Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 84 of 724
CVE-2025-40307UNKNOWN≥ 5.7.0, < 6.12.58≥ 6.13.0, < 6.17.82025-12-08
CVE-2025-40307 exfat: validate cluster allocation bits of the allocation bitmap
exfat: validate cluster allocation bits of the allocation bitmap
In the Linux kernel, the following vulnerability has been resolved:
exfat: validate cluster allocation bits of the allocation bitmap
syzbot created an exfat image with cluster bits not set for the allocation
bitmap. exfat-fs reads and uses the allocation bitmap without checking
this. The problem is that if the start cluster of the allocation bitmap
i
osv
CVE-2025-40308UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-08
CVE-2025-40308 CVE-2025-40308: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: bcsp: receive data only if registered Currently, bcsp_recv() can be cal
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: bcsp: receive data only if registered Currently, bcsp_recv() can be called even when the BCSP protocol has not been registered. This leads to a NULL pointer dereference, as shown in the following stack trace: KASAN: null-ptr-deref in range
osv
CVE-2025-40298UNKNOWN≥ 0, < 6.17.8-12025-12-08
CVE-2025-40298 CVE-2025-40298: In the Linux kernel, the following vulnerability has been resolved: gve: Implement settime64 with -EOPNOTSUPP ptp_clock_settime() assumes every ptp_cl
In the Linux kernel, the following vulnerability has been resolved: gve: Implement settime64 with -EOPNOTSUPP ptp_clock_settime() assumes every ptp_clock has implemented settime64(). Stub it with -EOPNOTSUPP to prevent a NULL dereference.
osv
CVE-2025-40321UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-08
CVE-2025-40321 CVE-2025-40321: In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode Curren
In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode Currently, whenever there is a need to transmit an Action frame, the brcmfmac driver always uses the P2P vif to send the "actframe" IOVAR to firmware. The P2P interfaces were
osv
CVE-2022-50614UNKNOWN≥ 0, < 5.10.148-1≥ 0, < 6.0.2-12025-12-08
CVE-2022-50614 CVE-2022-50614: In the Linux kernel, the following vulnerability has been resolved: misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic The dma_m
In the Linux kernel, the following vulnerability has been resolved: misc: pci_endpoint_test: Fix pci_endpoint_test_{copy,write,read}() panic The dma_map_single() doesn't permit zero length mapping. It causes a follow panic. A panic was reported on arm64: [ 60.137988] ------------[ cut here ]------------ [ 60.142630]
osv
CVE-2022-50622UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.3-12025-12-08
CVE-2022-50622 CVE-2022-50622: In the Linux kernel, the following vulnerability has been resolved: ext4: fix potential memory leak in ext4_fc_record_modified_inode() As krealloc may
In the Linux kernel, the following vulnerability has been resolved: ext4: fix potential memory leak in ext4_fc_record_modified_inode() As krealloc may return NULL, in this case 'state->fc_modified_inodes' may not be freed by krealloc, but 'state->fc_modified_inodes' already set NULL. Then will lead to 'state->fc_modi
osv
CVE-2023-53753UNKNOWN≥ 0, < 6.1.20-12025-12-08
CVE-2023-53753 CVE-2023-53753: In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fix mapping to non-allocated address [Why] There is an issue mapp
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: fix mapping to non-allocated address [Why] There is an issue mapping non-allocated location of memory. It would allocate gpio registers from an array out of bounds. [How] Patch correct numbers of bounds for using.
osv
CVE-2023-53756UNKNOWN≥ 4.18.0, < 5.10.175≥ 5.11.0, < 5.15.103+2 more2025-12-08
CVE-2023-53756 KVM: VMX: Fix crash due to uninitialized current_vmcs
KVM: VMX: Fix crash due to uninitialized current_vmcs
In the Linux kernel, the following vulnerability has been resolved:
KVM: VMX: Fix crash due to uninitialized current_vmcs
KVM enables 'Enlightened VMCS' and 'Enlightened MSR Bitmap' when running as
a nested hypervisor on top of Hyper-V. When MSR bitmap is updated,
evmcs_touch_msr_bitmap function uses current_vmcs per-cpu variable to mark
that the msr bitmap was changed.
osv
CVE-2023-53759UNKNOWN≥ 5.17.0, < 6.1.37≥ 6.2.0, < 6.3.11+1 more2025-12-08
CVE-2023-53759 HID: hidraw: fix data race on device refcount
HID: hidraw: fix data race on device refcount
In the Linux kernel, the following vulnerability has been resolved:
HID: hidraw: fix data race on device refcount
The hidraw_open() function increments the hidraw device reference
counter. The counter has no dedicated synchronization mechanism,
resulting in a potential data race when concurrently opening a device.
The race is a regression introduced by commit 8590222e4b02 ("HID:
hidraw:
osv
CVE-2022-50625UNKNOWN≥ 4.2.0, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-12-08
CVE-2022-50625 serial: amba-pl011: avoid SBSA UART accessing DMACR register
serial: amba-pl011: avoid SBSA UART accessing DMACR register
In the Linux kernel, the following vulnerability has been resolved:
serial: amba-pl011: avoid SBSA UART accessing DMACR register
Chapter "B Generic UART" in "ARM Server Base System Architecture" [1]
documentation describes a generic UART interface. Such generic UART
does not support DMA. In current code, sbsa_uart_pops and
amba_pl011_pops share the same stop
osv
CVE-2023-53743UNKNOWN≥ 0, < 6.1.55-1≥ 0, < 6.5.3-12025-12-08
CVE-2023-53743 CVE-2023-53743: In the Linux kernel, the following vulnerability has been resolved: PCI: Free released resource after coalescing release_resource() doesn't actually f
In the Linux kernel, the following vulnerability has been resolved: PCI: Free released resource after coalescing release_resource() doesn't actually free the resource or resource list entry so free the resource list entry to avoid a leak.
osv
CVE-2022-50620UNKNOWN≥ 0, < 6.1.4-12025-12-08
CVE-2022-50620 CVE-2022-50620: In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to invalidate dcc->f2fs_issue_discard in error path Syzbot reports a NUL
In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to invalidate dcc->f2fs_issue_discard in error path Syzbot reports a NULL pointer dereference issue as below: __refcount_add include/linux/refcount.h:193 [inline] __refcount_inc include/linux/refcount.h:250 [inline] refcount_inc include/lin
osv
CVE-2025-40299UNKNOWN≥ 6.17.0, < 6.17.82025-12-08
CVE-2025-40299 gve: Implement gettimex64 with -EOPNOTSUPP
gve: Implement gettimex64 with -EOPNOTSUPP
In the Linux kernel, the following vulnerability has been resolved:
gve: Implement gettimex64 with -EOPNOTSUPP
gve implemented a ptp_clock for sole use of do_aux_work at this time.
ptp_clock_gettime() and ptp_sys_offset() assume every ptp_clock has
implemented either gettimex64 or gettime64. Stub gettimex64 and return
-EOPNOTSUPP to prevent NULL dereferencing.
osv
CVE-2025-40297UNKNOWN≥ 5.18.0, < 6.1.159≥ 6.2.0, < 6.6.117+2 more2025-12-08
CVE-2025-40297 net: bridge: fix use-after-free due to MST port state bypass
net: bridge: fix use-after-free due to MST port state bypass
In the Linux kernel, the following vulnerability has been resolved:
net: bridge: fix use-after-free due to MST port state bypass
syzbot reported[1] a use-after-free when deleting an expired fdb. It is
due to a race condition between learning still happening and a port being
deleted, after all its fdbs have been flushed. The port's state has been
toggled to d
osv
CVE-2022-50583UNKNOWN≥ 5.19.0, < 6.0.16≥ 6.1.0, < 6.1.22025-12-08
CVE-2022-50583 md/raid0, raid10: Don't set discard sectors for request queue
md/raid0, raid10: Don't set discard sectors for request queue
In the Linux kernel, the following vulnerability has been resolved:
md/raid0, raid10: Don't set discard sectors for request queue
It should use disk_stack_limits to get a proper max_discard_sectors
rather than setting a value by stack drivers.
And there is a bug. If all member disks are rotational devices,
raid0/raid10 set max_discard_sectors. So the memb
osv
CVE-2023-53755UNKNOWN≥ 0, < 6.1.20-12025-12-08
CVE-2023-53755 CVE-2023-53755: In the Linux kernel, the following vulnerability has been resolved: dmaengine: ptdma: check for null desc before calling pt_cmd_callback Resolves a pa
In the Linux kernel, the following vulnerability has been resolved: dmaengine: ptdma: check for null desc before calling pt_cmd_callback Resolves a panic that can occur on AMD systems, typically during host shutdown, after the PTDMA driver had been exercised. The issue was the pt_issue_pending() function is mistakenl
osv
CVE-2022-50616UNKNOWN≥ 0, < 6.1.4-12025-12-08
CVE-2022-50616 CVE-2022-50616: In the Linux kernel, the following vulnerability has been resolved: regulator: core: Use different devices for resource allocation and DT lookup Follo
In the Linux kernel, the following vulnerability has been resolved: regulator: core: Use different devices for resource allocation and DT lookup Following by the below discussion, there's the potential UAF issue between regulator and mfd. https://lore.kernel.org/all/[email protected]/
osv
CVE-2023-53761UNKNOWN≥ 4.20.0, < 5.4.244≥ 5.5.0, < 5.10.181+3 more2025-12-08
CVE-2023-53761 USB: usbtmc: Fix direction for 0-length ioctl control messages
USB: usbtmc: Fix direction for 0-length ioctl control messages
In the Linux kernel, the following vulnerability has been resolved:
USB: usbtmc: Fix direction for 0-length ioctl control messages
The syzbot fuzzer found a problem in the usbtmc driver: When a user
submits an ioctl for a 0-length control transfer, the driver does not
check that the direction is set to OUT:
------------[ cut here ]------------
usb 3-1:
osv
CVE-2022-50623UNKNOWN≥ 5.9.0, < 5.10.150≥ 5.11.0, < 5.15.75+2 more2025-12-08
CVE-2022-50623 fpga: prevent integer overflow in dfl_feature_ioctl_set_irq()
fpga: prevent integer overflow in dfl_feature_ioctl_set_irq()
In the Linux kernel, the following vulnerability has been resolved:
fpga: prevent integer overflow in dfl_feature_ioctl_set_irq()
The "hdr.count * sizeof(s32)" multiplication can overflow on 32 bit
systems leading to memory corruption. Use array_size() to fix that.
osv
CVE-2023-53764UNKNOWN≥ 6.3.0, < 6.3.42025-12-08
CVE-2023-53764 wifi: ath12k: Handle lock during peer_id find
wifi: ath12k: Handle lock during peer_id find
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: Handle lock during peer_id find
ath12k_peer_find_by_id() requires that the caller hold the
ab->base_lock. Currently the WBM error path does not hold
the lock and calling that function, leads to the
following lockdep_assert()in QCN9274:
[105162.160893] ------------[ cut here ]------------
[105162.160916] WA
osv