Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 86 of 724
CVE-2025-40306UNKNOWN≥ 4.6.0, < 5.4.302≥ 5.5.0, < 5.10.247+5 more2025-12-08
CVE-2025-40306 orangefs: fix xattr related buffer overflow...
orangefs: fix xattr related buffer overflow...
In the Linux kernel, the following vulnerability has been resolved:
orangefs: fix xattr related buffer overflow...
Willy Tarreau forwarded me a message from
Disclosure with the following
warning:
> The helper `xattr_key()` uses the pointer variable in the loop condition
> rather than dereferencing it. As `key` is incremented, it remains non-NULL
> (until it runs into unmapped memory),
osv
CVE-2022-50626UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-08
CVE-2022-50626 CVE-2022-50626: In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: fix memory leak in dvb_usb_adapter_init() Syzbot reports a memory
In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: fix memory leak in dvb_usb_adapter_init() Syzbot reports a memory leak in "dvb_usb_adapter_init()". The leak is due to not accounting for and freeing current iteration's adapter->priv in case of an error. Currently if an error occurs,
osv
CVE-2023-53769UNKNOWN≥ 5.19.0, < 6.1.28≥ 6.2.0, < 6.2.15+1 more2025-12-08
CVE-2023-53769 virt/coco/sev-guest: Double-buffer messages
virt/coco/sev-guest: Double-buffer messages
In the Linux kernel, the following vulnerability has been resolved:
virt/coco/sev-guest: Double-buffer messages
The encryption algorithms read and write directly to shared unencrypted
memory, which may leak information as well as permit the host to tamper
with the message integrity. Instead, copy whole messages in or out as
needed before doing any computation on them.
osv
CVE-2023-53748UNKNOWN≥ 0, < 6.1.37-1≥ 0, < 6.3.7-12025-12-08
CVE-2023-53748 CVE-2023-53748: In the Linux kernel, the following vulnerability has been resolved: media: mediatek: vcodec: Fix potential array out-of-bounds in decoder queue_setup
In the Linux kernel, the following vulnerability has been resolved: media: mediatek: vcodec: Fix potential array out-of-bounds in decoder queue_setup variable *nplanes is provided by user via system call argument. The possible value of q_data->fmt->num_planes is 1-3, while the value of *nplanes can be 1-8. The array a
osv
CVE-2025-40326UNKNOWN≥ 0, < 6.17.8-12025-12-08
CVE-2025-40326 CVE-2025-40326: In the Linux kernel, the following vulnerability has been resolved: NFSD: Define actions for the new time_deleg FATTR4 attributes NFSv4 clients won't
In the Linux kernel, the following vulnerability has been resolved: NFSD: Define actions for the new time_deleg FATTR4 attributes NFSv4 clients won't send legitimate GETATTR requests for these new attributes because they are intended to be used only with CB_GETATTR and SETATTR. But NFSD has to do something besides cra
osv
CVE-2023-53744UNKNOWN≥ 5.2.0, < 5.10.180≥ 5.11.0, < 5.15.111+3 more2025-12-08
CVE-2023-53744 soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe
soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe
In the Linux kernel, the following vulnerability has been resolved:
soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe
wkup_m3_ipc_get() takes refcount, which should be freed by
wkup_m3_ipc_put(). Add missing refcount release in the error paths.
osv
CVE-2025-40315UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-08
CVE-2025-40315 CVE-2025-40315: In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Fix epfile null pointer access after ep enable
In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_fs: Fix epfile null pointer access after ep enable. A race condition occurs when ffs_func_eps_enable() runs concurrently with ffs_data_reset(). The ffs_data_clear() called in ffs_data_reset() sets ffs->epfiles to NULL before resetting ffs->eps_count to
osv
CVE-2023-53747UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-08
CVE-2023-53747 CVE-2023-53747: In the Linux kernel, the following vulnerability has been resolved: vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF After
In the Linux kernel, the following vulnerability has been resolved: vc_screen: reload load of struct vc_data pointer in vcs_write() to avoid UAF After a call to console_unlock() in vcs_write() the vc_data struct can be freed by vc_port_destruct(). Because of that, the struct vc_data pointer must be reloaded in the wh
osv
CVE-2022-50619UNKNOWN≥ 0, < 6.0.7-12025-12-08
CVE-2022-50619 CVE-2022-50619: In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix memory leak in kfd_mem_dmamap_userptr() If the number of pages fro
In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Fix memory leak in kfd_mem_dmamap_userptr() If the number of pages from the userptr BO differs from the SG BO then the allocated memory for the SG table doesn't get freed before returning -EINVAL, which may lead to a memory leak in some e
osv
CVE-2025-40322UNKNOWN≥ 0, < 5.10.247-1≥ 0, < 6.1.159-1+2 more2025-12-08
CVE-2025-40322 CVE-2025-40322: In the Linux kernel, the following vulnerability has been resolved: fbdev: bitblit: bound-check glyph index in bit_putcs* bit_putcs_aligned()/unaligne
In the Linux kernel, the following vulnerability has been resolved: fbdev: bitblit: bound-check glyph index in bit_putcs* bit_putcs_aligned()/unaligned() derived the glyph pointer from the character value masked by 0xff/0x1ff, which may exceed the actual font's glyph count and read past the end of the built-in font a
osv
CVE-2022-50621UNKNOWN≥ 0, < 6.0.3-12025-12-08
CVE-2022-50621 CVE-2022-50621: In the Linux kernel, the following vulnerability has been resolved: dm: verity-loadpin: Only trust verity targets with enforcement Verity targets can
In the Linux kernel, the following vulnerability has been resolved: dm: verity-loadpin: Only trust verity targets with enforcement Verity targets can be configured to ignore corrupted data blocks. LoadPin must only trust verity targets that are configured to perform some kind of enforcement when data corruption is det
osv
CVE-2023-53762UNKNOWN≥ 5.17.0, < 6.4.16≥ 6.5.0, < 6.5.32025-12-08
CVE-2023-53762 Bluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync
Bluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: hci_sync: Fix UAF in hci_disconnect_all_sync
Use-after-free can occur in hci_disconnect_all_sync if a connection is
deleted by concurrent processing of a controller event.
To prevent this the code now tries to iterate over the list backwards
to ensure the links are cleanup before its paren
osv
CVE-2023-53767UNKNOWN≥ 6.3.0, < 6.3.42025-12-08
CVE-2023-53767 wifi: ath12k: fix memory leak in ath12k_qmi_driver_event_work()
wifi: ath12k: fix memory leak in ath12k_qmi_driver_event_work()
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath12k: fix memory leak in ath12k_qmi_driver_event_work()
Currently the buffer pointed by event is not freed in case
ATH12K_FLAG_UNREGISTERING bit is set, this causes memory leak.
Add a goto skip instead of return, to ensure event and all the
list entries are freed properly.
Te
osv
CVE-2025-40320UNKNOWN≥ 0, < 6.6.117≥ 6.7.0, < 6.12.58+1 more2025-12-08
CVE-2025-40320 smb: client: fix potential cfid UAF in smb2_query_info_compound
smb: client: fix potential cfid UAF in smb2_query_info_compound
In the Linux kernel, the following vulnerability has been resolved:
smb: client: fix potential cfid UAF in smb2_query_info_compound
When smb2_query_info_compound() retries, a previously allocated cfid may
have been freed in the first attempt.
Because cfid wasn't reset on replay, later cleanup could act on a stale
pointer, leading to a potential use-aft
osv
CVE-2023-53763UNKNOWN≥ 0, < 6.1.53≥ 6.2.0, < 6.4.16+1 more2025-12-08
CVE-2023-53763 Revert "f2fs: fix to do sanity check on extent cache correctly"
Revert "f2fs: fix to do sanity check on extent cache correctly"
In the Linux kernel, the following vulnerability has been resolved:
Revert "f2fs: fix to do sanity check on extent cache correctly"
syzbot reports a f2fs bug as below:
UBSAN: array-index-out-of-bounds in fs/f2fs/f2fs.h:3275:19
index 1409 is out of range for type '__le32[923]' (aka 'unsigned int[923]')
Call Trace:
__dump_stack lib/dump_stack.c:88 [inli
osv
CVE-2025-40290UNKNOWN≥ 6.17.0, < 6.17.112025-12-08
CVE-2025-40290 xsk: avoid data corruption on cq descriptor number
xsk: avoid data corruption on cq descriptor number
In the Linux kernel, the following vulnerability has been resolved:
xsk: avoid data corruption on cq descriptor number
Since commit 30f241fcf52a ("xsk: Fix immature cq descriptor
production"), the descriptor number is stored in skb control block and
xsk_cq_submit_addr_locked() relies on it to put the umem addrs onto
pool's completion queue.
skb control block shouldn't be used
osv
CVE-2025-40302UNKNOWN≥ 0, < 6.12.63-1≥ 0, < 6.17.8-12025-12-08
CVE-2025-40302 CVE-2025-40302: In the Linux kernel, the following vulnerability has been resolved: media: videobuf2: forbid remove_bufs when legacy fileio is active vb2_ioctl_remove
In the Linux kernel, the following vulnerability has been resolved: media: videobuf2: forbid remove_bufs when legacy fileio is active vb2_ioctl_remove_bufs() call manipulates queue internal buffer list, potentially overwriting some pointers used by the legacy fileio access mode. Forbid that ioctl when fileio is activ
osv
CVE-2022-50617UNKNOWN≥ 5.11.0, < 5.15.86≥ 5.16.0, < 6.0.16+1 more2025-12-08
CVE-2022-50617 drm/amdgpu/powerplay/psm: Fix memory leak in power state init
drm/amdgpu/powerplay/psm: Fix memory leak in power state init
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu/powerplay/psm: Fix memory leak in power state init
Commit 902bc65de0b3 ("drm/amdgpu/powerplay/psm: return an error in power
state init") made the power state init function return early in case of
failure to get an entry from the powerplay table, but it missed to clean up
the all
osv
CVE-2022-50615UNKNOWN≥ 5.3.0, < 5.10.163≥ 5.11.0, < 5.15.86+2 more2025-12-08
CVE-2022-50615 perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map()
perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map()
In the Linux kernel, the following vulnerability has been resolved:
perf/x86/intel/uncore: Fix reference count leak in snr_uncore_mmio_map()
pci_get_device() will increase the reference count for the returned
pci_dev, so snr_uncore_get_mc_dev() will return a pci_dev with its
reference count increased. We need to call pci_dev_put() to
osv
CVE-2023-53752UNKNOWN≥ 0, < 6.1.54≥ 6.2.0, < 6.4.16+1 more2025-12-08
CVE-2023-53752 net: deal with integer overflows in kmalloc_reserve()
net: deal with integer overflows in kmalloc_reserve()
In the Linux kernel, the following vulnerability has been resolved:
net: deal with integer overflows in kmalloc_reserve()
Blamed commit changed:
ptr = kmalloc(size);
if (ptr)
size = ksize(ptr);
size = kmalloc_size_roundup(size);
ptr = kmalloc(size);
This allowed various crash as reported by syzbot [1]
and Kyle Zeng.
Problem is that if @size is bigger than 0x80000001,
k
osv