Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 54 of 724
CVE-2023-54072UNKNOWN≥ 0, < 5.10.197-1≥ 0, < 6.1.52-1+1 more2025-12-24
CVE-2023-54072 CVE-2023-54072: In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Fix potential data race at PCM memory allocation helpers The PCM memory In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: Fix potential data race at PCM memory allocation helpers The PCM memory allocation helpers have a sanity check against too many buffer allocations. However, the check is performed without a proper lock and the allocation isn't serialized;
osv
CVE-2023-53993UNKNOWN≥ 0, < 6.1.25-12025-12-24
CVE-2023-53993 CVE-2023-53993: In the Linux kernel, the following vulnerability has been resolved: PCI/DOE: Fix memory leak with CONFIG_DEBUG_OBJECTS=y After a pci_doe_task complete In the Linux kernel, the following vulnerability has been resolved: PCI/DOE: Fix memory leak with CONFIG_DEBUG_OBJECTS=y After a pci_doe_task completes, its work_struct needs to be destroyed to avoid a memory leak with CONFIG_DEBUG_OBJECTS=y.
osv
CVE-2023-53986UNKNOWN≥ 4.19.0, < 5.4.240≥ 5.5.0, < 5.10.177+3 more2025-12-24
CVE-2023-53986 mips: bmips: BCM6358: disable RAC flush for TP1 mips: bmips: BCM6358: disable RAC flush for TP1 In the Linux kernel, the following vulnerability has been resolved: mips: bmips: BCM6358: disable RAC flush for TP1 RAC flush causes kernel panics on BCM6358 with EHCI/OHCI when booting from TP1: [ 3.881739] usb 1-1: new high-speed USB device number 2 using ehci-platform [ 3.895011] Reserved instruction in kernel code[#1]: [ 3.900113] CPU: 0 PID: 1 Comm: init Not tainted 5.10.16 #0 [
osv
CVE-2022-50714UNKNOWN≥ 0, < 6.0.3-12025-12-24
CVE-2022-50714 CVE-2022-50714: In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921e: fix rmmod crash in driver reload test In insmod/rmmod stress In the Linux kernel, the following vulnerability has been resolved: wifi: mt76: mt7921e: fix rmmod crash in driver reload test In insmod/rmmod stress test, the following crash dump shows up immediately. The problem is caused by missing mt76_dev in mt7921_pci_remove(). We should make sure the drvdata is ready before pr
osv
CVE-2025-68743UNKNOWN≥ 0, < 6.17.13-12025-12-24
CVE-2025-68743 CVE-2025-68743: In the Linux kernel, the following vulnerability has been resolved: mshv: Fix create memory region overlap check The current check is incorrect; it on In the Linux kernel, the following vulnerability has been resolved: mshv: Fix create memory region overlap check The current check is incorrect; it only checks if the beginning or end of a region is within an existing region. This doesn't account for userspace specifying a region that begins before and ends after an
osv
CVE-2022-50736UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-24
CVE-2022-50736 CVE-2022-50736: In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Fix immediate work request flush to completion queue Correctly set send In the Linux kernel, the following vulnerability has been resolved: RDMA/siw: Fix immediate work request flush to completion queue Correctly set send queue element opcode during immediate work request flushing in post sendqueue operation, if the QP is in ERROR state. An undefined ocode value results in out-of-bounds a
osv
CVE-2025-68748UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.13-12025-12-24
CVE-2025-68748 CVE-2025-68748: In the Linux kernel, the following vulnerability has been resolved: drm/panthor: Fix UAF race between device unplug and FW event processing The functi In the Linux kernel, the following vulnerability has been resolved: drm/panthor: Fix UAF race between device unplug and FW event processing The function panthor_fw_unplug() will free the FW memory sections. The problem is that there could still be pending FW events which are yet not handled at this point. process_fw_
osv
CVE-2023-54063UNKNOWN≥ 5.15.0, < 5.15.111≥ 5.16.0, < 6.1.28+2 more2025-12-24
CVE-2023-54063 fs/ntfs3: Fix OOB read in indx_insert_into_buffer fs/ntfs3: Fix OOB read in indx_insert_into_buffer In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix OOB read in indx_insert_into_buffer Syzbot reported a OOB read bug: BUG: KASAN: slab-out-of-bounds in indx_insert_into_buffer+0xaa3/0x13b0 fs/ntfs3/index.c:1755 Read of size 17168 at addr ffff8880255e06c0 by task syz-executor308/3630 Call Trace: memmove+0x25/0x60 mm/kasan/shadow.c:54 indx_insert_
osv
CVE-2022-50743UNKNOWN≥ 0, < 6.1.4-12025-12-24
CVE-2022-50743 CVE-2022-50743: In the Linux kernel, the following vulnerability has been resolved: erofs: Fix pcluster memleak when its block address is zero syzkaller reported a me In the Linux kernel, the following vulnerability has been resolved: erofs: Fix pcluster memleak when its block address is zero syzkaller reported a memleak: https://syzkaller.appspot.com/bug?id=62f37ff612f0021641eda5b17f056f1668aa9aed unreferenced object 0xffff88811009c7f8 (size 136): ... backtrace: [] z_erofs_do_rea
osv
CVE-2025-68349UNKNOWN≥ 4.10.0, < 5.10.248≥ 5.11.0, < 5.15.198+5 more2025-12-24
CVE-2025-68349 NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid In the Linux kernel, the following vulnerability has been resolved: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid Fixes a crash when layout is null during this call stack: write_inode -> nfs4_write_inode -> pnfs_layoutcommit_inode pnfs_set_layoutcommit relies on the lseg refcount to keep the layout a
osv
CVE-2022-50758UNKNOWN≥ 4.18.0, < 4.19.262≥ 4.20.0, < 5.4.220+4 more2025-12-24
CVE-2022-50758 staging: vt6655: fix potential memory leak staging: vt6655: fix potential memory leak In the Linux kernel, the following vulnerability has been resolved: staging: vt6655: fix potential memory leak In function device_init_td0_ring, memory is allocated for member td_info of priv->apTD0Rings[i], with i increasing from 0. In case of allocation failure, the memory is freed in reversed order, with i decreasing to 0. However, the case i=0 is left out and thus memory is leaked. Modify
osv
CVE-2022-50776UNKNOWN≥ 3.15.0, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-12-24
CVE-2022-50776 clk: st: Fix memory leak in st_of_quadfs_setup() clk: st: Fix memory leak in st_of_quadfs_setup() In the Linux kernel, the following vulnerability has been resolved: clk: st: Fix memory leak in st_of_quadfs_setup() If st_clk_register_quadfs_pll() fails, @lock should be freed before goto @err_exit, otherwise will cause meory leak issue, fix it.
osv
CVE-2022-50712UNKNOWN≥ 0, < 6.1.4-12025-12-24
CVE-2022-50712 CVE-2022-50712: In the Linux kernel, the following vulnerability has been resolved: devlink: hold region lock when flushing snapshots Netdevsim triggers a splat on re In the Linux kernel, the following vulnerability has been resolved: devlink: hold region lock when flushing snapshots Netdevsim triggers a splat on reload, when it destroys regions with snapshots pending: WARNING: CPU: 1 PID: 787 at net/core/devlink.c:6291 devlink_region_snapshot_del+0x12e/0x140 CPU: 1 PID: 787 Comm:
osv
CVE-2023-54101UNKNOWN≥ 5.17.0, < 6.1.39≥ 6.2.0, < 6.3.13+1 more2025-12-24
CVE-2023-54101 driver: soc: xilinx: use _safe loop iterator to avoid a use after free driver: soc: xilinx: use _safe loop iterator to avoid a use after free In the Linux kernel, the following vulnerability has been resolved: driver: soc: xilinx: use _safe loop iterator to avoid a use after free The hash_for_each_possible() loop dereferences "eve_data" to get the next item on the list. However the loop frees eve_data so it leads to a use after free. Use hash_for_each_possible_safe() instead.
osv
CVE-2025-68378UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.13-12025-12-24
CVE-2025-68378 CVE-2025-68378: In the Linux kernel, the following vulnerability has been resolved: bpf: Fix stackmap overflow check in __bpf_get_stackid() Syzkaller reported a KASAN In the Linux kernel, the following vulnerability has been resolved: bpf: Fix stackmap overflow check in __bpf_get_stackid() Syzkaller reported a KASAN slab-out-of-bounds write in __bpf_get_stackid() when copying stack trace data. The issue occurs when the perf trace contains more stack entries than the stack map buck
osv
CVE-2025-68361UNKNOWN≥ 6.12.0, < 6.12.63≥ 6.13.0, < 6.17.13+1 more2025-12-24
CVE-2025-68361 erofs: limit the level of fs stacking for file-backed mounts erofs: limit the level of fs stacking for file-backed mounts In the Linux kernel, the following vulnerability has been resolved: erofs: limit the level of fs stacking for file-backed mounts Otherwise, it could cause potential kernel stack overflow (e.g., EROFS mounting itself).
osv
CVE-2022-50767UNKNOWN≥ 3.2.0, < 4.9.332≥ 4.10.0, < 4.14.298+5 more2025-12-24
CVE-2022-50767 fbdev: smscufx: Fix several use-after-free bugs fbdev: smscufx: Fix several use-after-free bugs In the Linux kernel, the following vulnerability has been resolved: fbdev: smscufx: Fix several use-after-free bugs Several types of UAFs can occur when physically removing a USB device. Adds ufx_ops_destroy() function to .fb_destroy of fb_ops, and in this function, there is kref_put() that finally calls ufx_free(). This fix prevents multiple UAFs.
osv
CVE-2022-50727UNKNOWN≥ 5.14.0, < 5.15.86≥ 5.16.0, < 6.0.16+1 more2025-12-24
CVE-2022-50727 scsi: efct: Fix possible memleak in efct_device_init() scsi: efct: Fix possible memleak in efct_device_init() In the Linux kernel, the following vulnerability has been resolved: scsi: efct: Fix possible memleak in efct_device_init() In efct_device_init(), when efct_scsi_reg_fc_transport() fails, efct_scsi_tgt_driver_exit() is not called to release memory for efct_scsi_tgt_driver_init() and causes memleak: unreferenced object 0xffff8881020ce000 (size 2048): comm "modprobe", pid
osv
CVE-2023-54160UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-24
CVE-2023-54160 CVE-2023-54160: In the Linux kernel, the following vulnerability has been resolved: firmware: arm_sdei: Fix sleep from invalid context BUG Running a preempt-rt (v6 In the Linux kernel, the following vulnerability has been resolved: firmware: arm_sdei: Fix sleep from invalid context BUG Running a preempt-rt (v6.2-rc3-rt1) based kernel on an Ampere Altra triggers: BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46 in_atomic(): 0, irqs_disabled(): 1
osv
CVE-2022-50748UNKNOWN≥ 5.19.0, < 5.19.17≥ 5.20.0, < 6.0.32025-12-24
CVE-2022-50748 ipc: mqueue: fix possible memory leak in init_mqueue_fs() ipc: mqueue: fix possible memory leak in init_mqueue_fs() In the Linux kernel, the following vulnerability has been resolved: ipc: mqueue: fix possible memory leak in init_mqueue_fs() commit db7cfc380900 ("ipc: Free mq_sysctls if ipc namespace creation failed") Here's a similar memory leak to the one fixed by the patch above. retire_mq_sysctls need to be called when init_mqueue_fs fails after setup_mq_sysctls.
osv