Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 78 of 724
CVE-2023-53857UNKNOWN≥ 0, < 6.5.6-12025-12-09
CVE-2023-53857 CVE-2023-53857: In the Linux kernel, the following vulnerability has been resolved: bpf: bpf_sk_storage: Fix invalid wait context lockdep report '
In the Linux kernel, the following vulnerability has been resolved: bpf: bpf_sk_storage: Fix invalid wait context lockdep report './test_progs -t test_local_storage' reported a splat: [ 27.137569] ============================= [ 27.138122] [ BUG: Invalid wait context ] [ 27.138650] 6.5.0-03980-gd11ae1b16b0a #247 Tainted: G O [ 27.139542
osv
CVE-2023-53837UNKNOWN≥ 0, < 6.1.37-1≥ 0, < 6.3.7-12025-12-09
CVE-2023-53837 CVE-2023-53837: In the Linux kernel, the following vulnerability has been resolved: drm/msm: fix NULL-deref on snapshot tear down In case of early initialisation erro
In the Linux kernel, the following vulnerability has been resolved: drm/msm: fix NULL-deref on snapshot tear down In case of early initialisation errors and on platforms that do not use the DPU controller, the deinitilisation code can be called with the kms pointer set to NULL. Patchwork: https://patchwork.freedeskto
osv
CVE-2023-53824UNKNOWN≥ 3.15.0, < 5.10.218≥ 5.11.0, < 5.15.160+2 more2025-12-09
CVE-2023-53824 netlink: annotate lockless accesses to nlk->max_recvmsg_len
netlink: annotate lockless accesses to nlk->max_recvmsg_len
In the Linux kernel, the following vulnerability has been resolved:
netlink: annotate lockless accesses to nlk->max_recvmsg_len
syzbot reported a data-race in data-race in netlink_recvmsg() [1]
Indeed, netlink_recvmsg() can be run concurrently,
and netlink_dump() also needs protection.
[1]
BUG: KCSAN: data-race in netlink_recvmsg / netlink_recvmsg
read to 0
osv
CVE-2025-40331UNKNOWN≥ 4.7.0, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-09
CVE-2025-40331 sctp: Prevent TOCTOU out-of-bounds write
sctp: Prevent TOCTOU out-of-bounds write
In the Linux kernel, the following vulnerability has been resolved:
sctp: Prevent TOCTOU out-of-bounds write
For the following path not holding the sock lock,
sctp_diag_dump() -> sctp_for_each_endpoint() -> sctp_ep_dump()
make sure not to exceed bounds in case the address list has grown
between buffer allocation (time-of-check) and write (time-of-use).
osv
CVE-2023-53785UNKNOWN≥ 0, < 6.1.55-1≥ 0, < 6.5.6-12025-12-09
CVE-2023-53785 CVE-2023-53785: In the Linux kernel, the following vulnerability has been resolved: mt76: mt7921: don't assume adequate headroom for SDIO headers mt7921_usb_sdio_tx_p
In the Linux kernel, the following vulnerability has been resolved: mt76: mt7921: don't assume adequate headroom for SDIO headers mt7921_usb_sdio_tx_prepare_skb() calls mt7921_usb_sdio_write_txwi() and mt7921_skb_add_usb_sdio_hdr(), both of which blindly assume that adequate headroom will be available in the passed s
osv
CVE-2022-50651UNKNOWN≥ 0, < 6.0.7-12025-12-09
CVE-2022-50651 CVE-2022-50651: In the Linux kernel, the following vulnerability has been resolved: ethtool: eeprom: fix null-deref on genl_info in dump The similar fix as commit 46c
In the Linux kernel, the following vulnerability has been resolved: ethtool: eeprom: fix null-deref on genl_info in dump The similar fix as commit 46cdedf2a0fa ("ethtool: pse-pd: fix null-deref on genl_info in dump") is also needed for ethtool eeprom.
osv
CVE-2023-53800UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-12-09
CVE-2023-53800 CVE-2023-53800: In the Linux kernel, the following vulnerability has been resolved: ubi: Fix use-after-free when volume resizing failed There is an use-after-free pro
In the Linux kernel, the following vulnerability has been resolved: ubi: Fix use-after-free when volume resizing failed There is an use-after-free problem reported by KASAN: ================================================================== BUG: KASAN: use-after-free in ubi_eba_copy_table+0x11f/0x1c0 [ubi] Read of si
osv
CVE-2022-50638UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-09
CVE-2022-50638 CVE-2022-50638: In the Linux kernel, the following vulnerability has been resolved: ext4: fix bug_on in __es_tree_search caused by bad boot loader inode We got a issu
In the Linux kernel, the following vulnerability has been resolved: ext4: fix bug_on in __es_tree_search caused by bad boot loader inode We got a issue as fllows: ================================================================== kernel BUG at fs/ext4/extents_status.c:203! invalid opcode: 0000 [#1] PREEMPT SMP CPU: 1
osv
CVE-2023-53810UNKNOWN≥ 5.8.0, < 5.10.180≥ 5.11.0, < 5.15.111+3 more2025-12-09
CVE-2023-53810 blk-mq: release crypto keyslot before reporting I/O complete
blk-mq: release crypto keyslot before reporting I/O complete
In the Linux kernel, the following vulnerability has been resolved:
blk-mq: release crypto keyslot before reporting I/O complete
Once all I/O using a blk_crypto_key has completed, filesystems can call
blk_crypto_evict_key(). However, the block layer currently doesn't call
blk_crypto_put_keyslot() until the request is being freed, which happens
after upper la
osv
CVE-2023-53788UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.25-12025-12-09
CVE-2023-53788 CVE-2023-53788: In the Linux kernel, the following vulnerability has been resolved: ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set() tuning_ctl_set() might
In the Linux kernel, the following vulnerability has been resolved: ALSA: hda/ca0132: fixup buffer overrun at tuning_ctl_set() tuning_ctl_set() might have buffer overrun at (X) if it didn't break from loop by matching (A). static int tuning_ctl_set(...) { for (i = 0; i < TUNING_CTLS_COUNT; i++) (A) if (nid == ca0132_t
osv
CVE-2023-53786UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-09
CVE-2023-53786 CVE-2023-53786: In the Linux kernel, the following vulnerability has been resolved: dm flakey: fix a crash with invalid table line This command will crash with NULL p
In the Linux kernel, the following vulnerability has been resolved: dm flakey: fix a crash with invalid table line This command will crash with NULL pointer dereference: dmsetup create flakey --table \ "0 `blockdev --getsize /dev/ram0` flakey /dev/ram0 0 0 1 2 corrupt_bio_byte 512" Fix the crash by checking if arg_na
osv
CVE-2022-50654UNKNOWN≥ 0, < 6.1.7-12025-12-09
CVE-2022-50654 CVE-2022-50654: In the Linux kernel, the following vulnerability has been resolved: bpf: Fix panic due to wrong pageattr of im->image In the scenario where livepatch
In the Linux kernel, the following vulnerability has been resolved: bpf: Fix panic due to wrong pageattr of im->image In the scenario where livepatch and kretfunc coexist, the pageattr of im->image is rox after arch_prepare_bpf_trampoline in bpf_trampoline_update, and then modify_fentry or register_fentry returns -EAG
osv
CVE-2022-50643UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.6-12025-12-09
CVE-2022-50643 CVE-2022-50643: In the Linux kernel, the following vulnerability has been resolved: cifs: Fix xid leak in cifs_copy_file_range() If the file is used by swap, before r
In the Linux kernel, the following vulnerability has been resolved: cifs: Fix xid leak in cifs_copy_file_range() If the file is used by swap, before return -EOPNOTSUPP, should free the xid, otherwise, the xid will be leaked.
osv
CVE-2025-40339UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-09
CVE-2025-40339 CVE-2025-40339: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix nullptr err of vm_handle_moved If a amdgpu_bo_va is fpriv->prt_va,
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: fix nullptr err of vm_handle_moved If a amdgpu_bo_va is fpriv->prt_va, the bo of this one is always NULL. So, such kind of amdgpu_bo_va should be updated separately before amdgpu_vm_handle_moved.
osv
CVE-2023-53859UNKNOWN≥ 5.9.0, < 5.15.99≥ 5.16.0, < 6.1.16+1 more2025-12-09
CVE-2023-53859 s390/idle: mark arch_cpu_idle() noinstr
s390/idle: mark arch_cpu_idle() noinstr
In the Linux kernel, the following vulnerability has been resolved:
s390/idle: mark arch_cpu_idle() noinstr
linux-next commit ("cpuidle: tracing: Warn about !rcu_is_watching()")
adds a new warning which hits on s390's arch_cpu_idle() function:
RCU not on for: arch_cpu_idle+0x0/0x28
WARNING: CPU: 2 PID: 0 at include/linux/trace_recursion.h:162 arch_ftrace_ops_list_func+0x24c/0x258
Modules linked in:
osv
CVE-2022-50667UNKNOWN≥ 5.15.0, < 5.15.75≥ 5.16.0, < 5.19.17+1 more2025-12-09
CVE-2022-50667 drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl()
drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl()
In the Linux kernel, the following vulnerability has been resolved:
drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl()
If the copy of the description string from userspace fails, then the page
for the instance descriptor doesn't get freed before returning -EFAULT,
which leads to a memleak.
osv
CVE-2022-50634UNKNOWN≥ 5.8.0, < 6.0.16≥ 6.1.0, < 6.1.22025-12-09
CVE-2022-50634 power: supply: cw2015: Fix potential null-ptr-deref in cw_bat_probe()
power: supply: cw2015: Fix potential null-ptr-deref in cw_bat_probe()
In the Linux kernel, the following vulnerability has been resolved:
power: supply: cw2015: Fix potential null-ptr-deref in cw_bat_probe()
cw_bat_probe() calls create_singlethread_workqueue() and not checked the
ret value, which may return NULL. And a null-ptr-deref may happen:
cw_bat_probe()
create_singlethread_workqueue() # failed, cw_bat
osv
CVE-2022-50645UNKNOWN≥ 5.1.0, < 5.4.229≥ 5.5.0, < 5.10.163+3 more2025-12-09
CVE-2022-50645 EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper()
EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper()
In the Linux kernel, the following vulnerability has been resolved:
EDAC/i10nm: fix refcount leak in pci_get_dev_wrapper()
As the comment of pci_get_domain_bus_and_slot() says, it returns
a PCI device with refcount incremented, so it doesn't need to
call an extra pci_dev_get() in pci_get_dev_wrapper(), and the PCI
device needs to be put in the error path.
osv
CVE-2022-50664UNKNOWN≥ 2.6.13, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-12-09
CVE-2022-50664 media: dvb-frontends: fix leak of memory fw
media: dvb-frontends: fix leak of memory fw
In the Linux kernel, the following vulnerability has been resolved:
media: dvb-frontends: fix leak of memory fw
osv
CVE-2022-50658UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.6-12025-12-09
CVE-2022-50658 CVE-2022-50658: In the Linux kernel, the following vulnerability has been resolved: cpufreq: qcom: fix memory leak in error path If for some reason the speedbin lengt
In the Linux kernel, the following vulnerability has been resolved: cpufreq: qcom: fix memory leak in error path If for some reason the speedbin length is incorrect, then there is a memory leak in the error path because we never free the speedbin buffer. This commit fixes the error path to always free the speedbin bu
osv