Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 50 of 724
CVE-2022-50816UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.7-12025-12-30
CVE-2022-50816 CVE-2022-50816: In the Linux kernel, the following vulnerability has been resolved: ipv6: ensure sane device mtu in tunnels Another syzbot report [1] with no reproduc In the Linux kernel, the following vulnerability has been resolved: ipv6: ensure sane device mtu in tunnels Another syzbot report [1] with no reproducer hints at a bug in ip6_gre tunnel (dev:ip6gretap0) Since ipv6 mcast code makes sure to read dev->mtu once and applies a sanity check on it (see commit b9b312a7a451 "i
osv
CVE-2023-54264UNKNOWN≥ 2.6.19, < 4.14.322≥ 4.15.0, < 4.19.291+5 more2025-12-30
CVE-2023-54264 fs/sysv: Null check to prevent null-ptr-deref bug fs/sysv: Null check to prevent null-ptr-deref bug In the Linux kernel, the following vulnerability has been resolved: fs/sysv: Null check to prevent null-ptr-deref bug sb_getblk(inode->i_sb, parent) return a null ptr and taking lock on that leads to the null-ptr-deref bug.
osv
CVE-2023-54195UNKNOWN≥ 6.2.0, < 6.2.16≥ 6.3.0, < 6.3.32025-12-30
CVE-2023-54195 rxrpc: Fix timeout of a call that hasn't yet been granted a channel rxrpc: Fix timeout of a call that hasn't yet been granted a channel In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix timeout of a call that hasn't yet been granted a channel afs_make_call() calls rxrpc_kernel_begin_call() to begin a call (which may get stalled in the background waiting for a connection to become available); it then calls rxrpc_kernel_set_max_life() to set the timeo
osv
CVE-2022-50840UNKNOWN≥ 4.2.0, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-12-30
CVE-2022-50840 scsi: snic: Fix possible UAF in snic_tgt_create() scsi: snic: Fix possible UAF in snic_tgt_create() In the Linux kernel, the following vulnerability has been resolved: scsi: snic: Fix possible UAF in snic_tgt_create() Smatch reports a warning as follows: drivers/scsi/snic/snic_disc.c:307 snic_tgt_create() warn: '&tgt->list' not removed from list If device_add() fails in snic_tgt_create(), tgt will be freed, but tgt->list will not be removed from snic->disc.tgt_list, then list
osv
CVE-2023-54223UNKNOWN≥ 6.4.5, < 6.4.102025-12-30
CVE-2023-54223 net/mlx5e: xsk: Fix invalid buffer access for legacy rq net/mlx5e: xsk: Fix invalid buffer access for legacy rq In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: xsk: Fix invalid buffer access for legacy rq The below crash can be encountered when using xdpsock in rx mode for legacy rq: the buffer gets released in the XDP_REDIRECT path, and then once again in the driver. This fix sets the flag to avoid releasing on the driver side. XSK handling of b
osv
CVE-2022-50846UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-30
CVE-2022-50846 CVE-2022-50846: In the Linux kernel, the following vulnerability has been resolved: mmc: via-sdmmc: fix return value check of mmc_add_host() mmc_add_host() may return In the Linux kernel, the following vulnerability has been resolved: mmc: via-sdmmc: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, it will lead two issues: 1. The memory that allocated in mmc_alloc_host() is leaked. 2. In the remove() path, mmc_remove_host() w
osv
CVE-2025-68358MEDIUMCVSS 5.5≥ 4.8, < 5.15.201≥ 5.16, < 6.1.164+4 more2025-12-24
CVE-2025-68358 [MEDIUM] CVE-2025-68358: In the Linux kernel, the following vulnerability has been resolved: btrfs: fix racy bitfield write In the Linux kernel, the following vulnerability has been resolved: btrfs: fix racy bitfield write in btrfs_clear_space_info_full() From the memory-barriers.txt document regarding memory barrier ordering guarantees: (*) These guarantees do not apply to bitfields, because compilers often generate code to modify these using non-atomic read-modify-write sequ
nvdosv
CVE-2025-68351MEDIUMCVSS 5.5≥ 6.12.23, < 6.12.68≥ 6.12.59, < 6.13+3 more2025-12-24
CVE-2025-68351 [MEDIUM] CVE-2025-68351: In the Linux kernel, the following vulnerability has been resolved: exfat: fix refcount leak in exf In the Linux kernel, the following vulnerability has been resolved: exfat: fix refcount leak in exfat_find Fix refcount leaks in `exfat_find` related to `exfat_get_dentry_set`. Function `exfat_get_dentry_set` would increase the reference counter of `es->bh` on success. Therefore, `exfat_put_dentry_set` must be called after `exfat_get_dentry_set` to ensur
nvdosv
CVE-2025-68725MEDIUMCVSS 5.5≥ 5.6, < 5.10.249≥ 5.11, < 5.15.199+4 more2025-12-24
CVE-2025-68725 [MEDIUM] CVE-2025-68725: In the Linux kernel, the following vulnerability has been resolved: bpf: Do not let BPF test infra In the Linux kernel, the following vulnerability has been resolved: bpf: Do not let BPF test infra emit invalid GSO types to stack Yinhao et al. reported that their fuzzer tool was able to trigger a skb_warn_bad_offload() from netif_skb_features() -> gso_features_check(). When a BPF program - triggered via BPF test infra - pushes the packet to the loopback
nvdosv
CVE-2025-68365MEDIUMCVSS 5.5≥ 5.15, < 5.15.199≥ 5.16, < 6.1.162+3 more2025-12-24
CVE-2025-68365 [MEDIUM] CWE-908 CVE-2025-68365: In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Initialize allocated In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Initialize allocated memory before use KMSAN reports: Multiple uninitialized values detected: - KMSAN: uninit-value in ntfs_read_hdr (3) - KMSAN: uninit-value in bcmp (3) Memory is allocated by __getname(), which is a wrapper for kmem_cache_alloc(). This memory is used
nvdosv
CVE-2025-68749MEDIUMCVSS 4.7≥ 6.8, < 6.12.68≥ 6.13, < 6.17.13+1 more2025-12-24
CVE-2025-68749 [MEDIUM] CWE-362 CVE-2025-68749: In the Linux kernel, the following vulnerability has been resolved: accel/ivpu: Fix race condition In the Linux kernel, the following vulnerability has been resolved: accel/ivpu: Fix race condition when unbinding BOs Fix 'Memory manager not clean during takedown' warning that occurs when ivpu_gem_bo_free() removes the BO from the BOs list before it gets unmapped. Then file_priv_unbind() triggers a warning in drm_mm_takedown() during context tear
nvdosv
CVE-2023-54031MEDIUMCVSS 4.4≥ 0, < 6.1.52-1≥ 0, < 6.4.13-12025-12-24
CVE-2023-54031 [MEDIUM] CVE-2023-54031: In the Linux kernel, the following vulnerability has been resolved: vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check The vdpa_nl_p In the Linux kernel, the following vulnerability has been resolved: vdpa: Add queue index attr to vdpa_nl_policy for nlattr length check The vdpa_nl_policy structure is used to validate the nlattr when parsing the incoming nlmsg. It will ensure the attribute being described produces a valid nlattr pointer in
osv
CVE-2023-54040UNKNOWN≥ 0, < 6.1.25-12025-12-24
CVE-2023-54040 CVE-2023-54040: In the Linux kernel, the following vulnerability has been resolved: ice: fix wrong fallback logic for FDIR When adding a FDIR filter, if ice_vc_fdir_s In the Linux kernel, the following vulnerability has been resolved: ice: fix wrong fallback logic for FDIR When adding a FDIR filter, if ice_vc_fdir_set_irq_ctx returns failure, the inserted fdir entry will not be removed and if ice_vc_fdir_write_fltr returns failure, the fdir context info for irq handler will not be
osv
CVE-2022-50716UNKNOWN≥ 3.8.0, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-12-24
CVE-2022-50716 wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out In the Linux kernel, the following vulnerability has been resolved: wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out syzkaller reported use-after-free with the stack trace like below [1]: [ 38.960489][ C3] ================================================================== [ 38.963216][ C3] BUG: KASAN: use-after-free in ar5523_cmd_tx_cb+0x220/0x240 [ 3
osv
CVE-2022-50697UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-24
CVE-2022-50697 CVE-2022-50697: In the Linux kernel, the following vulnerability has been resolved: mrp: introduce active flags to prevent UAF when applicant uninit The caller of del In the Linux kernel, the following vulnerability has been resolved: mrp: introduce active flags to prevent UAF when applicant uninit The caller of del_timer_sync must prevent restarting of the timer, If we have no this synchronization, there is a small probability that the cancellation will not be successful. And syz
osv
CVE-2022-50711UNKNOWN≥ 0, < 6.0.6-12025-12-24
CVE-2022-50711 CVE-2022-50711: In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_eth_soc: fix possible memory leak in mtk_probe() If mtk_wed_add In the Linux kernel, the following vulnerability has been resolved: net: ethernet: mtk_eth_soc: fix possible memory leak in mtk_probe() If mtk_wed_add_hw() has been called, mtk_wed_exit() needs be called in error path or removing module to free the memory allocated in mtk_wed_add_hw().
osv
CVE-2022-50764UNKNOWN≥ 2.6.37, < 5.15.86≥ 5.16.0, < 6.0.16+1 more2025-12-24
CVE-2022-50764 ipv6/sit: use DEV_STATS_INC() to avoid data-races ipv6/sit: use DEV_STATS_INC() to avoid data-races In the Linux kernel, the following vulnerability has been resolved: ipv6/sit: use DEV_STATS_INC() to avoid data-races syzbot/KCSAN reported that multiple cpus are updating dev->stats.tx_error concurrently. This is because sit tunnels are NETIF_F_LLTX, meaning their ndo_start_xmit() is not protected by a spinlock. While original KCSAN report was about tx path, rx path has the sa
osv
CVE-2022-50750UNKNOWN≥ 5.1.0, < 5.4.229≥ 5.5.0, < 5.10.163+3 more2025-12-24
CVE-2022-50750 drm/panel/panel-sitronix-st7701: Remove panel on DSI attach failure drm/panel/panel-sitronix-st7701: Remove panel on DSI attach failure In the Linux kernel, the following vulnerability has been resolved: drm/panel/panel-sitronix-st7701: Remove panel on DSI attach failure In case mipi_dsi_attach() fails, call drm_panel_remove() to avoid memory leak.
osv
CVE-2025-68740UNKNOWN≥ 2.6.30, < 5.10.248≥ 5.11.0, < 5.15.198+5 more2025-12-24
CVE-2025-68740 ima: Handle error code returned by ima_filter_rule_match() ima: Handle error code returned by ima_filter_rule_match() In the Linux kernel, the following vulnerability has been resolved: ima: Handle error code returned by ima_filter_rule_match() In ima_match_rules(), if ima_filter_rule_match() returns -ENOENT due to the rule being NULL, the function incorrectly skips the 'if (!rc)' check and sets 'result = true'. The LSM rule is considered a match, causing extra files to be meas
osv
CVE-2023-54092UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-24
CVE-2023-54092 CVE-2023-54092: In the Linux kernel, the following vulnerability has been resolved: KVM: s390: pv: fix index value of replaced ASCE The index field of the struct page In the Linux kernel, the following vulnerability has been resolved: KVM: s390: pv: fix index value of replaced ASCE The index field of the struct page corresponding to a guest ASCE should be 0. When replacing the ASCE in s390_replace_asce(), the index of the new ASCE should also be set to 0. Having the wrong index mi
osv