Filter and search through 198,404 vulnerabilities
| CVE ID | Description | CVSS | Priority | Trend | Exploit | Patch |
|---|---|---|---|---|---|---|
| CVE-2025-68212 | In the Linux kernel, the following vulnerability has been resolved: fs: Fix uninitialized 'offp' in statmount_string() In statmount_string(), most f... | 0.0 | 0 | Neutral | No |
| Yes |
| CVE-2025-68211 | In the Linux kernel, the following vulnerability has been resolved: ksm: use range-walk function to jump over holes in scan_get_next_rmap_item Curre... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68210 | In the Linux kernel, the following vulnerability has been resolved: erofs: avoid infinite loop due to incomplete zstd-compressed data Currently, the... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68209 | In the Linux kernel, the following vulnerability has been resolved: mlx5: Fix default values in create CQ Currently, CQs without a completion functi... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68208 | In the Linux kernel, the following vulnerability has been resolved: bpf: account for current allocated stack depth in widen_imprecise_scalars() The ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68207 | In the Linux kernel, the following vulnerability has been resolved: drm/xe/guc: Synchronize Dead CT worker with unbind Cancel and wait for any Dead ... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68206 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: add seqadj extension for natted connections Sequence adjustme... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68205 | In the Linux kernel, the following vulnerability has been resolved: ALSA: hda/hdmi: Fix breakage at probing nvhdmi-mcp driver After restructuring an... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68204 | In the Linux kernel, the following vulnerability has been resolved: pmdomain: arm: scmi: Fix genpd leak on provider registration failure If of_genpd... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68203 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix lock warning in amdgpu_userq_fence_driver_process Fix a potentia... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68202 | In the Linux kernel, the following vulnerability has been resolved: sched_ext: Fix unsafe locking in the scx_dump_state() For built with CONFIG_PREE... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68201 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: remove two invalid BUG_ON()s Those can be triggered trivially by use... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68200 | In the Linux kernel, the following vulnerability has been resolved: bpf: Add bpf_prog_run_data_pointers() syzbot found that cls_bpf_classify() is ab... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68199 | In the Linux kernel, the following vulnerability has been resolved: codetag: debug: handle existing CODETAG_EMPTY in mark_objexts_empty for slabobj_e... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68198 | In the Linux kernel, the following vulnerability has been resolved: crash: fix crashkernel resource shrink When crashkernel is configured with a hig... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68197 | In the Linux kernel, the following vulnerability has been resolved: bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap() With older F... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68196 | In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Cache streams targeting link when performing LT automation [WHY... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68195 | In the Linux kernel, the following vulnerability has been resolved: x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode Running x86_match_... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68194 | In the Linux kernel, the following vulnerability has been resolved: media: imon: make send_packet() more robust syzbot is reporting that imon has th... | 0.0 | 0 | Neutral | No | Yes |
| CVE-2025-68193 | In the Linux kernel, the following vulnerability has been resolved: drm/xe/guc: Add devm release action to safely tear down CT When a buffer object ... | 0.0 | 0 | Neutral | No | Yes |