Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 38 of 724
CVE-2025-68766UNKNOWN≥ 5.16.0, < 6.1.160≥ 6.2.0, < 6.6.120+3 more2026-01-05
CVE-2025-68766 irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc() irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc() In the Linux kernel, the following vulnerability has been resolved: irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc() If irq_domain_translate_twocell() sets "hwirq" to >= MCHP_EIC_NIRQ (2) then it results in an out of bounds access. The code checks for invalid values, but doesn't set the error code. Return -EINVAL in that case, instead of returning
osv
CVE-2025-68763UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.13-12026-01-05
CVE-2025-68763 CVE-2025-68763: In the Linux kernel, the following vulnerability has been resolved: crypto: starfive - Correctly handle return of sg_nents_for_len The return value of In the Linux kernel, the following vulnerability has been resolved: crypto: starfive - Correctly handle return of sg_nents_for_len The return value of sg_nents_for_len was assigned to an unsigned long in starfive_hash_digest, causing negative error codes to be converted to large positive integers. Add error checking
osv
CVE-2023-54285HIGHCVSS 7.8≥ 6.1.92, < 6.1.162≥ 6.2, < 6.5.52025-12-30
CVE-2023-54285 [HIGH] CWE-787 CVE-2023-54285: In the Linux kernel, the following vulnerability has been resolved: iomap: Fix possible overflow co In the Linux kernel, the following vulnerability has been resolved: iomap: Fix possible overflow condition in iomap_write_delalloc_scan folio_next_index() returns an unsigned long value which left shifted by PAGE_SHIFT could possibly cause an overflow on 32-bit system. Instead use folio_pos(folio) + folio_size(folio), which does this correctly.
nvdosv
CVE-2023-54207HIGHCVSS 7.8≥ 4.1, < 5.10.249≥ 5.11, < 5.15.199+3 more2025-12-30
CVE-2023-54207 [HIGH] CWE-416 CVE-2023-54207: In the Linux kernel, the following vulnerability has been resolved: HID: uclogic: Correct devm devi In the Linux kernel, the following vulnerability has been resolved: HID: uclogic: Correct devm device reference for hidinput input_dev name Reference the HID device rather than the input device for the devm allocation of the input_dev name. Referencing the input_dev would lead to a use-after-free when the input_dev was unregistered and subsequently
nvdosv
CVE-2023-54321MEDIUMCVSS 5.5≥ 2.6.26, < 5.10.249≥ 5.11, < 5.15.99+2 more2025-12-30
CVE-2023-54321 [MEDIUM] CWE-476 CVE-2023-54321: In the Linux kernel, the following vulnerability has been resolved: driver core: fix potential null In the Linux kernel, the following vulnerability has been resolved: driver core: fix potential null-ptr-deref in device_add() I got the following null-ptr-deref report while doing fault injection test: BUG: kernel NULL pointer dereference, address: 0000000000000058 CPU: 2 PID: 278 Comm: 37-i2c-ds2482 Tainted: G B W N 6.1.0-rc3+ RIP: 0010:klist_pu
nvdosv
CVE-2023-54265UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.25-12025-12-30
CVE-2023-54265 CVE-2023-54265: In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix an uninit variable access bug in __ip6_make_skb() Syzbot reported a bug In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix an uninit variable access bug in __ip6_make_skb() Syzbot reported a bug as following: ===================================================== BUG: KMSAN: uninit-value in arch_atomic64_inc arch/x86/include/asm/atomic64_64.h:88 [inline] BUG: KMS
osv
CVE-2022-50888UNKNOWN≥ 0, < 6.1.4-12025-12-30
CVE-2022-50888 CVE-2022-50888: In the Linux kernel, the following vulnerability has been resolved: remoteproc: qcom: q6v5: Fix potential null-ptr-deref in q6v5_wcss_init_mmio() q6v5 In the Linux kernel, the following vulnerability has been resolved: remoteproc: qcom: q6v5: Fix potential null-ptr-deref in q6v5_wcss_init_mmio() q6v5_wcss_init_mmio() will call platform_get_resource_byname() that may fail and return NULL. devm_ioremap() will use res->start as input, which may causes null-ptr-deref.
osv
CVE-2023-54228UNKNOWN≥ 0, < 6.5.6-12025-12-30
CVE-2023-54228 CVE-2023-54228: In the Linux kernel, the following vulnerability has been resolved: regulator: raa215300: Fix resource leak in case of error The clk_register_clkdev() In the Linux kernel, the following vulnerability has been resolved: regulator: raa215300: Fix resource leak in case of error The clk_register_clkdev() allocates memory by calling vclkdev_alloc() and this memory is not freed in the error path. Similarly, resources allocated by clk_register_fixed_rate() are not freed i
osv
CVE-2023-54250UNKNOWN≥ 0, < 6.1.25-12025-12-30
CVE-2023-54250 CVE-2023-54250: In the Linux kernel, the following vulnerability has been resolved: ksmbd: avoid out of bounds access in decode_preauth_ctxt() Confirm that the access In the Linux kernel, the following vulnerability has been resolved: ksmbd: avoid out of bounds access in decode_preauth_ctxt() Confirm that the accessed pneg_ctxt->HashAlgorithms address sits within the SMB request boundary; deassemble_neg_contexts() only checks that the eight byte smb2_neg_context header + (client c
osv
CVE-2023-54325UNKNOWN≥ 5.11.0, < 5.15.99≥ 5.16.0, < 6.1.16+1 more2025-12-30
CVE-2023-54325 crypto: qat - fix out-of-bounds read crypto: qat - fix out-of-bounds read In the Linux kernel, the following vulnerability has been resolved: crypto: qat - fix out-of-bounds read When preparing an AER-CTR request, the driver copies the key provided by the user into a data structure that is accessible by the firmware. If the target device is QAT GEN4, the key size is rounded up by 16 since a rounded up size is expected by the device. If the key size is rounded up before the copy
osv
CVE-2023-54294UNKNOWN≥ 4.16.0, < 4.19.283≥ 4.20.0, < 5.4.243+5 more2025-12-30
CVE-2023-54294 md/raid10: fix memleak of md thread md/raid10: fix memleak of md thread In the Linux kernel, the following vulnerability has been resolved: md/raid10: fix memleak of md thread In raid10_run(), if setup_conf() succeed and raid10_run() failed before setting 'mddev->thread', then in the error path 'conf->thread' is not freed. Fix the problem by setting 'mddev->thread' right after setup_conf().
osv
CVE-2023-54296UNKNOWN≥ 0, < 6.1.55-1≥ 0, < 6.5.6-12025-12-30
CVE-2023-54296 CVE-2023-54296: In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration Fix a goo In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration Fix a goof where KVM tries to grab source vCPUs from the destination VM when doing intrahost migration. Grabbing the wrong vCPU not only hoses the guest, it also crashes the hos
osv
CVE-2023-54216UNKNOWN≥ 6.3.0, < 6.3.62025-12-30
CVE-2023-54216 net/mlx5e: TC, Fix using eswitch mapping in nic mode net/mlx5e: TC, Fix using eswitch mapping in nic mode In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: TC, Fix using eswitch mapping in nic mode Cited patch is using the eswitch object mapping pool while in nic mode where it isn't initialized. This results in the trace below [0]. Fix that by using either nic or eswitch object mapping pool depending if eswitch is enabled or not. [0]: [ 826.446057
osv
CVE-2023-54323UNKNOWN≥ 0, < 6.1.20-12025-12-30
CVE-2023-54323 CVE-2023-54323: In the Linux kernel, the following vulnerability has been resolved: cxl/pmem: Fix nvdimm registration races A loop of the form: while true; do modprob In the Linux kernel, the following vulnerability has been resolved: cxl/pmem: Fix nvdimm registration races A loop of the form: while true; do modprobe cxl_pci; modprobe -r cxl_pci; done ...fails with the following crash signature: BUG: kernel NULL pointer dereference, address: 0000000000000040 [..] RIP: 0010:cxl_int
osv
CVE-2022-50850UNKNOWN≥ 2.6.34, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-12-30
CVE-2022-50850 scsi: ipr: Fix WARNING in ipr_init() scsi: ipr: Fix WARNING in ipr_init() In the Linux kernel, the following vulnerability has been resolved: scsi: ipr: Fix WARNING in ipr_init() ipr_init() will not call unregister_reboot_notifier() when pci_register_driver() fails, which causes a WARNING. Call unregister_reboot_notifier() when pci_register_driver() fails. notifier callback ipr_halt [ipr] already registered WARNING: CPU: 3 PID: 299 at kernel/notifier.c:29 notifier_chain_regist
osv
CVE-2022-50860UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-30
CVE-2022-50860 CVE-2022-50860: In the Linux kernel, the following vulnerability has been resolved: apparmor: Fix memleak in alloc_ns() After changes in commit a1bd627b46d1 ("apparmo In the Linux kernel, the following vulnerability has been resolved: apparmor: Fix memleak in alloc_ns() After changes in commit a1bd627b46d1 ("apparmor: share profile name on replacement"), the hname member of struct aa_policy is not valid slab object, but a subset of that, it can not be freed by kfree_sensitive(), u
osv
CVE-2023-54206UNKNOWN≥ 6.3.0, < 6.3.32025-12-30
CVE-2023-54206 net/sched: flower: fix filter idr initialization net/sched: flower: fix filter idr initialization In the Linux kernel, the following vulnerability has been resolved: net/sched: flower: fix filter idr initialization The cited commit moved idr initialization too early in fl_change() which allows concurrent users to access the filter that is still being initialized and is in inconsistent state, which, in turn, can cause NULL pointer dereference [0]. Since there is no obvious way t
osv
CVE-2023-54270UNKNOWN≥ 4.6.0, < 4.14.308≥ 4.15.0, < 4.19.276+5 more2025-12-30
CVE-2023-54270 media: usb: siano: Fix use after free bugs caused by do_submit_urb media: usb: siano: Fix use after free bugs caused by do_submit_urb In the Linux kernel, the following vulnerability has been resolved: media: usb: siano: Fix use after free bugs caused by do_submit_urb There are UAF bugs caused by do_submit_urb(). One of the KASan reports is shown below: [ 36.403605] BUG: KASAN: use-after-free in worker_thread+0x4a2/0x890 [ 36.406105] Read of size 8 at addr ffff8880059600e8 by
osv
CVE-2023-54262UNKNOWN≥ 0, < 6.1.37-1≥ 0, < 6.3.7-12025-12-30
CVE-2023-54262 CVE-2023-54262: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Don't clone flow post action attributes second time The code already cl In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Don't clone flow post action attributes second time The code already clones post action attributes in mlx5e_clone_flow_attr_for_post_act(). Creating another copy in mlx5e_tc_post_act_add() is a erroneous leftover from original implementati
osv
CVE-2023-54211UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-30
CVE-2023-54211 CVE-2023-54211: In the Linux kernel, the following vulnerability has been resolved: tracing: Fix warning in trace_buffered_event_disable() Warning happened in trace_b In the Linux kernel, the following vulnerability has been resolved: tracing: Fix warning in trace_buffered_event_disable() Warning happened in trace_buffered_event_disable() at WARN_ON_ONCE(!trace_buffered_event_ref) Call Trace: ? __warn+0xa5/0x1b0 ? trace_buffered_event_disable+0x189/0x1b0 __ftrace_event_enable_disa
osv