Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 45 of 724
CVE-2022-50866UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-30
CVE-2022-50866 CVE-2022-50866: In the Linux kernel, the following vulnerability has been resolved: ASoC: pxa: fix null-pointer dereference in filter() kasprintf() would return NULL
In the Linux kernel, the following vulnerability has been resolved: ASoC: pxa: fix null-pointer dereference in filter() kasprintf() would return NULL pointer when kmalloc() fail to allocate. Need to check the return pointer before calling strcmp().
osv
CVE-2023-54178UNKNOWN≥ 4.14.0, < 4.14.326≥ 4.15.0, < 4.19.295+6 more2025-12-30
CVE-2023-54178 of: unittest: fix null pointer dereferencing in of_unittest_find_node_by_name()
of: unittest: fix null pointer dereferencing in of_unittest_find_node_by_name()
In the Linux kernel, the following vulnerability has been resolved:
of: unittest: fix null pointer dereferencing in of_unittest_find_node_by_name()
when kmalloc() fail to allocate memory in kasprintf(), name
or full_name will be NULL, strcmp() will cause
null pointer dereference.
osv
CVE-2022-50820UNKNOWN≥ 0, < 6.1.4-12025-12-30
CVE-2022-50820 CVE-2022-50820: In the Linux kernel, the following vulnerability has been resolved: perf/arm_dmc620: Fix hotplug callback leak in dmc620_pmu_init() dmc620_pmu_init()
In the Linux kernel, the following vulnerability has been resolved: perf/arm_dmc620: Fix hotplug callback leak in dmc620_pmu_init() dmc620_pmu_init() won't remove the callback added by cpuhp_setup_state_multi() when platform_driver_register() failed. Remove the callback by cpuhp_remove_multi_state() in fail path. Simi
osv
CVE-2023-54209UNKNOWN≥ 5.19.0, < 6.1.39≥ 6.2.0, < 6.3.13+1 more2025-12-30
CVE-2023-54209 block: fix blktrace debugfs entries leakage
block: fix blktrace debugfs entries leakage
In the Linux kernel, the following vulnerability has been resolved:
block: fix blktrace debugfs entries leakage
Commit 99d055b4fd4b ("block: remove per-disk debugfs files in
blk_unregister_queue") moves blk_trace_shutdown() from
blk_release_queue() to blk_unregister_queue(), this is safe if blktrace
is created through sysfs, however, there is a regression in corner
case.
blktrace can still
osv
CVE-2022-50842UNKNOWN≥ 5.7.0, < 5.10.150≥ 5.11.0, < 5.15.75+2 more2025-12-30
CVE-2022-50842 drm/virtio: Check whether transferred 2D BO is shmem
drm/virtio: Check whether transferred 2D BO is shmem
In the Linux kernel, the following vulnerability has been resolved:
drm/virtio: Check whether transferred 2D BO is shmem
Transferred 2D BO always must be a shmem BO. Add check for that to prevent
NULL dereference if userspace passes a VRAM BO.
osv
CVE-2023-54302UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.11-12025-12-30
CVE-2023-54302 CVE-2023-54302: In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix data race on CQP completion stats CQP completion statistics is rea
In the Linux kernel, the following vulnerability has been resolved: RDMA/irdma: Fix data race on CQP completion stats CQP completion statistics is read lockesly in irdma_wait_event and irdma_check_cqp_progress while it can be updated in the completion thread irdma_sc_ccq_get_cqe_info on another CPU as KCSAN reports.
osv
CVE-2023-54267UNKNOWN≥ 3.12.0, < 5.10.195≥ 5.11.0, < 5.15.132+3 more2025-12-30
CVE-2023-54267 powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT
powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT
In the Linux kernel, the following vulnerability has been resolved:
powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT
lppaca_shared_proc() takes a pointer to the lppaca which is typically
accessed through get_lppaca(). With DEBUG_PREEMPT enabled, this leads
to checking if preemption is enabled, for example:
BUG: using smp_pro
osv
CVE-2023-54225UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.11-12025-12-30
CVE-2023-54225 CVE-2023-54225: In the Linux kernel, the following vulnerability has been resolved: net: ipa: only reset hashed tables when supported Last year, the code that manages
In the Linux kernel, the following vulnerability has been resolved: net: ipa: only reset hashed tables when supported Last year, the code that manages GSI channel transactions switched from using spinlock-protected linked lists to using indexes into the ring buffer used for a channel. Recently, Google reported seeing
osv
CVE-2022-50848UNKNOWN≥ 2.6.29, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-12-30
CVE-2022-50848 drivers: dio: fix possible memory leak in dio_init()
drivers: dio: fix possible memory leak in dio_init()
In the Linux kernel, the following vulnerability has been resolved:
drivers: dio: fix possible memory leak in dio_init()
If device_register() returns error, the 'dev' and name needs be
freed. Add a release function, and then call put_device() in the
error path, so the name is freed in kobject_cleanup() and to the
'dev' is freed in release function.
osv
CVE-2023-54287UNKNOWN≥ 0, < 6.1.20-12025-12-30
CVE-2023-54287 CVE-2023-54287: In the Linux kernel, the following vulnerability has been resolved: tty: serial: imx: disable Ageing Timer interrupt request irq There maybe pending U
In the Linux kernel, the following vulnerability has been resolved: tty: serial: imx: disable Ageing Timer interrupt request irq There maybe pending USR interrupt before requesting irq, however uart_add_one_port has not executed, so there will be kernel panic: [ 0.795668] Unable to handle kernel NULL pointer derefere
osv
CVE-2023-54164UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.11-12025-12-30
CVE-2023-54164 CVE-2023-54164: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: fix iso_conn related locking and validity issues sk->sk_state indi
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: ISO: fix iso_conn related locking and validity issues sk->sk_state indicates whether iso_pi(sk)->conn is valid. Operations that check/update sk_state and access conn should hold lock_sock, otherwise they can race. The order of taking locks
osv
CVE-2023-54322UNKNOWN≥ 4.3.0, < 5.10.188≥ 5.11.0, < 5.15.150+1 more2025-12-30
CVE-2023-54322 arm64: set __exception_irq_entry with __irq_entry as a default
arm64: set __exception_irq_entry with __irq_entry as a default
In the Linux kernel, the following vulnerability has been resolved:
arm64: set __exception_irq_entry with __irq_entry as a default
filter_irq_stacks() is supposed to cut entries which are related irq entries
from its call stack.
And in_irqentry_text() which is called by filter_irq_stacks()
uses __irqentry_text_start/end symbol to find irq entries in call
osv
CVE-2023-54172UNKNOWN≥ 5.18.0, < 6.1.45≥ 6.2.0, < 6.4.102025-12-30
CVE-2023-54172 x86/hyperv: Disable IBT when hypercall page lacks ENDBR instruction
x86/hyperv: Disable IBT when hypercall page lacks ENDBR instruction
In the Linux kernel, the following vulnerability has been resolved:
x86/hyperv: Disable IBT when hypercall page lacks ENDBR instruction
On hardware that supports Indirect Branch Tracking (IBT), Hyper-V VMs
with ConfigVersion 9.3 or later support IBT in the guest. However,
current versions of Hyper-V have a bug in that there's not an ENDBR64
ins
osv
CVE-2022-50851UNKNOWN≥ 5.7.0, < 6.0.19≥ 6.1.0, < 6.1.52025-12-30
CVE-2022-50851 vhost_vdpa: fix the crash in unmap a large memory
vhost_vdpa: fix the crash in unmap a large memory
In the Linux kernel, the following vulnerability has been resolved:
vhost_vdpa: fix the crash in unmap a large memory
While testing in vIOMMU, sometimes Guest will unmap very large memory,
which will cause the crash. To fix this, add a new function
vhost_vdpa_general_unmap(). This function will only unmap the memory
that saved in iotlb.
Call Trace:
[ 647.820144] ------------[ cu
osv
CVE-2023-54297UNKNOWN≥ 0, < 6.1.52-1≥ 0, < 6.4.11-12025-12-30
CVE-2023-54297 CVE-2023-54297: In the Linux kernel, the following vulnerability has been resolved: btrfs: zoned: fix memory leak after finding block group with super blocks At exclu
In the Linux kernel, the following vulnerability has been resolved: btrfs: zoned: fix memory leak after finding block group with super blocks At exclude_super_stripes(), if we happen to find a block group that has super blocks mapped to it and we are on a zoned filesystem, we error out as this is not supposed to happ
osv
CVE-2023-54319UNKNOWN≥ 4.4.0, < 4.14.322≥ 4.15.0, < 4.19.291+6 more2025-12-30
CVE-2023-54319 pinctrl: at91-pio4: check return value of devm_kasprintf()
pinctrl: at91-pio4: check return value of devm_kasprintf()
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: at91-pio4: check return value of devm_kasprintf()
devm_kasprintf() returns a pointer to dynamically allocated memory.
Pointer could be NULL in case allocation fails. Check pointer validity.
Identified with coccinelle (kmerr.cocci script).
Depends-on: 1c4e5c470a56 ("pinctrl: at91: use d
osv
CVE-2022-50858UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-30
CVE-2022-50858 CVE-2022-50858: In the Linux kernel, the following vulnerability has been resolved: mmc: alcor: fix return value check of mmc_add_host() mmc_add_host() may return err
In the Linux kernel, the following vulnerability has been resolved: mmc: alcor: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, the memory that allocated in mmc_alloc_host() will be leaked and it will lead a kernel crash because of deleting not added device in
osv
CVE-2022-50873UNKNOWN≥ 5.19.0, < 6.0.19≥ 6.1.0, < 6.1.52025-12-30
CVE-2022-50873 vdpa/vp_vdpa: fix kfree a wrong pointer in vp_vdpa_remove
vdpa/vp_vdpa: fix kfree a wrong pointer in vp_vdpa_remove
In the Linux kernel, the following vulnerability has been resolved:
vdpa/vp_vdpa: fix kfree a wrong pointer in vp_vdpa_remove
In vp_vdpa_remove(), the code kfree(&vp_vdpa_mgtdev->mgtdev.id_table) uses
a reference of pointer as the argument of kfree, which is the wrong pointer
and then may hit crash like this:
Unable to handle kernel paging request at virtual addr
osv
CVE-2022-50832UNKNOWN≥ 4.2.0, < 5.4.235≥ 5.5.0, < 5.10.173+3 more2025-12-30
CVE-2022-50832 wifi: wilc1000: fix potential memory leak in wilc_mac_xmit()
wifi: wilc1000: fix potential memory leak in wilc_mac_xmit()
In the Linux kernel, the following vulnerability has been resolved:
wifi: wilc1000: fix potential memory leak in wilc_mac_xmit()
The wilc_mac_xmit() returns NETDEV_TX_OK without freeing skb, add
dev_kfree_skb() to fix it. Compile tested only.
osv
CVE-2023-54284UNKNOWN≥ 0, < 5.10.216-1≥ 0, < 6.1.37-1+1 more2025-12-30
CVE-2023-54284 CVE-2023-54284: In the Linux kernel, the following vulnerability has been resolved: media: av7110: prevent underflow in write_ts_to_decoder() The buf[4] value comes f
In the Linux kernel, the following vulnerability has been resolved: media: av7110: prevent underflow in write_ts_to_decoder() The buf[4] value comes from the user via ts_play(). It is a value in the u8 range. The final length we pass to av7110_ipack_instant_repack() is "len - (buf[4] + 1) - 4" so add a check to ensur
osv