Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 66 of 724
CVE-2022-50777UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.7-12025-12-24
CVE-2022-50777 CVE-2022-50777: In the Linux kernel, the following vulnerability has been resolved: net: phy: xgmiitorgmii: Fix refcount leak in xgmiitorgmii_probe of_phy_find_device In the Linux kernel, the following vulnerability has been resolved: net: phy: xgmiitorgmii: Fix refcount leak in xgmiitorgmii_probe of_phy_find_device() return device node with refcount incremented. Call put_device() to relese it when not needed anymore.
osv
CVE-2023-54150UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-24
CVE-2023-54150 CVE-2023-54150: In the Linux kernel, the following vulnerability has been resolved: drm/amd: Fix an out of bounds error in BIOS parser The array is hardcoded to 8 in In the Linux kernel, the following vulnerability has been resolved: drm/amd: Fix an out of bounds error in BIOS parser The array is hardcoded to 8 in atomfirmware.h, but firmware provides a bigger one sometimes. Deferencing the larger array causes an out of bounds error. commit 4fc1ba4aa589 ("drm/amd/display: fix arra
osv
CVE-2023-54049UNKNOWN≥ 0, < 5.10.197-1≥ 0, < 6.1.55-1+1 more2025-12-24
CVE-2023-54049 CVE-2023-54049: In the Linux kernel, the following vulnerability has been resolved: rpmsg: glink: Add check for kstrdup Add check for the return value of kstrdup() an In the Linux kernel, the following vulnerability has been resolved: rpmsg: glink: Add check for kstrdup Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference.
osv
CVE-2023-54158UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-24
CVE-2023-54158 CVE-2023-54158: In the Linux kernel, the following vulnerability has been resolved: btrfs: don't free qgroup space unless specified Boris noticed in his simple quotas In the Linux kernel, the following vulnerability has been resolved: btrfs: don't free qgroup space unless specified Boris noticed in his simple quotas testing that he was getting a leak with Sweet Tea's change to subvol create that stopped doing a transaction commit. This was just a side effect of that change. In the
osv
CVE-2022-50703UNKNOWN≥ 4.5.0, < 4.9.331≥ 4.10.0, < 4.14.296+6 more2025-12-24
CVE-2022-50703 soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() In the Linux kernel, the following vulnerability has been resolved: soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe() There are two refcount leak bugs in qcom_smsm_probe(): (1) The 'local_node' is escaped out from for_each_child_of_node() as the break of iteration, we should call of_node_put() for it in error path or when it is not used anymore.
osv
CVE-2022-50726UNKNOWN≥ 5.1.0, < 5.4.223≥ 5.5.0, < 5.10.153+2 more2025-12-24
CVE-2022-50726 net/mlx5: Fix possible use-after-free in async command interface net/mlx5: Fix possible use-after-free in async command interface In the Linux kernel, the following vulnerability has been resolved: net/mlx5: Fix possible use-after-free in async command interface mlx5_cmd_cleanup_async_ctx should return only after all its callback handlers were completed. Before this patch, the below race between mlx5_cmd_cleanup_async_ctx and mlx5_cmd_exec_cb_handler was possible and lead to a
osv
CVE-2023-54075UNKNOWN≥ 6.3.0, < 6.3.22025-12-24
CVE-2023-54075 ASoC: mediatek: common: Fix refcount leak in parse_dai_link_info ASoC: mediatek: common: Fix refcount leak in parse_dai_link_info In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: common: Fix refcount leak in parse_dai_link_info Add missing of_node_put()s before the returns to balance of_node_get()s and of_node_put()s, which may get unbalanced in case the for loop 'for_each_available_child_of_node' returns early.
osv
CVE-2025-68355UNKNOWN≥ 6.18.0, < 6.18.22025-12-24
CVE-2025-68355 bpf: Fix exclusive map memory leak bpf: Fix exclusive map memory leak In the Linux kernel, the following vulnerability has been resolved: bpf: Fix exclusive map memory leak When excl_prog_hash is 0 and excl_prog_hash_size is non-zero, the map also needs to be freed. Otherwise, the map memory will not be reclaimed, just like the memory leak problem reported by syzbot [1]. syzbot reported: BUG: memory leak backtrace (crc 7b9fb9b4): map_create+0x322/0x11e0 kernel/bpf/syscall.c:15
osv
CVE-2025-68377UNKNOWN≥ 6.18.0, < 6.18.22025-12-24
CVE-2025-68377 ns: initialize ns_list_node for initial namespaces ns: initialize ns_list_node for initial namespaces In the Linux kernel, the following vulnerability has been resolved: ns: initialize ns_list_node for initial namespaces Make sure that the list is always initialized for initial namespaces.
osv
CVE-2022-50760UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-24
CVE-2022-50760 CVE-2022-50760: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios() As comment of p In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios() As comment of pci_get_class() says, it returns a pci_device with its refcount increased and decreased the refcount for the input parameter @from if it is not NULL. If we break the loo
osv
CVE-2023-54119UNKNOWN≥ 2.6.31, < 5.4.243≥ 5.5.0, < 5.10.180+4 more2025-12-24
CVE-2023-54119 inotify: Avoid reporting event with invalid wd inotify: Avoid reporting event with invalid wd In the Linux kernel, the following vulnerability has been resolved: inotify: Avoid reporting event with invalid wd When inotify_freeing_mark() races with inotify_handle_inode_event() it can happen that inotify_handle_inode_event() sees that i_mark->wd got already reset to -1 and reports this value to userspace which can confuse the inotify listener. Avoid the problem by validating that
osv
CVE-2023-54043UNKNOWN≥ 6.2.0, < 6.2.32025-12-24
CVE-2023-54043 iommufd: Do not add the same hwpt to the ioas->hwpt_list twice iommufd: Do not add the same hwpt to the ioas->hwpt_list twice In the Linux kernel, the following vulnerability has been resolved: iommufd: Do not add the same hwpt to the ioas->hwpt_list twice The hwpt is added to the hwpt_list only during its creation, it is never added again. This hunk is some missed leftover from rework. Adding it twice will corrupt the linked list in some cases. It effects HWPT specific attach
osv
CVE-2025-68350UNKNOWN≥ 6.18.0, < 6.18.22025-12-24
CVE-2025-68350 exfat: fix divide-by-zero in exfat_allocate_bitmap exfat: fix divide-by-zero in exfat_allocate_bitmap In the Linux kernel, the following vulnerability has been resolved: exfat: fix divide-by-zero in exfat_allocate_bitmap The variable max_ra_count can be 0 in exfat_allocate_bitmap(), which causes a divide-by-zero error in the subsequent modulo operation (i % max_ra_count), leading to a system crash. When max_ra_count is 0, it means that readahead is not used. This patch load the
osv
CVE-2023-54161UNKNOWN≥ 4.2.0, < 5.15.1282025-12-24
CVE-2023-54161 af_unix: Fix null-ptr-deref in unix_stream_sendpage(). af_unix: Fix null-ptr-deref in unix_stream_sendpage(). In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix null-ptr-deref in unix_stream_sendpage(). Bing-Jhong Billy Jheng reported null-ptr-deref in unix_stream_sendpage() with detailed analysis and a nice repro. unix_stream_sendpage() tries to add data to the last skb in the peer's recv queue without locking the queue. If the peer's FD is pass
osv
CVE-2025-68340MEDIUMCVSS 5.5≥ 3.7, < 5.15.199≥ 5.16, < 6.1.162+4 more2025-12-23
CVE-2025-68340 [MEDIUM] CVE-2025-68340: In the Linux kernel, the following vulnerability has been resolved: team: Move team device type cha In the Linux kernel, the following vulnerability has been resolved: team: Move team device type change at the end of team_port_add Attempting to add a port device that is already up will expectedly fail, but not before modifying the team device header_ops. In the case of the syzbot reproducer the gre0 device is already in state UP when it attempts to add
nvdosv
CVE-2025-68343UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-23
CVE-2025-68343 CVE-2025-68343: In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing header The driver expects to receive a struct gs_host_frame in gs_usb_receive_bulk_callback(). Use struct_group to describe the header of the struct gs_host_frame and ch
osv
CVE-2025-68342UNKNOWN≥ 3.16.0, < 6.6.119≥ 6.7.0, < 6.12.61+1 more2025-12-23
CVE-2025-68342 can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing data can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing data In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing data The URB received in gs_usb_receive_bulk_callback() contains a struct gs_host_frame. The length of the data after the header depends on the gs_host_frame
osv
CVE-2025-68339UNKNOWN≥ 2.6.12, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-23
CVE-2025-68339 atm/fore200e: Fix possible data race in fore200e_open() atm/fore200e: Fix possible data race in fore200e_open() In the Linux kernel, the following vulnerability has been resolved: atm/fore200e: Fix possible data race in fore200e_open() Protect access to fore200e->available_cell_rate with rate_mtx lock in the error handling path of fore200e_open() to prevent a data race. The field fore200e->available_cell_rate is a shared resource used to track available bandwidth. It is concur
osv
CVE-2025-68341UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.11-12025-12-23
CVE-2025-68341 CVE-2025-68341: In the Linux kernel, the following vulnerability has been resolved: veth: reduce XDP no_direct return section to fix race As explain in commit fa349e3 In the Linux kernel, the following vulnerability has been resolved: veth: reduce XDP no_direct return section to fix race As explain in commit fa349e396e48 ("veth: Fix race with AF_XDP exposing old or uninitialized descriptors") for veth there is a chance after napi_complete_done() that another CPU can manage start a
osv
CVE-2025-68338UNKNOWN≥ 6.3.0, < 6.12.61≥ 6.13.0, < 6.17.112025-12-23
CVE-2025-68338 net: dsa: microchip: Don't free uninitialized ksz_irq net: dsa: microchip: Don't free uninitialized ksz_irq In the Linux kernel, the following vulnerability has been resolved: net: dsa: microchip: Don't free uninitialized ksz_irq If something goes wrong at setup, ksz_irq_free() can be called on uninitialized ksz_irq (for example when ksz_ptp_irq_setup() fails). It leads to freeing uninitialized IRQ numbers and/or domains. Use dsa_switch_for_each_user_port_continue_reverse() in
osv