Linux Kernel vulnerabilities

14,742 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856

Vulnerabilities

Page 115 of 738
CVE-2022-50567UNKNOWN≥ 2.6.12, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-10-22
CVE-2022-50567 fs: jfs: fix shift-out-of-bounds in dbAllocAG fs: jfs: fix shift-out-of-bounds in dbAllocAG In the Linux kernel, the following vulnerability has been resolved: fs: jfs: fix shift-out-of-bounds in dbAllocAG Syzbot found a crash : UBSAN: shift-out-of-bounds in dbAllocAG. The underlying bug is the missing check of bmp->db_agl2size. The field can be greater than 64 and trigger the shift-out-of-bounds. Fix this bug by adding a check of bmp->db_agl2size in dbMount since this field i
osv
CVE-2022-50576UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-10-22
CVE-2022-50576 CVE-2022-50576: In the Linux kernel, the following vulnerability has been resolved: serial: pch: Fix PCI device refcount leak in pch_request_dma() As comment of pci_g In the Linux kernel, the following vulnerability has been resolved: serial: pch: Fix PCI device refcount leak in pch_request_dma() As comment of pci_get_slot() says, it returns a pci_device with its refcount increased. The caller must decrement the reference count by calling pci_dev_put(). Since 'dma_dev' is only use
osv
CVE-2023-53706UNKNOWN≥ 0, < 6.3.7-12025-10-22
CVE-2023-53706 CVE-2023-53706: In the Linux kernel, the following vulnerability has been resolved: mm/vmemmap/devdax: fix kernel crash when probing devdax devices commit 4917f55b4ef In the Linux kernel, the following vulnerability has been resolved: mm/vmemmap/devdax: fix kernel crash when probing devdax devices commit 4917f55b4ef9 ("mm/sparse-vmemmap: improve memory savings for compound devmaps") added support for using optimized vmmemap for devdax devices. But how vmemmap mappings are created
osv
CVE-2023-53709UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-10-22
CVE-2023-53709 CVE-2023-53709: In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Handle race between rb_move_tail and rb_check_pages It seems a data r In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Handle race between rb_move_tail and rb_check_pages It seems a data race between ring_buffer writing and integrity check. That is, RB_FLAG of head_page is been updating, while at same time RB_FLAG was cleared when doing integrity check r
osv
CVE-2022-50570UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.3-12025-10-22
CVE-2022-50570 CVE-2022-50570: In the Linux kernel, the following vulnerability has been resolved: platform/chrome: fix memory corruption in ioctl If "s_mem In the Linux kernel, the following vulnerability has been resolved: platform/chrome: fix memory corruption in ioctl If "s_mem.bytes" is larger than the buffer size it leads to memory corruption.
osv
CVE-2023-53715UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-10-22
CVE-2023-53715 CVE-2023-53715: In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex Apparently the hex In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex Apparently the hex passphrase mechanism does not work on newer chips/firmware (e.g. BCM4387). It seems there was a simple way of passing it in binary all along, so use that and avoid the
osv
CVE-2023-53705UNKNOWN≥ 2.6.19, < 4.14.316≥ 4.15.0, < 4.19.284+5 more2025-10-22
CVE-2023-53705 ipv6: Fix out-of-bounds access in ipv6_find_tlv() ipv6: Fix out-of-bounds access in ipv6_find_tlv() In the Linux kernel, the following vulnerability has been resolved: ipv6: Fix out-of-bounds access in ipv6_find_tlv() optlen is fetched without checking whether there is more than one byte to parse. It can lead to out-of-bounds access. Found by InfoTeCS on behalf of Linux Verification Center (linuxtesting.org) with SVACE.
osv
CVE-2023-53714UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.13-12025-10-22
CVE-2023-53714 CVE-2023-53714: In the Linux kernel, the following vulnerability has been resolved: drm/stm: ltdc: fix late dereference check In ltdc_crtc_set_crc_source(), struct dr In the Linux kernel, the following vulnerability has been resolved: drm/stm: ltdc: fix late dereference check In ltdc_crtc_set_crc_source(), struct drm_crtc was dereferenced in a container_of() before the pointer check. This could cause a kernel panic. Fix this smatch warning: drivers/gpu/drm/stm/ltdc.c:1124 ltdc_crt
osv
CVE-2023-53717UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-10-22
CVE-2023-53717 CVE-2023-53717: In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() F In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() Fix a stack-out-of-bounds write that occurs in a WMI response callback function that is called after a timeout occurs in ath9k_wmi_cmd(). The callback writes to wmi->cmd
osv
CVE-2023-53722UNKNOWN≥ 3.3.0, < 4.14.326≥ 4.15.0, < 4.19.295+5 more2025-10-22
CVE-2023-53722 md: raid1: fix potential OOB in raid1_remove_disk() md: raid1: fix potential OOB in raid1_remove_disk() In the Linux kernel, the following vulnerability has been resolved: md: raid1: fix potential OOB in raid1_remove_disk() If rddev->raid_disk is greater than mddev->raid_disks, there will be an out-of-bounds in raid1_remove_disk(). We have already found similar reports as follows: 1) commit d17f744e883b ("md-raid10: fix KASAN warning") 2) commit 1ebc2cec0b7d ("dm raid: fix KAS
osv
CVE-2023-53700UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-10-22
CVE-2023-53700 CVE-2023-53700: In the Linux kernel, the following vulnerability has been resolved: media: max9286: Fix memleak in max9286_v4l2_register() There is a kmemleak when te In the Linux kernel, the following vulnerability has been resolved: media: max9286: Fix memleak in max9286_v4l2_register() There is a kmemleak when testing the media/i2c/max9286.c with bpf mock device: kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) unreferenced object 0xffff88810defc400 (size
osv
CVE-2023-53698UNKNOWN≥ 0, < 5.15.127≥ 5.16.0, < 6.1.46+1 more2025-10-22
CVE-2023-53698 xsk: fix refcount underflow in error path xsk: fix refcount underflow in error path In the Linux kernel, the following vulnerability has been resolved: xsk: fix refcount underflow in error path Fix a refcount underflow problem reported by syzbot that can happen when a system is running out of memory. If xp_alloc_tx_descs() fails, and it can only fail due to not having enough memory, then the error path is triggered. In this error path, the refcount of the pool is decremented as
osv
CVE-2022-50569UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.3-12025-10-22
CVE-2022-50569 CVE-2022-50569: In the Linux kernel, the following vulnerability has been resolved: xfrm: Update ipcomp_scratches with NULL when freed Currently if ipcomp_alloc_scrat In the Linux kernel, the following vulnerability has been resolved: xfrm: Update ipcomp_scratches with NULL when freed Currently if ipcomp_alloc_scratches() fails to allocate memory ipcomp_scratches holds obsolete address. So when we try to free the percpu scratches using ipcomp_free_scratches() it tries to vfree non
osv
CVE-2023-53696UNKNOWN≥ 0, < 6.1.25-12025-10-22
CVE-2023-53696 CVE-2023-53696: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() There is a memory leak repor In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() There is a memory leak reported by kmemleak: unreferenced object 0xffffc900003f0000 (size 12288): comm "modprobe", pid 19117, jiffies 4299751452 (age 42490.264s) hex dump (first 32 bytes): 00 00 0
osv
CVE-2023-53699UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.4-12025-10-22
CVE-2023-53699 CVE-2023-53699: In the Linux kernel, the following vulnerability has been resolved: riscv: move memblock_allow_resize() after linear mapping is ready The initial memb In the Linux kernel, the following vulnerability has been resolved: riscv: move memblock_allow_resize() after linear mapping is ready The initial memblock metadata is accessed from kernel image mapping. The regions arrays need to "reallocated" from memblock and accessed through linear mapping to cover more memblock r
osv
CVE-2023-53693UNKNOWN≥ 5.7.0, < 5.10.190≥ 5.11.0, < 5.15.124+2 more2025-10-22
CVE-2023-53693 USB: gadget: Fix the memory leak in raw_gadget driver USB: gadget: Fix the memory leak in raw_gadget driver In the Linux kernel, the following vulnerability has been resolved: USB: gadget: Fix the memory leak in raw_gadget driver Currently, increasing raw_dev->count happens before invoke the raw_queue_event(), if the raw_queue_event() return error, invoke raw_release() will not trigger the dev_free() to be called. [ 268.905865][ T5067] raw-gadget.0 gadget.0: failed to queue ev
osv
CVE-2022-50556UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-10-22
CVE-2022-50556 CVE-2022-50556: In the Linux kernel, the following vulnerability has been resolved: drm: Fix potential null-ptr-deref due to drmm_mode_config_init() drmm_mode_config_ In the Linux kernel, the following vulnerability has been resolved: drm: Fix potential null-ptr-deref due to drmm_mode_config_init() drmm_mode_config_init() will call drm_mode_create_standard_properties() and won't check the ret value. When drm_mode_create_standard_properties() failed due to alloc, property will be a
osv
CVE-2022-50560UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.3-12025-10-22
CVE-2022-50560 CVE-2022-50560: In the Linux kernel, the following vulnerability has been resolved: drm/meson: explicitly remove aggregate driver at module unload time Because compon In the Linux kernel, the following vulnerability has been resolved: drm/meson: explicitly remove aggregate driver at module unload time Because component_master_del wasn't being called when unloading the meson_drm module, the aggregate device would linger forever in the global aggregate_devices list. That means when
osv
CVE-2022-50572UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-10-22
CVE-2022-50572 CVE-2022-50572: In the Linux kernel, the following vulnerability has been resolved: ASoC: audio-graph-card: fix refcount leak of cpu_ep in __graph_for_each_link() The In the Linux kernel, the following vulnerability has been resolved: ASoC: audio-graph-card: fix refcount leak of cpu_ep in __graph_for_each_link() The of_get_next_child() returns a node with refcount incremented, and decrements the refcount of prev. So in the error path of the while loop, of_node_put() needs be calle
osv
CVE-2023-53730UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-10-22
CVE-2023-53730 CVE-2023-53730: In the Linux kernel, the following vulnerability has been resolved: blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost adjust_inuse_and_c In the Linux kernel, the following vulnerability has been resolved: blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost adjust_inuse_and_calc_cost() use spin_lock_irq() and IRQ will be enabled when unlock. DEADLOCK might happen if we have held other locks and disabled IRQ before invoking it. Fix it by usi
osv
Linux Kernel vulnerabilities | cvebase