Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 57 of 724
CVE-2022-50746UNKNOWN≥ 4.19.0, < 6.0.16≥ 6.1.0, < 6.1.22025-12-24
CVE-2022-50746 erofs: validate the extent length for uncompressed pclusters
erofs: validate the extent length for uncompressed pclusters
In the Linux kernel, the following vulnerability has been resolved:
erofs: validate the extent length for uncompressed pclusters
syzkaller reported a KASAN use-after-free:
https://syzkaller.appspot.com/bug?extid=2ae90e873e97f1faf6f2
The referenced fuzzed image actually has two issues:
- m_pa == 0 as a non-inlined pcluster;
- The logical length is longer tha
osv
CVE-2025-68730UNKNOWN≥ 6.8.0, < 6.17.13≥ 6.18.0, < 6.18.22025-12-24
CVE-2025-68730 accel/ivpu: Fix page fault in ivpu_bo_unbind_all_bos_from_context()
accel/ivpu: Fix page fault in ivpu_bo_unbind_all_bos_from_context()
In the Linux kernel, the following vulnerability has been resolved:
accel/ivpu: Fix page fault in ivpu_bo_unbind_all_bos_from_context()
Don't add BO to the vdev->bo_list in ivpu_gem_create_object().
When failure happens inside drm_gem_shmem_create(), the BO is not
fully created and ivpu_gem_bo_free() callback will not be called
causing a delete
osv
CVE-2023-54141UNKNOWN≥ 6.3.0, < 6.3.13≥ 6.4.0, < 6.4.42025-12-24
CVE-2023-54141 wifi: ath11k: Add missing hw_ops->get_ring_selector() for IPQ5018
wifi: ath11k: Add missing hw_ops->get_ring_selector() for IPQ5018
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: Add missing hw_ops->get_ring_selector() for IPQ5018
During sending data after clients connected, hw_ops->get_ring_selector()
will be called. But for IPQ5018, this member isn't set, and the
following NULL pointer exception will be occurred:
[ 38.840478] 8] (ath11k_dp_
osv
CVE-2023-54001UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-24
CVE-2023-54001 CVE-2023-54001: In the Linux kernel, the following vulnerability has been resolved: staging: r8712: Fix memory leak in _r8712_init_xmit_priv() In the above mentioned
In the Linux kernel, the following vulnerability has been resolved: staging: r8712: Fix memory leak in _r8712_init_xmit_priv() In the above mentioned routine, memory is allocated in several places. If the first succeeds and a later one fails, the routine will leak memory. This patch fixes commit 2865d42c78a9 ("staging
osv
CVE-2023-54035UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.4-12025-12-24
CVE-2023-54035 CVE-2023-54035: In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix underflow in chain reference counter Set element additio
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: fix underflow in chain reference counter Set element addition error path decrements reference counter on chains twice: once on element release and again via nft_data_release(). Then, d6b478666ffa ("netfilter: nf_tables: fix unde
osv
CVE-2025-68375UNKNOWN≥ 6.16.0, < 6.17.13≥ 6.18.0, < 6.18.22025-12-24
CVE-2025-68375 perf/x86: Fix NULL event access and potential PEBS record loss
perf/x86: Fix NULL event access and potential PEBS record loss
In the Linux kernel, the following vulnerability has been resolved:
perf/x86: Fix NULL event access and potential PEBS record loss
When intel_pmu_drain_pebs_icl() is called to drain PEBS records, the
perf_event_overflow() could be called to process the last PEBS record.
While perf_event_overflow() could trigger the interrupt throttle and
stop all events
osv
CVE-2023-54118UNKNOWN≥ 3.16.0, < 5.10.173≥ 5.11.0, < 5.15.100+2 more2025-12-24
CVE-2023-54118 serial: sc16is7xx: setup GPIO controller later in probe
serial: sc16is7xx: setup GPIO controller later in probe
In the Linux kernel, the following vulnerability has been resolved:
serial: sc16is7xx: setup GPIO controller later in probe
The GPIO controller component of the sc16is7xx driver is setup too
early, which can result in a race condition where another device tries
to utilise the GPIO lines before the sc16is7xx device has finished
initialising.
This issue manifests itsel
osv
CVE-2025-68737UNKNOWN≥ 6.18.0, < 6.18.22025-12-24
CVE-2025-68737 arm64/pageattr: Propagate return value from __change_memory_common
arm64/pageattr: Propagate return value from __change_memory_common
In the Linux kernel, the following vulnerability has been resolved:
arm64/pageattr: Propagate return value from __change_memory_common
The rodata=on security measure requires that any code path which does
vmalloc -> set_memory_ro/set_memory_rox must protect the linear map alias
too. Therefore, if such a call fails, we must abort set_memory_* and
osv
CVE-2023-54009UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-24
CVE-2023-54009 CVE-2023-54009: In the Linux kernel, the following vulnerability has been resolved: i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path The cdns_i
In the Linux kernel, the following vulnerability has been resolved: i2c: cadence: cdns_i2c_master_xfer(): Fix runtime PM leak on error path The cdns_i2c_master_xfer() function gets a runtime PM reference when the function is entered. This reference is released when the function is exited. There is currently one error
osv
CVE-2023-54019UNKNOWN≥ 5.2.0, < 6.1.42≥ 6.2.0, < 6.4.72025-12-24
CVE-2023-54019 sched/psi: use kernfs polling functions for PSI trigger polling
sched/psi: use kernfs polling functions for PSI trigger polling
In the Linux kernel, the following vulnerability has been resolved:
sched/psi: use kernfs polling functions for PSI trigger polling
Destroying psi trigger in cgroup_file_release causes UAF issues when
a cgroup is removed from under a polling process. This is happening
because cgroup removal causes a call to cgroup_file_release while the
actual file is
osv
CVE-2023-53994UNKNOWN≥ 5.4.0, < 5.4.251≥ 5.5.0, < 5.10.188+3 more2025-12-24
CVE-2023-53994 ionic: remove WARN_ON to prevent panic_on_warn
ionic: remove WARN_ON to prevent panic_on_warn
In the Linux kernel, the following vulnerability has been resolved:
ionic: remove WARN_ON to prevent panic_on_warn
Remove unnecessary early code development check and the WARN_ON
that it uses. The irq alloc and free paths have long been
cleaned up and this check shouldn't have stuck around so long.
osv
CVE-2023-54104UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-24
CVE-2023-54104 CVE-2023-54104: In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: fsl_upm: Fix an off-by one test in fun_exec_op() 'op-cs' is copied i
In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: fsl_upm: Fix an off-by one test in fun_exec_op() 'op-cs' is copied in 'fun->mchip_number' which is used to access the 'mchip_offsets' and the 'rnb_gpio' arrays. These arrays have NAND_MAX_CHIPS elements, so the index must be below this
osv
CVE-2023-54051UNKNOWN≥ 4.8.0, < 4.14.324≥ 4.15.0, < 4.19.293+5 more2025-12-24
CVE-2023-54051 net: do not allow gso_size to be set to GSO_BY_FRAGS
net: do not allow gso_size to be set to GSO_BY_FRAGS
In the Linux kernel, the following vulnerability has been resolved:
net: do not allow gso_size to be set to GSO_BY_FRAGS
One missing check in virtio_net_hdr_to_skb() allowed
syzbot to crash kernels again [1]
Do not allow gso_size to be set to GSO_BY_FRAGS (0xffff),
because this magic value is used by the kernel.
[1]
general protection fault, probably for non-canonical add
osv
CVE-2023-54056UNKNOWN≥ 5.2.0, < 5.4.243≥ 5.5.0, < 5.10.180+4 more2025-12-24
CVE-2023-54056 kheaders: Use array declaration instead of char
kheaders: Use array declaration instead of char
In the Linux kernel, the following vulnerability has been resolved:
kheaders: Use array declaration instead of char
Under CONFIG_FORTIFY_SOURCE, memcpy() will check the size of destination
and source buffers. Defining kernel_headers_data as "char" would trip
this check. Since these addresses are treated as byte arrays, define
them as arrays (as done everywhere else).
This was seen w
osv
CVE-2023-54138UNKNOWN≥ 0, < 6.1.37-1≥ 0, < 6.3.7-12025-12-24
CVE-2023-54138 CVE-2023-54138: In the Linux kernel, the following vulnerability has been resolved: drm/msm: fix NULL-deref on irq uninstall In case of early initialisation errors an
In the Linux kernel, the following vulnerability has been resolved: drm/msm: fix NULL-deref on irq uninstall In case of early initialisation errors and on platforms that do not use the DPU controller, the deinitilisation code can be called with the kms pointer set to NULL. Patchwork: https://patchwork.freedesktop.org
osv
CVE-2025-68741UNKNOWN≥ 6.6.0, < 6.6.120≥ 6.7.0, < 6.12.63+2 more2025-12-24
CVE-2025-68741 scsi: qla2xxx: Fix improper freeing of purex item
scsi: qla2xxx: Fix improper freeing of purex item
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix improper freeing of purex item
In qla2xxx_process_purls_iocb(), an item is allocated via
qla27xx_copy_multiple_pkt(), which internally calls
qla24xx_alloc_purex_item().
The qla24xx_alloc_purex_item() function may return a pre-allocated item
from a per-adapter pool for small allocations, instea
osv
CVE-2023-54067UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.4-12025-12-24
CVE-2023-54067 CVE-2023-54067: In the Linux kernel, the following vulnerability has been resolved: btrfs: fix race when deleting free space root from the dirty cow roots list When d
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix race when deleting free space root from the dirty cow roots list When deleting the free space tree we are deleting the free space root from the list fs_info->dirty_cowonly_roots without taking the lock that protects it, which is struct btr
osv
CVE-2022-50717UNKNOWN≥ 5.0.0, < 5.4.220≥ 5.5.0, < 5.10.150+3 more2025-12-24
CVE-2022-50717 nvmet-tcp: add bounds check on Transfer Tag
nvmet-tcp: add bounds check on Transfer Tag
In the Linux kernel, the following vulnerability has been resolved:
nvmet-tcp: add bounds check on Transfer Tag
ttag is used as an index to get cmd in nvmet_tcp_handle_h2c_data_pdu(),
add a bounds check to avoid out-of-bounds access.
osv
CVE-2025-68750UNKNOWN≥ 0, < 5.10.244-1≥ 0, < 6.1.147-1+1 more2025-12-24
CVE-2025-68750 CVE-2025-68750: In the Linux kernel, the following vulnerability has been resolved: usb: potential integer overflow in usbg_make_tpg() The variable tpgt in usbg_make_
In the Linux kernel, the following vulnerability has been resolved: usb: potential integer overflow in usbg_make_tpg() The variable tpgt in usbg_make_tpg() is defined as unsigned long and is assigned to tpgt->tport_tpgt, which is defined as u16. This may cause an integer overflow when tpgt is greater than USHRT_MAX (
osv
CVE-2023-54112UNKNOWN≥ 4.6.0, < 4.14.326≥ 4.15.0, < 4.19.295+5 more2025-12-24
CVE-2023-54112 kcm: Fix memory leak in error path of kcm_sendmsg()
kcm: Fix memory leak in error path of kcm_sendmsg()
In the Linux kernel, the following vulnerability has been resolved:
kcm: Fix memory leak in error path of kcm_sendmsg()
syzbot reported a memory leak like below:
BUG: memory leak
unreferenced object 0xffff88810b088c00 (size 240):
comm "syz-executor186", pid 5012, jiffies 4294943306 (age 13.680s)
hex dump (first 32 bytes):
00 89 08 0b 81 88 ff ff 00 00 00 00 00 00 00 00 .....
osv