Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 66 of 724
CVE-2022-50777UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.7-12025-12-24
CVE-2022-50777 CVE-2022-50777: In the Linux kernel, the following vulnerability has been resolved: net: phy: xgmiitorgmii: Fix refcount leak in xgmiitorgmii_probe of_phy_find_device
In the Linux kernel, the following vulnerability has been resolved: net: phy: xgmiitorgmii: Fix refcount leak in xgmiitorgmii_probe of_phy_find_device() return device node with refcount incremented. Call put_device() to relese it when not needed anymore.
osv
CVE-2023-54150UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-24
CVE-2023-54150 CVE-2023-54150: In the Linux kernel, the following vulnerability has been resolved: drm/amd: Fix an out of bounds error in BIOS parser The array is hardcoded to 8 in
In the Linux kernel, the following vulnerability has been resolved: drm/amd: Fix an out of bounds error in BIOS parser The array is hardcoded to 8 in atomfirmware.h, but firmware provides a bigger one sometimes. Deferencing the larger array causes an out of bounds error. commit 4fc1ba4aa589 ("drm/amd/display: fix arra
osv
CVE-2023-54049UNKNOWN≥ 0, < 5.10.197-1≥ 0, < 6.1.55-1+1 more2025-12-24
CVE-2023-54049 CVE-2023-54049: In the Linux kernel, the following vulnerability has been resolved: rpmsg: glink: Add check for kstrdup Add check for the return value of kstrdup() an
In the Linux kernel, the following vulnerability has been resolved: rpmsg: glink: Add check for kstrdup Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference.
osv
CVE-2023-54158UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-24
CVE-2023-54158 CVE-2023-54158: In the Linux kernel, the following vulnerability has been resolved: btrfs: don't free qgroup space unless specified Boris noticed in his simple quotas
In the Linux kernel, the following vulnerability has been resolved: btrfs: don't free qgroup space unless specified Boris noticed in his simple quotas testing that he was getting a leak with Sweet Tea's change to subvol create that stopped doing a transaction commit. This was just a side effect of that change. In the
osv
CVE-2022-50703UNKNOWN≥ 4.5.0, < 4.9.331≥ 4.10.0, < 4.14.296+6 more2025-12-24
CVE-2022-50703 soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe()
soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe()
In the Linux kernel, the following vulnerability has been resolved:
soc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe()
There are two refcount leak bugs in qcom_smsm_probe():
(1) The 'local_node' is escaped out from for_each_child_of_node() as
the break of iteration, we should call of_node_put() for it in error
path or when it is not used anymore.
osv
CVE-2022-50726UNKNOWN≥ 5.1.0, < 5.4.223≥ 5.5.0, < 5.10.153+2 more2025-12-24
CVE-2022-50726 net/mlx5: Fix possible use-after-free in async command interface
net/mlx5: Fix possible use-after-free in async command interface
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Fix possible use-after-free in async command interface
mlx5_cmd_cleanup_async_ctx should return only after all its callback
handlers were completed. Before this patch, the below race between
mlx5_cmd_cleanup_async_ctx and mlx5_cmd_exec_cb_handler was possible and
lead to a
osv
CVE-2023-54075UNKNOWN≥ 6.3.0, < 6.3.22025-12-24
CVE-2023-54075 ASoC: mediatek: common: Fix refcount leak in parse_dai_link_info
ASoC: mediatek: common: Fix refcount leak in parse_dai_link_info
In the Linux kernel, the following vulnerability has been resolved:
ASoC: mediatek: common: Fix refcount leak in parse_dai_link_info
Add missing of_node_put()s before the returns to balance
of_node_get()s and of_node_put()s, which may get unbalanced
in case the for loop 'for_each_available_child_of_node' returns
early.
osv
CVE-2025-68355UNKNOWN≥ 6.18.0, < 6.18.22025-12-24
CVE-2025-68355 bpf: Fix exclusive map memory leak
bpf: Fix exclusive map memory leak
In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix exclusive map memory leak
When excl_prog_hash is 0 and excl_prog_hash_size is non-zero, the map also
needs to be freed. Otherwise, the map memory will not be reclaimed, just
like the memory leak problem reported by syzbot [1].
syzbot reported:
BUG: memory leak
backtrace (crc 7b9fb9b4):
map_create+0x322/0x11e0 kernel/bpf/syscall.c:15
osv
CVE-2025-68377UNKNOWN≥ 6.18.0, < 6.18.22025-12-24
CVE-2025-68377 ns: initialize ns_list_node for initial namespaces
ns: initialize ns_list_node for initial namespaces
In the Linux kernel, the following vulnerability has been resolved:
ns: initialize ns_list_node for initial namespaces
Make sure that the list is always initialized for initial namespaces.
osv
CVE-2022-50760UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-24
CVE-2022-50760 CVE-2022-50760: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios() As comment of p
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios() As comment of pci_get_class() says, it returns a pci_device with its refcount increased and decreased the refcount for the input parameter @from if it is not NULL. If we break the loo
osv
CVE-2023-54119UNKNOWN≥ 2.6.31, < 5.4.243≥ 5.5.0, < 5.10.180+4 more2025-12-24
CVE-2023-54119 inotify: Avoid reporting event with invalid wd
inotify: Avoid reporting event with invalid wd
In the Linux kernel, the following vulnerability has been resolved:
inotify: Avoid reporting event with invalid wd
When inotify_freeing_mark() races with inotify_handle_inode_event() it
can happen that inotify_handle_inode_event() sees that i_mark->wd got
already reset to -1 and reports this value to userspace which can
confuse the inotify listener. Avoid the problem by validating that
osv
CVE-2023-54043UNKNOWN≥ 6.2.0, < 6.2.32025-12-24
CVE-2023-54043 iommufd: Do not add the same hwpt to the ioas->hwpt_list twice
iommufd: Do not add the same hwpt to the ioas->hwpt_list twice
In the Linux kernel, the following vulnerability has been resolved:
iommufd: Do not add the same hwpt to the ioas->hwpt_list twice
The hwpt is added to the hwpt_list only during its creation, it is never
added again. This hunk is some missed leftover from rework. Adding it
twice will corrupt the linked list in some cases.
It effects HWPT specific attach
osv
CVE-2025-68350UNKNOWN≥ 6.18.0, < 6.18.22025-12-24
CVE-2025-68350 exfat: fix divide-by-zero in exfat_allocate_bitmap
exfat: fix divide-by-zero in exfat_allocate_bitmap
In the Linux kernel, the following vulnerability has been resolved:
exfat: fix divide-by-zero in exfat_allocate_bitmap
The variable max_ra_count can be 0 in exfat_allocate_bitmap(),
which causes a divide-by-zero error in the subsequent modulo operation
(i % max_ra_count), leading to a system crash.
When max_ra_count is 0, it means that readahead is not used. This patch
load the
osv
CVE-2023-54161UNKNOWN≥ 4.2.0, < 5.15.1282025-12-24
CVE-2023-54161 af_unix: Fix null-ptr-deref in unix_stream_sendpage().
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
In the Linux kernel, the following vulnerability has been resolved:
af_unix: Fix null-ptr-deref in unix_stream_sendpage().
Bing-Jhong Billy Jheng reported null-ptr-deref in unix_stream_sendpage()
with detailed analysis and a nice repro.
unix_stream_sendpage() tries to add data to the last skb in the peer's
recv queue without locking the queue.
If the peer's FD is pass
osv
CVE-2025-68340MEDIUMCVSS 5.5≥ 3.7, < 5.15.199≥ 5.16, < 6.1.162+4 more2025-12-23
CVE-2025-68340 [MEDIUM] CVE-2025-68340: In the Linux kernel, the following vulnerability has been resolved:
team: Move team device type cha
In the Linux kernel, the following vulnerability has been resolved:
team: Move team device type change at the end of team_port_add
Attempting to add a port device that is already up will expectedly fail,
but not before modifying the team device header_ops.
In the case of the syzbot reproducer the gre0 device is
already in state UP when it attempts to add
nvdosv
CVE-2025-68343UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-23
CVE-2025-68343 CVE-2025-68343: In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing
In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing header The driver expects to receive a struct gs_host_frame in gs_usb_receive_bulk_callback(). Use struct_group to describe the header of the struct gs_host_frame and ch
osv
CVE-2025-68342UNKNOWN≥ 3.16.0, < 6.6.119≥ 6.7.0, < 6.12.61+1 more2025-12-23
CVE-2025-68342 can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing data
can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing data
In the Linux kernel, the following vulnerability has been resolved:
can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing data
The URB received in gs_usb_receive_bulk_callback() contains a struct
gs_host_frame. The length of the data after the header depends on the
gs_host_frame
osv
CVE-2025-68339UNKNOWN≥ 2.6.12, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-23
CVE-2025-68339 atm/fore200e: Fix possible data race in fore200e_open()
atm/fore200e: Fix possible data race in fore200e_open()
In the Linux kernel, the following vulnerability has been resolved:
atm/fore200e: Fix possible data race in fore200e_open()
Protect access to fore200e->available_cell_rate with rate_mtx lock in the
error handling path of fore200e_open() to prevent a data race.
The field fore200e->available_cell_rate is a shared resource used to track
available bandwidth. It is concur
osv
CVE-2025-68341UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.11-12025-12-23
CVE-2025-68341 CVE-2025-68341: In the Linux kernel, the following vulnerability has been resolved: veth: reduce XDP no_direct return section to fix race As explain in commit fa349e3
In the Linux kernel, the following vulnerability has been resolved: veth: reduce XDP no_direct return section to fix race As explain in commit fa349e396e48 ("veth: Fix race with AF_XDP exposing old or uninitialized descriptors") for veth there is a chance after napi_complete_done() that another CPU can manage start a
osv
CVE-2025-68338UNKNOWN≥ 6.3.0, < 6.12.61≥ 6.13.0, < 6.17.112025-12-23
CVE-2025-68338 net: dsa: microchip: Don't free uninitialized ksz_irq
net: dsa: microchip: Don't free uninitialized ksz_irq
In the Linux kernel, the following vulnerability has been resolved:
net: dsa: microchip: Don't free uninitialized ksz_irq
If something goes wrong at setup, ksz_irq_free() can be called on
uninitialized ksz_irq (for example when ksz_ptp_irq_setup() fails). It
leads to freeing uninitialized IRQ numbers and/or domains.
Use dsa_switch_for_each_user_port_continue_reverse() in
osv