Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 85 of 724
CVE-2023-53768UNKNOWN≥ 6.0.0, < 6.1.40≥ 6.2.0, < 6.4.52025-12-08
CVE-2023-53768 regmap-irq: Fix out-of-bounds access when allocating config buffers
regmap-irq: Fix out-of-bounds access when allocating config buffers
In the Linux kernel, the following vulnerability has been resolved:
regmap-irq: Fix out-of-bounds access when allocating config buffers
When allocating the 2D array for handling IRQ type registers in
regmap_add_irq_chip_fwnode(), the intent is to allocate a matrix
with num_config_bases rows and num_config_regs columns.
This is currently handle
osv
CVE-2022-50631UNKNOWN≥ 5.19.0, < 6.0.18≥ 6.1.0, < 6.1.42025-12-08
CVE-2022-50631 RISC-V: kexec: Fix memory leak of fdt buffer
RISC-V: kexec: Fix memory leak of fdt buffer
In the Linux kernel, the following vulnerability has been resolved:
RISC-V: kexec: Fix memory leak of fdt buffer
This is reported by kmemleak detector:
unreferenced object 0xff60000082864000 (size 9588):
comm "kexec", pid 146, jiffies 4294900634 (age 64.788s)
hex dump (first 32 bytes):
d0 0d fe ed 00 00 12 ed 00 00 00 48 00 00 11 40 ...........H...@
00 00 00 28 00 00 00 11 00 00 00 02 00
osv
CVE-2023-53754UNKNOWN≥ 4.17.0, < 5.4.243≥ 5.5.0, < 5.10.180+4 more2025-12-08
CVE-2023-53754 scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup()
scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup()
In the Linux kernel, the following vulnerability has been resolved:
scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup()
When if_type equals zero and pci_resource_start(pdev, PCI_64BIT_BAR4)
returns false, drbl_regs_memmap_p is not remapped. This passes a NULL
pointer to iounmap(), which can trigger a WARN() on certain arches.
When if_type equals six a
osv
CVE-2025-40303UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-08
CVE-2025-40303 CVE-2025-40303: In the Linux kernel, the following vulnerability has been resolved: btrfs: ensure no dirty metadata is written back for an fs with errors [BUG] During
In the Linux kernel, the following vulnerability has been resolved: btrfs: ensure no dirty metadata is written back for an fs with errors [BUG] During development of a minor feature (make sure all btrfs_bio::end_io() is called in task context), I noticed a crash in generic/388, where metadata writes triggered new wor
osv
CVE-2025-40316UNKNOWN≥ 0, < 6.6.117≥ 6.7.0, < 6.12.58+1 more2025-12-08
CVE-2025-40316 drm/mediatek: Fix device use-after-free on unbind
drm/mediatek: Fix device use-after-free on unbind
In the Linux kernel, the following vulnerability has been resolved:
drm/mediatek: Fix device use-after-free on unbind
A recent change fixed device reference leaks when looking up drm
platform device driver data during bind() but failed to remove a partial
fix which had been added by commit 80805b62ea5b ("drm/mediatek: Fix
kobject put for component sub-drivers").
This results in
osv
CVE-2025-40323UNKNOWN≥ 2.6.12, < 6.1.159≥ 6.2.0, < 6.6.117+2 more2025-12-08
CVE-2025-40323 fbcon: Set fb_display[i]->mode to NULL when the mode is released
fbcon: Set fb_display[i]->mode to NULL when the mode is released
In the Linux kernel, the following vulnerability has been resolved:
fbcon: Set fb_display[i]->mode to NULL when the mode is released
Recently, we discovered the following issue through syzkaller:
BUG: KASAN: slab-use-after-free in fb_mode_is_equal+0x285/0x2f0
Read of size 4 at addr ff11000001b3c69c by task syz.xxx
...
Call Trace:
dump_stack_lvl+0xa
osv
CVE-2025-40310UNKNOWN≥ 6.5.0, < 6.6.117≥ 6.7.0, < 6.12.58+1 more2025-12-08
CVE-2025-40310 amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw
amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw
In the Linux kernel, the following vulnerability has been resolved:
amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw
There is race in amdgpu_amdkfd_device_fini_sw and interrupt.
if amdgpu_amdkfd_device_fini_sw run in b/w kfd_cleanup_nodes and
kfree(kfd), and KGD interrupt generated.
kernel panic log:
BUG: kernel NULL pointer dereference, address: 000
osv
CVE-2025-40304UNKNOWN≥ 2.6.12, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-08
CVE-2025-40304 fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds
fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds
In the Linux kernel, the following vulnerability has been resolved:
fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds
Add bounds checking to prevent writes past framebuffer boundaries when
rendering text near screen edges. Return early if the Y position is off-screen
and clip image height to screen boundary. Break from the
osv
CVE-2025-40324UNKNOWN≥ 0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-08
CVE-2025-40324 NFSD: Fix crash in nfsd4_read_release()
NFSD: Fix crash in nfsd4_read_release()
In the Linux kernel, the following vulnerability has been resolved:
NFSD: Fix crash in nfsd4_read_release()
When tracing is enabled, the trace_nfsd_read_done trace point
crashes during the pynfs read.testNoFh test.
osv
CVE-2025-40319UNKNOWN≥ 5.8.0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-08
CVE-2025-40319 bpf: Sync pending IRQ work before freeing ring buffer
bpf: Sync pending IRQ work before freeing ring buffer
In the Linux kernel, the following vulnerability has been resolved:
bpf: Sync pending IRQ work before freeing ring buffer
Fix a race where irq_work can be queued in bpf_ringbuf_commit()
but the ring buffer is freed before the work executes.
In the syzbot reproducer, a BPF program attached to sched_switch
triggers bpf_ringbuf_commit(), queuing an irq_work. If the ring buff
osv
CVE-2025-40312UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-08
CVE-2025-40312 CVE-2025-40312: In the Linux kernel, the following vulnerability has been resolved: jfs: Verify inode mode when loading from disk The inode mode loaded from corrupted
In the Linux kernel, the following vulnerability has been resolved: jfs: Verify inode mode when loading from disk The inode mode loaded from corrupted disk can be invalid. Do like what commit 0a9e74051313 ("isofs: Verify inode mode when loading from disk") does.
osv
CVE-2025-40317UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-08
CVE-2025-40317 CVE-2025-40317: In the Linux kernel, the following vulnerability has been resolved: regmap: slimbus: fix bus_context pointer in regmap init calls Commit 4e65bda8273c
In the Linux kernel, the following vulnerability has been resolved: regmap: slimbus: fix bus_context pointer in regmap init calls Commit 4e65bda8273c ("ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data()") revealed the problem in the slimbus regmap. That commit breaks audio playback, for instance, on sdm84
osv
CVE-2023-53758UNKNOWN≥ 6.0.0, < 6.1.28≥ 6.2.0, < 6.2.15+1 more2025-12-08
CVE-2023-53758 spi: atmel-quadspi: Free resources even if runtime resume failed in .remove()
spi: atmel-quadspi: Free resources even if runtime resume failed in .remove()
In the Linux kernel, the following vulnerability has been resolved:
spi: atmel-quadspi: Free resources even if runtime resume failed in .remove()
An early error exit in atmel_qspi_remove() doesn't prevent the device
unbind. So this results in an spi controller with an unbound parent
and unmapped register space (because devm_
osv
CVE-2023-53745UNKNOWN≥ 4.17.0, < 4.19.276≥ 4.20.0, < 5.4.235+4 more2025-12-08
CVE-2023-53745 um: vector: Fix memory leak in vector_config
um: vector: Fix memory leak in vector_config
In the Linux kernel, the following vulnerability has been resolved:
um: vector: Fix memory leak in vector_config
If the return value of the uml_parse_vector_ifspec function is NULL,
we should call kfree(params) to prevent memory leak.
osv
CVE-2023-53742UNKNOWN≥ 5.8.0, < 6.1.28≥ 6.2.0, < 6.2.15+1 more2025-12-08
CVE-2023-53742 kcsan: Avoid READ_ONCE() in read_instrumented_memory()
kcsan: Avoid READ_ONCE() in read_instrumented_memory()
In the Linux kernel, the following vulnerability has been resolved:
kcsan: Avoid READ_ONCE() in read_instrumented_memory()
Haibo Li reported:
| Unable to handle kernel paging request at virtual address
| ffffff802a0d8d7171
| Mem abort info:o:
| ESR = 0x9600002121
| EC = 0x25: DABT (current EL), IL = 32 bitsts
| SET = 0, FnV = 0 0
| EA = 0, S1PTW = 0 0
| FSC = 0x21: ali
osv
CVE-2022-50630UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.3-12025-12-08
CVE-2022-50630 CVE-2022-50630: In the Linux kernel, the following vulnerability has been resolved: mm: hugetlb: fix UAF in hugetlb_handle_userfault The vma_lock and hugetlb_fault_mu
In the Linux kernel, the following vulnerability has been resolved: mm: hugetlb: fix UAF in hugetlb_handle_userfault The vma_lock and hugetlb_fault_mutex are dropped before handling userfault and reacquire them again after handle_userfault(), but reacquire the vma_lock could lead to UAF[1,2] due to the following race
osv
CVE-2025-40292UNKNOWN≥ 6.1.0, < 6.1.159≥ 6.2.0, < 6.6.117+2 more2025-12-08
CVE-2025-40292 virtio-net: fix received length check in big packets
virtio-net: fix received length check in big packets
In the Linux kernel, the following vulnerability has been resolved:
virtio-net: fix received length check in big packets
Since commit 4959aebba8c0 ("virtio-net: use mtu size as buffer length
for big packets"), when guest gso is off, the allocated size for big
packets is not MAX_SKB_FRAGS * PAGE_SIZE anymore but depends on
negotiated MTU. The number of allocated frags for bi
osv
CVE-2025-40293UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-08
CVE-2025-40293 CVE-2025-40293: In the Linux kernel, the following vulnerability has been resolved: iommufd: Don't overflow during division for dirty tracking If pgshift is 63 then B
In the Linux kernel, the following vulnerability has been resolved: iommufd: Don't overflow during division for dirty tracking If pgshift is 63 then BITS_PER_TYPE(*bitmap->bitmap) * pgsize will overflow to 0 and this triggers divide by 0. In this case the index should just be 0, so reorganize things to divide by shif
osv
CVE-2025-40318UNKNOWN≥ 0, < 6.1.159≥ 6.2.0, < 6.6.117+2 more2025-12-08
CVE-2025-40318 Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once
Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once
hci_cmd_sync_dequeue_once() does lookup and then cancel
the entry under two separate lock sections. Meanwhile,
hci_cmd_sync_work() can also delete the same entry,
leading to double list_del() and "UAF".
Fix this by holding cmd_sync_work
osv
CVE-2025-40305UNKNOWN≥ 0, < 6.17.8-12025-12-08
CVE-2025-40305 CVE-2025-40305: In the Linux kernel, the following vulnerability has been resolved: 9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN p9_read_work() doesn't set R
In the Linux kernel, the following vulnerability has been resolved: 9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN p9_read_work() doesn't set Rworksched and doesn't do schedule_work(m->rq) if list_empty(&m->req_list). However, if the pipe is full, we need to read more data and this used to work prior to commit
osv