Linux Kernel vulnerabilities

14,478 known vulnerabilities affecting linux/linux_kernel.

Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767

Vulnerabilities

Page 43 of 724
CVE-2023-54177UNKNOWN≥ 0, < 5.10.197-1≥ 0, < 6.1.52-1+1 more2025-12-30
CVE-2023-54177 CVE-2023-54177: In the Linux kernel, the following vulnerability has been resolved: quota: fix warning in dqgrab() There's issue as follows when do fault injection: W In the Linux kernel, the following vulnerability has been resolved: quota: fix warning in dqgrab() There's issue as follows when do fault injection: WARNING: CPU: 1 PID: 14870 at include/linux/quotaops.h:51 dquot_disable+0x13b7/0x18c0 Modules linked in: CPU: 1 PID: 14870 Comm: fsconfig Not tainted 6.3.0-next-20230505
osv
CVE-2022-50833UNKNOWN≥ 0, < 5.19.15≥ 5.20.0, < 6.0.12025-12-30
CVE-2022-50833 Bluetooth: use hdev->workqueue when queuing hdev->{cmd,ncmd}_timer works Bluetooth: use hdev->workqueue when queuing hdev->{cmd,ncmd}_timer works In the Linux kernel, the following vulnerability has been resolved: Bluetooth: use hdev->workqueue when queuing hdev->{cmd,ncmd}_timer works syzbot is reporting attempt to schedule hdev->cmd_work work from system_wq WQ into hdev->workqueue WQ which is under draining operation [1], for commit c8efcc2589464ac7 ("workqueue: allow chained
osv
CVE-2023-54233UNKNOWN≥ 6.0.0, < 6.2.112025-12-30
CVE-2023-54233 ASoC: SOF: avoid a NULL dereference with unsupported widgets ASoC: SOF: avoid a NULL dereference with unsupported widgets In the Linux kernel, the following vulnerability has been resolved: ASoC: SOF: avoid a NULL dereference with unsupported widgets If an IPC4 topology contains an unsupported widget, its .module_info field won't be set, then sof_ipc4_route_setup() will cause a kernel Oops trying to dereference it. Add a check for such cases.
osv
CVE-2023-54292UNKNOWN≥ 5.14.0, < 5.15.124≥ 5.16.0, < 6.1.43+1 more2025-12-30
CVE-2023-54292 RDMA/irdma: Fix data race on CQP request done RDMA/irdma: Fix data race on CQP request done In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix data race on CQP request done KCSAN detects a data race on cqp_request->request_done memory location which is accessed locklessly in irdma_handle_cqp_op while being updated in irdma_cqp_ce_handler. Annotate lockless intent with READ_ONCE/WRITE_ONCE to avoid any compiler optimizations like load fusing and
osv
CVE-2023-54202UNKNOWN≥ 4.14.0, < 5.15.108≥ 5.16.0, < 6.1.24+1 more2025-12-30
CVE-2023-54202 drm/i915: fix race condition UAF in i915_perf_add_config_ioctl drm/i915: fix race condition UAF in i915_perf_add_config_ioctl In the Linux kernel, the following vulnerability has been resolved: drm/i915: fix race condition UAF in i915_perf_add_config_ioctl Userspace can guess the id value and try to race oa_config object creation with config remove, resulting in a use-after-free if we dereference the object after unlocking the metrics_lock. For that reason, unlocking the metric
osv
CVE-2023-54218UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-30
CVE-2023-54218 CVE-2023-54218: In the Linux kernel, the following vulnerability has been resolved: net: Fix load-tearing on sk->sk_stamp in sock_recv_cmsgs() In the Linux kernel, the following vulnerability has been resolved: net: Fix load-tearing on sk->sk_stamp in sock_recv_cmsgs(). KCSAN found a data race in sock_recv_cmsgs() where the read access to sk->sk_stamp needs READ_ONCE(). BUG: KCSAN: data-race in packet_recvmsg / packet_recvmsg write (marked) to 0xffff88803c81f258 of 8 bytes by task
osv
CVE-2023-54288UNKNOWN≥ 0, < 6.1.37-1≥ 0, < 6.3.7-12025-12-30
CVE-2023-54288 CVE-2023-54288: In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fortify the spinlock against deadlock by interrupt In the function In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211: fortify the spinlock against deadlock by interrupt In the function ieee80211_tx_dequeue() there is a particular locking sequence: begin: spin_lock(&local->queue_stop_reason_lock); q_stopped = local->queue_stop_reasons[q]; spin_unlock(
osv
CVE-2023-54255UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-30
CVE-2023-54255 CVE-2023-54255: In the Linux kernel, the following vulnerability has been resolved: sh: dma: Fix DMA channel offset calculation Various SoCs of the SH3, SH4 and SH4A In the Linux kernel, the following vulnerability has been resolved: sh: dma: Fix DMA channel offset calculation Various SoCs of the SH3, SH4 and SH4A family, which use this driver, feature a differing number of DMA channels, which can be distributed between up to two DMAC modules. The existing implementation fails to
osv
CVE-2022-50786UNKNOWN≥ 3.16.0, < 4.19.270≥ 4.20.0, < 5.4.229+4 more2025-12-30
CVE-2022-50786 media: s5p-mfc: Clear workbit to handle error condition media: s5p-mfc: Clear workbit to handle error condition In the Linux kernel, the following vulnerability has been resolved: media: s5p-mfc: Clear workbit to handle error condition During error on CLOSE_INSTANCE command, ctx_work_bits was not getting cleared. During consequent mfc execution NULL pointer dereferencing of this context led to kernel panic. This patch fixes this issue by making sure to clear ctx_work_bits alway
osv
CVE-2023-54181UNKNOWN≥ 0, < 6.1.55-1≥ 0, < 6.5.3-12025-12-30
CVE-2023-54181 CVE-2023-54181: In the Linux kernel, the following vulnerability has been resolved: bpf: Fix issue in verifying allow_ptr_leaks After we converted the capabilities of In the Linux kernel, the following vulnerability has been resolved: bpf: Fix issue in verifying allow_ptr_leaks After we converted the capabilities of our networking-bpf program from cap_sys_admin to cap_net_admin+cap_bpf, our networking-bpf program failed to start. Because it failed the bpf verifier, and the error l
osv
CVE-2022-50867UNKNOWN≥ 0, < 6.0.7-12025-12-30
CVE-2022-50867 CVE-2022-50867: In the Linux kernel, the following vulnerability has been resolved: drm/msm/a6xx: Fix kvzalloc vs state_kcalloc usage adreno_show_object() is a trap! In the Linux kernel, the following vulnerability has been resolved: drm/msm/a6xx: Fix kvzalloc vs state_kcalloc usage adreno_show_object() is a trap! It will re-allocate the pointer it is passed on first call, when the data is ascii85 encoded, using kvmalloc/ kvfree(). Which means the data *passed* to it must be kvmal
osv
CVE-2022-50882UNKNOWN≥ 5.12.0, < 5.15.75≥ 5.16.0, < 5.19.17+1 more2025-12-30
CVE-2022-50882 media: uvcvideo: Fix memory leak in uvc_gpio_parse media: uvcvideo: Fix memory leak in uvc_gpio_parse In the Linux kernel, the following vulnerability has been resolved: media: uvcvideo: Fix memory leak in uvc_gpio_parse Previously the unit buffer was allocated before checking the IRQ for privacy GPIO. In case of error, the unit buffer was leaked. Allocate the unit buffer after the IRQ to avoid it. Addresses-Coverity-ID: 1474639 ("Resource leak")
osv
CVE-2023-54266UNKNOWN≥ 0, < 5.10.197-1≥ 0, < 6.1.55-1+1 more2025-12-30
CVE-2023-54266 CVE-2023-54266: In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer() 'read' is f In the Linux kernel, the following vulnerability has been resolved: media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer() 'read' is freed when it is known to be NULL, but not when a read error occurs. Revert the logic to avoid a small leak, should a m920x_read() call fail.
osv
CVE-2023-54184UNKNOWN≥ 3.12.0, < 5.4.244≥ 5.5.0, < 5.10.181+3 more2025-12-30
CVE-2023-54184 scsi: target: iscsit: Free cmds before session free scsi: target: iscsit: Free cmds before session free In the Linux kernel, the following vulnerability has been resolved: scsi: target: iscsit: Free cmds before session free Commands from recovery entries are freed after session has been closed. That leads to use-after-free at command free or NPE with such call trace: Time2Retain timer expired for SID: 1, cleaning up iSCSI session. BUG: kernel NULL pointer dereference, address:
osv
CVE-2023-54235UNKNOWN≥ 0, < 6.1.53≥ 6.2.0, < 6.4.16+1 more2025-12-30
CVE-2023-54235 PCI/DOE: Fix destroy_work_on_stack() race PCI/DOE: Fix destroy_work_on_stack() race In the Linux kernel, the following vulnerability has been resolved: PCI/DOE: Fix destroy_work_on_stack() race The following debug object splat was observed in testing: ODEBUG: free active (active state 0) object: 0000000097d23782 object type: work_struct hint: doe_statemachine_work+0x0/0x510 WARNING: CPU: 1 PID: 71 at lib/debugobjects.c:514 debug_print_object+0x7d/0xb0 ... Workqueue: pci 0000:3
osv
CVE-2022-50869UNKNOWN≥ 5.15.0, < 5.15.87≥ 5.16.0, < 6.0.17+1 more2025-12-30
CVE-2022-50869 fs/ntfs3: Fix slab-out-of-bounds in r_page fs/ntfs3: Fix slab-out-of-bounds in r_page In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix slab-out-of-bounds in r_page When PAGE_SIZE is 64K, if read_log_page is called by log_read_rst for the first time, the size of *buffer would be equal to DefaultLogPageSize(4K).But for *buffer operations like memcpy, if the memory area size(n) which being assigned to buffer is larger than 4K (log->page_size(64K) o
osv
CVE-2022-50809UNKNOWN≥ 0, < 6.0.3-12025-12-30
CVE-2022-50809 CVE-2022-50809: In the Linux kernel, the following vulnerability has been resolved: xhci: dbc: Fix memory leak in xhci_alloc_dbc() If DbC is already in use, then the In the Linux kernel, the following vulnerability has been resolved: xhci: dbc: Fix memory leak in xhci_alloc_dbc() If DbC is already in use, then the allocated memory for the xhci_dbc struct doesn't get freed before returning NULL, which leads to a memleak.
osv
CVE-2023-54299UNKNOWN≥ 0, < 5.10.197-1≥ 0, < 6.1.55-1+1 more2025-12-30
CVE-2023-54299 CVE-2023-54299: In the Linux kernel, the following vulnerability has been resolved: usb: typec: bus: verify partner exists in typec_altmode_attention Some usb hubs wi In the Linux kernel, the following vulnerability has been resolved: usb: typec: bus: verify partner exists in typec_altmode_attention Some usb hubs will negotiate DisplayPort Alt mode with the device but will then negotiate a data role swap after entering the alt mode. The data role swap causes the device to unregist
osv
CVE-2022-50841UNKNOWN≥ 5.15.0, < 5.15.87≥ 5.16.0, < 6.0.17+1 more2025-12-30
CVE-2022-50841 fs/ntfs3: Add overflow check for attribute size fs/ntfs3: Add overflow check for attribute size In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Add overflow check for attribute size The offset addition could overflow and pass the used size check given an attribute with very large size (e.g., 0xffffff7f) while parsing MFT attributes. This could lead to out-of-bound memory R/W if we try to access the next attribute derived by Add2Ptr(attr, asize) [
osv
CVE-2023-54247UNKNOWN≥ 0, < 6.1.112-1≥ 0, < 6.4.11-12025-12-30
CVE-2023-54247 CVE-2023-54247: In the Linux kernel, the following vulnerability has been resolved: bpf: Silence a warning in btf_type_id_size() syzbot reported a warning in [1] with In the Linux kernel, the following vulnerability has been resolved: bpf: Silence a warning in btf_type_id_size() syzbot reported a warning in [1] with the following stacktrace: WARNING: CPU: 0 PID: 5005 at kernel/bpf/btf.c:1988 btf_type_id_size+0x2d9/0x9d0 kernel/bpf/btf.c:1988 ... RIP: 0010:btf_type_id_size+0x2d9/0x
osv