Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 55 of 724
CVE-2023-54029UNKNOWN≥ 0, < 6.1.37-1≥ 0, < 6.3.7-12025-12-24
CVE-2023-54029 CVE-2023-54029: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO For MLO, we cannot use vif->bs
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: fix iwl_mvm_max_amsdu_size() for MLO For MLO, we cannot use vif->bss_conf.chandef.chan->band, since that will lead to a NULL-ptr dereference as bss_conf isn't used. However, in case of real MLO, we also need to take both LMACs into acc
osv
CVE-2025-68348UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.13-12025-12-24
CVE-2025-68348 CVE-2025-68348: In the Linux kernel, the following vulnerability has been resolved: block: fix memory leak in __blkdev_issue_zero_pages Move the fatal signal check be
In the Linux kernel, the following vulnerability has been resolved: block: fix memory leak in __blkdev_issue_zero_pages Move the fatal signal check before bio_alloc() to prevent a memory leak when BLKDEV_ZERO_KILLABLE is set and a fatal signal is pending. Previously, the bio was allocated before checking for a fatal
osv
CVE-2025-68352UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.13-12025-12-24
CVE-2025-68352 CVE-2025-68352: In the Linux kernel, the following vulnerability has been resolved: spi: ch341: fix out-of-bounds memory access in ch341_transfer_one Discovered by At
In the Linux kernel, the following vulnerability has been resolved: spi: ch341: fix out-of-bounds memory access in ch341_transfer_one Discovered by Atuin - Automated Vulnerability Discovery Engine. The 'len' variable is calculated as 'min(32, trans->len + 1)', which includes the 1-byte command header. When copying da
osv
CVE-2025-68746UNKNOWN≥ 5.12.0, < 5.15.198≥ 5.16.0, < 6.1.160+4 more2025-12-24
CVE-2025-68746 spi: tegra210-quad: Fix timeout handling
spi: tegra210-quad: Fix timeout handling
In the Linux kernel, the following vulnerability has been resolved:
spi: tegra210-quad: Fix timeout handling
When the CPU that the QSPI interrupt handler runs on (typically CPU 0)
is excessively busy, it can lead to rare cases of the IRQ thread not
running before the transfer timeout is reached.
While handling the timeouts, any pending transfers are cleaned up and
the message that they correspond
osv
CVE-2023-54094UNKNOWN≥ 5.6.0, < 5.10.188≥ 5.11.0, < 5.15.121+2 more2025-12-24
CVE-2023-54094 net: prevent skb corruption on frag list segmentation
net: prevent skb corruption on frag list segmentation
In the Linux kernel, the following vulnerability has been resolved:
net: prevent skb corruption on frag list segmentation
Ian reported several skb corruptions triggered by rx-gro-list,
collecting different oops alike:
[ 62.624003] BUG: kernel NULL pointer dereference, address: 00000000000000c0
[ 62.631083] #PF: supervisor read access in kernel mode
[ 62.636312] #PF: erro
osv
CVE-2023-54124UNKNOWN≥ 4.19.0, < 4.19.284≥ 4.20.0, < 5.4.244+4 more2025-12-24
CVE-2023-54124 f2fs: fix to drop all dirty pages during umount() if cp_error is set
f2fs: fix to drop all dirty pages during umount() if cp_error is set
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to drop all dirty pages during umount() if cp_error is set
xfstest generic/361 reports a bug as below:
f2fs_bug_on(sbi, sbi->fsync_node_num);
kernel BUG at fs/f2fs/super.c:1627!
RIP: 0010:f2fs_put_super+0x3a8/0x3b0
Call Trace:
generic_shutdown_super+0x8c/0x1b0
kil
osv
CVE-2023-53997UNKNOWN≥ 6.4.0, < 6.4.82025-12-24
CVE-2023-53997 thermal: of: fix double-free on unregistration
thermal: of: fix double-free on unregistration
In the Linux kernel, the following vulnerability has been resolved:
thermal: of: fix double-free on unregistration
Since commit 3d439b1a2ad3 ("thermal/core: Alloc-copy-free the thermal
zone parameters structure"), thermal_zone_device_register() allocates
a copy of the tzp argument and frees it when unregistering, so
thermal_of_zone_register() now ends up leaking its original tzp and
do
osv
CVE-2022-50720UNKNOWN≥ 0, < 6.0.3-12025-12-24
CVE-2022-50720 CVE-2022-50720: In the Linux kernel, the following vulnerability has been resolved: x86/apic: Don't disable x2APIC if locked The APIC supports two modes, legacy APIC
In the Linux kernel, the following vulnerability has been resolved: x86/apic: Don't disable x2APIC if locked The APIC supports two modes, legacy APIC (or xAPIC), and Extended APIC (or x2APIC). X2APIC mode is mostly compatible with legacy APIC, but it disables the memory-mapped APIC interface in favor of one that uses
osv
CVE-2023-54015UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-24
CVE-2023-54015 CVE-2023-54015: In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device In case devcom all
In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Devcom, fix error flow in mlx5_devcom_register_device In case devcom allocation is failed, mlx5 is always freeing the priv. However, this priv might have been allocated by a different thread, and freeing it might lead to use-after-free bugs
osv
CVE-2022-50774UNKNOWN≥ 3.17.0, < 5.10.150≥ 5.11.0, < 5.15.75+2 more2025-12-24
CVE-2022-50774 crypto: qat - fix DMA transfer direction
crypto: qat - fix DMA transfer direction
In the Linux kernel, the following vulnerability has been resolved:
crypto: qat - fix DMA transfer direction
When CONFIG_DMA_API_DEBUG is selected, while running the crypto self
test on the QAT crypto algorithms, the function add_dma_entry() reports
a warning similar to the one below, saying that overlapping mappings
are not supported. This occurs in tests where the input and the output
scatter li
osv
CVE-2023-54028UNKNOWN≥ 4.8.0, < 6.1.32≥ 6.2.0, < 6.2.15+1 more2025-12-24
CVE-2023-54028 RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task"
RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task"
In the Linux kernel, the following vulnerability has been resolved:
RDMA/rxe: Fix the error "trying to register non-static key in rxe_cleanup_task"
In the function rxe_create_qp(), rxe_qp_from_init() is called to
initialize qp, internally things like rxe_init_task are not setup until
rxe_qp_init_req().
If an error occur
osv
CVE-2023-53987UNKNOWN≥ 6.0.0, < 6.1.24≥ 6.2.0, < 6.2.112025-12-24
CVE-2023-53987 ping: Fix potentail NULL deref for /proc/net/icmp.
ping: Fix potentail NULL deref for /proc/net/icmp.
In the Linux kernel, the following vulnerability has been resolved:
ping: Fix potentail NULL deref for /proc/net/icmp.
After commit dbca1596bbb0 ("ping: convert to RCU lookups, get rid
of rwlock"), we use RCU for ping sockets, but we should use spinlock
for /proc/net/icmp to avoid a potential NULL deref mentioned in
the previous patch.
Let's go back to using spinlock there.
N
osv
CVE-2022-50734UNKNOWN≥ 0, < 6.0.3-12025-12-24
CVE-2022-50734 CVE-2022-50734: In the Linux kernel, the following vulnerability has been resolved: nvmem: core: Fix memleak in nvmem_register() dev_set_name will alloc memory for nv
In the Linux kernel, the following vulnerability has been resolved: nvmem: core: Fix memleak in nvmem_register() dev_set_name will alloc memory for nvmem->dev.kobj.name in nvmem_register, when nvmem_validate_keepouts failed, nvmem's memory will be freed and return, but nobody will free memory for nvmem->dev.kobj.name
osv
CVE-2023-54071UNKNOWN≥ 5.19.0, < 6.1.30≥ 6.2.0, < 6.3.42025-12-24
CVE-2023-54071 wifi: rtw88: use work to update rate to avoid RCU warning
wifi: rtw88: use work to update rate to avoid RCU warning
In the Linux kernel, the following vulnerability has been resolved:
wifi: rtw88: use work to update rate to avoid RCU warning
The ieee80211_ops::sta_rc_update must be atomic, because
ieee80211_chan_bw_change() holds rcu_read lock while calling
drv_sta_rc_update(), so create a work to do original things.
Voluntary context switch within RCU read-side critical secti
osv
CVE-2025-68369UNKNOWN≥ 0, < 5.15.198≥ 5.16.0, < 6.1.160+4 more2025-12-24
CVE-2025-68369 ntfs3: init run lock for extend inode
ntfs3: init run lock for extend inode
In the Linux kernel, the following vulnerability has been resolved:
ntfs3: init run lock for extend inode
After setting the inode mode of $Extend to a regular file, executing the
truncate system call will enter the do_truncate() routine, causing the
run_lock uninitialized error reported by syzbot.
Prior to patch 4e8011ffec79, if the inode mode of $Extend was not set to
a regular file, the do_truncate()
osv
CVE-2022-50700UNKNOWN≥ 4.18.0, < 6.0.16≥ 6.1.0, < 6.1.22025-12-24
CVE-2022-50700 wifi: ath10k: Delay the unmapping of the buffer
wifi: ath10k: Delay the unmapping of the buffer
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath10k: Delay the unmapping of the buffer
On WCN3990, we are seeing a rare scenario where copy engine hardware is
sending a copy complete interrupt to the host driver while still
processing the buffer that the driver has sent, this is leading into an
SMMU fault triggering kernel panic. This is happening on copy
osv
CVE-2025-68745UNKNOWN≥ 0, < 6.18.3-12025-12-24
CVE-2025-68745 CVE-2025-68745: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Clear cmds after chip reset Commit aefed3e5548f ("scsi: qla2xxx: ta
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Clear cmds after chip reset Commit aefed3e5548f ("scsi: qla2xxx: target: Fix offline port handling and host reset handling") caused two problems: 1. Commands sent to FW, after chip reset got stuck and never freed as FW is not going to
osv
CVE-2023-54120UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.25-12025-12-24
CVE-2023-54120 CVE-2023-54120: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix race condition in hidp_session_thread There is a potential race con
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: Fix race condition in hidp_session_thread There is a potential race condition in hidp_session_thread that may lead to use-after-free. For instance, the timer is active while hidp_del_timer is called in hidp_session_thread(). After hidp_ses
osv
CVE-2023-54107UNKNOWN≥ 0, < 6.3.7-12025-12-24
CVE-2023-54107 CVE-2023-54107: In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: dropping parent refcount after pd_free_fn() is done Some cgroup polici
In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: dropping parent refcount after pd_free_fn() is done Some cgroup policies will access parent pd through child pd even after pd_offline_fn() is done. If pd_free_fn() for parent is called before child, then UAF can be triggered. Hence it's b
osv
CVE-2025-68379UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.13-12025-12-24
CVE-2025-68379 CVE-2025-68379: In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix null deref on srq->rq
In the Linux kernel, the following vulnerability has been resolved: RDMA/rxe: Fix null deref on srq->rq.queue after resize failure A NULL pointer dereference can occur in rxe_srq_chk_attr() when ibv_modify_srq() is invoked twice in succession under certain error conditions. The first call may fail in rxe_queue_resize(), which leads rxe_srq_from_attr() to set srq-
osv