Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 57 of 724
CVE-2022-50746UNKNOWN≥ 4.19.0, < 6.0.16≥ 6.1.0, < 6.1.22025-12-24
CVE-2022-50746 erofs: validate the extent length for uncompressed pclusters erofs: validate the extent length for uncompressed pclusters In the Linux kernel, the following vulnerability has been resolved: erofs: validate the extent length for uncompressed pclusters syzkaller reported a KASAN use-after-free: https://syzkaller.appspot.com/bug?extid=2ae90e873e97f1faf6f2 The referenced fuzzed image actually has two issues: - m_pa == 0 as a non-inlined pcluster; - The logical length is longer tha
osv
CVE-2025-68730UNKNOWN≥ 6.8.0, < 6.17.13≥ 6.18.0, < 6.18.22025-12-24
CVE-2025-68730 accel/ivpu: Fix page fault in ivpu_bo_unbind_all_bos_from_context() accel/ivpu: Fix page fault in ivpu_bo_unbind_all_bos_from_context() In the Linux kernel, the following vulnerability has been resolved: accel/ivpu: Fix page fault in ivpu_bo_unbind_all_bos_from_context() Don't add BO to the vdev->bo_list in ivpu_gem_create_object(). When failure happens inside drm_gem_shmem_create(), the BO is not fully created and ivpu_gem_bo_free() callback will not be called causing a delete
osv
CVE-2023-54141UNKNOWN≥ 6.3.0, < 6.3.13≥ 6.4.0, < 6.4.42025-12-24
CVE-2023-54141 wifi: ath11k: Add missing hw_ops->get_ring_selector() for IPQ5018 wifi: ath11k: Add missing hw_ops->get_ring_selector() for IPQ5018 In the Linux kernel, the following vulnerability has been resolved: wifi: ath11k: Add missing hw_ops->get_ring_selector() for IPQ5018 During sending data after clients connected, hw_ops->get_ring_selector() will be called. But for IPQ5018, this member isn't set, and the following NULL pointer exception will be occurred: [ 38.840478] 8] (ath11k_dp_
osv
CVE-2023-54001UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-24
CVE-2023-54001 CVE-2023-54001: In the Linux kernel, the following vulnerability has been resolved: staging: r8712: Fix memory leak in _r8712_init_xmit_priv() In the above mentioned In the Linux kernel, the following vulnerability has been resolved: staging: r8712: Fix memory leak in _r8712_init_xmit_priv() In the above mentioned routine, memory is allocated in several places. If the first succeeds and a later one fails, the routine will leak memory. This patch fixes commit 2865d42c78a9 ("staging
osv
CVE-2023-54035UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.4-12025-12-24
CVE-2023-54035 CVE-2023-54035: In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix underflow in chain reference counter Set element additio In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix underflow in chain reference counter Set element addition error path decrements reference counter on chains twice: once on element release and again via nft_data_release(). Then, d6b478666ffa ("netfilter: nf_tables: fix unde
osv
CVE-2025-68375UNKNOWN≥ 6.16.0, < 6.17.13≥ 6.18.0, < 6.18.22025-12-24
CVE-2025-68375 perf/x86: Fix NULL event access and potential PEBS record loss perf/x86: Fix NULL event access and potential PEBS record loss In the Linux kernel, the following vulnerability has been resolved: perf/x86: Fix NULL event access and potential PEBS record loss When intel_pmu_drain_pebs_icl() is called to drain PEBS records, the perf_event_overflow() could be called to process the last PEBS record. While perf_event_overflow() could trigger the interrupt throttle and stop all events
osv
CVE-2023-54118UNKNOWN≥ 3.16.0, < 5.10.173≥ 5.11.0, < 5.15.100+2 more2025-12-24
CVE-2023-54118 serial: sc16is7xx: setup GPIO controller later in probe serial: sc16is7xx: setup GPIO controller later in probe In the Linux kernel, the following vulnerability has been resolved: serial: sc16is7xx: setup GPIO controller later in probe The GPIO controller component of the sc16is7xx driver is setup too early, which can result in a race condition where another device tries to utilise the GPIO lines before the sc16is7xx device has finished initialising. This issue manifests itsel
osv
CVE-2025-68737UNKNOWN≥ 6.18.0, < 6.18.22025-12-24
CVE-2025-68737 arm64/pageattr: Propagate return value from __change_memory_common arm64/pageattr: Propagate return value from __change_memory_common In the Linux kernel, the following vulnerability has been resolved: arm64/pageattr: Propagate return value from __change_memory_common The rodata=on security measure requires that any code path which does vmalloc -> set_memory_ro/set_memory_rox must protect the linear map alias too. Therefore, if such a call fails, we must abort set_memory_* and
osv
CVE-2023-54009UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-24
CVE-2023-54009 CVE-2023-54009: In the Linux kernel, the following vulnerability has been resolved: i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path The cdns_i In the Linux kernel, the following vulnerability has been resolved: i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path The cdns_i2c_master_xfer() function gets a runtime PM reference when the function is entered. This reference is released when the function is exited. There is currently one error
osv
CVE-2023-54019UNKNOWN≥ 5.2.0, < 6.1.42≥ 6.2.0, < 6.4.72025-12-24
CVE-2023-54019 sched/psi: use kernfs polling functions for PSI trigger polling sched/psi: use kernfs polling functions for PSI trigger polling In the Linux kernel, the following vulnerability has been resolved: sched/psi: use kernfs polling functions for PSI trigger polling Destroying psi trigger in cgroup_file_release causes UAF issues when a cgroup is removed from under a polling process. This is happening because cgroup removal causes a call to cgroup_file_release while the actual file is
osv
CVE-2023-53994UNKNOWN≥ 5.4.0, < 5.4.251≥ 5.5.0, < 5.10.188+3 more2025-12-24
CVE-2023-53994 ionic: remove WARN_ON to prevent panic_on_warn ionic: remove WARN_ON to prevent panic_on_warn In the Linux kernel, the following vulnerability has been resolved: ionic: remove WARN_ON to prevent panic_on_warn Remove unnecessary early code development check and the WARN_ON that it uses. The irq alloc and free paths have long been cleaned up and this check shouldn't have stuck around so long.
osv
CVE-2023-54104UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-24
CVE-2023-54104 CVE-2023-54104: In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: fsl_upm: Fix an off-by one test in fun_exec_op() 'op-cs' is copied i In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: fsl_upm: Fix an off-by one test in fun_exec_op() 'op-cs' is copied in 'fun->mchip_number' which is used to access the 'mchip_offsets' and the 'rnb_gpio' arrays. These arrays have NAND_MAX_CHIPS elements, so the index must be below this
osv
CVE-2023-54051UNKNOWN≥ 4.8.0, < 4.14.324≥ 4.15.0, < 4.19.293+5 more2025-12-24
CVE-2023-54051 net: do not allow gso_size to be set to GSO_BY_FRAGS net: do not allow gso_size to be set to GSO_BY_FRAGS In the Linux kernel, the following vulnerability has been resolved: net: do not allow gso_size to be set to GSO_BY_FRAGS One missing check in virtio_net_hdr_to_skb() allowed syzbot to crash kernels again [1] Do not allow gso_size to be set to GSO_BY_FRAGS (0xffff), because this magic value is used by the kernel. [1] general protection fault, probably for non-canonical add
osv
CVE-2023-54056UNKNOWN≥ 5.2.0, < 5.4.243≥ 5.5.0, < 5.10.180+4 more2025-12-24
CVE-2023-54056 kheaders: Use array declaration instead of char kheaders: Use array declaration instead of char In the Linux kernel, the following vulnerability has been resolved: kheaders: Use array declaration instead of char Under CONFIG_FORTIFY_SOURCE, memcpy() will check the size of destination and source buffers. Defining kernel_headers_data as "char" would trip this check. Since these addresses are treated as byte arrays, define them as arrays (as done everywhere else). This was seen w
osv
CVE-2023-54138UNKNOWN≥ 0, < 6.1.37-1≥ 0, < 6.3.7-12025-12-24
CVE-2023-54138 CVE-2023-54138: In the Linux kernel, the following vulnerability has been resolved: drm/msm: fix NULL-deref on irq uninstall In case of early initialisation errors an In the Linux kernel, the following vulnerability has been resolved: drm/msm: fix NULL-deref on irq uninstall In case of early initialisation errors and on platforms that do not use the DPU controller, the deinitilisation code can be called with the kms pointer set to NULL. Patchwork: https://patchwork.freedesktop.org
osv
CVE-2025-68741UNKNOWN≥ 6.6.0, < 6.6.120≥ 6.7.0, < 6.12.63+2 more2025-12-24
CVE-2025-68741 scsi: qla2xxx: Fix improper freeing of purex item scsi: qla2xxx: Fix improper freeing of purex item In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix improper freeing of purex item In qla2xxx_process_purls_iocb(), an item is allocated via qla27xx_copy_multiple_pkt(), which internally calls qla24xx_alloc_purex_item(). The qla24xx_alloc_purex_item() function may return a pre-allocated item from a per-adapter pool for small allocations, instea
osv
CVE-2023-54067UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.4-12025-12-24
CVE-2023-54067 CVE-2023-54067: In the Linux kernel, the following vulnerability has been resolved: btrfs: fix race when deleting free space root from the dirty cow roots list When d In the Linux kernel, the following vulnerability has been resolved: btrfs: fix race when deleting free space root from the dirty cow roots list When deleting the free space tree we are deleting the free space root from the list fs_info->dirty_cowonly_roots without taking the lock that protects it, which is struct btr
osv
CVE-2022-50717UNKNOWN≥ 5.0.0, < 5.4.220≥ 5.5.0, < 5.10.150+3 more2025-12-24
CVE-2022-50717 nvmet-tcp: add bounds check on Transfer Tag nvmet-tcp: add bounds check on Transfer Tag In the Linux kernel, the following vulnerability has been resolved: nvmet-tcp: add bounds check on Transfer Tag ttag is used as an index to get cmd in nvmet_tcp_handle_h2c_data_pdu(), add a bounds check to avoid out-of-bounds access.
osv
CVE-2025-68750UNKNOWN≥ 0, < 5.10.244-1≥ 0, < 6.1.147-1+1 more2025-12-24
CVE-2025-68750 CVE-2025-68750: In the Linux kernel, the following vulnerability has been resolved: usb: potential integer overflow in usbg_make_tpg() The variable tpgt in usbg_make_ In the Linux kernel, the following vulnerability has been resolved: usb: potential integer overflow in usbg_make_tpg() The variable tpgt in usbg_make_tpg() is defined as unsigned long and is assigned to tpgt->tport_tpgt, which is defined as u16. This may cause an integer overflow when tpgt is greater than USHRT_MAX (
osv
CVE-2023-54112UNKNOWN≥ 4.6.0, < 4.14.326≥ 4.15.0, < 4.19.295+5 more2025-12-24
CVE-2023-54112 kcm: Fix memory leak in error path of kcm_sendmsg() kcm: Fix memory leak in error path of kcm_sendmsg() In the Linux kernel, the following vulnerability has been resolved: kcm: Fix memory leak in error path of kcm_sendmsg() syzbot reported a memory leak like below: BUG: memory leak unreferenced object 0xffff88810b088c00 (size 240): comm "syz-executor186", pid 5012, jiffies 4294943306 (age 13.680s) hex dump (first 32 bytes): 00 89 08 0b 81 88 ff ff 00 00 00 00 00 00 00 00 .....
osv