Linux Kernel vulnerabilities
14,478 known vulnerabilities affecting linux/linux_kernel.
Total CVEs
14,478
CISA KEV
29
actively exploited
Public exploits
296
Exploited in wild
31
Severity breakdown
CRITICAL112HIGH3696MEDIUM8484LOW419UNKNOWN1767
Vulnerabilities
Page 46 of 724
CVE-2023-54310UNKNOWN≥ 2.6.12, < 4.14.316≥ 4.15.0, < 4.19.284+5 more2025-12-30
CVE-2023-54310 scsi: message: mptlan: Fix use after free bug in mptlan_remove() due to race condition
scsi: message: mptlan: Fix use after free bug in mptlan_remove() due to race condition
In the Linux kernel, the following vulnerability has been resolved:
scsi: message: mptlan: Fix use after free bug in mptlan_remove() due to race condition
mptlan_probe() calls mpt_register_lan_device() which initializes the
&priv->post_buckets_task workqueue. A call to
mpt_lan_wake_post_buckets_task() will
osv
CVE-2022-50853UNKNOWN≥ 0, < 5.15.86≥ 5.16.0, < 6.0.16+1 more2025-12-30
CVE-2022-50853 NFSv4: Fix a credential leak in _nfs4_discover_trunking()
NFSv4: Fix a credential leak in _nfs4_discover_trunking()
In the Linux kernel, the following vulnerability has been resolved:
NFSv4: Fix a credential leak in _nfs4_discover_trunking()
osv
CVE-2022-50822UNKNOWN≥ 0, < 6.1.4-12025-12-30
CVE-2022-50822 CVE-2022-50822: In the Linux kernel, the following vulnerability has been resolved: RDMA/restrack: Release MR restrack when delete The MR restrack also needs to be re
In the Linux kernel, the following vulnerability has been resolved: RDMA/restrack: Release MR restrack when delete The MR restrack also needs to be released when delete it, otherwise it cause memory leak as the task struct won't be released.
osv
CVE-2023-54193UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.37-1+1 more2025-12-30
CVE-2023-54193 CVE-2023-54193: In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_api: remove block_cb from driver_list before freeing Error handler
In the Linux kernel, the following vulnerability has been resolved: net/sched: cls_api: remove block_cb from driver_list before freeing Error handler of tcf_block_bind() frees the whole bo->cb_list on error. However, by that time the flow_block_cb instances are already in the driver list because driver ndo_setup_tc()
osv
CVE-2022-50889UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-30
CVE-2022-50889 CVE-2022-50889: In the Linux kernel, the following vulnerability has been resolved: dm integrity: Fix UAF in dm_integrity_dtr() Dm_integrity also has the same UAF pro
In the Linux kernel, the following vulnerability has been resolved: dm integrity: Fix UAF in dm_integrity_dtr() Dm_integrity also has the same UAF problem when dm_resume() and dm_destroy() are concurrent. Therefore, cancelling timer again in dm_integrity_dtr().
osv
CVE-2022-50878UNKNOWN≥ 5.10.0, < 5.10.150≥ 5.11.0, < 5.15.75+2 more2025-12-30
CVE-2022-50878 gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init()
gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init()
In the Linux kernel, the following vulnerability has been resolved:
gpu: lontium-lt9611: Fix NULL pointer dereference in lt9611_connector_init()
A NULL check for bridge->encoder shows that it may be NULL, but it
already been dereferenced on all paths leading to the check.
812 if (!bridge->encoder) {
Dereference the pointer br
osv
CVE-2023-54326UNKNOWN≥ 0, < 5.10.191-1≥ 0, < 6.1.52-1+1 more2025-12-30
CVE-2023-54326 CVE-2023-54326: In the Linux kernel, the following vulnerability has been resolved: misc: pci_endpoint_test: Free IRQs before removing the device In pci_endpoint_test
In the Linux kernel, the following vulnerability has been resolved: misc: pci_endpoint_test: Free IRQs before removing the device In pci_endpoint_test_remove(), freeing the IRQs after removing the device creates a small race window for IRQs to be received with the test device memory already released, causing the IRQ
osv
CVE-2023-54304UNKNOWN≥ 0, < 5.10.197-1≥ 0, < 6.1.55-1+1 more2025-12-30
CVE-2023-54304 CVE-2023-54304: In the Linux kernel, the following vulnerability has been resolved: firmware: meson_sm: fix to avoid potential NULL pointer dereference of_match_devic
In the Linux kernel, the following vulnerability has been resolved: firmware: meson_sm: fix to avoid potential NULL pointer dereference of_match_device() may fail and returns a NULL pointer. Fix this by checking the return value of of_match_device.
osv
CVE-2022-50856UNKNOWN≥ 5.5.0, < 5.10.152≥ 5.11.0, < 5.15.76+1 more2025-12-30
CVE-2022-50856 cifs: Fix xid leak in cifs_ses_add_channel()
cifs: Fix xid leak in cifs_ses_add_channel()
In the Linux kernel, the following vulnerability has been resolved:
cifs: Fix xid leak in cifs_ses_add_channel()
Before return, should free the xid, otherwise, the
xid will be leaked.
osv
CVE-2023-54203UNKNOWN≥ 5.15.105, < 5.15.145≥ 6.1.22, < 6.1.24+1 more2025-12-30
CVE-2023-54203 ksmbd: fix slab-out-of-bounds in init_smb2_rsp_hdr
ksmbd: fix slab-out-of-bounds in init_smb2_rsp_hdr
In the Linux kernel, the following vulnerability has been resolved:
ksmbd: fix slab-out-of-bounds in init_smb2_rsp_hdr
When smb1 mount fails, KASAN detect slab-out-of-bounds in
init_smb2_rsp_hdr like the following one.
For smb1 negotiate(56bytes) , init_smb2_rsp_hdr() for smb2 is called.
The issue occurs while handling smb1 negotiate as smb2 server operations.
Add smb server op
osv
CVE-2023-54217UNKNOWN≥ 6.3.0, < 6.3.22025-12-30
CVE-2023-54217 Revert "drm/msm: Add missing check and destroy for alloc_ordered_workqueue"
Revert "drm/msm: Add missing check and destroy for alloc_ordered_workqueue"
In the Linux kernel, the following vulnerability has been resolved:
Revert "drm/msm: Add missing check and destroy for alloc_ordered_workqueue"
This reverts commit 643b7d0869cc7f1f7a5ac7ca6bd25d88f54e31d0.
A recent patch that tried to fix up the msm_drm_init() paths with
respect to the workqueue but only ended up making things
osv
CVE-2022-50887UNKNOWN≥ 3.3.0, < 4.9.337≥ 4.10.0, < 4.14.303+6 more2025-12-30
CVE-2022-50887 regulator: core: fix unbalanced of node refcount in regulator_dev_lookup()
regulator: core: fix unbalanced of node refcount in regulator_dev_lookup()
In the Linux kernel, the following vulnerability has been resolved:
regulator: core: fix unbalanced of node refcount in regulator_dev_lookup()
I got the the following report:
OF: ERROR: memory leak, expected refcount 1 instead of 2,
of_node_get()/of_node_put() unbalanced - destroy cset entry:
attach overlay node /i2c/pmic@62/regu
osv
CVE-2023-54257UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.25-12025-12-30
CVE-2023-54257 CVE-2023-54257: In the Linux kernel, the following vulnerability has been resolved: net: macb: fix a memory corruption in extended buffer descriptor mode For quite so
In the Linux kernel, the following vulnerability has been resolved: net: macb: fix a memory corruption in extended buffer descriptor mode For quite some time we were chasing a bug which looked like a sudden permanent failure of networking and mmc on some of our devices. The bug was very sensitive to any software chan
osv
CVE-2023-54242UNKNOWN≥ 5.17.0, < 6.1.30≥ 6.2.0, < 6.3.42025-12-30
CVE-2023-54242 block, bfq: Fix division by zero error on zero wsum
block, bfq: Fix division by zero error on zero wsum
In the Linux kernel, the following vulnerability has been resolved:
block, bfq: Fix division by zero error on zero wsum
When the weighted sum is zero the calculation of limit causes
a division by zero error. Fix this by continuing to the next level.
This was discovered by running as root:
stress-ng --ioprio 0
Fixes divison by error oops:
[ 521.450556] divide error: 0000 [
osv
CVE-2023-54279UNKNOWN≥ 3.10.0, < 4.14.315≥ 4.15.0, < 4.19.283+6 more2025-12-30
CVE-2023-54279 MIPS: fw: Allow firmware to pass a empty env
MIPS: fw: Allow firmware to pass a empty env
In the Linux kernel, the following vulnerability has been resolved:
MIPS: fw: Allow firmware to pass a empty env
fw_getenv will use env entry to determine style of env,
however it is legal for firmware to just pass a empty list.
Check if first entry exist before running strchr to avoid
null pointer dereference.
osv
CVE-2023-54183UNKNOWN≥ 0, < 5.10.197-1≥ 0, < 6.1.55-1+1 more2025-12-30
CVE-2023-54183 CVE-2023-54183: In the Linux kernel, the following vulnerability has been resolved: media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link() If fwn
In the Linux kernel, the following vulnerability has been resolved: media: v4l2-core: Fix a potential resource leak in v4l2_fwnode_parse_link() If fwnode_graph_get_remote_endpoint() fails, 'fwnode' is known to be NULL, so fwnode_handle_put() is a no-op. Release the reference taken from a previous fwnode_graph_get_por
osv
CVE-2023-54215UNKNOWN≥ 0, < 6.4.13-12025-12-30
CVE-2023-54215 CVE-2023-54215: In the Linux kernel, the following vulnerability has been resolved: virtio-vdpa: Fix cpumask memory leak in virtio_vdpa_find_vqs() Free the cpumask al
In the Linux kernel, the following vulnerability has been resolved: virtio-vdpa: Fix cpumask memory leak in virtio_vdpa_find_vqs() Free the cpumask allocated by create_affinity_masks() before returning from the function.
osv
CVE-2023-54230UNKNOWN≥ 3.1.0, < 4.14.326≥ 4.15.0, < 4.19.295+6 more2025-12-30
CVE-2023-54230 amba: bus: fix refcount leak
amba: bus: fix refcount leak
In the Linux kernel, the following vulnerability has been resolved:
amba: bus: fix refcount leak
commit 5de1540b7bc4 ("drivers/amba: create devices from device tree")
increases the refcount of of_node, but not releases it in
amba_device_release, so there is refcount leak. By using of_node_put
to avoid refcount leak.
osv
CVE-2022-50849UNKNOWN≥ 0, < 5.10.178-1≥ 0, < 6.1.4-12025-12-30
CVE-2022-50849 CVE-2022-50849: In the Linux kernel, the following vulnerability has been resolved: pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP An oops can be induced by ru
In the Linux kernel, the following vulnerability has been resolved: pstore: Avoid kcore oops by vmap()ing with VM_IOREMAP An oops can be induced by running 'cat /proc/kcore > /dev/null' on devices using pstore with the ram backend because kmap_atomic() assumes lowmem pages are accessible with __va(). Unable to handle
osv
CVE-2022-50880UNKNOWN≥ 4.8.0, < 4.9.331≥ 4.10.0, < 4.14.296+6 more2025-12-30
CVE-2022-50880 wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state()
wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state()
In the Linux kernel, the following vulnerability has been resolved:
wifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state()
When peer delete failed in a disconnect operation, use-after-free
detected by KFENCE in below log. It is because for each vdev_id and
address, it has only one struct ath10k_peer, it is allocat
osv