Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 38 of 724
CVE-2025-68766UNKNOWN≥ 5.16.0, < 6.1.160≥ 6.2.0, < 6.6.120+3 more2026-01-05
CVE-2025-68766 irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()
irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()
In the Linux kernel, the following vulnerability has been resolved:
irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()
If irq_domain_translate_twocell() sets "hwirq" to >= MCHP_EIC_NIRQ (2) then
it results in an out of bounds access.
The code checks for invalid values, but doesn't set the error code. Return
-EINVAL in that case, instead of returning
osv
CVE-2025-68763UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.13-12026-01-05
CVE-2025-68763 CVE-2025-68763: In the Linux kernel, the following vulnerability has been resolved: crypto: starfive - Correctly handle return of sg_nents_for_len The return value of
In the Linux kernel, the following vulnerability has been resolved: crypto: starfive - Correctly handle return of sg_nents_for_len The return value of sg_nents_for_len was assigned to an unsigned long in starfive_hash_digest, causing negative error codes to be converted to large positive integers. Add error checking
osv
CVE-2023-54285HIGHCVSS 7.8≥ 6.1.92, < 6.1.162≥ 6.2, < 6.5.52025-12-30
CVE-2023-54285 [HIGH] CWE-787 CVE-2023-54285: In the Linux kernel, the following vulnerability has been resolved:
iomap: Fix possible overflow co
In the Linux kernel, the following vulnerability has been resolved:
iomap: Fix possible overflow condition in iomap_write_delalloc_scan
folio_next_index() returns an unsigned long value which left shifted
by PAGE_SHIFT could possibly cause an overflow on 32-bit system. Instead
use folio_pos(folio) + folio_size(folio), which does this correctly.
nvdosv
CVE-2023-54207HIGHCVSS 7.8≥ 4.1, < 5.10.249≥ 5.11, < 5.15.199+3 more2025-12-30
CVE-2023-54207 [HIGH] CWE-416 CVE-2023-54207: In the Linux kernel, the following vulnerability has been resolved:
HID: uclogic: Correct devm devi
In the Linux kernel, the following vulnerability has been resolved:
HID: uclogic: Correct devm device reference for hidinput input_dev name
Reference the HID device rather than the input device for the devm
allocation of the input_dev name. Referencing the input_dev would lead to a
use-after-free when the input_dev was unregistered and subsequently
nvdosv
CVE-2023-54321MEDIUMCVSS 5.5≥ 2.6.26, < 5.10.249≥ 5.11, < 5.15.99+2 more2025-12-30
CVE-2023-54321 [MEDIUM] CWE-476 CVE-2023-54321: In the Linux kernel, the following vulnerability has been resolved:
driver core: fix potential null
In the Linux kernel, the following vulnerability has been resolved:
driver core: fix potential null-ptr-deref in device_add()
I got the following null-ptr-deref report while doing fault injection test:
BUG: kernel NULL pointer dereference, address: 0000000000000058
CPU: 2 PID: 278 Comm: 37-i2c-ds2482 Tainted: G B W N 6.1.0-rc3+
RIP: 0010:klist_pu
nvdosv
CVE-2023-54265UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.25-12025-12-30
CVE-2023-54265 CVE-2023-54265: In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix an uninit variable access bug in __ip6_make_skb() Syzbot reported a bug
In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix an uninit variable access bug in __ip6_make_skb() Syzbot reported a bug as following: ===================================================== BUG: KMSAN: uninit-value in arch_atomic64_inc arch/x86/include/asm/atomic64_64.h:88 [inline] BUG: KMS
osv
CVE-2022-50888UNKNOWN≥ 0, < 6.1.4-12025-12-30
CVE-2022-50888 CVE-2022-50888: In the Linux kernel, the following vulnerability has been resolved: remoteproc: qcom: q6v5: Fix potential null-ptr-deref in q6v5_wcss_init_mmio() q6v5
In the Linux kernel, the following vulnerability has been resolved: remoteproc: qcom: q6v5: Fix potential null-ptr-deref in q6v5_wcss_init_mmio() q6v5_wcss_init_mmio() will call platform_get_resource_byname() that may fail and return NULL. devm_ioremap() will use res->start as input, which may causes null-ptr-deref.
osv
CVE-2023-54228UNKNOWN≥ 0, < 6.5.6-12025-12-30
CVE-2023-54228 CVE-2023-54228: In the Linux kernel, the following vulnerability has been resolved: regulator: raa215300: Fix resource leak in case of error The clk_register_clkdev()
In the Linux kernel, the following vulnerability has been resolved: regulator: raa215300: Fix resource leak in case of error The clk_register_clkdev() allocates memory by calling vclkdev_alloc() and this memory is not freed in the error path. Similarly, resources allocated by clk_register_fixed_rate() are not freed i
osv
CVE-2023-54250UNKNOWN≥ 0, < 6.1.25-12025-12-30
CVE-2023-54250 CVE-2023-54250: In the Linux kernel, the following vulnerability has been resolved: ksmbd: avoid out of bounds access in decode_preauth_ctxt() Confirm that the access
In the Linux kernel, the following vulnerability has been resolved: ksmbd: avoid out of bounds access in decode_preauth_ctxt() Confirm that the accessed pneg_ctxt->HashAlgorithms address sits within the SMB request boundary; deassemble_neg_contexts() only checks that the eight byte smb2_neg_context header + (client c
osv
CVE-2023-54325UNKNOWN≥ 5.11.0, < 5.15.99≥ 5.16.0, < 6.1.16+1 more2025-12-30
CVE-2023-54325 crypto: qat - fix out-of-bounds read
crypto: qat - fix out-of-bounds read
In the Linux kernel, the following vulnerability has been resolved:
crypto: qat - fix out-of-bounds read
When preparing an AER-CTR request, the driver copies the key provided by
the user into a data structure that is accessible by the firmware.
If the target device is QAT GEN4, the key size is rounded up by 16 since
a rounded up size is expected by the device.
If the key size is rounded up before the copy
osv
CVE-2023-54294UNKNOWN≥ 4.16.0, < 4.19.283≥ 4.20.0, < 5.4.243+5 more2025-12-30
CVE-2023-54294 md/raid10: fix memleak of md thread
md/raid10: fix memleak of md thread
In the Linux kernel, the following vulnerability has been resolved:
md/raid10: fix memleak of md thread
In raid10_run(), if setup_conf() succeed and raid10_run() failed before
setting 'mddev->thread', then in the error path 'conf->thread' is not
freed.
Fix the problem by setting 'mddev->thread' right after setup_conf().
osv
CVE-2023-54296UNKNOWN≥ 0, < 6.1.55-1≥ 0, < 6.5.6-12025-12-30
CVE-2023-54296 CVE-2023-54296: In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration Fix a goo
In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Get source vCPUs from source VM for SEV-ES intrahost migration Fix a goof where KVM tries to grab source vCPUs from the destination VM when doing intrahost migration. Grabbing the wrong vCPU not only hoses the guest, it also crashes the hos
osv
CVE-2023-54216UNKNOWN≥ 6.3.0, < 6.3.62025-12-30
CVE-2023-54216 net/mlx5e: TC, Fix using eswitch mapping in nic mode
net/mlx5e: TC, Fix using eswitch mapping in nic mode
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: TC, Fix using eswitch mapping in nic mode
Cited patch is using the eswitch object mapping pool while
in nic mode where it isn't initialized. This results in the
trace below [0].
Fix that by using either nic or eswitch object mapping pool
depending if eswitch is enabled or not.
[0]:
[ 826.446057
osv
CVE-2023-54323UNKNOWN≥ 0, < 6.1.20-12025-12-30
CVE-2023-54323 CVE-2023-54323: In the Linux kernel, the following vulnerability has been resolved: cxl/pmem: Fix nvdimm registration races A loop of the form: while true; do modprob
In the Linux kernel, the following vulnerability has been resolved: cxl/pmem: Fix nvdimm registration races A loop of the form: while true; do modprobe cxl_pci; modprobe -r cxl_pci; done ...fails with the following crash signature: BUG: kernel NULL pointer dereference, address: 0000000000000040 [..] RIP: 0010:cxl_int
osv
CVE-2022-50850UNKNOWN≥ 2.6.34, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-12-30
CVE-2022-50850 scsi: ipr: Fix WARNING in ipr_init()
scsi: ipr: Fix WARNING in ipr_init()
In the Linux kernel, the following vulnerability has been resolved:
scsi: ipr: Fix WARNING in ipr_init()
ipr_init() will not call unregister_reboot_notifier() when
pci_register_driver() fails, which causes a WARNING. Call
unregister_reboot_notifier() when pci_register_driver() fails.
notifier callback ipr_halt [ipr] already registered
WARNING: CPU: 3 PID: 299 at kernel/notifier.c:29
notifier_chain_regist
osv
CVE-2022-50860UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-30
CVE-2022-50860 CVE-2022-50860: In the Linux kernel, the following vulnerability has been resolved: apparmor: Fix memleak in alloc_ns() After changes in commit a1bd627b46d1 ("apparmo
In the Linux kernel, the following vulnerability has been resolved: apparmor: Fix memleak in alloc_ns() After changes in commit a1bd627b46d1 ("apparmor: share profile name on replacement"), the hname member of struct aa_policy is not valid slab object, but a subset of that, it can not be freed by kfree_sensitive(), u
osv
CVE-2023-54206UNKNOWN≥ 6.3.0, < 6.3.32025-12-30
CVE-2023-54206 net/sched: flower: fix filter idr initialization
net/sched: flower: fix filter idr initialization
In the Linux kernel, the following vulnerability has been resolved:
net/sched: flower: fix filter idr initialization
The cited commit moved idr initialization too early in fl_change() which
allows concurrent users to access the filter that is still being
initialized and is in inconsistent state, which, in turn, can cause NULL
pointer dereference [0]. Since there is no obvious way t
osv
CVE-2023-54270UNKNOWN≥ 4.6.0, < 4.14.308≥ 4.15.0, < 4.19.276+5 more2025-12-30
CVE-2023-54270 media: usb: siano: Fix use after free bugs caused by do_submit_urb
media: usb: siano: Fix use after free bugs caused by do_submit_urb
In the Linux kernel, the following vulnerability has been resolved:
media: usb: siano: Fix use after free bugs caused by do_submit_urb
There are UAF bugs caused by do_submit_urb(). One of the KASan reports
is shown below:
[ 36.403605] BUG: KASAN: use-after-free in worker_thread+0x4a2/0x890
[ 36.406105] Read of size 8 at addr ffff8880059600e8 by
osv
CVE-2023-54262UNKNOWN≥ 0, < 6.1.37-1≥ 0, < 6.3.7-12025-12-30
CVE-2023-54262 CVE-2023-54262: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Don't clone flow post action attributes second time The code already cl
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Don't clone flow post action attributes second time The code already clones post action attributes in mlx5e_clone_flow_attr_for_post_act(). Creating another copy in mlx5e_tc_post_act_add() is a erroneous leftover from original implementati
osv
CVE-2023-54211UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-30
CVE-2023-54211 CVE-2023-54211: In the Linux kernel, the following vulnerability has been resolved: tracing: Fix warning in trace_buffered_event_disable() Warning happened in trace_b
In the Linux kernel, the following vulnerability has been resolved: tracing: Fix warning in trace_buffered_event_disable() Warning happened in trace_buffered_event_disable() at WARN_ON_ONCE(!trace_buffered_event_ref) Call Trace: ? __warn+0xa5/0x1b0 ? trace_buffered_event_disable+0x189/0x1b0 __ftrace_event_enable_disa
osv