Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 41 of 724
CVE-2022-50818UNKNOWN≥ 5.18.0, < 5.19.17≥ 5.20.0, < 6.0.32025-12-30
CVE-2022-50818 scsi: pm8001: Fix running_req for internal abort commands scsi: pm8001: Fix running_req for internal abort commands In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix running_req for internal abort commands Disabling the remote phy for a SATA disk causes a hang: root@(none)$ more /sys/class/sas_phy/phy-0:0:8/target_port_protocols sata root@(none)$ echo 0 > sys/class/sas_phy/phy-0:0:8/enable root@(none)$ [ 67.855950] sas: ex 500e004aaaaaaa1f p
osv
CVE-2023-54169UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.11-12025-12-30
CVE-2023-54169 CVE-2023-54169: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: fix memory leak in mlx5e_ptp_open When kvzalloc_node or kvzalloc failed In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: fix memory leak in mlx5e_ptp_open When kvzalloc_node or kvzalloc failed in mlx5e_ptp_open, the memory pointed by "c" or "cparams" is not freed, which can lead to a memory leak. Fix by freeing the array in the error path.
osv
CVE-2023-54168UNKNOWN≥ 2.6.24, < 4.19.283≥ 4.20.0, < 5.4.243+5 more2025-12-30
CVE-2023-54168 RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() In the Linux kernel, the following vulnerability has been resolved: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() The ucmd->log_sq_bb_count variable is controlled by the user so this shift can wrap. Fix it by using check_shl_overflow() in the same way that it was done in commit 515f60004ed9 ("RDMA/hns: Prevent undefined behavior in hns_roce_set_user_sq_size(
osv
CVE-2022-50837UNKNOWN≥ 5.15.0, < 5.15.86≥ 5.16.0, < 6.0.16+1 more2025-12-30
CVE-2022-50837 net: dsa: tag_8021q: avoid leaking ctx on dsa_tag_8021q_register() error path net: dsa: tag_8021q: avoid leaking ctx on dsa_tag_8021q_register() error path In the Linux kernel, the following vulnerability has been resolved: net: dsa: tag_8021q: avoid leaking ctx on dsa_tag_8021q_register() error path If dsa_tag_8021q_setup() fails, for example due to the inability of the device to install a VLAN, the tag_8021q context of the switch will leak. Make sure it is freed on the error
osv
CVE-2023-54176UNKNOWN≥ 0, < 6.1.25-12025-12-30
CVE-2023-54176 CVE-2023-54176: In the Linux kernel, the following vulnerability has been resolved: mptcp: stricter state check in mptcp_worker As reported by Christoph, the mptcp pr In the Linux kernel, the following vulnerability has been resolved: mptcp: stricter state check in mptcp_worker As reported by Christoph, the mptcp protocol can run the worker when the relevant msk socket is in an unexpected state: connect() // incoming reset + fastclose // the mptcp worker is scheduled mptcp_disconn
osv
CVE-2022-50865UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.7-12025-12-30
CVE-2022-50865 CVE-2022-50865: In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and in tcp_add_backlog(), the variable limit is caculated by adding sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value
osv
CVE-2023-54271UNKNOWN≥ 5.4.0, < 6.4.16≥ 6.5.0, < 6.5.32025-12-30
CVE-2023-54271 blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init In the Linux kernel, the following vulnerability has been resolved: blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init blk-iocost sometimes causes the following crash: BUG: kernel NULL pointer dereference, address: 00000000000000e0 ... RIP: 0010:_raw_spin_lock+0x17/0x30 Code: be 01 02
osv
CVE-2023-54224UNKNOWN≥ 5.15.0, < 5.15.133≥ 5.16.0, < 6.1.55+1 more2025-12-30
CVE-2023-54224 btrfs: fix lockdep splat and potential deadlock after failure running delayed items btrfs: fix lockdep splat and potential deadlock after failure running delayed items In the Linux kernel, the following vulnerability has been resolved: btrfs: fix lockdep splat and potential deadlock after failure running delayed items When running delayed items we are holding a delayed node's mutex and then we will attempt to modify a subvolume btree to insert/update/delete the delayed items. H
osv
CVE-2022-50883UNKNOWN≥ 5.16.0, < 6.0.16≥ 6.1.0, < 6.1.22025-12-30
CVE-2022-50883 bpf: Prevent decl_tag from being referenced in func_proto arg bpf: Prevent decl_tag from being referenced in func_proto arg In the Linux kernel, the following vulnerability has been resolved: bpf: Prevent decl_tag from being referenced in func_proto arg Syzkaller managed to hit another decl_tag issue: btf_func_proto_check kernel/bpf/btf.c:4506 [inline] btf_check_all_types kernel/bpf/btf.c:4734 [inline] btf_parse_type_sec+0x1175/0x1980 kernel/bpf/btf.c:4763 btf_parse kernel/bpf
osv
CVE-2022-50836UNKNOWN≥ 5.1.0, < 5.4.229≥ 5.5.0, < 5.10.163+3 more2025-12-30
CVE-2022-50836 remoteproc: sysmon: fix memory leak in qcom_add_sysmon_subdev() remoteproc: sysmon: fix memory leak in qcom_add_sysmon_subdev() In the Linux kernel, the following vulnerability has been resolved: remoteproc: sysmon: fix memory leak in qcom_add_sysmon_subdev() The kfree() should be called when of_irq_get_byname() fails or devm_request_threaded_irq() fails in qcom_add_sysmon_subdev(), otherwise there will be a memory leak, so add kfree() to fix it.
osv
CVE-2022-50785UNKNOWN≥ 0, < 6.0.3-12025-12-30
CVE-2022-50785 CVE-2022-50785: In the Linux kernel, the following vulnerability has been resolved: fsi: occ: Prevent use after free Use get_device and put_device in the open and clo In the Linux kernel, the following vulnerability has been resolved: fsi: occ: Prevent use after free Use get_device and put_device in the open and close functions to make sure the device doesn't get freed while a file descriptor is open. Also, lock around the freeing of the device buffer and check the buffer before u
osv
CVE-2022-50784UNKNOWN≥ 0, < 6.1.4-12025-12-30
CVE-2022-50784 CVE-2022-50784: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mei: fix potential NULL-ptr deref after clone If cloning the SKB fa In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mei: fix potential NULL-ptr deref after clone If cloning the SKB fails, don't try to use it, but rather return as if we should pass it. Coverity CID: 1503456
osv
CVE-2023-54324UNKNOWN≥ 2.6.12, < 6.1.56≥ 6.2.0, < 6.5.52025-12-30
CVE-2023-54324 dm: fix a race condition in retrieve_deps dm: fix a race condition in retrieve_deps In the Linux kernel, the following vulnerability has been resolved: dm: fix a race condition in retrieve_deps There's a race condition in the multipath target when retrieve_deps races with multipath_message calling dm_get_device and dm_put_device. retrieve_deps walks the list of open devices without holding any lock but multipath may add or remove devices to the list while it is running. The end
osv
CVE-2023-54171UNKNOWN≥ 5.7.0, < 5.10.188≥ 5.11.0, < 5.15.121+2 more2025-12-30
CVE-2023-54171 tracing: Fix memory leak of iter->temp when reading trace_pipe tracing: Fix memory leak of iter->temp when reading trace_pipe In the Linux kernel, the following vulnerability has been resolved: tracing: Fix memory leak of iter->temp when reading trace_pipe kmemleak reports: unreferenced object 0xffff88814d14e200 (size 256): comm "cat", pid 336, jiffies 4294871818 (age 779.490s) hex dump (first 32 bytes): 04 00 01 03 00 00 00 00 08 00 00 00 00 00 00 00 ................ 0c d8 c8
osv
CVE-2023-54274UNKNOWN≥ 3.3.0, < 5.10.180≥ 5.11.0, < 5.15.111+3 more2025-12-30
CVE-2023-54274 RDMA/srpt: Add a check for valid 'mad_agent' pointer RDMA/srpt: Add a check for valid 'mad_agent' pointer In the Linux kernel, the following vulnerability has been resolved: RDMA/srpt: Add a check for valid 'mad_agent' pointer When unregistering MAD agent, srpt module has a non-null check for 'mad_agent' pointer before invoking ib_unregister_mad_agent(). This check can pass if 'mad_agent' variable holds an error value. The 'mad_agent' can have an error value for a short window
osv
CVE-2022-50815UNKNOWN≥ 2.6.12, < 5.19.17≥ 5.20.0, < 6.0.32025-12-30
CVE-2022-50815 ext2: Add sanity checks for group and filesystem size ext2: Add sanity checks for group and filesystem size In the Linux kernel, the following vulnerability has been resolved: ext2: Add sanity checks for group and filesystem size Add sanity check that filesystem size does not exceed the underlying device size and that group size is big enough so that metadata can fit into it. This avoid trying to mount some crafted filesystems with extremely large group counts.
osv
CVE-2023-54261UNKNOWN≥ 6.5.0, < 6.5.42025-12-30
CVE-2023-54261 drm/amdkfd: Add missing gfx11 MQD manager callbacks drm/amdkfd: Add missing gfx11 MQD manager callbacks In the Linux kernel, the following vulnerability has been resolved: drm/amdkfd: Add missing gfx11 MQD manager callbacks mqd_stride function was introduced in commit 2f77b9a242a2 ("drm/amdkfd: Update MQD management on multi XCC setup") but not assigned for gfx11. Fixes a NULL dereference in debugfs.
osv
CVE-2023-54186UNKNOWN≥ 4.19.0, < 4.19.284≥ 4.20.0, < 5.4.244+4 more2025-12-30
CVE-2023-54186 usb: typec: altmodes/displayport: fix pin_assignment_show usb: typec: altmodes/displayport: fix pin_assignment_show In the Linux kernel, the following vulnerability has been resolved: usb: typec: altmodes/displayport: fix pin_assignment_show This patch fixes negative indexing of buf array in pin_assignment_show when get_current_pin_assignments returns 0 i.e. no compatible pin assignments are found. BUG: KASAN: use-after-free in pin_assignment_show+0x26c/0x33c ... Call trace: d
osv
CVE-2023-54239UNKNOWN≥ 6.2.0, < 6.2.112025-12-30
CVE-2023-54239 iommufd: Check for uptr overflow iommufd: Check for uptr overflow In the Linux kernel, the following vulnerability has been resolved: iommufd: Check for uptr overflow syzkaller found that setting up a map with a user VA that wraps past zero can trigger WARN_ONs, particularly from pin_user_pages weirdly returning 0 due to invalid arguments. Prevent creating a pages with a uptr and size that would math overflow. WARNING: CPU: 0 PID: 518 at drivers/iommu/iommufd/pages.c:793 pfn_
osv
CVE-2023-54162UNKNOWN≥ 0, < 6.1.20-12025-12-30
CVE-2023-54162 CVE-2023-54162: In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix possible memory leak in smb2_lock() argv needs to be free when setup_as In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix possible memory leak in smb2_lock() argv needs to be free when setup_async_work fails or when the current process is woken up.
osv