Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 65 of 724
CVE-2022-50757UNKNOWN≥ 4.14.0, < 4.14.303≥ 4.15.0, < 4.19.270+5 more2025-12-24
CVE-2022-50757 media: camss: Clean up received buffers on failed start of streaming
media: camss: Clean up received buffers on failed start of streaming
In the Linux kernel, the following vulnerability has been resolved:
media: camss: Clean up received buffers on failed start of streaming
It is required to return the received buffers, if streaming can not be
started. For instance media_pipeline_start() may fail with EPIPE, if
a link validation between entities is not passed, and in such a cas
osv
CVE-2022-50710UNKNOWN≥ 0, < 6.0.3-12025-12-24
CVE-2022-50710 CVE-2022-50710: In the Linux kernel, the following vulnerability has been resolved: ice: set tx_tstamps when creating new Tx rings via ethtool When the user changes t
In the Linux kernel, the following vulnerability has been resolved: ice: set tx_tstamps when creating new Tx rings via ethtool When the user changes the number of queues via ethtool, the driver allocates new rings. This allocation did not initialize tx_tstamps. This results in the tx_tstamps field being zero (due to
osv
CVE-2022-50721UNKNOWN≥ 5.11.0, < 5.19.17≥ 5.20.0, < 6.0.32025-12-24
CVE-2022-50721 dmaengine: qcom-adm: fix wrong calling convention for prep_slave_sg
dmaengine: qcom-adm: fix wrong calling convention for prep_slave_sg
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: qcom-adm: fix wrong calling convention for prep_slave_sg
The calling convention for pre_slave_sg is to return NULL on error and
provide an error log to the system. Qcom-adm instead provide error
pointer when an error occur. This indirectly cause kernel panic for
exam
osv
CVE-2023-54133UNKNOWN≥ 0, < 6.4.11-12025-12-24
CVE-2023-54133 CVE-2023-54133: In the Linux kernel, the following vulnerability has been resolved: nfp: clean mc addresses in application firmware when closing port When moving devi
In the Linux kernel, the following vulnerability has been resolved: nfp: clean mc addresses in application firmware when closing port When moving devices from one namespace to another, mc addresses are cleaned in software while not removed from application firmware. Thus the mc addresses are remained and will cause r
osv
CVE-2023-54131UNKNOWN≥ 5.11.0, < 5.15.111≥ 5.16.0, < 6.1.28+2 more2025-12-24
CVE-2023-54131 wifi: rt2x00: Fix memory leak when handling surveys
wifi: rt2x00: Fix memory leak when handling surveys
In the Linux kernel, the following vulnerability has been resolved:
wifi: rt2x00: Fix memory leak when handling surveys
When removing a rt2x00 device, its associated channel surveys
are not freed, causing a memory leak observable with kmemleak:
unreferenced object 0xffff9620f0881a00 (size 512):
comm "systemd-udevd", pid 2290, jiffies 4294906974 (age 33.768s)
hex dump (first
osv
CVE-2023-54032UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-24
CVE-2023-54032 CVE-2023-54032: In the Linux kernel, the following vulnerability has been resolved: btrfs: fix race when deleting quota root from the dirty cow roots list When disabl
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix race when deleting quota root from the dirty cow roots list When disabling quotas we are deleting the quota root from the list fs_info->dirty_cowonly_roots without taking the lock that protects it, which is struct btrfs_fs_info::trans_lock
osv
CVE-2023-54054UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-24
CVE-2023-54054 CVE-2023-54054: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix buffer overrun Klocwork warning: Buffer Overflow - Array Index
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix buffer overrun Klocwork warning: Buffer Overflow - Array Index Out of Bounds Driver uses fc_els_flogi to calculate size of buffer. The actual buffer is nested inside of fc_els_flogi which is smaller. Replace structure name to allow
osv
CVE-2023-54084UNKNOWN≥ 5.4.0, < 5.4.244≥ 5.5.0, < 5.10.181+3 more2025-12-24
CVE-2023-54084 ALSA: firewire-digi00x: prevent potential use after free
ALSA: firewire-digi00x: prevent potential use after free
In the Linux kernel, the following vulnerability has been resolved:
ALSA: firewire-digi00x: prevent potential use after free
This code was supposed to return an error code if init_stream()
failed, but it instead freed dg00x->rx_stream and returned success.
This potentially leads to a use after free.
osv
CVE-2023-54115UNKNOWN≥ 0, < 5.10.197-1≥ 0, < 6.1.52-1+1 more2025-12-24
CVE-2023-54115 CVE-2023-54115: In the Linux kernel, the following vulnerability has been resolved: pcmcia: rsrc_nonstatic: Fix memory leak in nonstatic_release_resource_db() When no
In the Linux kernel, the following vulnerability has been resolved: pcmcia: rsrc_nonstatic: Fix memory leak in nonstatic_release_resource_db() When nonstatic_release_resource_db() frees all resources associated with an PCMCIA socket, it forgets to free socket_data too, causing a memory leak observable with kmemleak:
osv
CVE-2022-50741UNKNOWN≥ 5.13.0, < 5.15.86≥ 5.16.0, < 6.0.16+1 more2025-12-24
CVE-2022-50741 media: imx-jpeg: Disable useless interrupt to avoid kernel panic
media: imx-jpeg: Disable useless interrupt to avoid kernel panic
In the Linux kernel, the following vulnerability has been resolved:
media: imx-jpeg: Disable useless interrupt to avoid kernel panic
There is a hardware bug that the interrupt STMBUF_HALF may be triggered
after or when disable interrupt.
It may led to unexpected kernel panic.
And interrupt STMBUF_HALF and STMBUF_RTND have no other effect.
So disable
osv
CVE-2023-54134UNKNOWN≥ 2.6.27, < 4.14.326≥ 4.15.0, < 4.19.295+5 more2025-12-24
CVE-2023-54134 autofs: fix memory leak of waitqueues in autofs_catatonic_mode
autofs: fix memory leak of waitqueues in autofs_catatonic_mode
In the Linux kernel, the following vulnerability has been resolved:
autofs: fix memory leak of waitqueues in autofs_catatonic_mode
Syzkaller reports a memory leak:
BUG: memory leak
unreferenced object 0xffff88810b279e00 (size 96):
comm "syz-executor399", pid 3631, jiffies 4294964921 (age 23.870s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 08 9e
osv
CVE-2025-68736UNKNOWN≥ 5.13.0, < 6.18.22025-12-24
CVE-2025-68736 landlock: Fix handling of disconnected directories
landlock: Fix handling of disconnected directories
In the Linux kernel, the following vulnerability has been resolved:
landlock: Fix handling of disconnected directories
Disconnected files or directories can appear when they are visible and
opened from a bind mount, but have been renamed or moved from the source
of the bind mount in a way that makes them inaccessible from the mount
point (i.e. out of scope).
Previously, access
osv
CVE-2025-68724UNKNOWN≥ 0, < 5.10.249-1≥ 0, < 6.1.162-1+2 more2025-12-24
CVE-2025-68724 CVE-2025-68724: In the Linux kernel, the following vulnerability has been resolved: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id Use check
In the Linux kernel, the following vulnerability has been resolved: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id Use check_add_overflow() to guard against potential integer overflows when adding the binary blob lengths and the size of an asymmetric_key_id structure and return ERR_PTR(-EOVE
osv
CVE-2023-54007UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-24
CVE-2023-54007 CVE-2023-54007: In the Linux kernel, the following vulnerability has been resolved: vmci_host: fix a race condition in vmci_host_poll() causing GPF During fuzzing, a
In the Linux kernel, the following vulnerability has been resolved: vmci_host: fix a race condition in vmci_host_poll() causing GPF During fuzzing, a general protection fault is observed in vmci_host_poll(). general protection fault, probably for non-canonical address 0xdffffc0000000019: 0000 [#1] PREEMPT SMP KASAN KA
osv
CVE-2023-54117UNKNOWN≥ 5.17.0, < 6.1.53≥ 6.2.0, < 6.4.16+1 more2025-12-24
CVE-2023-54117 s390/dcssblk: fix kernel crash with list_add corruption
s390/dcssblk: fix kernel crash with list_add corruption
In the Linux kernel, the following vulnerability has been resolved:
s390/dcssblk: fix kernel crash with list_add corruption
Commit fb08a1908cb1 ("dax: simplify the dax_device gendisk
association") introduced new logic for gendisk association, requiring
drivers to explicitly call dax_add_host() and dax_remove_host().
For dcssblk driver, some dax_remove_host() calls we
osv
CVE-2025-68364UNKNOWN≥ 3.0.0, < 5.10.248≥ 5.11.0, < 5.15.198+5 more2025-12-24
CVE-2025-68364 ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent()
ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent()
In the Linux kernel, the following vulnerability has been resolved:
ocfs2: relax BUG() to ocfs2_error() in __ocfs2_move_extent()
In '__ocfs2_move_extent()', relax 'BUG()' to 'ocfs2_error()' just
to avoid crashing the whole kernel due to a filesystem corruption.
osv
CVE-2023-54093UNKNOWN≥ 2.6.27, < 4.14.326≥ 4.15.0, < 4.19.295+5 more2025-12-24
CVE-2023-54093 media: anysee: fix null-ptr-deref in anysee_master_xfer
media: anysee: fix null-ptr-deref in anysee_master_xfer
In the Linux kernel, the following vulnerability has been resolved:
media: anysee: fix null-ptr-deref in anysee_master_xfer
In anysee_master_xfer, msg is controlled by user. When msg[i].buf
is null and msg[i].len is zero, former checks on msg[i].buf would be
passed. Malicious data finally reach anysee_master_xfer. If accessing
msg[i].buf[0] without sanity check, null
osv
CVE-2025-68732UNKNOWN≥ 5.13.0, < 5.15.198≥ 5.16.0, < 6.1.160+4 more2025-12-24
CVE-2025-68732 gpu: host1x: Fix race in syncpt alloc/free
gpu: host1x: Fix race in syncpt alloc/free
In the Linux kernel, the following vulnerability has been resolved:
gpu: host1x: Fix race in syncpt alloc/free
Fix race condition between host1x_syncpt_alloc()
and host1x_syncpt_put() by using kref_put_mutex()
instead of kref_put() + manual mutex locking.
This ensures no thread can acquire the
syncpt_mutex after the refcount drops to zero
but before syncpt_release acquires it.
This prevents r
osv
CVE-2023-54083UNKNOWN≥ 5.7.0, < 5.10.188≥ 5.11.0, < 5.15.121+2 more2025-12-24
CVE-2023-54083 phy: tegra: xusb: Clear the driver reference in usb-phy dev
phy: tegra: xusb: Clear the driver reference in usb-phy dev
In the Linux kernel, the following vulnerability has been resolved:
phy: tegra: xusb: Clear the driver reference in usb-phy dev
For the dual-role port, it will assign the phy dev to usb-phy dev and
use the port dev driver as the dev driver of usb-phy.
When we try to destroy the port dev, it will destroy its dev driver
as well. But we did not remove the refere
osv
CVE-2023-54089UNKNOWN≥ 0, < 6.5.3-12025-12-24
CVE-2023-54089 CVE-2023-54089: In the Linux kernel, the following vulnerability has been resolved: virtio_pmem: add the missing REQ_OP_WRITE for flush bio When doing mkfs
In the Linux kernel, the following vulnerability has been resolved: virtio_pmem: add the missing REQ_OP_WRITE for flush bio When doing mkfs.xfs on a pmem device, the following warning was ------------[ cut here ]------------ WARNING: CPU: 2 PID: 384 at block/blk-core.c:751 submit_bio_noacct Modules linked in: CPU: 2 PID: 384 Co
osv