Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 39 of 724
CVE-2023-54307UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.25-12025-12-30
CVE-2023-54307 CVE-2023-54307: In the Linux kernel, the following vulnerability has been resolved: ptp_qoriq: fix memory leak in probe() Smatch complains that: drivers/ptp/ptp_qoriq In the Linux kernel, the following vulnerability has been resolved: ptp_qoriq: fix memory leak in probe() Smatch complains that: drivers/ptp/ptp_qoriq.c ptp_qoriq_probe() warn: 'base' from ioremap() not released. Fix this by revising the parameter from 'ptp_qoriq->base' to 'base'. This is only a bug if ptp_qoriq_init
osv
CVE-2023-54231UNKNOWN≥ 6.3.0, < 6.3.22025-12-30
CVE-2023-54231 net: libwx: fix memory leak in wx_setup_rx_resources net: libwx: fix memory leak in wx_setup_rx_resources In the Linux kernel, the following vulnerability has been resolved: net: libwx: fix memory leak in wx_setup_rx_resources When wx_alloc_page_pool() failed in wx_setup_rx_resources(), it doesn't release DMA buffer. Add dma_free_coherent() in the error path to release the DMA buffer.
osv
CVE-2022-50876UNKNOWN≥ 4.3.0, < 4.9.331≥ 4.10.0, < 4.14.296+6 more2025-12-30
CVE-2022-50876 usb: musb: Fix musb_gadget.c rxstate overflow bug usb: musb: Fix musb_gadget.c rxstate overflow bug In the Linux kernel, the following vulnerability has been resolved: usb: musb: Fix musb_gadget.c rxstate overflow bug The usb function device call musb_gadget_queue() adds the passed request to musb_ep::req_list,If the (request->length > musb_ep->packet_sz) and (is_buffer_mapped(req) return false),the rxstate() will copy all data in fifo to request->buf which may cause request->b
osv
CVE-2023-54278UNKNOWN≥ 6.3.0, < 6.4.102025-12-30
CVE-2023-54278 s390/vmem: split pages when debug pagealloc is enabled s390/vmem: split pages when debug pagealloc is enabled In the Linux kernel, the following vulnerability has been resolved: s390/vmem: split pages when debug pagealloc is enabled Since commit bb1520d581a3 ("s390/mm: start kernel with DAT enabled") the kernel crashes early during boot when debug pagealloc is enabled: mem auto-init: stack:off, heap alloc:off, heap free:off addressing exception: 0005 ilc:2 [#1] SMP DEBUG_PAGEA
osv
CVE-2022-50870UNKNOWN≥ 2.6.16, < 4.14.303≥ 4.15.0, < 4.19.270+5 more2025-12-30
CVE-2022-50870 powerpc/rtas: avoid device tree lookups in rtas_os_term() powerpc/rtas: avoid device tree lookups in rtas_os_term() In the Linux kernel, the following vulnerability has been resolved: powerpc/rtas: avoid device tree lookups in rtas_os_term() rtas_os_term() is called during panic. Its behavior depends on a couple of conditions in the /rtas node of the device tree, the traversal of which entails locking and local IRQ state changes. If the kernel panics while devtree_lock is held,
osv
CVE-2023-54281UNKNOWN≥ 4.18.0, < 5.10.197≥ 5.11.0, < 5.15.133+2 more2025-12-30
CVE-2023-54281 btrfs: release path before inode lookup during the ino lookup ioctl btrfs: release path before inode lookup during the ino lookup ioctl In the Linux kernel, the following vulnerability has been resolved: btrfs: release path before inode lookup during the ino lookup ioctl During the ino lookup ioctl we can end up calling btrfs_iget() to get an inode reference while we are holding on a root's btree. If btrfs_iget() needs to lookup the inode from the root's btree, because it's not
osv
CVE-2023-54272UNKNOWN≥ 0, < 6.1.82-1≥ 0, < 6.3.7-12025-12-30
CVE-2023-54272 CVE-2023-54272: In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix a possible null-pointer dereference in ni_clear() In a previous comm In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix a possible null-pointer dereference in ni_clear() In a previous commit c1006bd13146, ni->mi.mrec in ni_write_inode() could be NULL, and thus a NULL check is added for this variable. However, in the same call stack, ni->mi.mrec can be al
osv
CVE-2023-54289UNKNOWN≥ 4.11.0, < 5.4.251≥ 5.5.0, < 5.10.188+4 more2025-12-30
CVE-2023-54289 scsi: qedf: Fix NULL dereference in error handling scsi: qedf: Fix NULL dereference in error handling In the Linux kernel, the following vulnerability has been resolved: scsi: qedf: Fix NULL dereference in error handling Smatch reported: drivers/scsi/qedf/qedf_main.c:3056 qedf_alloc_global_queues() warn: missing unwind goto? At this point in the function, nothing has been allocated so we can return directly. In particular the "qedf->global_queues" have not been allocated so c
osv
CVE-2023-54182UNKNOWN≥ 5.2.0, < 5.15.113≥ 5.16.0, < 6.1.30+1 more2025-12-30
CVE-2023-54182 f2fs: fix to check readonly condition correctly f2fs: fix to check readonly condition correctly In the Linux kernel, the following vulnerability has been resolved: f2fs: fix to check readonly condition correctly With below case, it can mount multi-device image w/ rw option, however one of secondary device is set as ro, later update will cause panic, so let's introduce f2fs_dev_is_readonly(), and check multi-devices rw status in f2fs_remount() w/ it in order to avoid such incons
osv
CVE-2023-54189UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-30
CVE-2023-54189 CVE-2023-54189: In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Add check for kstrdup Add check for the return value of kstrdup() and In the Linux kernel, the following vulnerability has been resolved: pstore/ram: Add check for kstrdup Add check for the return value of kstrdup() and return the error if it fails in order to avoid NULL pointer dereference.
osv
CVE-2023-54253UNKNOWN≥ 0, < 6.1.55-1≥ 0, < 6.5.6-12025-12-30
CVE-2023-54253 CVE-2023-54253: In the Linux kernel, the following vulnerability has been resolved: btrfs: set page extent mapped after read_folio in relocate_one_page One of the CI In the Linux kernel, the following vulnerability has been resolved: btrfs: set page extent mapped after read_folio in relocate_one_page One of the CI runs triggered the following panic assertion failed: PagePrivate(page) && page->private, in fs/btrfs/subpage.c:229 ------------[ cut here ]------------ kernel BUG at fs/
osv
CVE-2023-54170UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-30
CVE-2023-54170 CVE-2023-54170: In the Linux kernel, the following vulnerability has been resolved: keys: Fix linking a duplicate key to a keyring's assoc_array When making a DNS que In the Linux kernel, the following vulnerability has been resolved: keys: Fix linking a duplicate key to a keyring's assoc_array When making a DNS query inside the kernel using dns_query(), the request code can in rare cases end up creating a duplicate index key in the assoc_array of the destination keyring. It is ev
osv
CVE-2023-54282UNKNOWN≥ 0, < 5.10.197-1≥ 0, < 6.1.55-1+1 more2025-12-30
CVE-2023-54282 CVE-2023-54282: In the Linux kernel, the following vulnerability has been resolved: media: tuners: qt1010: replace BUG_ON with a regular error BUG_ON is unnecessary h In the Linux kernel, the following vulnerability has been resolved: media: tuners: qt1010: replace BUG_ON with a regular error BUG_ON is unnecessary here, and in addition it confuses smatch. Replacing this with an error return help resolve this smatch warning: drivers/media/tuners/qt1010.c:350 qt1010_init() error: bu
osv
CVE-2023-54301UNKNOWN≥ 5.13.0, < 5.15.113≥ 5.16.0, < 6.1.30+1 more2025-12-30
CVE-2023-54301 serial: 8250_bcm7271: fix leak in `brcmuart_probe` serial: 8250_bcm7271: fix leak in `brcmuart_probe` In the Linux kernel, the following vulnerability has been resolved: serial: 8250_bcm7271: fix leak in `brcmuart_probe` Smatch reports: drivers/tty/serial/8250/8250_bcm7271.c:1120 brcmuart_probe() warn: 'baud_mux_clk' from clk_prepare_enable() not released on lines: 1032. The issue is fixed by using a managed clock.
osv
CVE-2022-50828UNKNOWN≥ 5.2.0, < 5.4.220≥ 5.5.0, < 5.10.150+3 more2025-12-30
CVE-2022-50828 clk: zynqmp: Fix stack-out-of-bounds in strncpy` clk: zynqmp: Fix stack-out-of-bounds in strncpy` In the Linux kernel, the following vulnerability has been resolved: clk: zynqmp: Fix stack-out-of-bounds in strncpy` "BUG: KASAN: stack-out-of-bounds in strncpy+0x30/0x68" Linux-ATF interface is using 16 bytes of SMC payload. In case clock name is longer than 15 bytes, string terminated NULL character will not be received by Linux. Add explicit NULL character at last byte to fix i
osv
CVE-2023-54291UNKNOWN≥ 6.4.0, < 6.4.42025-12-30
CVE-2023-54291 vduse: fix NULL pointer dereference vduse: fix NULL pointer dereference In the Linux kernel, the following vulnerability has been resolved: vduse: fix NULL pointer dereference vduse_vdpa_set_vq_affinity callback can be called with NULL value as cpu_mask when deleting the vduse device. This patch resets virtqueue's IRQ affinity mask value to set all CPUs instead of dereferencing NULL cpu_mask. [ 4760.952149] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 476
osv
CVE-2023-54316UNKNOWN≥ 0, < 5.10.197-1≥ 0, < 6.1.55-1+1 more2025-12-30
CVE-2023-54316 CVE-2023-54316: In the Linux kernel, the following vulnerability has been resolved: refscale: Fix uninitalized use of wait_queue_head_t Running the refscale test occa In the Linux kernel, the following vulnerability has been resolved: refscale: Fix uninitalized use of wait_queue_head_t Running the refscale test occasionally crashes the kernel with the following error: [ 8569.952896] BUG: unable to handle page fault for address: ffffffffffffffe8 [ 8569.952900] #PF: supervisor read
osv
CVE-2022-50868UNKNOWN≥ 2.6.18, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-12-30
CVE-2022-50868 hwrng: amd - Fix PCI device refcount leak hwrng: amd - Fix PCI device refcount leak In the Linux kernel, the following vulnerability has been resolved: hwrng: amd - Fix PCI device refcount leak for_each_pci_dev() is implemented by pci_get_device(). The comment of pci_get_device() says that it will increase the reference count for the returned pci_dev and also decrease the reference count for the input pci_dev @from if it is not NULL. If we break for_each_pci_dev() loop with pd
osv
CVE-2023-54308UNKNOWN≥ 5.15.0, < 5.15.106≥ 5.16.0, < 6.1.23+1 more2025-12-30
CVE-2023-54308 ALSA: ymfpci: Create card with device-managed snd_devm_card_new() ALSA: ymfpci: Create card with device-managed snd_devm_card_new() In the Linux kernel, the following vulnerability has been resolved: ALSA: ymfpci: Create card with device-managed snd_devm_card_new() snd_card_ymfpci_remove() was removed in commit c6e6bb5eab74 ("ALSA: ymfpci: Allocate resources with device-managed APIs"), but the call to snd_card_new() was not replaced with snd_devm_card_new(). Since there was no
osv
CVE-2023-54251UNKNOWN≥ 5.3.0, < 5.15.126≥ 5.16.0, < 6.1.45+1 more2025-12-30
CVE-2023-54251 net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX. net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX. In the Linux kernel, the following vulnerability has been resolved: net/sched: taprio: Limit TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME to INT_MAX. syzkaller found zero division error [0] in div_s64_rem() called from get_cycle_time_elapsed(), where sched->cycle_time is the divisor. We have tests in parse_taprio_schedule() so that cycle_time will nev
osv
Linux Kernel vulnerabilities | cvebase