Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 56 of 724
CVE-2023-54034UNKNOWN≥ 6.2.0, < 6.2.32025-12-24
CVE-2023-54034 iommufd: Make sure to zero vfio_iommu_type1_info before copying to user iommufd: Make sure to zero vfio_iommu_type1_info before copying to user In the Linux kernel, the following vulnerability has been resolved: iommufd: Make sure to zero vfio_iommu_type1_info before copying to user Missed a zero initialization here. Most of the struct is filled with a copy_from_user(), however minsz for that copy is smaller than the actual struct by 8 bytes, thus we don't fill the padding.
osv
CVE-2022-50780UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.7-12025-12-24
CVE-2022-50780 CVE-2022-50780: In the Linux kernel, the following vulnerability has been resolved: net: fix UAF issue in nfqnl_nf_hook_drop() when ops_init() failed When the ops_ini In the Linux kernel, the following vulnerability has been resolved: net: fix UAF issue in nfqnl_nf_hook_drop() when ops_init() failed When the ops_init() interface is invoked to initialize the net, but ops->init() fails, data is released. However, the ptr pointer in net->gen is invalid. In this case, when nfqnl_nf_ho
osv
CVE-2023-54068UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-24
CVE-2023-54068 CVE-2023-54068: In the Linux kernel, the following vulnerability has been resolved: f2fs: compress: fix to call f2fs_wait_on_page_writeback() in f2fs_write_raw_pages( In the Linux kernel, the following vulnerability has been resolved: f2fs: compress: fix to call f2fs_wait_on_page_writeback() in f2fs_write_raw_pages() BUG_ON() will be triggered when writing files concurrently, because the same page is writtenback multiple times. 1597 void folio_end_writeback(struct folio *folio) 15
osv
CVE-2022-50702UNKNOWN≥ 0, < 6.1.7-12025-12-24
CVE-2022-50702 CVE-2022-50702: In the Linux kernel, the following vulnerability has been resolved: vdpa_sim: fix possible memory leak in vdpasim_net_init() and vdpasim_blk_init() In In the Linux kernel, the following vulnerability has been resolved: vdpa_sim: fix possible memory leak in vdpasim_net_init() and vdpasim_blk_init() Inject fault while probing module, if device_register() fails in vdpasim_net_init() or vdpasim_blk_init(), but the refcount of kobject is not decreased to 0, the name all
osv
CVE-2025-68727UNKNOWN≥ 0, < 6.1.162-1≥ 0, < 6.12.63-1+1 more2025-12-24
CVE-2025-68727 CVE-2025-68727: In the Linux kernel, the following vulnerability has been resolved: ntfs3: Fix uninit buffer allocated by __getname() Fix uninit errors caused after b In the Linux kernel, the following vulnerability has been resolved: ntfs3: Fix uninit buffer allocated by __getname() Fix uninit errors caused after buffer allocation given to 'de'; by initializing the buffer with zeroes. The fix was found by using KMSAN.
osv
CVE-2023-54153UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.11-12025-12-24
CVE-2023-54153 CVE-2023-54153: In the Linux kernel, the following vulnerability has been resolved: ext4: turn quotas off if mount failed after enabling quotas Yi found during a revi In the Linux kernel, the following vulnerability has been resolved: ext4: turn quotas off if mount failed after enabling quotas Yi found during a review of the patch "ext4: don't BUG on inconsistent journal feature" that when ext4_mark_recovery_complete() returns an error value, the error handling path does not turn
osv
CVE-2025-68376UNKNOWN≥ 6.6.0, < 6.17.13≥ 6.18.0, < 6.18.22025-12-24
CVE-2025-68376 coresight: ETR: Fix ETR buffer use-after-free issue coresight: ETR: Fix ETR buffer use-after-free issue In the Linux kernel, the following vulnerability has been resolved: coresight: ETR: Fix ETR buffer use-after-free issue When ETR is enabled as CS_MODE_SYSFS, if the buffer size is changed and enabled again, currently sysfs_buf will point to the newly allocated memory(buf_new) and free the old memory(buf_old). But the etr_buf that is being used by the ETR remains pointed to bu
osv
CVE-2023-54125UNKNOWN≥ 6.2.0, < 6.4.122025-12-24
CVE-2023-54125 fs/ntfs3: Return error for inconsistent extended attributes fs/ntfs3: Return error for inconsistent extended attributes In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Return error for inconsistent extended attributes ntfs_read_ea is called when we want to read extended attributes. There are some sanity checks for the validity of the EAs. However, it fails to return a proper error code for the inconsistent attributes, which might lead to unpredicte
osv
CVE-2025-68373UNKNOWN≥ 6.17.0, < 6.17.13≥ 6.18.0, < 6.18.22025-12-24
CVE-2025-68373 md: avoid repeated calls to del_gendisk md: avoid repeated calls to del_gendisk In the Linux kernel, the following vulnerability has been resolved: md: avoid repeated calls to del_gendisk There is a uaf problem which is found by case 23rdev-lifetime: Oops: general protection fault, probably for non-canonical address 0xdead000000000122 RIP: 0010:bdi_unregister+0x4b/0x170 Call Trace: __del_gendisk+0x356/0x3e0 mddev_unlock+0x351/0x360 rdev_attr_store+0x217/0x280 kernfs_fop_write
osv
CVE-2023-54130UNKNOWN≥ 5.16.0, < 6.0.19≥ 6.1.0, < 6.1.52025-12-24
CVE-2023-54130 hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling In the Linux kernel, the following vulnerability has been resolved: hfs/hfsplus: avoid WARN_ON() for sanity check, use proper error handling Commit 55d1cbbbb29e ("hfs/hfsplus: use WARN_ON for sanity check") fixed a build warning by turning a comment into a WARN_ON(), but it turns out that syzbot then complains because it can trigger s
osv
CVE-2023-54157UNKNOWN≥ 4.20.0, < 5.15.115≥ 5.16.0, < 6.1.31+1 more2025-12-24
CVE-2023-54157 binder: fix UAF of alloc->vma in race with munmap() binder: fix UAF of alloc->vma in race with munmap() In the Linux kernel, the following vulnerability has been resolved: binder: fix UAF of alloc->vma in race with munmap() [ cmllamas: clean forward port from commit 015ac18be7de ("binder: fix UAF of alloc->vma in race with munmap()") in 5.10 stable. It is needed in mainline after the revert of commit a43cfc87caaf ("android: binder: stop saving a pointer to the VMA") as pointed
osv
CVE-2023-54122UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-12-24
CVE-2023-54122 CVE-2023-54122: In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add check for cstate As kzalloc may fail and return NULL pointer, it In the Linux kernel, the following vulnerability has been resolved: drm/msm/dpu: Add check for cstate As kzalloc may fail and return NULL pointer, it should be better to check cstate in order to avoid the NULL pointer dereference in __drm_atomic_helper_crtc_reset. Patchwork: https://patchwork.freedesktop.org/patch/514
osv
CVE-2023-54136UNKNOWN≥ 5.2.0, < 5.4.257≥ 5.5.0, < 5.10.195+4 more2025-12-24
CVE-2023-54136 serial: sprd: Fix DMA buffer leak issue serial: sprd: Fix DMA buffer leak issue In the Linux kernel, the following vulnerability has been resolved: serial: sprd: Fix DMA buffer leak issue Release DMA buffer when _probe() returns failure to avoid memory leak.
osv
CVE-2023-54081UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.11-12025-12-24
CVE-2023-54081 CVE-2023-54081: In the Linux kernel, the following vulnerability has been resolved: xen: speed up grant-table reclaim When a grant entry is still in use by the remote In the Linux kernel, the following vulnerability has been resolved: xen: speed up grant-table reclaim When a grant entry is still in use by the remote domain, Linux must put it on a deferred list. Normally, this list is very short, because the PV network and block protocols expect the backend to unmap the grant first
osv
CVE-2025-68374UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.13-12025-12-24
CVE-2025-68374 CVE-2025-68374: In the Linux kernel, the following vulnerability has been resolved: md: fix rcu protection in md_wakeup_thread We attempted to use RCU to protect the In the Linux kernel, the following vulnerability has been resolved: md: fix rcu protection in md_wakeup_thread We attempted to use RCU to protect the pointer 'thread', but directly passed the value when calling md_wakeup_thread(). This means that the RCU pointer has been acquired before rcu_read_lock(), which renders
osv
CVE-2022-50752UNKNOWN≥ 0, < 6.0.3-12025-12-24
CVE-2022-50752 CVE-2022-50752: In the Linux kernel, the following vulnerability has been resolved: md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk() When running chun In the Linux kernel, the following vulnerability has been resolved: md/raid5: Remove unnecessary bio_put() in raid5_read_one_chunk() When running chunk-sized reads on disks with badblocks duplicate bio free/puts are observed: ============================================================================= BUG bio-200 (N
osv
CVE-2023-54151UNKNOWN≥ 5.19.0, < 6.1.30≥ 6.2.0, < 6.3.42025-12-24
CVE-2023-54151 f2fs: Fix system crash due to lack of free space in LFS f2fs: Fix system crash due to lack of free space in LFS In the Linux kernel, the following vulnerability has been resolved: f2fs: Fix system crash due to lack of free space in LFS When f2fs tries to checkpoint during foreground gc in LFS mode, system crash occurs due to lack of free space if the amount of dirty node and dentry pages generated by data migration exceeds free space. The reproduction sequence is as follows. -
osv
CVE-2025-68726UNKNOWN≥ 0, < 6.17.13-12025-12-24
CVE-2025-68726 CVE-2025-68726: In the Linux kernel, the following vulnerability has been resolved: crypto: aead - Fix reqsize handling Commit afddce13ce81d ("crypto: api - Add reqsi In the Linux kernel, the following vulnerability has been resolved: crypto: aead - Fix reqsize handling Commit afddce13ce81d ("crypto: api - Add reqsize to crypto_alg") introduced cra_reqsize field in crypto_alg struct to replace type specific reqsize fields. It looks like this was introduced specifically for ahash a
osv
CVE-2025-68372UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2025-12-24
CVE-2025-68372 CVE-2025-68372: In the Linux kernel, the following vulnerability has been resolved: nbd: defer config put in recv_work There is one uaf issue in recv_work when runnin In the Linux kernel, the following vulnerability has been resolved: nbd: defer config put in recv_work There is one uaf issue in recv_work when running NBD_CLEAR_SOCK and NBD_CMD_RECONFIGURE: nbd_genl_connect // conf_ref=2 (connect and recv_work A) nbd_open // conf_ref=3 recv_work A done // conf_ref=2 NBD_CLEAR_SOCK
osv
CVE-2025-68344UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2025-12-24
CVE-2025-68344 CVE-2025-68344: In the Linux kernel, the following vulnerability has been resolved: ALSA: wavefront: Fix integer overflow in sample size validation The wavefront_send In the Linux kernel, the following vulnerability has been resolved: ALSA: wavefront: Fix integer overflow in sample size validation The wavefront_send_sample() function has an integer overflow issue when validating sample size. The header->size field is u32 but gets cast to int for comparison with dev->freemem Fix by
osv