Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 50 of 724
CVE-2022-50816UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.7-12025-12-30
CVE-2022-50816 CVE-2022-50816: In the Linux kernel, the following vulnerability has been resolved: ipv6: ensure sane device mtu in tunnels Another syzbot report [1] with no reproduc
In the Linux kernel, the following vulnerability has been resolved: ipv6: ensure sane device mtu in tunnels Another syzbot report [1] with no reproducer hints at a bug in ip6_gre tunnel (dev:ip6gretap0) Since ipv6 mcast code makes sure to read dev->mtu once and applies a sanity check on it (see commit b9b312a7a451 "i
osv
CVE-2023-54264UNKNOWN≥ 2.6.19, < 4.14.322≥ 4.15.0, < 4.19.291+5 more2025-12-30
CVE-2023-54264 fs/sysv: Null check to prevent null-ptr-deref bug
fs/sysv: Null check to prevent null-ptr-deref bug
In the Linux kernel, the following vulnerability has been resolved:
fs/sysv: Null check to prevent null-ptr-deref bug
sb_getblk(inode->i_sb, parent) return a null ptr and taking lock on
that leads to the null-ptr-deref bug.
osv
CVE-2023-54195UNKNOWN≥ 6.2.0, < 6.2.16≥ 6.3.0, < 6.3.32025-12-30
CVE-2023-54195 rxrpc: Fix timeout of a call that hasn't yet been granted a channel
rxrpc: Fix timeout of a call that hasn't yet been granted a channel
In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Fix timeout of a call that hasn't yet been granted a channel
afs_make_call() calls rxrpc_kernel_begin_call() to begin a call (which may
get stalled in the background waiting for a connection to become
available); it then calls rxrpc_kernel_set_max_life() to set the timeo
osv
CVE-2022-50840UNKNOWN≥ 4.2.0, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-12-30
CVE-2022-50840 scsi: snic: Fix possible UAF in snic_tgt_create()
scsi: snic: Fix possible UAF in snic_tgt_create()
In the Linux kernel, the following vulnerability has been resolved:
scsi: snic: Fix possible UAF in snic_tgt_create()
Smatch reports a warning as follows:
drivers/scsi/snic/snic_disc.c:307 snic_tgt_create() warn:
'&tgt->list' not removed from list
If device_add() fails in snic_tgt_create(), tgt will be freed, but
tgt->list will not be removed from snic->disc.tgt_list, then list
osv
CVE-2023-54223UNKNOWN≥ 6.4.5, < 6.4.102025-12-30
CVE-2023-54223 net/mlx5e: xsk: Fix invalid buffer access for legacy rq
net/mlx5e: xsk: Fix invalid buffer access for legacy rq
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: xsk: Fix invalid buffer access for legacy rq
The below crash can be encountered when using xdpsock in rx mode for
legacy rq: the buffer gets released in the XDP_REDIRECT path, and then
once again in the driver. This fix sets the flag to avoid releasing on
the driver side.
XSK handling of b
osv
CVE-2022-50846UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-30
CVE-2022-50846 CVE-2022-50846: In the Linux kernel, the following vulnerability has been resolved: mmc: via-sdmmc: fix return value check of mmc_add_host() mmc_add_host() may return
In the Linux kernel, the following vulnerability has been resolved: mmc: via-sdmmc: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, it will lead two issues: 1. The memory that allocated in mmc_alloc_host() is leaked. 2. In the remove() path, mmc_remove_host() w
osv
CVE-2025-68358MEDIUMCVSS 5.5≥ 4.8, < 5.15.201≥ 5.16, < 6.1.164+4 more2025-12-24
CVE-2025-68358 [MEDIUM] CVE-2025-68358: In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix racy bitfield write
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix racy bitfield write in btrfs_clear_space_info_full()
From the memory-barriers.txt document regarding memory barrier ordering
guarantees:
(*) These guarantees do not apply to bitfields, because compilers often
generate code to modify these using non-atomic read-modify-write
sequ
nvdosv
CVE-2025-68351MEDIUMCVSS 5.5≥ 6.12.23, < 6.12.68≥ 6.12.59, < 6.13+3 more2025-12-24
CVE-2025-68351 [MEDIUM] CVE-2025-68351: In the Linux kernel, the following vulnerability has been resolved:
exfat: fix refcount leak in exf
In the Linux kernel, the following vulnerability has been resolved:
exfat: fix refcount leak in exfat_find
Fix refcount leaks in `exfat_find` related to `exfat_get_dentry_set`.
Function `exfat_get_dentry_set` would increase the reference counter of
`es->bh` on success. Therefore, `exfat_put_dentry_set` must be called
after `exfat_get_dentry_set` to ensur
nvdosv
CVE-2025-68725MEDIUMCVSS 5.5≥ 5.6, < 5.10.249≥ 5.11, < 5.15.199+4 more2025-12-24
CVE-2025-68725 [MEDIUM] CVE-2025-68725: In the Linux kernel, the following vulnerability has been resolved:
bpf: Do not let BPF test infra
In the Linux kernel, the following vulnerability has been resolved:
bpf: Do not let BPF test infra emit invalid GSO types to stack
Yinhao et al. reported that their fuzzer tool was able to trigger a
skb_warn_bad_offload() from netif_skb_features() -> gso_features_check().
When a BPF program - triggered via BPF test infra - pushes the packet
to the loopback
nvdosv
CVE-2025-68365MEDIUMCVSS 5.5≥ 5.15, < 5.15.199≥ 5.16, < 6.1.162+3 more2025-12-24
CVE-2025-68365 [MEDIUM] CWE-908 CVE-2025-68365: In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Initialize allocated
In the Linux kernel, the following vulnerability has been resolved:
fs/ntfs3: Initialize allocated memory before use
KMSAN reports: Multiple uninitialized values detected:
- KMSAN: uninit-value in ntfs_read_hdr (3)
- KMSAN: uninit-value in bcmp (3)
Memory is allocated by __getname(), which is a wrapper for
kmem_cache_alloc(). This memory is used
nvdosv
CVE-2025-68749MEDIUMCVSS 4.7≥ 6.8, < 6.12.68≥ 6.13, < 6.17.13+1 more2025-12-24
CVE-2025-68749 [MEDIUM] CWE-362 CVE-2025-68749: In the Linux kernel, the following vulnerability has been resolved:
accel/ivpu: Fix race condition
In the Linux kernel, the following vulnerability has been resolved:
accel/ivpu: Fix race condition when unbinding BOs
Fix 'Memory manager not clean during takedown' warning that occurs
when ivpu_gem_bo_free() removes the BO from the BOs list before it
gets unmapped. Then file_priv_unbind() triggers a warning in
drm_mm_takedown() during context tear
nvdosv
CVE-2023-54031MEDIUMCVSS 4.4≥ 0, < 6.1.52-1≥ 0, < 6.4.13-12025-12-24
CVE-2023-54031 [MEDIUM] CVE-2023-54031: In the Linux kernel, the following vulnerability has been resolved: vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check The vdpa_nl_p
In the Linux kernel, the following vulnerability has been resolved: vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check The vdpa_nl_policy structure is used to validate the nlattr when parsing the incoming nlmsg. It will ensure the attribute being described produces a valid nlattr pointer in
osv
CVE-2023-54040UNKNOWN≥ 0, < 6.1.25-12025-12-24
CVE-2023-54040 CVE-2023-54040: In the Linux kernel, the following vulnerability has been resolved: ice: fix wrong fallback logic for FDIR When adding a FDIR filter, if ice_vc_fdir_s
In the Linux kernel, the following vulnerability has been resolved: ice: fix wrong fallback logic for FDIR When adding a FDIR filter, if ice_vc_fdir_set_irq_ctx returns failure, the inserted fdir entry will not be removed and if ice_vc_fdir_write_fltr returns failure, the fdir context info for irq handler will not be
osv
CVE-2022-50716UNKNOWN≥ 3.8.0, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-12-24
CVE-2022-50716 wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out
wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out
In the Linux kernel, the following vulnerability has been resolved:
wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out
syzkaller reported use-after-free with the stack trace like below [1]:
[ 38.960489][ C3] ==================================================================
[ 38.963216][ C3] BUG: KASAN: use-after-free in ar5523_cmd_tx_cb+0x220/0x240
[ 3
osv
CVE-2022-50697UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-24
CVE-2022-50697 CVE-2022-50697: In the Linux kernel, the following vulnerability has been resolved: mrp: introduce active flags to prevent UAF when applicant uninit The caller of del
In the Linux kernel, the following vulnerability has been resolved: mrp: introduce active flags to prevent UAF when applicant uninit The caller of del_timer_sync must prevent restarting of the timer, If we have no this synchronization, there is a small probability that the cancellation will not be successful. And syz
osv
CVE-2022-50711UNKNOWN≥ 0, < 6.0.6-12025-12-24
CVE-2022-50711 CVE-2022-50711: In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_eth_soc: fix possible memory leak in mtk_probe() If mtk_wed_add
In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_eth_soc: fix possible memory leak in mtk_probe() If mtk_wed_add_hw() has been called, mtk_wed_exit() needs be called in error path or removing module to free the memory allocated in mtk_wed_add_hw().
osv
CVE-2022-50764UNKNOWN≥ 2.6.37, < 5.15.86≥ 5.16.0, < 6.0.16+1 more2025-12-24
CVE-2022-50764 ipv6/sit: use DEV_STATS_INC() to avoid data-races
ipv6/sit: use DEV_STATS_INC() to avoid data-races
In the Linux kernel, the following vulnerability has been resolved:
ipv6/sit: use DEV_STATS_INC() to avoid data-races
syzbot/KCSAN reported that multiple cpus are updating dev->stats.tx_error
concurrently.
This is because sit tunnels are NETIF_F_LLTX, meaning their ndo_start_xmit()
is not protected by a spinlock.
While original KCSAN report was about tx path, rx path has the sa
osv
CVE-2022-50750UNKNOWN≥ 5.1.0, < 5.4.229≥ 5.5.0, < 5.10.163+3 more2025-12-24
CVE-2022-50750 drm/panel/panel-sitronix-st7701: Remove panel on DSI attach failure
drm/panel/panel-sitronix-st7701: Remove panel on DSI attach failure
In the Linux kernel, the following vulnerability has been resolved:
drm/panel/panel-sitronix-st7701: Remove panel on DSI attach failure
In case mipi_dsi_attach() fails, call drm_panel_remove() to
avoid memory leak.
osv
CVE-2025-68740UNKNOWN≥ 2.6.30, < 5.10.248≥ 5.11.0, < 5.15.198+5 more2025-12-24
CVE-2025-68740 ima: Handle error code returned by ima_filter_rule_match()
ima: Handle error code returned by ima_filter_rule_match()
In the Linux kernel, the following vulnerability has been resolved:
ima: Handle error code returned by ima_filter_rule_match()
In ima_match_rules(), if ima_filter_rule_match() returns -ENOENT due to
the rule being NULL, the function incorrectly skips the 'if (!rc)' check
and sets 'result = true'. The LSM rule is considered a match, causing
extra files to be meas
osv
CVE-2023-54092UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-24
CVE-2023-54092 CVE-2023-54092: In the Linux kernel, the following vulnerability has been resolved: KVM: s390: pv: fix index value of replaced ASCE The index field of the struct page
In the Linux kernel, the following vulnerability has been resolved: KVM: s390: pv: fix index value of replaced ASCE The index field of the struct page corresponding to a guest ASCE should be 0. When replacing the ASCE in s390_replace_asce(), the index of the new ASCE should also be set to 0. Having the wrong index mi
osv