Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 85 of 724
CVE-2023-53768UNKNOWN≥ 6.0.0, < 6.1.40≥ 6.2.0, < 6.4.52025-12-08
CVE-2023-53768 regmap-irq: Fix out-of-bounds access when allocating config buffers regmap-irq: Fix out-of-bounds access when allocating config buffers In the Linux kernel, the following vulnerability has been resolved: regmap-irq: Fix out-of-bounds access when allocating config buffers When allocating the 2D array for handling IRQ type registers in regmap_add_irq_chip_fwnode(), the intent is to allocate a matrix with num_config_bases rows and num_config_regs columns. This is currently handle
osv
CVE-2022-50631UNKNOWN≥ 5.19.0, < 6.0.18≥ 6.1.0, < 6.1.42025-12-08
CVE-2022-50631 RISC-V: kexec: Fix memory leak of fdt buffer RISC-V: kexec: Fix memory leak of fdt buffer In the Linux kernel, the following vulnerability has been resolved: RISC-V: kexec: Fix memory leak of fdt buffer This is reported by kmemleak detector: unreferenced object 0xff60000082864000 (size 9588): comm "kexec", pid 146, jiffies 4294900634 (age 64.788s) hex dump (first 32 bytes): d0 0d fe ed 00 00 12 ed 00 00 00 48 00 00 11 40 ...........H...@ 00 00 00 28 00 00 00 11 00 00 00 02 00
osv
CVE-2023-53754UNKNOWN≥ 4.17.0, < 5.4.243≥ 5.5.0, < 5.10.180+4 more2025-12-08
CVE-2023-53754 scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup() scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup() In the Linux kernel, the following vulnerability has been resolved: scsi: lpfc: Fix ioremap issues in lpfc_sli4_pci_mem_setup() When if_type equals zero and pci_resource_start(pdev, PCI_64BIT_BAR4) returns false, drbl_regs_memmap_p is not remapped. This passes a NULL pointer to iounmap(), which can trigger a WARN() on certain arches. When if_type equals six a
osv
CVE-2025-40303UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-08
CVE-2025-40303 CVE-2025-40303: In the Linux kernel, the following vulnerability has been resolved: btrfs: ensure no dirty metadata is written back for an fs with errors [BUG] During In the Linux kernel, the following vulnerability has been resolved: btrfs: ensure no dirty metadata is written back for an fs with errors [BUG] During development of a minor feature (make sure all btrfs_bio::end_io() is called in task context), I noticed a crash in generic/388, where metadata writes triggered new wor
osv
CVE-2025-40316UNKNOWN≥ 0, < 6.6.117≥ 6.7.0, < 6.12.58+1 more2025-12-08
CVE-2025-40316 drm/mediatek: Fix device use-after-free on unbind drm/mediatek: Fix device use-after-free on unbind In the Linux kernel, the following vulnerability has been resolved: drm/mediatek: Fix device use-after-free on unbind A recent change fixed device reference leaks when looking up drm platform device driver data during bind() but failed to remove a partial fix which had been added by commit 80805b62ea5b ("drm/mediatek: Fix kobject put for component sub-drivers"). This results in
osv
CVE-2025-40323UNKNOWN≥ 2.6.12, < 6.1.159≥ 6.2.0, < 6.6.117+2 more2025-12-08
CVE-2025-40323 fbcon: Set fb_display[i]->mode to NULL when the mode is released fbcon: Set fb_display[i]->mode to NULL when the mode is released In the Linux kernel, the following vulnerability has been resolved: fbcon: Set fb_display[i]->mode to NULL when the mode is released Recently, we discovered the following issue through syzkaller: BUG: KASAN: slab-use-after-free in fb_mode_is_equal+0x285/0x2f0 Read of size 4 at addr ff11000001b3c69c by task syz.xxx ... Call Trace: dump_stack_lvl+0xa
osv
CVE-2025-40310UNKNOWN≥ 6.5.0, < 6.6.117≥ 6.7.0, < 6.12.58+1 more2025-12-08
CVE-2025-40310 amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw In the Linux kernel, the following vulnerability has been resolved: amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw There is race in amdgpu_amdkfd_device_fini_sw and interrupt. if amdgpu_amdkfd_device_fini_sw run in b/w kfd_cleanup_nodes and kfree(kfd), and KGD interrupt generated. kernel panic log: BUG: kernel NULL pointer dereference, address: 000
osv
CVE-2025-40304UNKNOWN≥ 2.6.12, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-08
CVE-2025-40304 fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds In the Linux kernel, the following vulnerability has been resolved: fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds Add bounds checking to prevent writes past framebuffer boundaries when rendering text near screen edges. Return early if the Y position is off-screen and clip image height to screen boundary. Break from the
osv
CVE-2025-40324UNKNOWN≥ 0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-08
CVE-2025-40324 NFSD: Fix crash in nfsd4_read_release() NFSD: Fix crash in nfsd4_read_release() In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix crash in nfsd4_read_release() When tracing is enabled, the trace_nfsd_read_done trace point crashes during the pynfs read.testNoFh test.
osv
CVE-2025-40319UNKNOWN≥ 5.8.0, < 5.10.247≥ 5.11.0, < 5.15.197+4 more2025-12-08
CVE-2025-40319 bpf: Sync pending IRQ work before freeing ring buffer bpf: Sync pending IRQ work before freeing ring buffer In the Linux kernel, the following vulnerability has been resolved: bpf: Sync pending IRQ work before freeing ring buffer Fix a race where irq_work can be queued in bpf_ringbuf_commit() but the ring buffer is freed before the work executes. In the syzbot reproducer, a BPF program attached to sched_switch triggers bpf_ringbuf_commit(), queuing an irq_work. If the ring buff
osv
CVE-2025-40312UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-08
CVE-2025-40312 CVE-2025-40312: In the Linux kernel, the following vulnerability has been resolved: jfs: Verify inode mode when loading from disk The inode mode loaded from corrupted In the Linux kernel, the following vulnerability has been resolved: jfs: Verify inode mode when loading from disk The inode mode loaded from corrupted disk can be invalid. Do like what commit 0a9e74051313 ("isofs: Verify inode mode when loading from disk") does.
osv
CVE-2025-40317UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-08
CVE-2025-40317 CVE-2025-40317: In the Linux kernel, the following vulnerability has been resolved: regmap: slimbus: fix bus_context pointer in regmap init calls Commit 4e65bda8273c In the Linux kernel, the following vulnerability has been resolved: regmap: slimbus: fix bus_context pointer in regmap init calls Commit 4e65bda8273c ("ASoC: wcd934x: fix error handling in wcd934x_codec_parse_data()") revealed the problem in the slimbus regmap. That commit breaks audio playback, for instance, on sdm84
osv
CVE-2023-53758UNKNOWN≥ 6.0.0, < 6.1.28≥ 6.2.0, < 6.2.15+1 more2025-12-08
CVE-2023-53758 spi: atmel-quadspi: Free resources even if runtime resume failed in .remove() spi: atmel-quadspi: Free resources even if runtime resume failed in .remove() In the Linux kernel, the following vulnerability has been resolved: spi: atmel-quadspi: Free resources even if runtime resume failed in .remove() An early error exit in atmel_qspi_remove() doesn't prevent the device unbind. So this results in an spi controller with an unbound parent and unmapped register space (because devm_
osv
CVE-2023-53745UNKNOWN≥ 4.17.0, < 4.19.276≥ 4.20.0, < 5.4.235+4 more2025-12-08
CVE-2023-53745 um: vector: Fix memory leak in vector_config um: vector: Fix memory leak in vector_config In the Linux kernel, the following vulnerability has been resolved: um: vector: Fix memory leak in vector_config If the return value of the uml_parse_vector_ifspec function is NULL, we should call kfree(params) to prevent memory leak.
osv
CVE-2023-53742UNKNOWN≥ 5.8.0, < 6.1.28≥ 6.2.0, < 6.2.15+1 more2025-12-08
CVE-2023-53742 kcsan: Avoid READ_ONCE() in read_instrumented_memory() kcsan: Avoid READ_ONCE() in read_instrumented_memory() In the Linux kernel, the following vulnerability has been resolved: kcsan: Avoid READ_ONCE() in read_instrumented_memory() Haibo Li reported: | Unable to handle kernel paging request at virtual address | ffffff802a0d8d7171 | Mem abort info:o: | ESR = 0x9600002121 | EC = 0x25: DABT (current EL), IL = 32 bitsts | SET = 0, FnV = 0 0 | EA = 0, S1PTW = 0 0 | FSC = 0x21: ali
osv
CVE-2022-50630UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.3-12025-12-08
CVE-2022-50630 CVE-2022-50630: In the Linux kernel, the following vulnerability has been resolved: mm: hugetlb: fix UAF in hugetlb_handle_userfault The vma_lock and hugetlb_fault_mu In the Linux kernel, the following vulnerability has been resolved: mm: hugetlb: fix UAF in hugetlb_handle_userfault The vma_lock and hugetlb_fault_mutex are dropped before handling userfault and reacquire them again after handle_userfault(), but reacquire the vma_lock could lead to UAF[1,2] due to the following race
osv
CVE-2025-40292UNKNOWN≥ 6.1.0, < 6.1.159≥ 6.2.0, < 6.6.117+2 more2025-12-08
CVE-2025-40292 virtio-net: fix received length check in big packets virtio-net: fix received length check in big packets In the Linux kernel, the following vulnerability has been resolved: virtio-net: fix received length check in big packets Since commit 4959aebba8c0 ("virtio-net: use mtu size as buffer length for big packets"), when guest gso is off, the allocated size for big packets is not MAX_SKB_FRAGS * PAGE_SIZE anymore but depends on negotiated MTU. The number of allocated frags for bi
osv
CVE-2025-40293UNKNOWN≥ 0, < 6.1.159-1≥ 0, < 6.12.63-1+1 more2025-12-08
CVE-2025-40293 CVE-2025-40293: In the Linux kernel, the following vulnerability has been resolved: iommufd: Don't overflow during division for dirty tracking If pgshift is 63 then B In the Linux kernel, the following vulnerability has been resolved: iommufd: Don't overflow during division for dirty tracking If pgshift is 63 then BITS_PER_TYPE(*bitmap->bitmap) * pgsize will overflow to 0 and this triggers divide by 0. In this case the index should just be 0, so reorganize things to divide by shif
osv
CVE-2025-40318UNKNOWN≥ 0, < 6.1.159≥ 6.2.0, < 6.6.117+2 more2025-12-08
CVE-2025-40318 Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once hci_cmd_sync_dequeue_once() does lookup and then cancel the entry under two separate lock sections. Meanwhile, hci_cmd_sync_work() can also delete the same entry, leading to double list_del() and "UAF". Fix this by holding cmd_sync_work
osv
CVE-2025-40305UNKNOWN≥ 0, < 6.17.8-12025-12-08
CVE-2025-40305 CVE-2025-40305: In the Linux kernel, the following vulnerability has been resolved: 9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN p9_read_work() doesn't set R In the Linux kernel, the following vulnerability has been resolved: 9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN p9_read_work() doesn't set Rworksched and doesn't do schedule_work(m->rq) if list_empty(&m->req_list). However, if the pipe is full, we need to read more data and this used to work prior to commit
osv