Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 55 of 724
CVE-2023-54029UNKNOWN≥ 0, < 6.1.37-1≥ 0, < 6.3.7-12025-12-24
CVE-2023-54029 CVE-2023-54029: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO For MLO, we cannot use vif->bs In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO For MLO, we cannot use vif->bss_conf.chandef.chan->band, since that will lead to a NULL-ptr dereference as bss_conf isn't used. However, in case of real MLO, we also need to take both LMACs into acc
osv
CVE-2025-68348UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.13-12025-12-24
CVE-2025-68348 CVE-2025-68348: In the Linux kernel, the following vulnerability has been resolved: block: fix memory leak in __blkdev_issue_zero_pages Move the fatal signal check be In the Linux kernel, the following vulnerability has been resolved: block: fix memory leak in __blkdev_issue_zero_pages Move the fatal signal check before bio_alloc() to prevent a memory leak when BLKDEV_ZERO_KILLABLE is set and a fatal signal is pending. Previously, the bio was allocated before checking for a fatal
osv
CVE-2025-68352UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.13-12025-12-24
CVE-2025-68352 CVE-2025-68352: In the Linux kernel, the following vulnerability has been resolved: spi: ch341: fix out-of-bounds memory access in ch341_transfer_one Discovered by At In the Linux kernel, the following vulnerability has been resolved: spi: ch341: fix out-of-bounds memory access in ch341_transfer_one Discovered by Atuin - Automated Vulnerability Discovery Engine. The 'len' variable is calculated as 'min(32, trans->len + 1)', which includes the 1-byte command header. When copying da
osv
CVE-2025-68746UNKNOWN≥ 5.12.0, < 5.15.198≥ 5.16.0, < 6.1.160+4 more2025-12-24
CVE-2025-68746 spi: tegra210-quad: Fix timeout handling spi: tegra210-quad: Fix timeout handling In the Linux kernel, the following vulnerability has been resolved: spi: tegra210-quad: Fix timeout handling When the CPU that the QSPI interrupt handler runs on (typically CPU 0) is excessively busy, it can lead to rare cases of the IRQ thread not running before the transfer timeout is reached. While handling the timeouts, any pending transfers are cleaned up and the message that they correspond
osv
CVE-2023-54094UNKNOWN≥ 5.6.0, < 5.10.188≥ 5.11.0, < 5.15.121+2 more2025-12-24
CVE-2023-54094 net: prevent skb corruption on frag list segmentation net: prevent skb corruption on frag list segmentation In the Linux kernel, the following vulnerability has been resolved: net: prevent skb corruption on frag list segmentation Ian reported several skb corruptions triggered by rx-gro-list, collecting different oops alike: [ 62.624003] BUG: kernel NULL pointer dereference, address: 00000000000000c0 [ 62.631083] #PF: supervisor read access in kernel mode [ 62.636312] #PF: erro
osv
CVE-2023-54124UNKNOWN≥ 4.19.0, < 4.19.284≥ 4.20.0, < 5.4.244+4 more2025-12-24
CVE-2023-54124 f2fs: fix to drop all dirty pages during umount() if cp_error is set f2fs: fix to drop all dirty pages during umount() if cp_error is set In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to drop all dirty pages during umount() if cp_error is set xfstest generic/361 reports a bug as below: f2fs_bug_on(sbi, sbi->fsync_node_num); kernel BUG at fs/f2fs/super.c:1627! RIP: 0010:f2fs_put_super+0x3a8/0x3b0 Call Trace: generic_shutdown_super+0x8c/0x1b0 kil
osv
CVE-2023-53997UNKNOWN≥ 6.4.0, < 6.4.82025-12-24
CVE-2023-53997 thermal: of: fix double-free on unregistration thermal: of: fix double-free on unregistration In the Linux kernel, the following vulnerability has been resolved: thermal: of: fix double-free on unregistration Since commit 3d439b1a2ad3 ("thermal/core: Alloc-copy-free the thermal zone parameters structure"), thermal_zone_device_register() allocates a copy of the tzp argument and frees it when unregistering, so thermal_of_zone_register() now ends up leaking its original tzp and do
osv
CVE-2022-50720UNKNOWN≥ 0, < 6.0.3-12025-12-24
CVE-2022-50720 CVE-2022-50720: In the Linux kernel, the following vulnerability has been resolved: x86/apic: Don't disable x2APIC if locked The APIC supports two modes, legacy APIC In the Linux kernel, the following vulnerability has been resolved: x86/apic: Don't disable x2APIC if locked The APIC supports two modes, legacy APIC (or xAPIC), and Extended APIC (or x2APIC). X2APIC mode is mostly compatible with legacy APIC, but it disables the memory-mapped APIC interface in favor of one that uses
osv
CVE-2023-54015UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-24
CVE-2023-54015 CVE-2023-54015: In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device In case devcom all In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device In case devcom allocation is failed, mlx5 is always freeing the priv. However, this priv might have been allocated by a different thread, and freeing it might lead to use-after-free bugs
osv
CVE-2022-50774UNKNOWN≥ 3.17.0, < 5.10.150≥ 5.11.0, < 5.15.75+2 more2025-12-24
CVE-2022-50774 crypto: qat - fix DMA transfer direction crypto: qat - fix DMA transfer direction In the Linux kernel, the following vulnerability has been resolved: crypto: qat - fix DMA transfer direction When CONFIG_DMA_API_DEBUG is selected, while running the crypto self test on the QAT crypto algorithms, the function add_dma_entry() reports a warning similar to the one below, saying that overlapping mappings are not supported. This occurs in tests where the input and the output scatter li
osv
CVE-2023-54028UNKNOWN≥ 4.8.0, < 6.1.32≥ 6.2.0, < 6.2.15+1 more2025-12-24
CVE-2023-54028 RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task" RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task" In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task" In the function rxe_create_qp(), rxe_qp_from_init() is called to initialize qp, internally things like rxe_init_task are not setup until rxe_qp_init_req(). If an error occur
osv
CVE-2023-53987UNKNOWN≥ 6.0.0, < 6.1.24≥ 6.2.0, < 6.2.112025-12-24
CVE-2023-53987 ping: Fix potentail NULL deref for /proc/net/icmp. ping: Fix potentail NULL deref for /proc/net/icmp. In the Linux kernel, the following vulnerability has been resolved: ping: Fix potentail NULL deref for /proc/net/icmp. After commit dbca1596bbb0 ("ping: convert to RCU lookups, get rid of rwlock"), we use RCU for ping sockets, but we should use spinlock for /proc/net/icmp to avoid a potential NULL deref mentioned in the previous patch. Let's go back to using spinlock there. N
osv
CVE-2022-50734UNKNOWN≥ 0, < 6.0.3-12025-12-24
CVE-2022-50734 CVE-2022-50734: In the Linux kernel, the following vulnerability has been resolved: nvmem: core: Fix memleak in nvmem_register() dev_set_name will alloc memory for nv In the Linux kernel, the following vulnerability has been resolved: nvmem: core: Fix memleak in nvmem_register() dev_set_name will alloc memory for nvmem->dev.kobj.name in nvmem_register, when nvmem_validate_keepouts failed, nvmem's memory will be freed and return, but nobody will free memory for nvmem->dev.kobj.name
osv
CVE-2023-54071UNKNOWN≥ 5.19.0, < 6.1.30≥ 6.2.0, < 6.3.42025-12-24
CVE-2023-54071 wifi: rtw88: use work to update rate to avoid RCU warning wifi: rtw88: use work to update rate to avoid RCU warning In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: use work to update rate to avoid RCU warning The ieee80211_ops::sta_rc_update must be atomic, because ieee80211_chan_bw_change() holds rcu_read lock while calling drv_sta_rc_update(), so create a work to do original things. Voluntary context switch within RCU read-side critical secti
osv
CVE-2025-68369UNKNOWN≥ 0, < 5.15.198≥ 5.16.0, < 6.1.160+4 more2025-12-24
CVE-2025-68369 ntfs3: init run lock for extend inode ntfs3: init run lock for extend inode In the Linux kernel, the following vulnerability has been resolved: ntfs3: init run lock for extend inode After setting the inode mode of $Extend to a regular file, executing the truncate system call will enter the do_truncate() routine, causing the run_lock uninitialized error reported by syzbot. Prior to patch 4e8011ffec79, if the inode mode of $Extend was not set to a regular file, the do_truncate()
osv
CVE-2022-50700UNKNOWN≥ 4.18.0, < 6.0.16≥ 6.1.0, < 6.1.22025-12-24
CVE-2022-50700 wifi: ath10k: Delay the unmapping of the buffer wifi: ath10k: Delay the unmapping of the buffer In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: Delay the unmapping of the buffer On WCN3990, we are seeing a rare scenario where copy engine hardware is sending a copy complete interrupt to the host driver while still processing the buffer that the driver has sent, this is leading into an SMMU fault triggering kernel panic. This is happening on copy
osv
CVE-2025-68745UNKNOWN≥ 0, < 6.18.3-12025-12-24
CVE-2025-68745 CVE-2025-68745: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Clear cmds after chip reset Commit aefed3e5548f ("scsi: qla2xxx: ta In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Clear cmds after chip reset Commit aefed3e5548f ("scsi: qla2xxx: target: Fix offline port handling and host reset handling") caused two problems: 1. Commands sent to FW, after chip reset got stuck and never freed as FW is not going to
osv
CVE-2023-54120UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.25-12025-12-24
CVE-2023-54120 CVE-2023-54120: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix race condition in hidp_session_thread There is a potential race con In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix race condition in hidp_session_thread There is a potential race condition in hidp_session_thread that may lead to use-after-free. For instance, the timer is active while hidp_del_timer is called in hidp_session_thread(). After hidp_ses
osv
CVE-2023-54107UNKNOWN≥ 0, < 6.3.7-12025-12-24
CVE-2023-54107 CVE-2023-54107: In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: dropping parent refcount after pd_free_fn() is done Some cgroup polici In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: dropping parent refcount after pd_free_fn() is done Some cgroup policies will access parent pd through child pd even after pd_offline_fn() is done. If pd_free_fn() for parent is called before child, then UAF can be triggered. Hence it's b
osv
CVE-2025-68379UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.13-12025-12-24
CVE-2025-68379 CVE-2025-68379: In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix null deref on srq->rq In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix null deref on srq->rq.queue after resize failure A NULL pointer dereference can occur in rxe_srq_chk_attr() when ibv_modify_srq() is invoked twice in succession under certain error conditions. The first call may fail in rxe_queue_resize(), which leads rxe_srq_from_attr() to set srq-
osv