Linux Kernel vulnerabilities
14,742 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,742
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3715MEDIUM8619LOW440UNKNOWN1856
Vulnerabilities
Page 115 of 738
CVE-2022-50567UNKNOWN≥ 2.6.12, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-10-22
CVE-2022-50567 fs: jfs: fix shift-out-of-bounds in dbAllocAG
fs: jfs: fix shift-out-of-bounds in dbAllocAG
In the Linux kernel, the following vulnerability has been resolved:
fs: jfs: fix shift-out-of-bounds in dbAllocAG
Syzbot found a crash : UBSAN: shift-out-of-bounds in dbAllocAG. The
underlying bug is the missing check of bmp->db_agl2size. The field can
be greater than 64 and trigger the shift-out-of-bounds.
Fix this bug by adding a check of bmp->db_agl2size in dbMount since this
field i
osv
CVE-2022-50576UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-10-22
CVE-2022-50576 CVE-2022-50576: In the Linux kernel, the following vulnerability has been resolved: serial: pch: Fix PCI device refcount leak in pch_request_dma() As comment of pci_g
In the Linux kernel, the following vulnerability has been resolved: serial: pch: Fix PCI device refcount leak in pch_request_dma() As comment of pci_get_slot() says, it returns a pci_device with its refcount increased. The caller must decrement the reference count by calling pci_dev_put(). Since 'dma_dev' is only use
osv
CVE-2023-53706UNKNOWN≥ 0, < 6.3.7-12025-10-22
CVE-2023-53706 CVE-2023-53706: In the Linux kernel, the following vulnerability has been resolved: mm/vmemmap/devdax: fix kernel crash when probing devdax devices commit 4917f55b4ef
In the Linux kernel, the following vulnerability has been resolved: mm/vmemmap/devdax: fix kernel crash when probing devdax devices commit 4917f55b4ef9 ("mm/sparse-vmemmap: improve memory savings for compound devmaps") added support for using optimized vmmemap for devdax devices. But how vmemmap mappings are created
osv
CVE-2023-53709UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-10-22
CVE-2023-53709 CVE-2023-53709: In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Handle race between rb_move_tail and rb_check_pages It seems a data r
In the Linux kernel, the following vulnerability has been resolved: ring-buffer: Handle race between rb_move_tail and rb_check_pages It seems a data race between ring_buffer writing and integrity check. That is, RB_FLAG of head_page is been updating, while at same time RB_FLAG was cleared when doing integrity check r
osv
CVE-2022-50570UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.3-12025-10-22
CVE-2022-50570 CVE-2022-50570: In the Linux kernel, the following vulnerability has been resolved: platform/chrome: fix memory corruption in ioctl If "s_mem
In the Linux kernel, the following vulnerability has been resolved: platform/chrome: fix memory corruption in ioctl If "s_mem.bytes" is larger than the buffer size it leads to memory corruption.
osv
CVE-2023-53715UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-10-22
CVE-2023-53715 CVE-2023-53715: In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex Apparently the hex
In the Linux kernel, the following vulnerability has been resolved: wifi: brcmfmac: cfg80211: Pass the PMK in binary instead of hex Apparently the hex passphrase mechanism does not work on newer chips/firmware (e.g. BCM4387). It seems there was a simple way of passing it in binary all along, so use that and avoid the
osv
CVE-2023-53705UNKNOWN≥ 2.6.19, < 4.14.316≥ 4.15.0, < 4.19.284+5 more2025-10-22
CVE-2023-53705 ipv6: Fix out-of-bounds access in ipv6_find_tlv()
ipv6: Fix out-of-bounds access in ipv6_find_tlv()
In the Linux kernel, the following vulnerability has been resolved:
ipv6: Fix out-of-bounds access in ipv6_find_tlv()
optlen is fetched without checking whether there is more than one byte to parse.
It can lead to out-of-bounds access.
Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with SVACE.
osv
CVE-2023-53714UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.13-12025-10-22
CVE-2023-53714 CVE-2023-53714: In the Linux kernel, the following vulnerability has been resolved: drm/stm: ltdc: fix late dereference check In ltdc_crtc_set_crc_source(), struct dr
In the Linux kernel, the following vulnerability has been resolved: drm/stm: ltdc: fix late dereference check In ltdc_crtc_set_crc_source(), struct drm_crtc was dereferenced in a container_of() before the pointer check. This could cause a kernel panic. Fix this smatch warning: drivers/gpu/drm/stm/ltdc.c:1124 ltdc_crt
osv
CVE-2023-53717UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-10-22
CVE-2023-53717 CVE-2023-53717: In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() F
In the Linux kernel, the following vulnerability has been resolved: wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() Fix a stack-out-of-bounds write that occurs in a WMI response callback function that is called after a timeout occurs in ath9k_wmi_cmd(). The callback writes to wmi->cmd
osv
CVE-2023-53722UNKNOWN≥ 3.3.0, < 4.14.326≥ 4.15.0, < 4.19.295+5 more2025-10-22
CVE-2023-53722 md: raid1: fix potential OOB in raid1_remove_disk()
md: raid1: fix potential OOB in raid1_remove_disk()
In the Linux kernel, the following vulnerability has been resolved:
md: raid1: fix potential OOB in raid1_remove_disk()
If rddev->raid_disk is greater than mddev->raid_disks, there will be
an out-of-bounds in raid1_remove_disk(). We have already found
similar reports as follows:
1) commit d17f744e883b ("md-raid10: fix KASAN warning")
2) commit 1ebc2cec0b7d ("dm raid: fix KAS
osv
CVE-2023-53700UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-10-22
CVE-2023-53700 CVE-2023-53700: In the Linux kernel, the following vulnerability has been resolved: media: max9286: Fix memleak in max9286_v4l2_register() There is a kmemleak when te
In the Linux kernel, the following vulnerability has been resolved: media: max9286: Fix memleak in max9286_v4l2_register() There is a kmemleak when testing the media/i2c/max9286.c with bpf mock device: kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) unreferenced object 0xffff88810defc400 (size
osv
CVE-2023-53698UNKNOWN≥ 0, < 5.15.127≥ 5.16.0, < 6.1.46+1 more2025-10-22
CVE-2023-53698 xsk: fix refcount underflow in error path
xsk: fix refcount underflow in error path
In the Linux kernel, the following vulnerability has been resolved:
xsk: fix refcount underflow in error path
Fix a refcount underflow problem reported by syzbot that can happen
when a system is running out of memory. If xp_alloc_tx_descs() fails,
and it can only fail due to not having enough memory, then the error
path is triggered. In this error path, the refcount of the pool is
decremented as
osv
CVE-2022-50569UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.3-12025-10-22
CVE-2022-50569 CVE-2022-50569: In the Linux kernel, the following vulnerability has been resolved: xfrm: Update ipcomp_scratches with NULL when freed Currently if ipcomp_alloc_scrat
In the Linux kernel, the following vulnerability has been resolved: xfrm: Update ipcomp_scratches with NULL when freed Currently if ipcomp_alloc_scratches() fails to allocate memory ipcomp_scratches holds obsolete address. So when we try to free the percpu scratches using ipcomp_free_scratches() it tries to vfree non
osv
CVE-2023-53696UNKNOWN≥ 0, < 6.1.25-12025-10-22
CVE-2023-53696 CVE-2023-53696: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() There is a memory leak repor
In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix memory leak in qla2x00_probe_one() There is a memory leak reported by kmemleak: unreferenced object 0xffffc900003f0000 (size 12288): comm "modprobe", pid 19117, jiffies 4299751452 (age 42490.264s) hex dump (first 32 bytes): 00 00 0
osv
CVE-2023-53699UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.4-12025-10-22
CVE-2023-53699 CVE-2023-53699: In the Linux kernel, the following vulnerability has been resolved: riscv: move memblock_allow_resize() after linear mapping is ready The initial memb
In the Linux kernel, the following vulnerability has been resolved: riscv: move memblock_allow_resize() after linear mapping is ready The initial memblock metadata is accessed from kernel image mapping. The regions arrays need to "reallocated" from memblock and accessed through linear mapping to cover more memblock r
osv
CVE-2023-53693UNKNOWN≥ 5.7.0, < 5.10.190≥ 5.11.0, < 5.15.124+2 more2025-10-22
CVE-2023-53693 USB: gadget: Fix the memory leak in raw_gadget driver
USB: gadget: Fix the memory leak in raw_gadget driver
In the Linux kernel, the following vulnerability has been resolved:
USB: gadget: Fix the memory leak in raw_gadget driver
Currently, increasing raw_dev->count happens before invoke the
raw_queue_event(), if the raw_queue_event() return error, invoke
raw_release() will not trigger the dev_free() to be called.
[ 268.905865][ T5067] raw-gadget.0 gadget.0: failed to queue ev
osv
CVE-2022-50556UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-10-22
CVE-2022-50556 CVE-2022-50556: In the Linux kernel, the following vulnerability has been resolved: drm: Fix potential null-ptr-deref due to drmm_mode_config_init() drmm_mode_config_
In the Linux kernel, the following vulnerability has been resolved: drm: Fix potential null-ptr-deref due to drmm_mode_config_init() drmm_mode_config_init() will call drm_mode_create_standard_properties() and won't check the ret value. When drm_mode_create_standard_properties() failed due to alloc, property will be a
osv
CVE-2022-50560UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.3-12025-10-22
CVE-2022-50560 CVE-2022-50560: In the Linux kernel, the following vulnerability has been resolved: drm/meson: explicitly remove aggregate driver at module unload time Because compon
In the Linux kernel, the following vulnerability has been resolved: drm/meson: explicitly remove aggregate driver at module unload time Because component_master_del wasn't being called when unloading the meson_drm module, the aggregate device would linger forever in the global aggregate_devices list. That means when
osv
CVE-2022-50572UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-10-22
CVE-2022-50572 CVE-2022-50572: In the Linux kernel, the following vulnerability has been resolved: ASoC: audio-graph-card: fix refcount leak of cpu_ep in __graph_for_each_link() The
In the Linux kernel, the following vulnerability has been resolved: ASoC: audio-graph-card: fix refcount leak of cpu_ep in __graph_for_each_link() The of_get_next_child() returns a node with refcount incremented, and decrements the refcount of prev. So in the error path of the while loop, of_node_put() needs be calle
osv
CVE-2023-53730UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-10-22
CVE-2023-53730 CVE-2023-53730: In the Linux kernel, the following vulnerability has been resolved: blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost adjust_inuse_and_c
In the Linux kernel, the following vulnerability has been resolved: blk-iocost: use spin_lock_irqsave in adjust_inuse_and_calc_cost adjust_inuse_and_calc_cost() use spin_lock_irq() and IRQ will be enabled when unlock. DEADLOCK might happen if we have held other locks and disabled IRQ before invoking it. Fix it by usi
osv