Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 41 of 724
CVE-2022-50818UNKNOWN≥ 5.18.0, < 5.19.17≥ 5.20.0, < 6.0.32025-12-30
CVE-2022-50818 scsi: pm8001: Fix running_req for internal abort commands
scsi: pm8001: Fix running_req for internal abort commands
In the Linux kernel, the following vulnerability has been resolved:
scsi: pm8001: Fix running_req for internal abort commands
Disabling the remote phy for a SATA disk causes a hang:
root@(none)$ more /sys/class/sas_phy/phy-0:0:8/target_port_protocols
sata
root@(none)$ echo 0 > sys/class/sas_phy/phy-0:0:8/enable
root@(none)$ [ 67.855950] sas: ex 500e004aaaaaaa1f p
osv
CVE-2023-54169UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.11-12025-12-30
CVE-2023-54169 CVE-2023-54169: In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: fix memory leak in mlx5e_ptp_open When kvzalloc_node or kvzalloc failed
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: fix memory leak in mlx5e_ptp_open When kvzalloc_node or kvzalloc failed in mlx5e_ptp_open, the memory pointed by "c" or "cparams" is not freed, which can lead to a memory leak. Fix by freeing the array in the error path.
osv
CVE-2023-54168UNKNOWN≥ 2.6.24, < 4.19.283≥ 4.20.0, < 5.4.243+5 more2025-12-30
CVE-2023-54168 RDMA/mlx4: Prevent shift wrapping in set_user_sq_size()
RDMA/mlx4: Prevent shift wrapping in set_user_sq_size()
In the Linux kernel, the following vulnerability has been resolved:
RDMA/mlx4: Prevent shift wrapping in set_user_sq_size()
The ucmd->log_sq_bb_count variable is controlled by the user so this
shift can wrap. Fix it by using check_shl_overflow() in the same way
that it was done in commit 515f60004ed9 ("RDMA/hns: Prevent undefined
behavior in hns_roce_set_user_sq_size(
osv
CVE-2022-50837UNKNOWN≥ 5.15.0, < 5.15.86≥ 5.16.0, < 6.0.16+1 more2025-12-30
CVE-2022-50837 net: dsa: tag_8021q: avoid leaking ctx on dsa_tag_8021q_register() error path
net: dsa: tag_8021q: avoid leaking ctx on dsa_tag_8021q_register() error path
In the Linux kernel, the following vulnerability has been resolved:
net: dsa: tag_8021q: avoid leaking ctx on dsa_tag_8021q_register() error path
If dsa_tag_8021q_setup() fails, for example due to the inability of the
device to install a VLAN, the tag_8021q context of the switch will leak.
Make sure it is freed on the error
osv
CVE-2023-54176UNKNOWN≥ 0, < 6.1.25-12025-12-30
CVE-2023-54176 CVE-2023-54176: In the Linux kernel, the following vulnerability has been resolved: mptcp: stricter state check in mptcp_worker As reported by Christoph, the mptcp pr
In the Linux kernel, the following vulnerability has been resolved: mptcp: stricter state check in mptcp_worker As reported by Christoph, the mptcp protocol can run the worker when the relevant msk socket is in an unexpected state: connect() // incoming reset + fastclose // the mptcp worker is scheduled mptcp_disconn
osv
CVE-2022-50865UNKNOWN≥ 0, < 5.10.158-1≥ 0, < 6.0.7-12025-12-30
CVE-2022-50865 CVE-2022-50865: In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf
In the Linux kernel, the following vulnerability has been resolved: tcp: fix a signed-integer-overflow bug in tcp_add_backlog() The type of sk_rcvbuf and sk_sndbuf in struct sock is int, and in tcp_add_backlog(), the variable limit is caculated by adding sk_rcvbuf, sk_sndbuf and 64 * 1024, it may exceed the max value
osv
CVE-2023-54271UNKNOWN≥ 5.4.0, < 6.4.16≥ 6.5.0, < 6.5.32025-12-30
CVE-2023-54271 blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init
blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init
In the Linux kernel, the following vulnerability has been resolved:
blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init
blk-iocost sometimes causes the following crash:
BUG: kernel NULL pointer dereference, address: 00000000000000e0
...
RIP: 0010:_raw_spin_lock+0x17/0x30
Code: be 01 02
osv
CVE-2023-54224UNKNOWN≥ 5.15.0, < 5.15.133≥ 5.16.0, < 6.1.55+1 more2025-12-30
CVE-2023-54224 btrfs: fix lockdep splat and potential deadlock after failure running delayed items
btrfs: fix lockdep splat and potential deadlock after failure running delayed items
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix lockdep splat and potential deadlock after failure running delayed items
When running delayed items we are holding a delayed node's mutex and then
we will attempt to modify a subvolume btree to insert/update/delete the
delayed items. H
osv
CVE-2022-50883UNKNOWN≥ 5.16.0, < 6.0.16≥ 6.1.0, < 6.1.22025-12-30
CVE-2022-50883 bpf: Prevent decl_tag from being referenced in func_proto arg
bpf: Prevent decl_tag from being referenced in func_proto arg
In the Linux kernel, the following vulnerability has been resolved:
bpf: Prevent decl_tag from being referenced in func_proto arg
Syzkaller managed to hit another decl_tag issue:
btf_func_proto_check kernel/bpf/btf.c:4506 [inline]
btf_check_all_types kernel/bpf/btf.c:4734 [inline]
btf_parse_type_sec+0x1175/0x1980 kernel/bpf/btf.c:4763
btf_parse kernel/bpf
osv
CVE-2022-50836UNKNOWN≥ 5.1.0, < 5.4.229≥ 5.5.0, < 5.10.163+3 more2025-12-30
CVE-2022-50836 remoteproc: sysmon: fix memory leak in qcom_add_sysmon_subdev()
remoteproc: sysmon: fix memory leak in qcom_add_sysmon_subdev()
In the Linux kernel, the following vulnerability has been resolved:
remoteproc: sysmon: fix memory leak in qcom_add_sysmon_subdev()
The kfree() should be called when of_irq_get_byname() fails or
devm_request_threaded_irq() fails in qcom_add_sysmon_subdev(),
otherwise there will be a memory leak, so add kfree() to fix it.
osv
CVE-2022-50785UNKNOWN≥ 0, < 6.0.3-12025-12-30
CVE-2022-50785 CVE-2022-50785: In the Linux kernel, the following vulnerability has been resolved: fsi: occ: Prevent use after free Use get_device and put_device in the open and clo
In the Linux kernel, the following vulnerability has been resolved: fsi: occ: Prevent use after free Use get_device and put_device in the open and close functions to make sure the device doesn't get freed while a file descriptor is open. Also, lock around the freeing of the device buffer and check the buffer before u
osv
CVE-2022-50784UNKNOWN≥ 0, < 6.1.4-12025-12-30
CVE-2022-50784 CVE-2022-50784: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mei: fix potential NULL-ptr deref after clone If cloning the SKB fa
In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mei: fix potential NULL-ptr deref after clone If cloning the SKB fails, don't try to use it, but rather return as if we should pass it. Coverity CID: 1503456
osv
CVE-2023-54324UNKNOWN≥ 2.6.12, < 6.1.56≥ 6.2.0, < 6.5.52025-12-30
CVE-2023-54324 dm: fix a race condition in retrieve_deps
dm: fix a race condition in retrieve_deps
In the Linux kernel, the following vulnerability has been resolved:
dm: fix a race condition in retrieve_deps
There's a race condition in the multipath target when retrieve_deps
races with multipath_message calling dm_get_device and dm_put_device.
retrieve_deps walks the list of open devices without holding any lock
but multipath may add or remove devices to the list while it is
running. The end
osv
CVE-2023-54171UNKNOWN≥ 5.7.0, < 5.10.188≥ 5.11.0, < 5.15.121+2 more2025-12-30
CVE-2023-54171 tracing: Fix memory leak of iter->temp when reading trace_pipe
tracing: Fix memory leak of iter->temp when reading trace_pipe
In the Linux kernel, the following vulnerability has been resolved:
tracing: Fix memory leak of iter->temp when reading trace_pipe
kmemleak reports:
unreferenced object 0xffff88814d14e200 (size 256):
comm "cat", pid 336, jiffies 4294871818 (age 779.490s)
hex dump (first 32 bytes):
04 00 01 03 00 00 00 00 08 00 00 00 00 00 00 00 ................
0c d8 c8
osv
CVE-2023-54274UNKNOWN≥ 3.3.0, < 5.10.180≥ 5.11.0, < 5.15.111+3 more2025-12-30
CVE-2023-54274 RDMA/srpt: Add a check for valid 'mad_agent' pointer
RDMA/srpt: Add a check for valid 'mad_agent' pointer
In the Linux kernel, the following vulnerability has been resolved:
RDMA/srpt: Add a check for valid 'mad_agent' pointer
When unregistering MAD agent, srpt module has a non-null check
for 'mad_agent' pointer before invoking ib_unregister_mad_agent().
This check can pass if 'mad_agent' variable holds an error value.
The 'mad_agent' can have an error value for a short window
osv
CVE-2022-50815UNKNOWN≥ 2.6.12, < 5.19.17≥ 5.20.0, < 6.0.32025-12-30
CVE-2022-50815 ext2: Add sanity checks for group and filesystem size
ext2: Add sanity checks for group and filesystem size
In the Linux kernel, the following vulnerability has been resolved:
ext2: Add sanity checks for group and filesystem size
Add sanity check that filesystem size does not exceed the underlying
device size and that group size is big enough so that metadata can fit
into it. This avoid trying to mount some crafted filesystems with
extremely large group counts.
osv
CVE-2023-54261UNKNOWN≥ 6.5.0, < 6.5.42025-12-30
CVE-2023-54261 drm/amdkfd: Add missing gfx11 MQD manager callbacks
drm/amdkfd: Add missing gfx11 MQD manager callbacks
In the Linux kernel, the following vulnerability has been resolved:
drm/amdkfd: Add missing gfx11 MQD manager callbacks
mqd_stride function was introduced in commit 2f77b9a242a2
("drm/amdkfd: Update MQD management on multi XCC setup")
but not assigned for gfx11. Fixes a NULL dereference in debugfs.
osv
CVE-2023-54186UNKNOWN≥ 4.19.0, < 4.19.284≥ 4.20.0, < 5.4.244+4 more2025-12-30
CVE-2023-54186 usb: typec: altmodes/displayport: fix pin_assignment_show
usb: typec: altmodes/displayport: fix pin_assignment_show
In the Linux kernel, the following vulnerability has been resolved:
usb: typec: altmodes/displayport: fix pin_assignment_show
This patch fixes negative indexing of buf array in pin_assignment_show
when get_current_pin_assignments returns 0 i.e. no compatible pin
assignments are found.
BUG: KASAN: use-after-free in pin_assignment_show+0x26c/0x33c
...
Call trace:
d
osv
CVE-2023-54239UNKNOWN≥ 6.2.0, < 6.2.112025-12-30
CVE-2023-54239 iommufd: Check for uptr overflow
iommufd: Check for uptr overflow
In the Linux kernel, the following vulnerability has been resolved:
iommufd: Check for uptr overflow
syzkaller found that setting up a map with a user VA that wraps past zero
can trigger WARN_ONs, particularly from pin_user_pages weirdly returning 0
due to invalid arguments.
Prevent creating a pages with a uptr and size that would math overflow.
WARNING: CPU: 0 PID: 518 at drivers/iommu/iommufd/pages.c:793 pfn_
osv
CVE-2023-54162UNKNOWN≥ 0, < 6.1.20-12025-12-30
CVE-2023-54162 CVE-2023-54162: In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix possible memory leak in smb2_lock() argv needs to be free when setup_as
In the Linux kernel, the following vulnerability has been resolved: ksmbd: fix possible memory leak in smb2_lock() argv needs to be free when setup_async_work fails or when the current process is woken up.
osv