Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 44 of 724
CVE-2023-54166UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.11-12025-12-30
CVE-2023-54166 CVE-2023-54166: In the Linux kernel, the following vulnerability has been resolved: igc: Fix Kernel Panic during ndo_tx_timeout callback The Xeon validation group has
In the Linux kernel, the following vulnerability has been resolved: igc: Fix Kernel Panic during ndo_tx_timeout callback The Xeon validation group has been carrying out some loaded tests with various HW configurations, and they have seen some transmit queue time out happening during the test. This will cause the rese
osv
CVE-2023-54179UNKNOWN≥ 2.6.12, < 4.19.291≥ 4.20.0, < 5.4.253+4 more2025-12-30
CVE-2023-54179 scsi: qla2xxx: Array index may go out of bound
scsi: qla2xxx: Array index may go out of bound
In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Array index may go out of bound
Klocwork reports array 'vha->host_str' of size 16 may use index value(s)
16..19. Use snprintf() instead of sprintf().
osv
CVE-2023-54312UNKNOWN≥ 4.15.0, < 4.19.291≥ 4.20.0, < 5.4.251+5 more2025-12-30
CVE-2023-54312 samples/bpf: Fix buffer overflow in tcp_basertt
samples/bpf: Fix buffer overflow in tcp_basertt
In the Linux kernel, the following vulnerability has been resolved:
samples/bpf: Fix buffer overflow in tcp_basertt
Using sizeof(nv) or strlen(nv)+1 is correct.
osv
CVE-2023-54305UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-12-30
CVE-2023-54305 CVE-2023-54305: In the Linux kernel, the following vulnerability has been resolved: ext4: refuse to create ea block when umounted The ea block expansion need to acces
In the Linux kernel, the following vulnerability has been resolved: ext4: refuse to create ea block when umounted The ea block expansion need to access s_root while it is already set as NULL when umount is triggered. Refuse this request to avoid panic.
osv
CVE-2022-50863UNKNOWN≥ 0, < 6.0.3-12025-12-30
CVE-2022-50863 CVE-2022-50863: In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: free unused skb to prevent memory leak This avoid potential memory le
In the Linux kernel, the following vulnerability has been resolved: wifi: rtw89: free unused skb to prevent memory leak This avoid potential memory leak under power saving mode.
osv
CVE-2023-54204UNKNOWN≥ 0, < 6.4.13-12025-12-30
CVE-2023-54204 CVE-2023-54204: In the Linux kernel, the following vulnerability has been resolved: mmc: sunplus: fix return value check of mmc_add_host() mmc_add_host() may return e
In the Linux kernel, the following vulnerability has been resolved: mmc: sunplus: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, 1. the memory allocated in mmc_alloc_host() will be leaked 2. null-ptr-deref will happen when calling mmc_remove_host() in remove f
osv
CVE-2022-50881UNKNOWN≥ 5.8.0, < 5.10.173≥ 5.11.0, < 5.15.99+2 more2025-12-30
CVE-2022-50881 wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect()
wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect()
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath9k: Fix use-after-free in ath9k_hif_usb_disconnect()
This patch fixes a use-after-free in ath9k that occurs in
ath9k_hif_usb_disconnect() when ath9k_destroy_wmi() is trying to access
'drv_priv' that has already been freed by ieee80211_free_hw(), called by
ath9k_htc_hw_deinit(). Th
osv
CVE-2023-54298UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-12-30
CVE-2023-54298 CVE-2023-54298: In the Linux kernel, the following vulnerability has been resolved: thermal: intel: quark_dts: fix error pointer dereference If alloc_soc_dts() fails,
In the Linux kernel, the following vulnerability has been resolved: thermal: intel: quark_dts: fix error pointer dereference If alloc_soc_dts() fails, then we can just return. Trying to free "soc_dts" will lead to an Oops.
osv
CVE-2022-50838UNKNOWN≥ 0, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-12-30
CVE-2022-50838 net: stream: purge sk_error_queue in sk_stream_kill_queues()
net: stream: purge sk_error_queue in sk_stream_kill_queues()
In the Linux kernel, the following vulnerability has been resolved:
net: stream: purge sk_error_queue in sk_stream_kill_queues()
Changheon Lee reported TCP socket leaks, with a nice repro.
It seems we leak TCP sockets with the following sequence:
1) SOF_TIMESTAMPING_TX_ACK is enabled on the socket.
Each ACK will cook an skb put in error queue, from __skb_
osv
CVE-2022-50861UNKNOWN≥ 5.13.0, < 5.15.86≥ 5.16.0, < 6.0.16+1 more2025-12-30
CVE-2022-50861 NFSD: Finish converting the NFSv2 GETACL result encoder
NFSD: Finish converting the NFSv2 GETACL result encoder
In the Linux kernel, the following vulnerability has been resolved:
NFSD: Finish converting the NFSv2 GETACL result encoder
The xdr_stream conversion inadvertently left some code that set the
page_len of the send buffer. The XDR stream encoders should handle
this automatically now.
This oversight adds garbage past the end of the Reply message.
Clients typically ignor
osv
CVE-2023-54187UNKNOWN≥ 3.19.0, < 5.4.243≥ 5.5.0, < 5.10.180+4 more2025-12-30
CVE-2023-54187 f2fs: fix potential corruption when moving a directory
f2fs: fix potential corruption when moving a directory
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix potential corruption when moving a directory
F2FS has the same issue in ext4_rename causing crash revealed by
xfstests/generic/707.
See also commit 0813299c586b ("ext4: Fix possible corruption when moving a directory")
osv
CVE-2023-54219UNKNOWN≥ 0, < 5.10.197-1≥ 0, < 6.1.55-1+1 more2025-12-30
CVE-2023-54219 CVE-2023-54219: In the Linux kernel, the following vulnerability has been resolved: Revert "IB/isert: Fix incorrect release of isert connection" Commit: 699826f4e30a
In the Linux kernel, the following vulnerability has been resolved: Revert "IB/isert: Fix incorrect release of isert connection" Commit: 699826f4e30a ("IB/isert: Fix incorrect release of isert connection") is causing problems on OPA when DEVICE_REMOVAL is happening. ------------[ cut here ]------------ WARNING: CPU: 5
osv
CVE-2023-54300UNKNOWN≥ 2.6.35, < 4.14.322≥ 4.15.0, < 4.19.291+6 more2025-12-30
CVE-2023-54300 wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx
wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath9k: avoid referencing uninit memory in ath9k_wmi_ctrl_rx
For the reasons also described in commit b383e8abed41 ("wifi: ath9k: avoid
uninit memory read in ath9k_htc_rx_msg()"), ath9k_htc_rx_msg() should
validate pkt_len before accessing the SKB.
For example, the obtained S
osv
CVE-2023-54295UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-12-30
CVE-2023-54295 CVE-2023-54295: In the Linux kernel, the following vulnerability has been resolved: mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type spi_nor_set_erase_
In the Linux kernel, the following vulnerability has been resolved: mtd: spi-nor: Fix shift-out-of-bounds in spi_nor_set_erase_type spi_nor_set_erase_type() was used either to set or to mask out an erase type. When we used it to mask out an erase type a shift-out-of-bounds was hit: UBSAN: shift-out-of-bounds in drive
osv
CVE-2023-54277UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-30
CVE-2023-54277 CVE-2023-54277: In the Linux kernel, the following vulnerability has been resolved: fbdev: udlfb: Fix endpoint check The syzbot fuzzer detected a problem in the udlfb
In the Linux kernel, the following vulnerability has been resolved: fbdev: udlfb: Fix endpoint check The syzbot fuzzer detected a problem in the udlfb driver, caused by an endpoint not having the expected type: usb 1-1: Read EDID byte 0 failed: -71 usb 1-1: Unable to get valid EDID from device/display ------------[ c
osv
CVE-2022-50872UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.20-12025-12-30
CVE-2022-50872 CVE-2022-50872: In the Linux kernel, the following vulnerability has been resolved: ARM: OMAP2+: Fix memory leak in realtime_counter_init() The "sys_clk" resource is
In the Linux kernel, the following vulnerability has been resolved: ARM: OMAP2+: Fix memory leak in realtime_counter_init() The "sys_clk" resource is malloced by clk_get(), it is not released when the function return.
osv
CVE-2023-54194UNKNOWN≥ 5.7.0, < 5.10.190≥ 5.11.0, < 5.15.126+2 more2025-12-30
CVE-2023-54194 exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree
exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree
In the Linux kernel, the following vulnerability has been resolved:
exfat: use kvmalloc_array/kvfree instead of kmalloc_array/kfree
The call stack shown below is a scenario in the Linux 4.19 kernel.
Allocating memory failed where exfat fs use kmalloc_array due to
system memory fragmentation, while the u-disk was inserted without
recognition.
Devices su
osv
CVE-2023-54196UNKNOWN≥ 0, < 6.1.82-1≥ 0, < 6.3.7-12025-12-30
CVE-2023-54196 CVE-2023-54196: In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix NULL pointer dereference in 'ni_write_inode' Syzbot found the follow
In the Linux kernel, the following vulnerability has been resolved: fs/ntfs3: Fix NULL pointer dereference in 'ni_write_inode' Syzbot found the following issue: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000016 Mem abort info: ESR = 0x0000000096000006 EC = 0x25: DABT (current EL), I
osv
CVE-2023-54174UNKNOWN≥ 6.2.0, < 6.2.32025-12-30
CVE-2023-54174 vfio: Fix NULL pointer dereference caused by uninitialized group->iommufd
vfio: Fix NULL pointer dereference caused by uninitialized group->iommufd
In the Linux kernel, the following vulnerability has been resolved:
vfio: Fix NULL pointer dereference caused by uninitialized group->iommufd
group->iommufd is not initialized for the iommufd_ctx_put()
[20018.331541] BUG: kernel NULL pointer dereference, address: 0000000000000000
[20018.377508] RIP: 0010:iommufd_ctx_put+0x5/0x10 [i
osv
CVE-2023-54198UNKNOWN≥ 2.6.28, < 4.14.308≥ 4.15.0, < 4.19.276+5 more2025-12-30
CVE-2023-54198 tty: fix out-of-bounds access in tty_driver_lookup_tty()
tty: fix out-of-bounds access in tty_driver_lookup_tty()
In the Linux kernel, the following vulnerability has been resolved:
tty: fix out-of-bounds access in tty_driver_lookup_tty()
When specifying an invalid console= device like console=tty3270,
tty_driver_lookup_tty() returns the tty struct without checking
whether index is a valid number.
To reproduce:
qemu-system-x86_64 -enable-kvm -nographic -serial mon:stdio \
-ke
osv