Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 65 of 724
CVE-2022-50757UNKNOWN≥ 4.14.0, < 4.14.303≥ 4.15.0, < 4.19.270+5 more2025-12-24
CVE-2022-50757 media: camss: Clean up received buffers on failed start of streaming media: camss: Clean up received buffers on failed start of streaming In the Linux kernel, the following vulnerability has been resolved: media: camss: Clean up received buffers on failed start of streaming It is required to return the received buffers, if streaming can not be started. For instance media_pipeline_start() may fail with EPIPE, if a link validation between entities is not passed, and in such a cas
osv
CVE-2022-50710UNKNOWN≥ 0, < 6.0.3-12025-12-24
CVE-2022-50710 CVE-2022-50710: In the Linux kernel, the following vulnerability has been resolved: ice: set tx_tstamps when creating new Tx rings via ethtool When the user changes t In the Linux kernel, the following vulnerability has been resolved: ice: set tx_tstamps when creating new Tx rings via ethtool When the user changes the number of queues via ethtool, the driver allocates new rings. This allocation did not initialize tx_tstamps. This results in the tx_tstamps field being zero (due to
osv
CVE-2022-50721UNKNOWN≥ 5.11.0, < 5.19.17≥ 5.20.0, < 6.0.32025-12-24
CVE-2022-50721 dmaengine: qcom-adm: fix wrong calling convention for prep_slave_sg dmaengine: qcom-adm: fix wrong calling convention for prep_slave_sg In the Linux kernel, the following vulnerability has been resolved: dmaengine: qcom-adm: fix wrong calling convention for prep_slave_sg The calling convention for pre_slave_sg is to return NULL on error and provide an error log to the system. Qcom-adm instead provide error pointer when an error occur. This indirectly cause kernel panic for exam
osv
CVE-2023-54133UNKNOWN≥ 0, < 6.4.11-12025-12-24
CVE-2023-54133 CVE-2023-54133: In the Linux kernel, the following vulnerability has been resolved: nfp: clean mc addresses in application firmware when closing port When moving devi In the Linux kernel, the following vulnerability has been resolved: nfp: clean mc addresses in application firmware when closing port When moving devices from one namespace to another, mc addresses are cleaned in software while not removed from application firmware. Thus the mc addresses are remained and will cause r
osv
CVE-2023-54131UNKNOWN≥ 5.11.0, < 5.15.111≥ 5.16.0, < 6.1.28+2 more2025-12-24
CVE-2023-54131 wifi: rt2x00: Fix memory leak when handling surveys wifi: rt2x00: Fix memory leak when handling surveys In the Linux kernel, the following vulnerability has been resolved: wifi: rt2x00: Fix memory leak when handling surveys When removing a rt2x00 device, its associated channel surveys are not freed, causing a memory leak observable with kmemleak: unreferenced object 0xffff9620f0881a00 (size 512): comm "systemd-udevd", pid 2290, jiffies 4294906974 (age 33.768s) hex dump (first
osv
CVE-2023-54032UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-24
CVE-2023-54032 CVE-2023-54032: In the Linux kernel, the following vulnerability has been resolved: btrfs: fix race when deleting quota root from the dirty cow roots list When disabl In the Linux kernel, the following vulnerability has been resolved: btrfs: fix race when deleting quota root from the dirty cow roots list When disabling quotas we are deleting the quota root from the list fs_info->dirty_cowonly_roots without taking the lock that protects it, which is struct btrfs_fs_info::trans_lock
osv
CVE-2023-54054UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-24
CVE-2023-54054 CVE-2023-54054: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix buffer overrun Klocwork warning: Buffer Overflow - Array Index In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix buffer overrun Klocwork warning: Buffer Overflow - Array Index Out of Bounds Driver uses fc_els_flogi to calculate size of buffer. The actual buffer is nested inside of fc_els_flogi which is smaller. Replace structure name to allow
osv
CVE-2023-54084UNKNOWN≥ 5.4.0, < 5.4.244≥ 5.5.0, < 5.10.181+3 more2025-12-24
CVE-2023-54084 ALSA: firewire-digi00x: prevent potential use after free ALSA: firewire-digi00x: prevent potential use after free In the Linux kernel, the following vulnerability has been resolved: ALSA: firewire-digi00x: prevent potential use after free This code was supposed to return an error code if init_stream() failed, but it instead freed dg00x->rx_stream and returned success. This potentially leads to a use after free.
osv
CVE-2023-54115UNKNOWN≥ 0, < 5.10.197-1≥ 0, < 6.1.52-1+1 more2025-12-24
CVE-2023-54115 CVE-2023-54115: In the Linux kernel, the following vulnerability has been resolved: pcmcia: rsrc_nonstatic: Fix memory leak in nonstatic_release_resource_db() When no In the Linux kernel, the following vulnerability has been resolved: pcmcia: rsrc_nonstatic: Fix memory leak in nonstatic_release_resource_db() When nonstatic_release_resource_db() frees all resources associated with an PCMCIA socket, it forgets to free socket_data too, causing a memory leak observable with kmemleak:
osv
CVE-2022-50741UNKNOWN≥ 5.13.0, < 5.15.86≥ 5.16.0, < 6.0.16+1 more2025-12-24
CVE-2022-50741 media: imx-jpeg: Disable useless interrupt to avoid kernel panic media: imx-jpeg: Disable useless interrupt to avoid kernel panic In the Linux kernel, the following vulnerability has been resolved: media: imx-jpeg: Disable useless interrupt to avoid kernel panic There is a hardware bug that the interrupt STMBUF_HALF may be triggered after or when disable interrupt. It may led to unexpected kernel panic. And interrupt STMBUF_HALF and STMBUF_RTND have no other effect. So disable
osv
CVE-2023-54134UNKNOWN≥ 2.6.27, < 4.14.326≥ 4.15.0, < 4.19.295+5 more2025-12-24
CVE-2023-54134 autofs: fix memory leak of waitqueues in autofs_catatonic_mode autofs: fix memory leak of waitqueues in autofs_catatonic_mode In the Linux kernel, the following vulnerability has been resolved: autofs: fix memory leak of waitqueues in autofs_catatonic_mode Syzkaller reports a memory leak: BUG: memory leak unreferenced object 0xffff88810b279e00 (size 96): comm "syz-executor399", pid 3631, jiffies 4294964921 (age 23.870s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 08 9e
osv
CVE-2025-68736UNKNOWN≥ 5.13.0, < 6.18.22025-12-24
CVE-2025-68736 landlock: Fix handling of disconnected directories landlock: Fix handling of disconnected directories In the Linux kernel, the following vulnerability has been resolved: landlock: Fix handling of disconnected directories Disconnected files or directories can appear when they are visible and opened from a bind mount, but have been renamed or moved from the source of the bind mount in a way that makes them inaccessible from the mount point (i.e. out of scope). Previously, access
osv
CVE-2025-68724UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2025-12-24
CVE-2025-68724 CVE-2025-68724: In the Linux kernel, the following vulnerability has been resolved: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id Use check In the Linux kernel, the following vulnerability has been resolved: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id Use check_add_overflow() to guard against potential integer overflows when adding the binary blob lengths and the size of an asymmetric_key_id structure and return ERR_PTR(-EOVE
osv
CVE-2023-54007UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-24
CVE-2023-54007 CVE-2023-54007: In the Linux kernel, the following vulnerability has been resolved: vmci_host: fix a race condition in vmci_host_poll() causing GPF During fuzzing, a In the Linux kernel, the following vulnerability has been resolved: vmci_host: fix a race condition in vmci_host_poll() causing GPF During fuzzing, a general protection fault is observed in vmci_host_poll(). general protection fault, probably for non-canonical address 0xdffffc0000000019: 0000 [#1] PREEMPT SMP KASAN KA
osv
CVE-2023-54117UNKNOWN≥ 5.17.0, < 6.1.53≥ 6.2.0, < 6.4.16+1 more2025-12-24
CVE-2023-54117 s390/dcssblk: fix kernel crash with list_add corruption s390/dcssblk: fix kernel crash with list_add corruption In the Linux kernel, the following vulnerability has been resolved: s390/dcssblk: fix kernel crash with list_add corruption Commit fb08a1908cb1 ("dax: simplify the dax_device gendisk association") introduced new logic for gendisk association, requiring drivers to explicitly call dax_add_host() and dax_remove_host(). For dcssblk driver, some dax_remove_host() calls we
osv
CVE-2025-68364UNKNOWN≥ 3.0.0, < 5.10.248≥ 5.11.0, < 5.15.198+5 more2025-12-24
CVE-2025-68364 ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent() ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent() In the Linux kernel, the following vulnerability has been resolved: ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent() In '__ocfs2_move_extent()', relax 'BUG()' to 'ocfs2_error()' just to avoid crashing the whole kernel due to a filesystem corruption.
osv
CVE-2023-54093UNKNOWN≥ 2.6.27, < 4.14.326≥ 4.15.0, < 4.19.295+5 more2025-12-24
CVE-2023-54093 media: anysee: fix null-ptr-deref in anysee_master_xfer media: anysee: fix null-ptr-deref in anysee_master_xfer In the Linux kernel, the following vulnerability has been resolved: media: anysee: fix null-ptr-deref in anysee_master_xfer In anysee_master_xfer, msg is controlled by user. When msg[i].buf is null and msg[i].len is zero, former checks on msg[i].buf would be passed. Malicious data finally reach anysee_master_xfer. If accessing msg[i].buf[0] without sanity check, null
osv
CVE-2025-68732UNKNOWN≥ 5.13.0, < 5.15.198≥ 5.16.0, < 6.1.160+4 more2025-12-24
CVE-2025-68732 gpu: host1x: Fix race in syncpt alloc/free gpu: host1x: Fix race in syncpt alloc/free In the Linux kernel, the following vulnerability has been resolved: gpu: host1x: Fix race in syncpt alloc/free Fix race condition between host1x_syncpt_alloc() and host1x_syncpt_put() by using kref_put_mutex() instead of kref_put() + manual mutex locking. This ensures no thread can acquire the syncpt_mutex after the refcount drops to zero but before syncpt_release acquires it. This prevents r
osv
CVE-2023-54083UNKNOWN≥ 5.7.0, < 5.10.188≥ 5.11.0, < 5.15.121+2 more2025-12-24
CVE-2023-54083 phy: tegra: xusb: Clear the driver reference in usb-phy dev phy: tegra: xusb: Clear the driver reference in usb-phy dev In the Linux kernel, the following vulnerability has been resolved: phy: tegra: xusb: Clear the driver reference in usb-phy dev For the dual-role port, it will assign the phy dev to usb-phy dev and use the port dev driver as the dev driver of usb-phy. When we try to destroy the port dev, it will destroy its dev driver as well. But we did not remove the refere
osv
CVE-2023-54089UNKNOWN≥ 0, < 6.5.3-12025-12-24
CVE-2023-54089 CVE-2023-54089: In the Linux kernel, the following vulnerability has been resolved: virtio_pmem: add the missing REQ_OP_WRITE for flush bio When doing mkfs In the Linux kernel, the following vulnerability has been resolved: virtio_pmem: add the missing REQ_OP_WRITE for flush bio When doing mkfs.xfs on a pmem device, the following warning was ------------[ cut here ]------------ WARNING: CPU: 2 PID: 384 at block/blk-core.c:751 submit_bio_noacct Modules linked in: CPU: 2 PID: 384 Co
osv