70.683640][ T93
osv
CVE-2025-68202UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.9-12025-12-16
CVE-2025-68202 CVE-2025-68202: In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix unsafe locking in the scx_dump_state() For built with CONFIG_PREEMP
In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix unsafe locking in the scx_dump_state() For built with CONFIG_PREEMPT_RT=y kernels, the dump_lock will be converted sleepable spinlock and not disable-irq, so the following scenarios occur: inconsistent {IN-HARDIRQ-W} -> {HARDIRQ-ON-W}
osv
CVE-2025-68258UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2025-12-16
CVE-2025-68258 CVE-2025-68258: In the Linux kernel, the following vulnerability has been resolved: comedi: multiq3: sanitize config options in multiq3_attach() Syzbot identified an
In the Linux kernel, the following vulnerability has been resolved: comedi: multiq3: sanitize config options in multiq3_attach() Syzbot identified an issue [1] in multiq3_attach() that induces a task timeout due to open() or COMEDI_DEVCONFIG ioctl operations, specifically, in the case of multiq3 driver. This problem a
osv
CVE-2025-68228UNKNOWN≥ 6.16.0, < 6.17.102025-12-16
CVE-2025-68228 drm/plane: Fix create_in_format_blob() return value
drm/plane: Fix create_in_format_blob() return value
In the Linux kernel, the following vulnerability has been resolved:
drm/plane: Fix create_in_format_blob() return value
create_in_format_blob() is either supposed to return a valid
pointer or an error, but never NULL. The caller will dereference
the blob when it is not an error, and thus will oops if NULL
returned. Return proper error values in the failure cases.
osv
CVE-2025-68237UNKNOWN≥ 5.17.0, < 6.1.159≥ 6.2.0, < 6.6.118+2 more2025-12-16
CVE-2025-68237 mtdchar: fix integer overflow in read/write ioctls
mtdchar: fix integer overflow in read/write ioctls
In the Linux kernel, the following vulnerability has been resolved:
mtdchar: fix integer overflow in read/write ioctls
The "req.start" and "req.len" variables are u64 values that come from the
user at the start of the function. We mask away the high 32 bits of
"req.len" so that's capped at U32_MAX but the "req.start" variable can go
up to U64_MAX which means that the addition c
osv
CVE-2025-40349UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.158-1+2 more2025-12-16
CVE-2025-40349 CVE-2025-40349: In the Linux kernel, the following vulnerability has been resolved: hfs: validate record offset in hfsplus_bmap_alloc hfsplus_bmap_alloc can trigger a
In the Linux kernel, the following vulnerability has been resolved: hfs: validate record offset in hfsplus_bmap_alloc hfsplus_bmap_alloc can trigger a crash if a record offset or length is larger than node_size [ 15.264282] BUG: KASAN: slab-out-of-bounds in hfsplus_bmap_alloc+0x887/0x8b0 [ 15.265192] Read of size 8 a
osv
CVE-2025-68297UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.11-12025-12-16
CVE-2025-68297 CVE-2025-68297: In the Linux kernel, the following vulnerability has been resolved: ceph: fix crash in process_v2_sparse_read() for encrypted directories The crash in
In the Linux kernel, the following vulnerability has been resolved: ceph: fix crash in process_v2_sparse_read() for encrypted directories The crash in process_v2_sparse_read() for fscrypt-encrypted directories has been reported. Issue takes place for Ceph msgr2 protocol in secure mode. It can be reproduced by the ste
osv
CVE-2025-68199UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.9-12025-12-16
CVE-2025-68199 CVE-2025-68199: In the Linux kernel, the following vulnerability has been resolved: codetag: debug: handle existing CODETAG_EMPTY in mark_objexts_empty for slabobj_ex
In the Linux kernel, the following vulnerability has been resolved: codetag: debug: handle existing CODETAG_EMPTY in mark_objexts_empty for slabobj_ext When alloc_slab_obj_exts() fails and then later succeeds in allocating a slab extension vector, it calls handle_failed_objexts_alloc() to mark all objects in the vect
osv
CVE-2025-40345UNKNOWN≥ 2.6.12, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-12
CVE-2025-40345 usb: storage: sddr55: Reject out-of-bound new_pba
usb: storage: sddr55: Reject out-of-bound new_pba
In the Linux kernel, the following vulnerability has been resolved:
usb: storage: sddr55: Reject out-of-bound new_pba
Discovered by Atuin - Automated Vulnerability Discovery Engine.
new_pba comes from the status packet returned after each write.
A bogus device could report values beyond the block count derived
from info->capacity, letting the driver walk off the end of
pba_to_lb
osv
CVE-2025-40018UNKNOWN≥ 0, < 6.17.0-8.82025-12-10
CVE-2025-40018 linux, linux-aws, linux-gcp, linux-realtime vulnerabilities
linux, linux-aws, linux-gcp, linux-realtime vulnerabilities
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
- Tracing infrastructure;
- Netfilter;
(CVE-2025-40018, CVE-2025-40232)
osv
CVE-2023-53851UNKNOWN≥ 0, < 6.4.4-12025-12-09
CVE-2023-53851 CVE-2023-53851: In the Linux kernel, the following vulnerability has been resolved: drm/msm/dp: Drop aux devices together with DP controller Using devres to depopulat
In the Linux kernel, the following vulnerability has been resolved: drm/msm/dp: Drop aux devices together with DP controller Using devres to depopulate the aux bus made sure that upon a probe deferral the EDP panel device would be destroyed and recreated upon next attempt. But the struct device which the devres is ti
osv
CVE-2023-53802UNKNOWN≥ 2.6.35, < 4.14.308≥ 4.15.0, < 4.19.276+5 more2025-12-09
CVE-2023-53802 wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function
wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function
It is stated that ath9k_htc_rx_msg() either frees the provided skb or
passes its management to another callback function. However, the skb is
not freed in c
osv
CVE-2023-53803UNKNOWN≥ 2.6.32, < 4.14.308≥ 4.15.0, < 4.19.276+5 more2025-12-09
CVE-2023-53803 scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process()
scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process()
In the Linux kernel, the following vulnerability has been resolved:
scsi: ses: Fix slab-out-of-bounds in ses_enclosure_data_process()
A fix for:
BUG: KASAN: slab-out-of-bounds in ses_enclosure_data_process+0x949/0xe30 [ses]
Read of size 1 at addr ffff88a1b043a451 by task systemd-udevd/3271
Checking after (and before in next loop) addl_desc_ptr[1]
osv
CVE-2022-50635UNKNOWN≥ 0, < 6.0.3-12025-12-09
CVE-2022-50635 CVE-2022-50635: In the Linux kernel, the following vulnerability has been resolved: powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe() I found a nul
In the Linux kernel, the following vulnerability has been resolved: powerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe() I found a null pointer reference in arch_prepare_kprobe(): # echo 'p cmdline_proc_show' > kprobe_events # echo 'p cmdline_proc_show+16' >> kprobe_events Kernel attempted to read use
osv