Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 64 of 724
CVE-2025-68735UNKNOWN≥ 6.10.0, < 6.17.13≥ 6.18.0, < 6.18.22025-12-24
CVE-2025-68735 drm/panthor: Prevent potential UAF in group creation drm/panthor: Prevent potential UAF in group creation In the Linux kernel, the following vulnerability has been resolved: drm/panthor: Prevent potential UAF in group creation This commit prevents the possibility of a use after free issue in the GROUP_CREATE ioctl function, which arose as pointer to the group is accessed in that ioctl function after storing it in the Xarray. A malicious userspace can second guess the handle of
osv
CVE-2025-68345UNKNOWN≥ 0, < 6.1.162-1≥ 0, < 6.12.69-1+1 more2025-12-24
CVE-2025-68345 CVE-2025-68345: In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi() The ac In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi() The acpi_get_first_physical_node() function can return NULL, in which case the get_device() function also returns NULL, but this value is then dereferenced without checking,s
osv
CVE-2023-54155UNKNOWN≥ 5.12.0, < 5.15.127≥ 5.16.0, < 6.1.46+1 more2025-12-24
CVE-2023-54155 net: core: remove unnecessary frame_sz check in bpf_xdp_adjust_tail() net: core: remove unnecessary frame_sz check in bpf_xdp_adjust_tail() In the Linux kernel, the following vulnerability has been resolved: net: core: remove unnecessary frame_sz check in bpf_xdp_adjust_tail() Syzkaller reported the following issue: Too BIG xdp->frame_sz = 131072 WARNING: CPU: 0 PID: 5020 at net/core/filter.c:4121 ____bpf_xdp_adjust_tail net/core/filter.c:4121 [inline] WARNING: CPU: 0 PID: 5020
osv
CVE-2022-50704UNKNOWN≥ 4.20.0, < 6.0.16≥ 6.1.0, < 6.1.22025-12-24
CVE-2022-50704 USB: gadget: Fix use-after-free during usb config switch USB: gadget: Fix use-after-free during usb config switch In the Linux kernel, the following vulnerability has been resolved: USB: gadget: Fix use-after-free during usb config switch In the process of switching USB config from rndis to other config, if the hardware does not support the ->pullup callback, or the hardware encounters a low probability fault, both of them may cause the ->pullup callback to fail, which will the
osv
CVE-2022-50698UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.3-12025-12-24
CVE-2022-50698 CVE-2022-50698: In the Linux kernel, the following vulnerability has been resolved: ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() If clk_hw_r In the Linux kernel, the following vulnerability has been resolved: ASoC: da7219: Fix an error handling path in da7219_register_dai_clks() If clk_hw_register() fails, the corresponding clk should not be unregistered. To handle errors from loops, clean up partial iterations before doing the goto. So add a clk_hw_unreg
osv
CVE-2023-54146UNKNOWN≥ 0, < 5.15.87≥ 5.16.0, < 6.0.19+1 more2025-12-24
CVE-2023-54146 x86/kexec: Fix double-free of elf header buffer x86/kexec: Fix double-free of elf header buffer In the Linux kernel, the following vulnerability has been resolved: x86/kexec: Fix double-free of elf header buffer After b3e34a47f989 ("x86/kexec: fix memory leak of elf header buffer"), freeing image->elf_headers in the error path of crash_load_segments() is not needed because kimage_file_post_load_cleanup() will take care of that later. And not clearing it could result in a doub
osv
CVE-2025-68731UNKNOWN≥ 6.18.0, < 6.18.22025-12-24
CVE-2025-68731 accel/amdxdna: Fix an integer overflow in aie2_query_ctx_status_array() accel/amdxdna: Fix an integer overflow in aie2_query_ctx_status_array() In the Linux kernel, the following vulnerability has been resolved: accel/amdxdna: Fix an integer overflow in aie2_query_ctx_status_array() The unpublished smatch static checker reported a warning. drivers/accel/amdxdna/aie2_pci.c:904 aie2_query_ctx_status_array() warn: potential user controlled sizeof overflow 'args->num_element * arg
osv
CVE-2025-68367UNKNOWN≥ 2.6.34, < 5.10.248≥ 5.11.0, < 5.15.198+5 more2025-12-24
CVE-2025-68367 macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse In the Linux kernel, the following vulnerability has been resolved: macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse The following warning appears when running syzkaller, and this issue also exists in the mainline code. ------------[ cut here ]------------ list_add double add: new=ffffffffa57eee28, prev=ffffffffa57eee28, next=fffffff
osv
CVE-2023-54065UNKNOWN≥ 0, < 6.1.25-12025-12-24
CVE-2023-54065 CVE-2023-54065: In the Linux kernel, the following vulnerability has been resolved: net: dsa: realtek: fix out-of-bounds access The probe function sets priv->chip_dat In the Linux kernel, the following vulnerability has been resolved: net: dsa: realtek: fix out-of-bounds access The probe function sets priv->chip_data to (void *)priv + sizeof(*priv) with the expectation that priv has enough trailing space. However, only realtek-smi actually allocated this chip_data space. Do likewi
osv
CVE-2022-50723UNKNOWN≥ 6.0.0, < 6.0.62025-12-24
CVE-2022-50723 bnxt_en: fix memory leak in bnxt_nvm_test() bnxt_en: fix memory leak in bnxt_nvm_test() In the Linux kernel, the following vulnerability has been resolved: bnxt_en: fix memory leak in bnxt_nvm_test() Free the kzalloc'ed buffer before returning in the success path.
osv
CVE-2023-54050UNKNOWN≥ 2.6.27, < 4.19.283≥ 4.20.0, < 5.4.243+5 more2025-12-24
CVE-2023-54050 ubifs: Fix memleak when insert_old_idx() failed ubifs: Fix memleak when insert_old_idx() failed In the Linux kernel, the following vulnerability has been resolved: ubifs: Fix memleak when insert_old_idx() failed Following process will cause a memleak for copied up znode: dirty_cow_znode zn = copy_znode(c, znode); err = insert_old_idx(c, zbr->lnum, zbr->offs); if (unlikely(err)) return ERR_PTR(err); // No one refers to zn. Fetch a reproducer in [Link]. Function copy_znode() i
osv
CVE-2023-53988UNKNOWN≥ 5.15.0, < 5.15.111≥ 5.16.0, < 6.1.28+2 more2025-12-24
CVE-2023-53988 fs/ntfs3: Fix slab-out-of-bounds read in hdr_delete_de() fs/ntfs3: Fix slab-out-of-bounds read in hdr_delete_de() In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix slab-out-of-bounds read in hdr_delete_de() Here is a BUG report from syzbot: BUG: KASAN: slab-out-of-bounds in hdr_delete_de+0xe0/0x150 fs/ntfs3/index.c:806 Read of size 16842960 at addr ffff888079cc0600 by task syz-executor934/3631 Call Trace: memmove+0x25/0x60 mm/kasan/shadow.c:54
osv
CVE-2023-54000UNKNOWN≥ 6.1.0, < 6.1.46≥ 6.2.0, < 6.4.112025-12-24
CVE-2023-54000 net: hns3: fix deadlock issue when externel_lb and reset are executed together net: hns3: fix deadlock issue when externel_lb and reset are executed together In the Linux kernel, the following vulnerability has been resolved: net: hns3: fix deadlock issue when externel_lb and reset are executed together When externel_lb and reset are executed together, a deadlock may occur: [ 3147.217009] INFO: task kworker/u321:0:7 blocked for more than 120 seconds. [ 3147.230483] "echo 0 > /p
osv
CVE-2023-54022UNKNOWN≥ 6.5.0, < 6.5.32025-12-24
CVE-2023-54022 ALSA: usb-audio: Fix potential memory leaks at error path for UMP open ALSA: usb-audio: Fix potential memory leaks at error path for UMP open In the Linux kernel, the following vulnerability has been resolved: ALSA: usb-audio: Fix potential memory leaks at error path for UMP open The allocation and initialization errors at alloc_midi_urbs() that is called at MIDI 2.0 / UMP device are supposed to be handled at the caller side by invoking free_midi_urbs(). However, free_midi_urbs
osv
CVE-2022-50771UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-24
CVE-2022-50771 CVE-2022-50771: In the Linux kernel, the following vulnerability has been resolved: rcu: Fix __this_cpu_read() lockdep warning in rcu_force_quiescent_state() Running In the Linux kernel, the following vulnerability has been resolved: rcu: Fix __this_cpu_read() lockdep warning in rcu_force_quiescent_state() Running rcutorture with non-zero fqs_duration module parameter in a kernel built with CONFIG_PREEMPTION=y results in the following splat: BUG: using __this_cpu_read() in preempt
osv
CVE-2025-68728UNKNOWN≥ 0, < 6.1.162-1≥ 0, < 6.12.63-1+1 more2025-12-24
CVE-2025-68728 CVE-2025-68728: In the Linux kernel, the following vulnerability has been resolved: ntfs3: fix uninit memory after failed mi_read in mi_format_new Fix a KMSAN un-init In the Linux kernel, the following vulnerability has been resolved: ntfs3: fix uninit memory after failed mi_read in mi_format_new Fix a KMSAN un-init bug found by syzkaller. ntfs_get_bh() expects a buffer from sb_getblk(), that buffer may not be uptodate. We do not bring the buffer uptodate before setting it as upto
osv
CVE-2025-68371UNKNOWN≥ 0, < 6.1.162-1≥ 0, < 6.12.63-1+1 more2025-12-24
CVE-2025-68371 CVE-2025-68371: In the Linux kernel, the following vulnerability has been resolved: scsi: smartpqi: Fix device resources accessed after device removal Correct possibl In the Linux kernel, the following vulnerability has been resolved: scsi: smartpqi: Fix device resources accessed after device removal Correct possible race conditions during device removal. Previously, a scheduled work item to reset a LUN could still execute after the device was removed, leading to use-after-free an
osv
CVE-2022-50769UNKNOWN≥ 2.6.29, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-12-24
CVE-2022-50769 mmc: mxcmmc: fix return value check of mmc_add_host() mmc: mxcmmc: fix return value check of mmc_add_host() In the Linux kernel, the following vulnerability has been resolved: mmc: mxcmmc: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, the memory that allocated in mmc_alloc_host() will be leaked and it will lead a kernel crash because of deleting not added device in the remove path. So fix this by checking the return va
osv
CVE-2022-50708UNKNOWN≥ 3.16.0, < 5.19.17≥ 5.20.0, < 6.0.32025-12-24
CVE-2022-50708 HSI: ssi_protocol: fix potential resource leak in ssip_pn_open() HSI: ssi_protocol: fix potential resource leak in ssip_pn_open() In the Linux kernel, the following vulnerability has been resolved: HSI: ssi_protocol: fix potential resource leak in ssip_pn_open() ssip_pn_open() claims the HSI client's port with hsi_claim_port(). When hsi_register_port_event() gets some error and returns a negetive value, the HSI client's port should be released with hsi_release_port(). Fix it b
osv
CVE-2022-50747UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-24
CVE-2022-50747 CVE-2022-50747: In the Linux kernel, the following vulnerability has been resolved: hfs: Fix OOB Write in hfs_asc2mac Syzbot reported a OOB Write bug: loop0: detected In the Linux kernel, the following vulnerability has been resolved: hfs: Fix OOB Write in hfs_asc2mac Syzbot reported a OOB Write bug: loop0: detected capacity change from 0 to 64 ================================================================== BUG: KASAN: slab-out-of-bounds in hfs_asc2mac+0x467/0x9a0 fs/hfs/trans.
osv